• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/330

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

330 Cards in this Set

  • Front
  • Back
®Bluetooth
A wireless technology for exchanging data over short distances.
3G
3G 'third generation'. A standard for access technology enabling connection to the internet using mobile.
4G
4G 'fourth generation'. A much faster standard for connection to the internet than 3G.
Abnormal data
Invalid data used when testing a system; this is data that should not be accepted.
Absolute file path
Shows the whole of the path to the file from the root directory.
Absolute reference
In a spreadsheet, an absolute cell will always point to the exact cell described if it has a dollar sign ($) in the row or column coordinate, or in both. For example, =$A$5/A2.
Actuator
Device used to carry out the physical requirements of a computer.
Analogue data
Data in its original, physical form. Typically output from a sensor.
Analogue-to-digital converter
Device that changes analogue data to digital data so that it can be stored on a computer system.
Anchor
a type of hyperlink that will take you specifically to a different part of the web page you are on.
Animation (in presentation software)
An effect used on individual elements on one slide.
Animation using computers
Sequence of different pictures which project movement. CGI (computer-generated imagery) is the application of computer graphics to special effects in films and television programmes.
ANPR
Automatic number plate recognition.
Applets
A small program that is designed to be executed from inside another program, not from the operating system.
Applications program
a type of software that allows you to create many different types of documents, such as letters, invoices, presentations, web pages and so on.
Application software
Sets of instructions to the computer that allow the user to do something useful.
Apps
Short for application.
Artificial intelligence
An expert system that can change the rules by which it works according to experience of what has happened in previous occurrences.
Aspect ratio
The proportional relationship between the width and height of an image, expressed in numbers as in 14:6.
Audio-conferencing
A telephone meeting between multiple callers in separate locations.
Automated objects
Objects that update automatically every time your page is updated, for example date and time, page numbering, and so on.
Automated teller machine (ATM)
Cash point machine used to withdraw cash or manage a bank account.
Backing store
a secondary storage device for data.
Backup file
A copy of a file of information which is stored somewhere away from the computer and can be used to restore the file if the data is lost.
Bandwidth
A measurement of how much data can be sent along a communications channel in a given time, usually per second.
Bar code
A series of black and white lines representing a code number, used in a variety of applications.
Bar code reader
Device used to read bar codes - can be fixed or hand-held.
Batch processing
The data to be processed is collected together in batches and is then run at some later more convenient time. The data must not be time sensitive.
Binary code
The representation of a number in the binary system, which comprises only the digits 0 and 1.
Binary number system
The base-2 numeral system which represents numeric values using only two symbols, 0 and 1.
Biometric data
records that are used to identify people by a physical attribute that doesn't change. An example of this would be a database of fingerprints of known criminals.
Biometrics
The technologies that measure and analyse human body characteristics for the purpose of authentication. Typically used are fingerprints, eye retinas and irises, voice and face patterns.
Blog
Short for 'web log' - a website with regular entries of commentary, descriptions of events, or other material such as graphics or video.
Boolean
Data that can only take two states and hence can be represented by 0 or 1.
Botnets
Describes a number of internet computers set up to forward transmissions (including spam or viruses) to other computers on the internet.
Browser
A software application for searching and retrieving information resources on the world wide web.
CAD/CAM
Software which allows for the design of an item and then for its automatic manufacture.
Cascading style sheets (CSS)
A style sheet language used for describing the presentation of a document written in a markup language such as HTML.
CD-ROM
Compact disk read only memory - optical storage media.
CD-ROM drive
Device used to read CD-rom, CD-R and CD-RW media.
Cells
the small rectangular sections on spreadsheets used to enter data such as text, numbers or symbols and to perform calculations using formulas and functions.
CGI
Computer-generated imagery software for creating cartoons.
Changeover
The planning of how the new system is to replace the old system. Should include training/ file construction and hardware and software implementation. Typical methods are direct/phased/ parallel/pilot.
Chart/graph
data taken from spreadsheets can be represented by creating a graph or chart, such as a bar, pie or line graph. You can use different colours, lines and patterns for more visual clarity.
Chip-and-pin
Microchip built into debit/credit cards to provide security when purchasing.
Cloud
we sometimes refer to something being 'in the cloud'. It refers to software applications and data that are stored online and used through the internet. Cloud computing means that we don't have to think about where our data is, because with cloud computing it will be wherever we are.
Coded data
Data that has been changed in some way so that entry and storage in the computer are simplified, e.g. M instead of male and F instead of female.
Columns
made up of cells that are adjacent to each other and go from top to bottom or bottom to top vertically.
Comma separated values (CSV)
A simple structured format for data; used to exchange data between programs of different types.
Command-line interface
Interface between the computer and the user which requires the user to type commands at a prompt supplied by the operating system.
Compiler
A computer program that transforms source code written in a programming language into another computer language.
Compressed hours
When employees work the same number of hours but over fewer days.
Computer assisted learning (CAL)
Using computers to teach students facts about a particular topic. Would also be used for testing and producing results.
Concept keyboard
A computer input device. They have a flat surface and are used with a prepared paper or plastic overlay to indicate what will be input when the board is pressed.
Consistent style
the style on all of a company's promotional materials, with the same colours and logo position on all documents, using the same images and there being a 'sameness' in the look of all their materials.
Contactless payment
Devices, including smartphones that use radio-frequency identification (RFID) or near field communication (NFC) to make secure payments.
Content management system (CMS)
A system used to manage the content of a website.
Contiguous data
Data stored in a solid uninterrupted block; usually in spreadsheets or memory.
Contrast
the difference between how dull or bright an image and how it appears in reality or as can be seen by the human eye.
Cookie
A small amount of data sent from a website when the user is browsing that site; it is stored in a user's web browser.
Copyright
the exclusive and assignable protection of intellectual property by law.
Corporate branding
the promotion of a particular company or organisation through the advertising style it uses. The more people see the style the more they associate it with that particular company or organisation.
Crop
cutting out a part of an image that is not required for the intended purpose.
Custom written software
Software that is specially commissioned to carry out a particular task.
Data
Material that is stored in the computer.
Data capture form
Form designed to collect data and then to allow easy entry of the data to the computer.
Data duplication
repeating data by adding data that is already held in the database.
Data logging
Collection of data for future processing.
Data packets
When data is transmitted, it is broken down into small, similar blocks of data which are reassembled once they reach their destination.
Data table
Table which lists and defines the purpose and type of each variable used in a computer program.
Database
A collection of data. It normally has more than one file (table) which can interact with other files so that the need for duplication of data is reduced.
De-skilling
The effect on workers who no longer need a particular skill because it is done by new technology.
Declarations
when using CSS to create stylesheets, the CSS rules require you to define the properties and the values for each selector you wish to use by using declarations.
Dedicated
Something that is designed to do only one thing. A dedicated microprocessor is used to control a washing machine, a job that it does very well, but it can't do anything else.
Design
Producing the parameters of the solution to a problem. Done in the order: output/input/ storage/ processing. Design can be done on paper or directly to the computer.
Desktop publisher (DTP)
Application that allows the import of text and graphics to the computer and can then be used to arrange it on a page.
Device driver
A program to control a device that is attached to your computer, such as a printer.
Digital camera
Camera which uses memory to store photographs instead of film. Can be used as an input device.
Digital certificate
An electronic certificate similar to a passport to allow the exchange of information securely over the internet using the public key infrastructure (PKI).
Digital data
Data in electronic form, suitable for storage on a computer.
Digital-to-analogue converter
Device that changes digital data to analogue data so that it can be transmitted via telecommunications or used to drive an actuator.
Direct access
File where the data is indexed making access to a specific piece of data very fast.
Direct data entry
When input devices transfer data into a computerised information system. E.g. RFID, MICR.
DNS server
Domain name system server. DNS turns the userfriendly version of a domain name, such as www. thisismysite.com, into numbers such as 60.22.161.42. This set of numbers is called an Internet Protocol (IP) address and is used to route you to your requested site. DNS works through a massive distributed database that stores domain names and their IP addresses so that it can find the domain name you want.
Double data entry
a proofing technique that uses the COUNTIF spreadsheet function together with conditional formatting to highlight the differences in two lists of items.
Drone
Unmanned aircraft or flying robot.
Duplex
a feature of printers that enables automatic printing on both sides of a sheet of paper.
Electrical overload
electrical circuit overloads are when too many electrical items are plugged into one socket causing more current to be put across an electrical wire or circuit than it can handle.
Electronic conferencing
Use of electronic communications to allow people to hold meetings without actually meeting. These links could be voice only or more often would now include live video, then known as video conferencing.
Electronic funds transfer (EFT)
Transfer of money from one bank account to another by computers.
Electronic funds transfer at point of sale (EFTPos)
Money is transferred, by computer, from the customer's bank account to the shop's bank account to pay for goods.
Encryption
Making data difficult to read by scrambling mathematically. Before reading, the contents must be decrypted.
Ethernet
the most common standard defining the wiring and signalling in a LAN.
Expert system
A computer system that stores facts about a particular topic and can search the facts for sensible information according to a set of rules.
External storage device
data storage that is separate from the computer, it usually plugs into a USB port on the computer.
Extracting a pie chart sector
when a section of a pie chart is extracted out of the pie chart in order to highlight or emphasise a point.
Extreme data
Values at the extreme ends of normal data used in testing a system; this is data that should be accepted.
Facimile (fax)
An exact copy of a document that is scanned transmitted as data by telecommunications links.
Field
An area of a record in a file which stores a specific piece of data.
File
A collection of data covering a particular topic.
File directory
An index which allows fast access to the files.
File extension
a way to identify the type of file.
File name
a way to identify a file.
Firewall
A stand-alone machine or an application through which external messages must be filtered. This stops viruses and unauthorised access to the system.
Flash memory cards
Used in mobile phones (cell phones), MP3 players and digital cameras as storage.
Flat file
Database held as a table and stored in a single file.
Flexible working
A working schedule different from normal working patterns when working hours can be varied instead of fixed.
Foreign key
A field in one table of a relational database that is linked to the primary key in another table.
Formatting
The preparation of the surface of a storage medium so that it is ready to accept data. The process results in the previous data being erased.
Formatting text
using the font type, font size, font colours, etc. that you prefer for your text.
Formula
arithmetical or mathematical operations carried out on cells even when they do not form part of a range of cells; for example, you can add cells together where you cannot use the function SUM because the cells being added up are not adjacent to each other.
Function
arithmetical or mathematical operations that are carried out on groups of cells, ranges, columns or rows and are very specific, for example AVERAGE or SUM.
Geographic information systems (GIS)
For capturing, storing, checking and displaying data related to the surface of the Earth as a map.
Graphical user interface (GUI)
Uses windows (W) to create a border to the information, icons (I) to represent files, menus (M) to allow user to make choices and a pointer (P) to select choices. Hence, sometimes called a WIMP.
Graphics
Pictorial representation and manipulation of data.
Graphics tablet
Device to input designs as they are being drawn by hand; also used in editing graphics/ photographs.
Gridlines
the visible onscreen lines between cells in a table.
Gutter margin
A typographical term meaning an addition to the margins on the inside of two facing pages in a book. It compensates for the part of the paper made unusable by the binding process.
Hacking
Unauthorised access to computer systems.
Handshake
When the computer wants to communicate with a device it is important that rules are established for the communication. This must be done before communicating and is known as handshaking.
Hanging paragraph
indentation of the second and subsequent lines of a paragraph that is different from the first indentation of the paragraph.
Hard disk
Magnetic storage device.
Hardware
The physical parts of a computer system.
HCI
Human computer interface.
House style
Sometimes called 'branding', it is a set of rules to keep all written communications of an organisation in the same format throughout that organisation.
HTML
Hypertext markup language.
HTTP
Hypertext transfer protocol.
Hub
Central node of a network or sub-network to which each computer is connected. Data transmitted by one computer is passed to all ports of the hub.
Hyperlink
A link from a hypertext document that takes you to another location when you click on a highlighted word or an image.
HyperText Transfer Protocol (HTTP)
Used by the World Wide Web to define how a web page is formatted and transferred.
HyperText Transfer Protocol secure variant (HTTPS)
HTTP using a secure encrypted link.
Icon
Pictorial representation of a specific file, directory, window, option, or program.
Indented paragraph
a paragraph that begins its first line of text a few spaces away from the left-hand margin.
In-plane switching (Ips)
A screen technology allowing greater viewing angles and colour reproduction.
Inference engine
A processing program which is the part of an expert system that derives conclusions from facts in the knowledge base of the expert system.
Information assets
valuable data that you wouldn't want to be stolen or corrupted.
Input device
transfers data into a computer so that it can be processed.
Intellectual property
the ideas and skills of other people that belong to them.
Integration of software
Pieces of software that can communicate with one another and share data without changing its form.
Interface
The hardware and software that create the connection between the user and the computer or the software being used.
Internet
A public, worldwide WAN whose contents are not controlled.
Internet café
Where customers can pay to use computer systems and usually coffee is available.
Internet connection sharing
ICS is a way of connecting more than one computer in a LAN to the internet using only one connection and IP address.
Internet Service Provider (ISP)
ISPs allow a connection to the internet (usually with a price attached to different levels of service).
Intranet
A privately operated WAN, like the Internet, except that the data content is controlled and access to it is also controlled.
ISBN
International Standard Book Number, which consists of 13 digits. ISBNs include a check digit calculated using a mathematical formula to validate the number.
Item
Item of data stored in a field.
Iteration
Process of repeating a sequence of steps.
Joystick
An input device used in games, simulations and control applications to move an object.
Key (field)
The field that is used to identify the record within the file. The item within the key field must be unique.
Keyboard
Input device used to input characters.
Landscape
the wider, shorter orientation of a page compared to the narrower, taller version of a page with a portrait orientation.
Laptop
Portable computer, able to operate from internal battery power, also known as a notebook.
Layout
the way objects are arranged in the space provided on the page of a document.
Legend
a key at the side of a chart or graph that indicates what the symbols or colours and patterns represent in the chart or graph.
Linker
A computer program to combine files generated by a compiler into single executable file, or another object file.
Local area network (LAN)
Network that is physically close together. The machines are close enough to be hard wired.
Lossless
A form of file compression that allows all original data to be recovered when the file is uncompressed.
Lossy
Lossy compression reduces a file by permanently eliminating some information so when the file is uncompressed, not all of the original information is still there (although you may not be able to notice it).
Machine code
Set of programming instructions to match the electronic design of a particular computer. An example of a low-level language.
Magnetic disk Storage
medium that can store large amounts of data in a way that allows direct access to the data.
Magnetic ink
Special ink used to print characters so that they are in both computer- and human-readable form.
Magnetic stripes
Magnetic material which stores information about the holder, typically on the back of a credit card/debit card.
Magnetic tape Storage
medium which is now a bit out of date but is still used to keep backup files on some systems.
Mail merge
A time-saving method of sending the same letter to many people with the automatic addition of individual names and addresses from a database to each letter.
Mainframe computer
Large-scale computer typically used in a large organisation to be the processing power for all the terminals in a multi-user system.
Master slide
the main slide where you can create the design you want to use across all the other slides in a presentation.
Memory sticks
Pen drives used to store files (up to many gigabytes) or transport files from one computer to another.
Microcomputer
Term no longer in use to describe a PC - personal computer.
Microphone
Device used for input of sound to a computer system.
Microprocessor
A dedicated device that incorporates all the parts of a computer processor on a single chip (also known as CPU - central processing unit).
Minicomputer
A larger computer than a PC but smaller than a mainframe. Called a mini because when they were invented they were the smallest computer. Typically used to control the checkouts in a supermarket.
Modem
An abbreviation of 'modulator/demodulator' - hardware device to connect a computer to the telephone network; needed because the computer produces digital signals and the telephone network uses analogue.
Module
Smaller components after a problem has been broken down by the use of top- down design.
Monitor
Device that shows computer output in picture form. TFT monitors may be used for a PC system or be an integral part of a laptop.
Motherboard
A motherboard contains a computer's basic circuitry and sockets to plug in components.
Mouse
Input device used to control a pointer in a graphical user interface.
Multi-access (operating system)
Operating system which allows the resources of a computer to be used by a number of users at terminals. The processing is centralised.
Multi-tasking (operating system)
Operating system which can do a number of different things simultaneously. Microsoft Windows is a typical multi- tasking OS.
Multimedia
Combination of more than one of: text, graphics, photographs, sound, animation, video.
Multimedia package
Set of software which uses many different media to convey or manipulate information.
Multimedia projector
Output device used for presentations.
Musical instrument digital interface (MIDI)
A communications link between an electronic instrument and a computer. Each device must have midi hardware.
Named cell or range
each cell in a spreadsheet has a name by default, for example E7 is the cell in column 'E' and in row '7'.
Nested formula/function
you can 'nest' a formula or function inside another formula or function in one cell of a spreadsheet.
Netbook
Small notebook, often used simply to send emails or access the internet.
Network
Linked set of computer systems, allowing the sharing of resources.
Network operating system
Operating system which allows a number of machines to be in communication with each other and to share data and resources.
Non-contiguous data
Data that is not stored in a solid uninterrupted block; usually in spreadsheets or memory.
Notebook
Portable computer, able to operate from internal battery power, also known as a laptop.
Objectives of a solution
List of things that a solution should do, that has been agreed between the analyst and the user and will be used during the testing of the solution to decide whether or not the solution works.
OCR
Optical character recognition.
Off-line
This is a way of using the computer where the user or device is not directly connected to the processor.
Off-the-shelf software
Ready-for-use software.
OMR
Optical mark reader.
On-line
Using the computer where the user or the device is directly connected up to the processor.
Online processing
Processing which allows the user to interact directly with the main computer.
Operating system
Set of software which controls the hardware and applications of the computer and provides an interface with the outside world.
Optical disk
Storage device that stores large amounts of data in a way that can be accessed directly. The data is stored and read using lasers, rather than magnetically.
Optical mark form
Form used to record optical marks which are then read by OMR.
Page orientation
the way you position your page having the narrower width across the top of the page is called 'portrait' orientation; having the wider width across the top of the page is called 'landscape' orientation.
Pages
these are the same as spreadsheet sheets.
Pagination
the numbering of pages in a document.
Part-time working
working fewer hours per week than people usually do.
Password
Secret code that gives the user access to the computer, file or folder.
Pharming
A cyber attack that redirects a website's traffic to another, fake site.
Phishing
Phishing attempts to acquire sensitive information for malicious reasons whilst masquerading as a trustworthy entity in an email or other electronic communication.
Physical data
Data that exists in the physical world like length, area, weight. This data is analogue and is not in the right form for a digital computer.
Pixel
The smallest part of a computer graphic image. A large number of pixels are put together to form the whole image. The pixel is so small that it cannot be seen.
Placeholders
'frames' or 'empty boxes' to insert items of text, images, sound, video and so on.
Plotter
Device used to produce hard copy output of line drawings from a computer.
Point of sale (POS)
The cash register/till in the shop where customers pay for their purchases.
Pointer
device Used for input to the computer by pointing at a particular output on the screen. Typically the pointer is a mouse.
Presentation software
Software that allows a presentation to be produced using linked screens (or frames) that can be followed in an order. Allows use of animation and sound as well as standard outputs.
Preview
a tool that allows you to see what your document will look like before you either print it out, save it or send it somewhere else
Primary key
In a relational database it is a key field that is unique for each record. It is a unique identifier, such as a passport number. A relational database must always have one primary key.
Printer
Device used to produce hard-copy output from a computer.
Privacy of data
Some data is confidential and methods need to be used to ensure that the wrong people do not see it. Methods used include passwords and encryption.
Privacy settings
Settings in your software to control who is allowed who is authorised to view your postings.
Private key
Used in cryptography, it is an encryption/ decryption key known only to the people exchanging. It is shared by the communicators so that each could encrypt and decrypt messages.
Process control (operating system)
An operating system which allows a processor to control the use of sensors and actuators.
Processor
called CPU, short for central processing unit.
Proofing Reading
a copy of a publication to find and correct errors in text or art.
Protocol
Guidelines or procedures to follow for the format of data transmitted between two devices, for example: FTP, HTTP.
Prototyping
Producing a partial solution to a problem so that that area of the problem can be tested without reference to the rest of the solution.
Proxy server
Controls the access of authorised users to data on a different network and prevents external users gaining control of the system.
Pseudo-code
A method of describing the design of a system in the user's own language. Looks like programming code but cannot be run or compiled.
Public key
In cryptography it is a value provided as an encryption key, when, if combined with a private key can be used to encrypt messages and digital signatures.
Radio-Frequency Identification (RFID)
A RFID reader will typically consist of a small chip and an antenna.
Random access memory (RAM)
That part of the computer's memory that is used to store programs and files that are being used by the computer at that time. The contents of RAM are lost when the power is turned off.
Range
a group of cells in a spreadsheet that consist of more than one row and column and where the cells are all adjacent to each other.
Re-skilling
When a worker with a particular skill that is no longer needed learns and uses a different skill.
Read only memory (ROM)
That part of the computer's memory that is not erased when the power is turned off. Contains code used when the computer is turned on.
Real-time processing
Operating system that processes an input and produces output immediately.
Record
Part of a file which stores data about a particular entity. All records in the file store the same type of data.
Reflect
producing a mirror image of the original image.
Relational table
Complex database structure stored in more than one table, which are linked together (by foreign keys).
Relative file path
A path specifies a unique location in a file system. A relative path starts from a given working directory, not from the root directory. Avoiding the need to provide the full absolute path.
Relative reference
When a relative reference is replicated to other rows or columns, the cell reference will automatically update itself accordingly, unlike the absolute cell reference which always points to an exact cell.
Repetitive strain injury (RSI)
Injury caused by the constant use of certain muscles, mainly fingers or joints in the arms, as a result of typing for long periods of time.
Requirement specification
List of the necessary hardware and software to put a solution into practice and a list of the wishes of the proposed user of the solution.
Resize
changing the width and/or height of an image to fit its intended purpose.
Resolution
Measurement of the clarity of an image based on the number of pixels used to create the image.
Robotics
Study, design and use of robots for use in automated industrial processes.
Rotate
turning an image around from its original position.
Router
Complex hub which contains the network addresses of the attached computers and can forward data to the correct location, often used where a LAN connects to a WAN.
Routkits
A malicious program to allow an unauthorised user to control a computer system undetected.
Rows
made up of cells that are adjacent to each other and go from left to right or right to left horizontally.
Sans-serif
font font types that do not have any serifs or 'tails' at the ends of characters.
Scales
the units of measurement used on the axes of a chart or graph.
Scanner Device
that reads an image on paper into the computer.
Script
a set of instructions for a computer.
Scripting language
a fairly simple programming language, such as JavaScript, used to create a script.
Search engine
A computer program that searches for and identifies items in a database that correspond to keywords entered by the user for finding particular sites on the world wide web.
Secondary storage
device sometimes called external memory, this is non-volatile memory (does not lose stored data when the computer is switched off).
Secure socket layer (SSL)
Layer that allows an encrypted connection between your web server and the web browser of visitors to it enabling private information to be transmitted without problems such as eavesdropping, data tampering or message forgery.
Security of data
Data that is being stored is necessary otherwise it would not be stored. The security of the data is how it is looked after to make sure that it is not destroyed, typically by making backups of the data.
Security settings
Settings you can change to protect your computer from harm.
Selectors
when using CSS to create stylesheets, the CSS rules require you to specify the selectors (HTML elements) to which you wish the styles to apply before defining the declarations. The declarations are applied to the selectors.
Sensors
Input devices that capture physical data.
Sequential file
File where the data is stored in a logical order, e.g. Alphabetic.
Serial file
File where the data is stored in the order in which it was received.
Sheets
in spreadsheets, the sheets are like the different pages of a book. You can rename each sheet to whatever you prefer and add as many sheets as you need to.
Slogan
a phrase or a string of words (not necessarily a sentence) that are representative of a company or organisation.
Smartcard
A plastic card such as a credit or debit card with a built-in microprocessor that are used to carry out financial transactions.
Smartphone
A mobile phone that can perform many of the functions that a computer performs.
Smishing
A security attack where a user is tricked into downloading a virus or malware onto a cellular phone or mobile device.
Social networking
People use a website to talk, share ideas and images and to make new friends.
Software
A general term for instructions to a computer to perform a variety of tasks.
Solid-state
media storage media with no moving parts, based on electronic circuits and using flash memory.
Solid-state memory
Similar to RAM only the data is persistent (non-volatile). Used as a replacement for hard disks.
Sound card
this enables the computer to send audio information to an audio device, such speakers or headphones.
Spam
When multiple copies of the same message are sent over the internet to try to force the message on people who would not otherwise choose to receive it.
Speakers
Electro-mechanical device producing sound output from electricity input.
Spreadsheet
Application designed to handle numbers and calculations in a grid formation. Is also used for predicting future trends according to rules that govern the numerical data input.
Spyware
A program that can secretly record what you do on computer. It usually tries to capture passwords, banking and credit card details for fraudulent purposes.
Stepwise
refinement The breaking down of a large problem into smaller sub-problems (see top-down design).
Storage media
something onto which data is written for safe keeping, like a tape or a disk.
Supercomputer
Most powerful type of computer. The extremely fast processing speeds make it useful for applications requiring large amounts of calculation like weather forecasting.
Switch
Similar to hub but only sends data to devices that are addressed, rather than all devices. Used to cut down traffic on complicated networks.
Syntax
every language has a set of rules that govern the ways their words combine to form phrases, clauses and sentences. Similarly, in computer programming languages, syntax defines the combinations of symbols that are considered to be a correctly structured document or fragment in that language.
System
flowchart Diagrammatic representation of the way the hardware and software operate in the system and the way that the files are stored.
Systems
analysis Standardised set of steps that can be used to analyse a problem and design and implement a solution to the problem.
Systems analyst
Person responsible for carrying out the stages of systems analysis on a project.
Systems life cycle
the different stages in the process of producing a new IT system.
Systems software
Software that operates the computer hardware and provides a platform for running application software.
Tablet
A small, wireless, portable, personal computer which has a touch screen interface.
Tabs
small buttons typically placed at the bottom of a spreadsheet and serve to navigate between the different sheets.
Tabulation
refers to how far to the left or right text is indented.
Technical documentation
Set of detailed descriptions about how the solution was arrived at and how it works. Intended for someone who needs to maintain the system.
Tele-conferencing
A conference between two or more people in separate locations using computer networks to transmit audio and video data.
Template
a frame upon which to build a document by simply copying the same style or filling in your own relevant information in the spaces provided
Test plan
Set of test instructions designed to test specific parts of the solution.
Test strategy
Decision made by the systems analyst about who/where/when and how the eventual solution is to be tested.
Tethering
Using a mobile device that's connected to the internet as a modem for another device, such as a laptop or a WiFi-only tablet.
Thermistor
Semiconductor device that is used to read temperature (its resistance varies with temperature).
Time dependent
Data which must be used immediately otherwise it becomes useless is said to be time dependent.
Top-down design
The breaking down of a large problem into smaller sub-problems (see stepwise refinement).
Touch screen
Screen that allows input as well as output. Input is accomplished by pointing at an area of the screen.
Touchpad
Used in laptops as an alternative to a mouse as an input device.
Trackerball
An input device used to control pointers; may be used in older laptops. Very similar to a mouse.
Transitions (in presentation software)
An effect used to make a slide appear or disappear, such as fade or blinds.
Trilateration
A technique to find the user's position, speed, and elevation by constantly receiving and analysing radio signals from GPS satellites.
Universal resource locator (URL)
Unique reference for each resource on the internet.
User documentation
Detailed descriptions of how to use the system.
Utilities
A small program that provides an addition to the capabilities provided by the operating system such as: antivirus, disk repair, file management, etc.
Validation
Checking data input to a system to ensure that it follows certain rules and is sensible.
Variable
Symbolic name, often in programming code, that can take different values.
Verification
Checking of data input to ensure that is correct.
Video card
this is an internal circuit board for displaying images from a computer onto a screen.
Video conferencing
Electronic meeting where all physically separated participants can be seen as well as heard.
Virus
Computer code that is maliciously placed on a computer system with the aim of damaging the system.
Virus protection
Software which identifies viruses and deals with them by not allowing access or erasing them.
Vishing
A fraudulent phone call from someone, for example, posing as a bank representative who tries to persuade victims to reveal financial information.
Visual verification
a proofing technique whereby you visually check a document for accuracy and correctness.
VOIP
Voice Over Internet Protocol.
Watermark
A very faint design visible behind the main text.
Web 2.0
Use of the internet that aims to enhance communications, secure information sharing and other forms of collaboration. Web 2.0 concepts have led to the development of social-networking sites, file- sharing sites, wikis and blogs.
Website authoring
Application that enables the user to create a website.
Wide area network (WAN)
Machines on the network are so far apart that they cannot be hard-wired. Interconnected by satellite, radio or fibre-optic cable.
Widow / orphan
A term used for the lines at the beginning or end of a paragraph, which are split between the top or bottom of a page or column, separated from the rest of the paragraph.
WiFi
Wireless technology to connect devices with each other without the use of cables or wires.
WIKI
Web page(s) designed so anyone who accesses it can contribute or modify the content.
Wild card search
A search for multiple words using wildcard characters such as an asterisk () wildcard character to search for a string of characters e.g. chair, would find, wheelchair, armchair, easychair, or any words ending in chair.
WLAN
a Wireless Local Area Network covers short distances, using radio or infrared signals.
Word processor
Application dedicated to the production of text-based documents.
World Wide Web
an information system that operates over the internet. It lets documents connect to other documents using hyperlinks, so that the user can search for information by moving from one document to another.
Worms
A program that self-replicates; it penetrates an operating system with the intent of spreading malicious code.
XML
Extensible markup language designed to store and transport data to be both human- and machine-readable.

Data manipulation

The process of changing data to make it easier to read or to make it more organised.