Anda di halaman 1dari 5

over a period of time and then batched Cell an area on a spreadsheet produced

ICT Glossary together, inputted and processed in one


go. For example, questionnaires from a
survey are collected over a few weeks
by the intersection of a column and a row
in which data can be placed.
By Sarang Sujit, Ph.D. and then batched together and processed Changeover the process by which an
in one go. older ICT system is replaced with a
newer one.
A bcc (blind carbon copy) this is useful
when you want to send an email to one Character any symbol (letter, number,
person and others but you do not want punctuation mark, etc.) that you can type
the others to see each others email from the keyboard.
Abnormal data data that is unacceptable addresses.
and that should be rejected by a Check digit a decimal number (or
validation check. For example, entering Biometric a property of the human body alphanumeric character) added to a
text into a numeric field or data which is such as fingerprints or pattern on the number for the purpose of detecting the
outside the range specified. retina which can be used to identify a sorts of errors humans normally make on
person and allow them access to a data entry.
Absolute reference a reference to a cell computer system.
used in a formula where, when the Chip and PIN chip readers are the
formula is copied to a new address, the BIOS (basic input/output system) stored devices into which you place a
cell address does not change. in ROM and holds instructions used to credit/debit card to read the data which
boot (i.e. start) the computer when first is encrypted in the chip on the card. The
Access rights restrictions to a users switched on. PIN pad is the small numeric keypad
access to only those files they need in where the personal identification
order to perform their job. Blog a web site that allows comments to number (PIN) is entered and the holder
be posted usually in reverse of the card can be verified as the true
Actuator a device which takes control chronological order. owner of the card.
signals from a computer and converts
them into movement, e.g. to turn a valve Blogger a person who maintains a blog. Cloud computing Internet-based
on/off or to open/close a window. computing where programs and data are
Bluetooth a method used to transfer data stored on the Internet rather than on the
Address book the names and email over short distances from fixed and users own computer.
addresses of all the people to whom you mobile devices wirelessly. The range of
are likely to send email stored as a file. Bluetooth depends on the power of the Command line interface type of user
signal and can be typically from 5m to interface where a user has to type
Alphanumeric data sometimes called text 100m. instructions in a certain format to
and it includes letters, digits and accomplish a task.
punctuation marks. Bookmarks storage area where the URL
(i.e. the web address) of a web site can be Compression storing data in a format
Analogue a continuously changing stored so that it can be accessed later that requires less space. A compressed
quantity that needs to be converted to using a link. file takes less time to be transferred
digital values before it can be processed across a network.
by a computer. Boolean data data that can only exist in
two states. For example True/False. Computer Misuse Act the Act which
Analogue-to-digital converter (ADC) a makes illegal a number of activities such
device that changes continuously Bridge a hardware device used to as deliberately planting viruses, hacking,
changing quantities (such as connect two local area networks to each using ICT equipment for frauds, etc.
temperature) into digital quantities. other. The purpose of a bridge is to
decide whether a message needs to be Content the actual text, images, etc.
Anti-virus software software that is used transferred between the two networks or
to detect and destroy computer viruses. just confined to one of them. This reduces Control system system used to control a
network traffic. process automatically by making use of
Application software software designed data from sensors as the input to the
to do a particular job such as word- Browser (also called web browser) system.
processing or database software. software program you use to access the
Internet. Microsoft Internet Explorer is Copyright, Designs and Patents Act an Act
Aspect ratio the ratio of the width of an an example of a web browser. making it a criminal offence to copy or
image to its height. steal software or use the software in a
way that is not allowed according to the
Attachment a file which is attached to an
email which the recipient can open and C software licence.
view the contents provided they have Cookie a small text file with some data
suitable software to open the file about your preferences stored on your
CAD (computer-aided design) software computer to modify a website according
software used to produce technical to your preferences.
drawings, plans, designs, maps, etc.
CPU (central processing unit) the
cc (carbon copy) used when you want to computers brain. It interprets and
send an email to one person but you also executes the commands given to it by the
B want others to see the email you are
sending. To do this you enter the email
hardware and software.
address of the main person you are Cropping only using part of an image.
sending it to and in the box marked cc
Backing storage storage which is not you enter all the email addresses, CSV (comma separated variables) a way
classed as ROM or RAM. It is used to hold separated by commas, of all the people of holding data in a file so that it can be
programs and data. Backing storage you wish to receive a copy. transferred into databases or
devices include magnetic hard drives, spreadsheets.
optical drives (CD or DVD), flash/pen CD R (compact disk recordable) optical
drives, etc. storage where data is stored as an optical
Backup file copy of a file which is used in
pattern. The user can record their data
onto the disk once only. D
the event of the original file being
corrupted (damaged). CD ROM (compact disk read only
memory) optical storage where data is Database a series of files stored in a
Backup keeping copies of software and stored as an optical pattern. Once data computer which can be accessed in
data so that the data can be recovered has been written onto CD ROM it cannot different ways.
should there be corruption or loss of be erased. It is mainly used for the
some or all of the ICT system. distribution of software. Data capture term for the various
methods by which data can be entered
Bandwidth a measure of the amount of CD RW (compact disk read- into the computer so that it can be
data that can be transferred per second write) optical storage that allows data to processed.
over the Internet or other network. be stored on the disk over and over again
just like a hard disk. This is needed if the Data logger a device which collects
Bar code a series of dark and light lines data stored on the disk needs to be readings from one or more sensors. The
of differing thickness which are used to updated. You can treat a CD RW like a time interval between each reading can
represent a number which is usually hard drive but the transfer rate is less be varied (called the logging rate) and
written below the bar code. Can be read and the time taken to locate a file is the total time over which the data is
by an scanner to input the number greater. The media is not as robust as a logged (called the logging period) can
accurately. hard drive. also be varied.
Batch processing type of processing Data logging the process of using an ICT
where all the inputs needed are collected system to collect data from sensors at a
certain rate over a certain period of time.
Remote weather stations use data F H
logging.
Data Protection Act an Act that restricts Fax a machine capable of sending and Hackers people who try (succeed) to
the way personal information is stored receiving text and pictures along break into a computer/computer
and processed on a computer. telephone lines. network illegally.
Data redundancy where the same data is Field a space in an information handling Hacking process of trying to break into a
stored more than once in a table or system/database used for inputting data. secure computer system.
where the same data is stored in more For instance, you could have fields for
than one table. surname, date of birth, etc. Hard copy printed output from a
computer which may be taken away and
Data type check validation check to File a collection of related data. studied.
ensure the data being entered is the same
type as the data type specified for the File attachment (sometimes called an Hardware the physical components of a
field. attachment) a file that is attached to an computer system.
email and can be sent to another person
Digital camera a camera that takes a or a group of people. Header text placed at the top of a
picture and stores it digitally so that it document.
can be transferred to and processed by a File compression taking files and using
computer or other device. special software to reduce their size Hub a hub contains multiple ports (i.e.
before sending them over the Internet or connection points). When a packet of
Digital signature a way of ensuring that to reduce their size so that they take up data arrives at one port, it is copied to the
an email or document sent electronically less space on the storage media. other ports so that all network devices of
is authentic. It can be used to detect a the LAN can see all packets. Every device
forged document. Firewall a piece of software, hardware or on the network will receive the packet of
both that is able to protect a network data, which it will inspect to see if it is
Digital-to-analogue converter (DAC) a from hackers. relevant or not.
device that changes digital quantities into
analogue ones. Flash/pen drives portable storage media Hyperlink a feature of a web site that
which offer cheap and large storage allows a user to jump to another web
Direct/random access data is accessed capacities and are an ideal media for page, to jump to part of the same web
immediately from the storage media. photographs, music and other data files. page or to send an email message.
This is the method used with storage They consist of printed circuit boards
media such as magnetic hard disks and enclosed in a plastic case. Hypertext Mark-Up Language (HTML) a
optical media such as CD and DVD. computer programming language used to
Flat file method used for storage of data create documents on the World Wide
Dot matrix printer a printer which uses in a database where all the data is held in Web. You use it to specify the structure
numerous tiny dots to make up each a single table. and layout of a web document.
printed character. It works by hitting tiny
pins against an inked ribbon to make the Font a set of letters and characters in a
dots on the page, so this makes this
printer noisy.
particular design. I
Footer text placed at the bottom of a
Double entry of data two people use the document.
same data source to enter the details into Identity theft using your banking/credit
the ICT system and only if the two sets of Format checks checks performed on card/personal details in order to commit
data are identical, will they be accepted codes to make sure that they conform to fraud.
for processing. It is a method of the correct combinations of characters.
verification. Inference engine one of three parts of an
expert system. It is a rules base and is the
part of the expert system that does the
Download to copy files from a distant
computer to the one you are working on. G reasoning by manipulating and using the
knowledge in the knowledge base.

E Gateway the device/software that


translates between two different kinds of
Information Data + Meaning =
Information. For example 12/03/11 is
computer networks (e.g. between a WAN data. Only when we understand it is the
and a LAN). date for the exam and it is in dd/mm/yy
EFTPOS (electronic funds transfer at point do we have the information that the
of sale) where electronic funds transfer GIF (Graphics Interchange Format) file exam date is 12th March 2011. So date
takes place at a point of sale terminal. type used for images. Images in this needs field name and format to become
This means that money is transferred format are reduced to a maximum of 256 information.
from the bank or credit card company to colours. Images in this format are
the store when you pay for goods at a compressed so this means that they load Inkjet printer printer that works by
store. quickly. Used for simple line diagrams or spraying ink through nozzles onto the
clip art. paper.
GPS (Global Positioning System) system Input device the hardware device used
Encryption the process of scrambling which uses the signals from several to feed the input data into an ICT system
files before they are sent over a network satellites to obtain the exact position of such as a keyboard or a scanner.
to protect them from hackers. Also the any object (e.g. aircraft, ship, car, etc.) on
process of scrambling files stored on a the Earths surface. Many cars are Instant messaging (IM) a method of two
computer/storage device so that if the equipped with satellite navigation people using real time text to conduct a
computer/storage device is stolen, the systems which use GPS so that the driver conversation using the Internet.
files cannot be read. Only the person who can locate their position on a map on a
has a special key can see the information small screen inside the car. Internet a huge group of networks joined
in its original form. together. The largest network in the
Graphics tablet an input device which world.
EPOS (electronic point of sale) a consists of shapes and commands on a
computerized till which can be used for tablet which can be selected by the user Internet service provider (ISP) a
stock control. by touching. Using a graphics tablet, company that provides users with an
means that more space is left on the Internet connection.
Ergonomics an applied science screen for a plan or diagram.
concerned with designing and arranging Intranet a private network used with an
things people use so that the people and Graph plotter output device which draws organization that makes uses of Internet
things interact most efficiently and safely. by moving a pen. Useful for scale technology used for sharing internal
drawings and is used mainly with CAD information.
Evaluation the act of reviewing what has packages.
been achieved, how it was achieved and IP (Internet Protocol) address a number
how well the solution works. GUI (graphical user interface) interface which uniquely indentifies the physical
that allows users to communicate with computer linked to the Internet.
Expert system an ICT system that mimics the computer using icons and pull-down
the decision-making ability of a human menus.
expert.
Gutter the extra margin space given to
J
Extreme data is data on the borderline of either side of a page in a document so
what the system will accept. For example, when it is binded into a document, there
if a range check specifies that a number will be equal looking margins on every Joystick input device used instead of the
from 16 to 21 inclusive is entered, the page cursor keys or mouse as a way of
extreme data would be 16 and 21. producing movement on the screen.
JPEG a file format used for still images
which uses millions of colours and
MIDI (musical instrument digital
interface) used mainly to communicate P
compression which makes it an ideal file between electronic keyboards,
format for photographic images on web synthesizers and computers. MIDI files
pages. are compressed and the files are quite Password a series of characters chosen
small. by the user that are used to check the
identity of the user when they require
K Monitor another name for a VDU or
computer screen.
access to an ICT system.
PDA (personal digital assistant) a small
Key field this is a field that is unique for a MP3 music file format that uses hand-held computer.
particular record in a database. compression to reduce the file size
considerably which is why the MP3 file Personal data data about a living
format is popular with portable music identifiable person which is specific to
Knowledge base one of three parts of an players such as iPods and mobile phones. that person.
expert system. A huge organized set of
knowledge about a particular subject. It Multifunction devices hardware which Pharming malicious programming code
contains facts and also judgemental brings together the functions of several is stored on a computer. Any users who
knowledge, which gives it the ability to devices. For example, by combining PDA try to access a web site which has been
make a good guess, like a human expert. and mobile phone technology you can stored on the computer will be re-
have phones capable of browsing the directed automatically by the malicious
Internet. code to a bogus web site and not the web
site they wanted. The fake or bogus web
Multimedia making use of many media site is often used to obtain passwords or
such as text, image, sound, animation and banking details so that these can be used
video. fraudulently.
Multimedia projector output device used Phishing fraudulently trying to get
to project the screen display from a people to reveal usernames, passwords,
computer onto a much larger screen that credit card details, account numbers, etc.,
L can be viewed by a large audience. by pretending they are from a bank,
building society, or credit card company,
etc. Emails are sent asking recipients to
LAN (local area network) a network of N reveal their details.
computers on one site. PIN (personal identification number)
Landscape page orientation where the secret number that needs to be keyed in
Network a group of ICT devices to gain access to an ATM or to pay for
width is greater than the height. (computers, printers, scanners, etc.) goods/services using a credit/debit card.
which are able to communicate with each
Laser printer printer which uses a laser other. Piracy the process of illegally copying
beam to form characters on the paper. software.
Networking software systems software
Length check validation check to make which allows computers connected Pixel a single point in a graphics element
sure that the data being entered has the together to function as a network. or the smallest dot of light that can
correct number of characters in it. appear on a computer screen.
Normal data data that is acceptable for
Light pen input device used to draw processing and will pass the validation Plotter a device which draws by moving
directly on a computer screen or used to checks. a pen, and is useful for printing scale
make selections on the screen. drawings, designs and maps.
Login accessing an ICT system usually by
entering a user-ID/username or a
O Presence checks validation checks used
password. to ensure that data has been entered into
a field.
OCR (optical character recognition) a
M combination of software and a scanner
which is able to read characters into the
Print preview feature that comes with
most software used to produce
computer. documents. It allows users to view the
page or pages of a document to see
Magnetic stripe stripe on a plastic card OMR (optical mark reader/recognition) exactly how they will be printed. If
where data is encoded in a magnetic reader that detects marks on a piece of necessary, the documents can be
pattern on the stripe and can be read by paper. Shaded areas are detected and the corrected. Print preview saves paper and
swiping the card using a magnetic stripe computer can understand the ink.
reader. information contained in them.
Process any operation that transfers
Magnetic stripe reader hardware device Online processing the system is data into information.
that reads the data contained in magnetic automatically updated when a change
stripes such as those on the back of credit (called a transaction) is made. This Processing performing something on the
cards. means that the system always contains input data such as performing
up-to-date information. Online calculations, making decisions or
Mail merge combining a list of names processing is used with booking systems arranging the data into a meaningful
and addresses with a standard letter so to ensure seats are not double booked. order.
that a series of letters is produced with
each letter being addressed to a different Online shopping is shopping over the Processor often called the CPU and is the
person. Internet, as opposed to using traditional brain of the computer consisting of
methods such as buying goods or millions of tiny circuits on a silicon chip.
Main internal memory memory which is services from shops or trading using the It processes the input data to produce
either ROM (read only memory) or RAM telephone. information.
(random access memory).
Operating system software software that Program the set of step-by-step
Master slides (also called slide masters) controls the hardware of a computer and instructions that tell the computer
used to help ensure consistency from used to run the applications software. hardware what to do.
slide to slide in a presentation. They are Operating systems control the handling
also used to place objects and set styles of input, output, interrupts, etc. Proof-reading carefully reading what has
on each slide. Using master slides you can been typed in and comparing it with
format titles, backgrounds, colour Optical character recognition (OCR) what is on the data source (order forms,
schemes, dates, slide numbers, etc. input method using a scanner as the application forms, invoices, etc.) for any
input device along with special software errors or just reading what has been
Memory cards thin cards you see in which looks at the shape of each typed in to check that it makes sense and
digital cameras used to store character so that it can be recognized contains no errors.
photographs and can be used for other separately.
data. Proxy-server a server which can be
Optical disk a plastic disk used for hardware or software that takes requests
Memory stick/flash drive/pen drive solid removable storage includes CD and DVD. from users for access to other servers
state memory used for backup and is and either forwards them onto the other
usually connected to the computer using Optical mark recognition (OMR) the servers or denies access to the servers.
a USB port. process of reading marks (usually shaded
boxes) made on a specially prepared
Microprocessor the brain of the
computer consisting of millions of tiny
document. The marks are read using an
optical mark reader.
Q
circuits on a silicon chip. It processes the
input data to produce information. Output the results from processing data.
Query a request for specific information pressing the Prt Scr button when a copy forwarded appropriately to the correct
from a database. of the screen will be placed in the computer. Because a switch only sends a
clipboard. The copy of the screen can packet of data to the computer it is
then be pasted. intended for, it reduces the amount of
R Search engine program which searches
data on the network, thus speeding the
network up.
for required information on the Internet.
RAM (random access memory) type of
main internal memory on a chip which is Secondary memory storage other than
ROM or RAM and is non-volatile which
T
temporary/volatile because it loses its means it holds its contents when the
contents when the power is removed. It power is removed. It is used to hold
is used to hold the operating system and software/files not being used. Tags special markers used in HTML to
the software currently in use and the files tell the computer what to do with the
being currently worked on. The contents Sensors devices which measure physical text. A tag is needed at the start and end
of RAM are constantly changing. quantities such as temperature, pressure, of the block of text to which the tag
humidity, etc. applies.
Range check data validation technique
which checks that the data input to a Serial/sequential access data is accessed Tape magnetic media used to store data.
computer is within a certain range. from the storage media by starting at the
beginning of the media until the required Thesaurus software which suggests
Read only a user can only read the data is found. It is the type of access used words with similar meanings to the word
contents of the file. They cannot alter or with magnetic tape and it is a very slow highlighted in a document.
delete the data. form of access when looking for
particular data on a tape. TFT (thin film transistor) a thin screen
Read/write a user can read the data held used in laptops/notebooks or in desktops
in the file and can alter the data. Serif a small decorative line added to the where desk space is limited.
basic form of a character (letter, number,
Real-time a real-time system accepts punctuation mark, etc.). Touchscreen a special type of screen that
data and processes it immediately. The is sensitive to touch. A selection is made
results have a direct effect on the next set Social networking site a web site used to from a menu on the screen by touching
of available data. communicate with friends, family and to part of it.
make new friends and contacts.
Real-time processing type of processing Tracker ball an input device which is
where data received by the system is Software the actual programs consisting rather like an upside down mouse and is
processed immediately without any of instructions that allow the hardware to ideal for children or disabled people who
delay and is used mainly for control do a useful job. find it hard to move a mouse.
systems, e.g. autopilot systems in aircraft.
Software licence document (digital or Transaction a piece of business, e.g. an
Record the information about an item or paper) which sets out the terms by which order, purchase, return, delivery, transfer
person. A row in a table. the software can be used. It will refer to of money, etc.
the number of computers on which it can
Relational database a database where be run simultaneously. Transcription error error made when
the data is held in two or more tables typing data in using a document as the
with relationships (links) established Solid state backing storage the smallest source of the data.
between them. The software is used to form of memory and is used as
set up and hold the data as well as to removable storage. Because there are no Transposition error error made when
extract and manipulate the stored data. moving parts and no removable media to characters are swapped around so they
damage, this type of storage is very are in the wrong order.
Relative reference when a cell is used in robust. The data stored on solid state
a formula and the formula is copied to a backing storage is rewritable and does Tree topology a combination of two
new address, the cell address changes to not need electricity to keep the data. network topologies combined together,
take account of the formulas new Solid state backing storage includes e.g. a series of star networks are
position. memory sticks/pen drives and flash connected onto a bus.
memory cards.
Report the output from a database in txt text files just contain text without any
which the results are presented in a way Spam unsolicited bulk email (i.e., email formatting. Text files use the file
that is controlled by the user. from people you do not know, sent to extension .txt.
everyone in the hope that a small
Resolution the sharpness or clarity of an percentage may purchase the goods or
image. services on offer). U
ROM (read only memory) type of Spellchecker program usually found with
internal memory on a chip which is a word-processor and most packages
permanent/non-volatile and cannot have which make use of text which checks the URL (Uniform Resource Locator) a web
its contents changed by the user. It is spelling in a document and suggests address.
used to hold the boot routines used to correctly spelt words.
start the computer when the power is USB (Universal Serial Bus) a socket
switched on. Spyware software that is put onto a which is used to connect devices to the
computer without the owners computer such as web cams, flash drives,
Router hardware device which is able to knowledge and consent with the purpose portable hard disks, etc.
make the decision about the path that an of monitoring the users use of the
individual packet of data should take so Internet. For example, it can invade their User a person who uses a computer.
that it arrives in the shortest possible privacy or monitor keystrokes, so it can
time. It is used to enable several be used to record usernames and User interface the user interface uses an
computers to share the same connection passwords. This information can then be interactive screen (which can be a
to the Internet. used to commit fraud. touchscreen) to present questions and
information to the operator and also
RSI (repetitive strain injury) a painful Stand-alone computer if a computer is receives answers from the operator. Can
muscular condition caused by repeatedly used on its own without any connection also be one of the three parts of an expert
using certain muscles in the same way. (wireless or wired) to a network system.
(including the Internet), then it is a User log a record of the successful and
rtf (rich text format) file format that stand-alone computer.
saves text with a limited amount of failed logins and also the resources used
formatting. Rich text format files use the Storage media the collective name for by those users who have access to
file extension .rtf. the different types of storage materials network resources.
such as DVD, magnetic hard disk, solid Username or User-ID a name or number
state memory card, etc.
S Style sheet a document which sets out
that is used to identify a certain user of
the network or system.
fonts and font sizes for headings and
subheadings, etc., in a document. Changes
Sans serif a set of typefaces or fonts that
do not use the small lines at the end of to a heading need only made in the style V
characters which are called serifs. sheet and all the changes to headings in
the document will be made
Scanner input device that can be used to automatically. Validation checks checks a developer of a
capture an image and is useful for solution sets/creates, using the software,
digitizing old non-digital photographs, Swipe card plastic card containing data in order to restrict the data that a user
paper documents or pictures in books. stored in a magnetic stripe on the card. can enter so as to reduce errors.
Screenshot copy of what is seen on a Switch a device that is able to inspect
computer screen. It can be obtained by packets of data so that they are
Verification checking that the data being
entered into the ICT system perfectly
matches the source of the data.
Videoconferencing ICT system that
allows virtual face-to-face meetings to be
conducted without the participants being
in the same room or even the same
geographical area.
Virus a program that copies itself
automatically and can cause damage to
data or cause the computer to run slowly.
Voice recognition the ability of a
computer to understand spoken words
by comparing them with stored data.

W
WAN (wide area network) a network
where the terminals/computers are
remote from each other and
telecommunications are used to
communicate between them.
Web cam a digital video camera that is
used to capture moving images and is
connected to the Internet so the video
can be seen by others remotely. They are
often included as part of the screen in
computers or bought separately and
connected to a USB port.
Web logs (blogs) blogs are web sites that
are created by an individual with
information about events in their life,
videos, photographs, etc.
Web page a document that can be
accessed using browser software.
Web site a collection of interconnected
web pages relating to a topic or
organization.
Wi-Fi a trademark for the certification of
products that meet certain standards for
transmitting data over wireless
networks.
WIMP (Windows Icons Menus Pointing
devices) the graphical user interface
(GUI) way of using a computer rather
than typing in commands at the
command line.
WLAN A local area network (LAN)
where some or all of the links are
wireless, making use instead of infra-red
or microwaves as a carrier for the data
rather than wires.
World Wide Web (WWW) the way of
accessing the information on all the
networked computers which make up the
Internet. WWW makes use of web pages
and web browsers to store and access the
information.

Anda mungkin juga menyukai