0% found this document useful (0 votes)
25 views14 pages

Topic 1-4 - Key Terms

Uploaded by

吳卓蔚
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views14 pages

Topic 1-4 - Key Terms

Uploaded by

吳卓蔚
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

MODULE 01 – Fundamentals of Information Technology

From Topic 01 Introduction to Information Technology


Key Term Definition
application software End user software
apps Small programs designed for mobile devices
Blu-ray disc (BD) Type of optical disc using laser technology to store
data and programs
cloud computing Uses the Internet and the Web to shift many
computer activities from a user’s computer to
computers on the Internet.
communication device Computer equipment that allows a computer to
connect to other computer systems to share data
and information.
compact disc (CD) A type of optical disc that has the least storage
capacity.
connectivity Allows computers to connect and share information
with other computers.
data Unprocessed facts.
database file Typically created by database management
programs to contain highly structured and
organized data.
desktop computer A type of microcomputer that is small enough to fit
on top of or alongside a desk yet is too big to carry
around.
digital versatile disc (DVD) A type of optical device that gives great capacity
and can be used to store many different types of
data. (See also digital video disc)
digital video disc (DVD) A type of optical device that gives great capacity
and can be used to store many different types of
data. (See also digital versatile disc.)
display A monitor used to display information.
document file Data files created by word processors to save
documents such as memos, term papers, and
letters.
Embedded operating Embedded operating system known as real-time
systems (RTOS) operating system used in Smartphones, tablets and
other mobile devices
end user The most important part of an information system.
(See also people)
general purpose application Application software that is used in nearly all
careers.
hard disk A secondary storage device that uses magnetized
dust to store the information.
hardware The equipment that processes the data to create
information.
Key Term Definition
information Processed facts.
information technology (IT) Relating to computer software and hardware, and
data.
input device Translate data and programs that humans can
understand into a form the computer can process.
Internet The largest computer network in the world.
IoT (Internet of Things) The continuing development of the Internet that
allows everyday objects embedded with electronic
devices to send and receive data over the Internet.
keyboard A type of input device that allows the user to input
character data into the computer.
Laptop computer Also known as a notebook computer is lightweight
and portable
mainframe computer A type of computer that is capable of great
processing speeds and data storage.
memory Holds data and program instructions for processing
the data. (See also primary storage, random access
memory)
microprocessor Controls and manipulates data to produce
information.
midrange computer Also referred to as servers, most widely used to
support end users for specific needs such as
retrieving data from a database or supplying access
to application software.
Mobile app (application) Known as apps ae small programs primarily
designed for mobile devices such as smartphones
and tablet computers.
modem Modifies telephone communications into a form
that can be processed by a computer.
monitor A common output device that allows the user to
see what the computer is doing.
mouse A type of input device that allows the user to point
and click on items for easier operation.
network A communications system connecting two or more
computers.
notebook computer A type of microcomputer that is portable,
lightweight, and fits into most briefcases.
operating system Program that coordinates computer resources,
provides an interface between users and the
computer, and runs applications.
optical disc A secondary storage device that uses laser
technology and has the greatest capacity.
output device Translates the processed information from the
computer into a form that humans can understand.
PC Personal computer
Key Term Definition
people The most important part of an information system.
(See also end users)
Personal computer PC
presentation file Created by presentation graphics programs to save
presentation materials.
procedures The rules or guidelines for people to follow when
using software, hardware, and data.
program Consists of the step-by-step instructions that tell
the computer how to do its work. (See also
software)
random access memory Holds data and program instructions for processing
(RAM) the data. (See also primary storage, memory)
secondary storage Holds data and programs even after electrical
power to the computer system has been turned off.
server Most widely used to support end users for specific
needs such as retrieving data from a database or
supplying access to application software.
smartphone Mobile phone offering advanced capabilities
beyond a typical mobile phone, often with PC-like
functionality.
software Consists of the step-by-step instructions that tell
the computer how to do its work. (See also
program)
solid-state storage A secondary storage device that has no moving
parts. Data is stored and retrieved electronically
directly from these devices, much as they would be
from conventional computer memory.
specialized application Computer programs that are narrowly focused on
specific disciplines and occupations. (See also
special-purpose application)
stand-alone operating Used in desktop computers and include Windows
system 10 and Mac OS
supercomputer The most powerful type of computer that is a
special high-capacity computer used by very large
organizations.
system software Enables the application software to interact with
the computer hardware and helps the computer
manage its own internal resources.
system unit A container that houses most of the electronic
components that makes up a computer system.
tablet Also known as a tablet computer is smaller and
lighter and generally less powerful than a laptop.
Usually has a flat screen but and a virtual keyboard.
tablet computer Also known as a tablet is smaller and lighter and
generally less powerful than a laptop. Usually has a
Key Term Definition
flat screen but and a virtual keyboard.
utility A part of the system software that performs specific
tasks related to managing computer resources.
virus Malicious programs that can damage software,
hardware, and compromise the security and privacy
of your personal data.
wearable Mobile computer that can be worn.
web Provides a multimedia interface to the numerous
resources available on the Internet.
wireless communication Communication between wireless communication
devices such as Smartphones and tablets
wireless revolution A revolution that is expected to dramatically affect
the way we communicate and use computer
technology.
worksheet file Created by electronic spreadsheets to analyze
things like budgets and to predict sales.

From Topic 02 The Internet, the Web, and Electronic Commerce


Key Term Definition
address The location or name of a Web site.
Launched in 1969 when the United States
Advanced Research Project
funded a project that developed a national
Agency Network (ARPANET)
computer network.
An advanced use of JavaScript that can be
AJAX
found on many interactive sites.
Special programs on Web sites that provide
applets animation, interactivity, and display
graphics.
Files, such as documents and worksheets
attachment that can be sent along with an e-mail
message.
A type of file transfer that distributes files
BitTorrent across many different computers for more
efficient downloads.
Web logs that contain time stamped
blog
postings.
Software programs that provide a user
browser
interface to Web resources.
Involves the sale of a product or service
business-to-business (B2B) from one business to another over the
Internet
The sale of a product or service to the
business-to-consumer (B2C)
general public or end users over the Internet
Modems that provide Internet high-speed
cable
access using unused bandwidth on a cable
Key Term Definition
television network.
Files inserted into an HTML document that
cascading style sheets (CSS) control the appearance of Web pages
including layout, colors, and fonts.
A service offered through Google+, for
Circles grouping individuals according to interests
or other criteria
Special program known as an e-mail client
that needs to be installed and running in
client based e-mail system
order to enable a computer to communicate
with the e-mail service provider.
Uses the Internet and the Web to shift many
cloud computing computer activities from a user’s computer
to computers on the Internet.
Involves individuals selling to individuals
consumer-to-consumer (C2C)
over the Internet.
Internet’s equivalent to traditional cash.
digital cash Buyers purchase digital cash from a third
party by transferring funds from their banks.
It is part of an URL that signifies the name of
domain name
a Web server where the resource is located.
Copying a file from a server to a local
downloading
computer.
Digital Subscriber Line, provides a digital
DSL connection over unused frequencies of
standard telephone lines.
Buying and selling of goods over the
e-commerce
Internet. (See also electronic commerce)
Being able to take classes on almost any
e-learning subject from educational institutions that
offer courses online.
Buying and selling of goods over the
electronic commerce
Internet. (See also e-commerce)
Electronic mail, the transmissions of
electronic mail electronic messages over the Internet. (See
also e-mail)
Electronic mail, the transmissions of
e-mail electronic messages over the Internet. (See
also electronic mail)
Special program required to communicate
e-mail client with the e-mail service provider in client-
based e-mail accounts.
Social networking site that provides an array
Facebook of features and applications including
instant messaging, photo and video sharing,
Key Term Definition
games, and more.
Share information that is typically organized
Facebook groups
around topics, events, ideas.
Created by businesses to promote products
Facebook Pages
and services.
Created by individuals who may include
photos, lists of personal interest, contact
Facebook Profile
information, and other personal
information.
file transfer protocol (FTP) An Internet standard for transferring files.
filter Blocks access to selected web sites.
A person that you specify in a list to use
friend
instant messaging.
A combination of some of Google Inc.'s
previously existing services with some new
Google+
services, many of which are similar to
Facebook's
A combination of some of Google Inc.'s
previously existing services with some new
Google Plus
services, many of which are similar to
Facebook's
A service offered through Google Plus, for
Hangouts communicating with up to 10 people at a
time.
header The first element of an e-mail message.
A list of sites that contain the keywords from
hit
a search.
Connect to other documents, which can be
hyperlink
video files, text, graphics, audio files, etc.
Hypertext Markup Language Text based programming language used to
(HTML) create Web pages.
An extension of e-mail that allows two or
instant messaging (IM) more people to contact each other via
direct, live communication.
Launched in 1969 with ARPANET, the
Internet (Net) consists of the actual physical
Internet
network made up of wires, cables, and
satellites.
Allows everyday objects embedded with
Internet of Things electronic devices to send and receive data
over the Internet.
A collection of utility programs designed to
Internet security suite maintain security and privacy while on the
Web.
Internet service provider (ISP) Provides a path or connection for individuals
Key Term Definition
to access the Internet.
A scripting language that adds basic
JavaScript
interactivity to Web pages.
link Nickname for a Hyperlink.
Social networking site focusing on business
LinkedIn
professionals.
location The name of a Web site.
The second element of an e-mail that
message
consists of the body of the e-mail.
A Web site that publishes short sentences
microblog that only take a few seconds to write.
Twitter is a microblog.
MMS (multimedia messaging Sends images, videos and sounds
service)
A special browser designed to run on
mobile browser
portable device.
online Being connected to the Internet.
Program that automatically start and
operate as a part of a Web browser in order
plug-in
to enable a full experience of the content of
a Web site.
Deliver media content widely used to
podcast download music and movies over the
Internet.
Rules for exchanging data between
protocol
computers.
An organization helps individuals locate
search engine information on the Web. (See also search
service).
An organization helps individuals locate
search service information on the Web. (See also search
engine)
Allows the copying of files to and from a
secure file transfer protocol computer across the Internet and are
(SFTP) frequently for uploading changes to a Web
site hosted by an Internet service provider.
The third element of an e-mail message that
signature provides additional information about the
sender.
Using the Internet to connect individuals to
social networking
one another
spam Unwanted or unsolicited e-mail.
Software programs that are installed to
spam blocker work with e-mail programs to filter
unwanted e-mail messages.
Key Term Definition
Programs used to identify and eliminate
spam filter
spam.
specialized search engine Focus on subject-specific Web sites.
Special programs that continually look for
spider new information on the Internet and update
the search services’ databases.
Technology in which audio and video files
are continuously downloaded to a computer
streaming
while the computer user is listening to
and/or viewing the file content.
Part of the header element in an e-mail,
subject usually a one-line description of the
message.
Sending a short electronic message typically
less than 160 characters using a wireless
texting network to another person who views the
message on a mobile device, such as a
smartphone.
Sending a short electronic message typically
less than 160 characters using a wireless
text messaging network to another person who views the
message on a mobile device, such as a
smartphone.
top-level domain (TLD) Another name for a domain name.
tweet Twitter messages
Twitter A microblog that publishes short sentences.
uniform resource locator (URL) The name, or address, of a Web site.
To copy a file from a local machine to a
uploading
server.
Destructive program often attached to
virus
unsolicited e-mail.
Introduced in 1992 at CERN, the Web
web (WWW and World Wide Web) provides a
multimedia interface to Internet resources.
Web 1.0 Focused on linking existing information.
Evolved to support more dynamic content
Web 2.0
creation and social interaction.
Focuses on computer-generated information
Web 3.0 requiring less human interaction to locate
and to integrate information.
Sellers post descriptions of products at a
web auction Web site and buyers submit bids
electronically.
Use Webmail clients located on the e-mail
web-based e-mail system
providers computer.
Key Term Definition
Services that make use of a Web browser to
web-based file transfer services
upload and download files: i.e.: drop.io
Use streaming technology in which audio
and video files are continuously
webcasts downloaded to the user’s computer while
they are listening to and/or viewing the file
content.
Personal Web sites that contain time
web log
stamped postings.
Once a computer connects to an e-mail
service provider, a special program called a
webmail
Webmail client runs on the e-mail provider’s
computer and e-mailing can take place.
Program that runs on an e-mail provider’s
webmail client computer and enables Web mailing to take
place.
Develops and maintains Web sites and Web
webmaster
resources.
web page A document on the Web.
Identifies the type of organization, for
web suffix
example .com indicates a commercial site.
Specialized programs that make using the
web utility
Internet and the Web easier and safer.
A Web site specially designed to allow
wiki visitors to fill in missing information or
correct inaccuracies.
An online ‘wiki’ encyclopedia written and
Wikipedia
edited by anyone who wants to contribute.
They transmit information that is modulated
onto a carrier frequency to allow many
wireless modem simultaneous wireless communication links
to work simultaneous on different
frequencies.
Also known as WWW provided a
World Wide Web multimedia interface to resources available
on the Internet.
Provide a multimedia interface to resources
WWW
available on the Internet
From Topic 3 Privacy, Security, and Ethics
Key Term Definition
Relates to the responsibility of those who have
access
data to control who is able to use that data.
Relates to the responsibility of those who collect
accuracy
data to ensure that the data is correct.
Programs designed to detect and remove
antispyware cookies, web bugs, and monitoring software.
(see also spy removal program)
Using devices such as fingerprint and iris (eye)
biometric scanning
scanners to verify the identity of users.
botnet A collection of zombie computers.
A collection of temporary internet files that
browser cache contain web page content and instructions for
displaying this content.
An illegal action in which the perpetrator uses
computer crime
special knowledge of computer technology.
Guidelines for the morally acceptable use of
computer ethics
computers in our society.
A law that makes creating and knowingly
Computer Fraud and Abuse Act
spreading a virus a crime.
The most invasive and dangerous type of
spyware. They record every activity and
computer monitoring software
keystroke made on a computer system. (see also
keystroke logger)
Specialized programs that are deposited on a
cookies
hard disk from websites.
A legal concept that gives content creators the
copyright right to control use and distribution of their
work.
People who gain unauthorized access to a
cracker
computer system for malicious purposes.
Use of the Internet, cell phones, or other devices
cyberbullying to send or post content intended to hurt or
embarrass another person.
Includes the creation of malicious programs such
as viruses, worms, Trojan horses, zombies,
cybercrime denial of service attacks, Internet scams,
cyberbullying, rogue Wi-Fi hotspots, and data
manipulation
Concerned with protecting software and data
data security
from unauthorized tampering or damage.
A type of worm floods a computer or network
with requests for information and data which
denial of service (DoS) attack
overwhelms the system making it unable to
respond to legitimate users.
A computer attack that uses software to try
thousands of common words, sequentially in an
dictionary attack
attempt to gain unauthorized access to a user’s
account.
States that it is legal for a program owner to
Digital Millennium Copyright make only their own backup copies of that
Act program.
In order to prevent copyright violations, DRM
digital rights management
encompasses various technologies that control
(DRM)
access to electronic media and files.
A set of procedures that setups ways to continue
disaster recovery plan operating until normal computer operations can
be restored.
Highly detailed and personalized descriptions of
electronic profile
individuals.
Software that record everything including
employee-monitoring software employees’ electronic mail and computer files
on an employee’s computer.
The process of coding information to make it
encryption unreadable except to those who have a special
key.
A key or special piece of information used to
encryption key
gain access to data that has been encrypted.
ethics Standards of moral conduct.
Family Educational Rights and A federal law that restricts disclosure of
Privacy Act (FERPA) educational records.
A security buffer between an organization’s
firewall
private network and all external networks.
A cookie that is generated and then read only by
first-party cookie
the web site you are currently visiting.
A law that entitles people to look at records held
Freedom of Information Act
by government agencies.
A federal law that protects personal financial
Gramm-Leach-Bliley Act
information.
People who gain unauthorized access to a
hacker
computer system for the fun and challenge of it.
Health Insurance Portability A federal law that protects personal medical
and Accountability Act (HIPAA) information.
A file that includes the locations of websites
history file
visited.
HTTP (Hyper Text Transfer
Is a widely used protocol used for web traffic
Protocol)
Is a widely used protocol used for web traffic
HTTPS (Hyper Text Transfer
and is used to protect the transfer of sensitive
Protocol Secure)
information.
identity theft The illegal assumption of someone’s identity for
the purposes of economic gain.
The feeling that if you are selective about
disclosing personal information on the Internet,
illusion of anonymity
then little can be done to invade your personal
privacy.
Google Chrome provides to ensure browsing
Incognito Mode activity is not recorded on a computer’s hard
disk
Data gatherers that collect and sell personal
information broker
data. (see also information reseller)
Data gatherers that collect and sell personal
information reseller
data. (see also information broker)
Internet scam A scam that uses the Internet.
Responsible for maintaining the security of a
company's network, systems, and data.
Employers look for candidates with a bachelor's
IT security analyst
or advanced specialized associate's degree in
information systems or computer science and
network experience.
An encryption key; special information for
key
making encrypted information readable.
The most invasive and dangerous type of
spyware. They record every activity and
keystroke logger
keystroke made on a computer system. (see also
computer monitoring software)
malware Short for malicious software.
It is when an electronic profile of one person is
mistaken identity
switched with another.
The information that people voluntarily post
online identity
about themselves online.
Secret words or numbers that must be keyed
password
into a computer system to gain access.
Helps create strong passwords and will save all
passwords in one location to automatically
password managers provide password when requested from
website; use one master password to access list
of passwords
A technique employed by scammers attempting
phishing to trick Internet users to think a fake but official
looking site is legitimate.
Procedures and devices that deal with
physical security protecting hardware from possible human and
natural disasters.
An ethical issue which means representing some
plagiarism other person’s work and ideas as your own
without giving credit to the original source.
A person who uses another’s work and ideas as
plagiarist
their own without crediting the original source.
privacy The collection and use of data about individuals.
Many browsers offer a privacy mode that
privacy mode eliminates history files as well as blocks most
cookies.
A tool in Safari that controls many types of
Privacy Browsing
cookies.
Relating to who owns data and rights to
property
software.
robot network A botnet; a collection of zombie computers.
Free wireless hotspot where users information
rogue Wi-Fi hotspot are captured when connecting to legitimate
sites.
A fraudulent or deceptive act or operation
scam designed to trick individuals into spending their
time and money for little or no return.
Controlling access to sensitive information,
security
hardware, and software.
A collection of utility programs designed to
security suites protect your privacy and security while you are
on the web.
Unauthorized copying of programs for personal
software piracy
gain is a form of theft.
Programs designed to detect and remove
spy removal program cookies, web bugs, and monitoring software.
(see also anti-spyware)
A wide range of programs that are designed to
spyware secretly record and report an individual’s
activities on the Internet.
Contain Web page content and instructions for
temporary Internet file
displaying this content.
Generated by an advertising company that is
affiliated with the website you are currently
third-party cookie
visiting. Often also referred to as a tracking
cookie.
Generated by an advertising company that is
tracking cookies affiliated with the website you are currently
visiting.
A program that comes into a computer system
Trojan horse disguised as something else, but contains a
virus.
A secure private connection between a remote
virtual private network (VPN)
user and an organization’s internal network.
Programs that migrate through networks and
virus
operating systems, and most attach themselves
to different programs and databases.
A type of spyware that is typically hidden within
web bugs the HTML code for a web page or e-mail
message as a graphical image.
Restricts access to authorized users on wireless
wireless network encryption
networks.
A special program fills a computer system with
worm self-replicating information, clogging the system
so that its operations are slowed or stopped.
Wi-Fi Protected Access; replacing WEP in
WPA2
wireless encryption.
Computers infected by a virus, worm, or Trojan
zombie house that allows them to be remotely
controlled for malicious purposes.

The key terms for Topic 04 is the combination of the key terms from
Topic 01, Topic 02, and Topic 03.

You might also like