Computing device | Desktop computer |
Laptop computer | Tablet computer |
Smartphone | Server |
Router | Switch |
A personal computer that is designed to fit on top of a desk or table, and is intended for use in a fixed location. | An electronic device that can receive, store, process, and output data. |
A mobile computing device that is larger than a smartphone or PDA, and is designed to be operated using a touchscreen or digital pen. | A portable computer that is designed to be carried from one place to another, and can operate on battery power. |
A computer or device that manages network resources, and provides services to other computers or devices connected to the network. | A mobile phone that is capable of running applications and accessing the internet, and typically includes a touchscreen interface. |
A device that connects multiple devices together on a single network, and allows them to communicate with each other by directing data packets to their destination. | A device that connects multiple networks together, and routes data packets between them. |
Peripheral device | Input device |
Output device | Storage device |
Mainframe | Batch Processing |
Scalability | Reliability |
A peripheral device that is used to provide input to a computer or computing device, such as a mouse, keyboard, or touchpad. | A device that connects to a computer or computing device, and provides additional functionality or input/output options. |
A peripheral device that is used to store data on a computer or computing device, such as a hard disk drive, solid-state drive, or memory card. | A peripheral device that is used to provide output from a computer or computing device, such as a monitor, printer, or speakers. |
A technique used by mainframes to process large volumes of data in batches, rather than individually. | A large and powerful computer system, typically used by large organizations to process and store large amounts of data. |
A key characteristic of mainframes, referring to their ability to operate continuously without downtime or failure. | The ability of a mainframe system to expand or shrink its processing power and storage capacity to meet changing needs. |
Centralization | Data Security |
Legacy Systems | Cost-effectiveness |
Real-time Processing | Mainframe Partitioning |
Disadvantages | Applications |
A strength of mainframes, due to their ability to implement advanced security measures to protect sensitive data. | The practice of using a mainframe to consolidate processing and storage resources in a central location, rather than distributed throughout an organization. |
A benefit of mainframes in some situations, due to their ability to process large amounts of data more efficiently than other computer systems. | Older mainframe systems, which may still be used by some organizations due to their reliability and compatibility with older software. |
The ability of a mainframe to create multiple virtual environments, allowing different applications to run on the same physical system without interfering with each other. | A capability of some modern mainframes, enabling them to process data in real-time, such as in financial trading or airline reservation systems. |
Mainframes are used in a wide range of industries, including finance, healthcare, government, and telecommunications, for processing large volumes of data and running critical applications. | There are some potential drawbacks to using mainframes, including their high cost, complexity, and limited flexibility compared to other systems. |
Home Entertainment System | Components |
Setup | Customization |
Troubleshooting | HDMI |
USB | Remote control |
Various devices that make up a home entertainment system such as a TV, DVD player, speakers, and amplifier. | A system that provides entertainment in the form of audio and video in a household setting. |
The process of modifying the settings of a home entertainment system to suit individual preferences. | The process of connecting and configuring the components of a home entertainment system to function together. |
High-Definition Multimedia Interface. A digital video and audio interface that transmits high-quality audio and video signals. | The process of identifying and resolving problems with a home entertainment system. |
A device used to operate a home entertainment system from a distance by sending signals to the components via infrared or radio waves. | Universal Serial Bus. A standard interface used for connecting devices to a computer or other host device. |
Surround sound | Streaming |
Resolution | Aspect ratio |
Navigation | Navigation Aids |
GPS | Satellites |
The process of transmitting audio and video data over the internet for real-time playback. | A sound system that uses multiple speakers to create a more immersive audio experience. |
The ratio of the width to the height of the screen on a display device, typically expressed as a ratio (e.g. 16:9). | The number of pixels that make up the image on a display screen, typically measured as width x height. |
Equipment or devices designed to assist navigators in determining their position and movement, including compasses, maps, sextants, and radio beacons. | The process of planning and controlling the movement of a vessel from one place to another, using charts, maps, and other navigational aids. |
A man-made object in space that orbits a celestial body, used for navigation, reconnaissance, communication, and scientific research. | Global Positioning System is a satellite-based navigation system used to determine precise location and time information anywhere on Earth. |
GPS Integration | Satellite Navigation System |
Inertial Navigation System | Geocaching |
Positioning | Coordinates |
Waypoints | Limitations |
A system that uses a network of satellites to provide autonomous geo-spatial positioning and time information to a user. | The use of GPS data to complement or enhance other navigation systems. The integration of GPS data with other systems improves accuracy and reliability. |
A recreational activity in which participants use GPS receivers to hide and seek containers, called 'caches', at specific locations marked by coordinates all over the world. | A navigation system that uses a combination of accelerometers and gyroscopes to track the movement of a vehicle or vessel. |
A set of numerical values that specify the precise location of a point on the earth's surface or in space (latitude and longitude). | The determination of an object's location in space or time, achieved through the use of navigation aids such as GPS or compasses. |
The shortcomings or weaknesses of a system or technology, which may include accuracy, reliability, availability, or cost. | A precise location defined by coordinates used in navigation. |
Multifunction devices | Single function devices |
Advantages | Efficiency |
Cost-effective | Space-saving |
Ease of use | Maintenance |
Devices that can only perform one function such as printing, scanning, or faxing. | Devices that can perform multiple functions such as printing, scanning, copying, and faxing. |
The ability of multifunction devices to perform multiple functions in a single unit, which saves time and increases productivity. | Benefits or positive aspects of using multifunction devices over single function devices. |
Multifunction devices take up less space than separate devices for each function. | Multifunction devices are often cheaper than buying separate devices for each function. |
The process of keeping multifunction devices in good working order to ensure their longevity and optimal performance. | Multifunction devices are easy to use and require minimal training. |
Ink/toner usage | Security |
Integration | Duplex printing |
Laptop | Desktop |
Portability | Battery life |
Multifunction devices may have security features such as password-protected printing or scanning to prevent unauthorized access to documents. | The amount of ink or toner used by multifunction devices depends on the number and type of functions used. |
The ability of a multifunction device to print on both sides of a sheet of paper, which saves paper and reduces printing costs. | Multifunction devices can integrate with other software and hardware to streamline workflows and increase efficiency. |
A personal computer that is designed for regular use at a desk or workspace and is composed of a separate display screen, keyboard, and processing unit. | A portable computer that is designed for mobility and typically has a thin LCD or LED computer screen mounted on the inside of the upper lid of the clamshell form factor. |
The length of time a laptop can run on its battery, which is an important consideration for mobility. | The ability of a device to be easily carried or moved, such as a laptop in comparison to a desktop. |
Upgradeability | Ergonomics |
Cost | Processing power |
Screen size | Storage capacity |
Operating system | Gaming |
The study of designing equipment and devices that fit the human body and its cognitive abilities, which is important to consider when comparing laptops and desktops. | The ease with which a user can upgrade or replace components of a computer, such as graphics cards or memory, which is often more difficult with laptops than desktops. |
The ability of a computer to quickly and efficiently process data, which can vary between laptops and desktops based on their hardware specifications. | The amount of money required to purchase either a laptop or desktop, including additional peripherals like a monitor or keyboard. |
The amount of data a device can hold, which can vary between laptops and desktops based on their storage options. | The physical size of the display screen for either a laptop or desktop, which can impact factors such as portability and ease of use. |
The ability of a computer to run graphically-intensive software, such as video games, which can require more powerful hardware in certain cases. | The software that manages a computer's hardware and software resources and provides common services for efficient execution of various applications. |
Embedded Devices | Features |
Applications | Types |
Sensors | Actuators |
Smart Home Devices | Wearables |
Characteristics or capabilities of an embedded device that make it suitable for a particular purpose | Specialized computer systems designed to perform dedicated functions, often with minimal user interaction |
Categories of embedded devices based on their design, functionality, or intended use | Specific ways in which embedded devices are used to make tasks more efficient or effective |
Embedded devices that control or adjust a physical process or system | Embedded devices that detect and respond to changes in their physical environment |
Embedded devices that can be worn on the body or integrated into clothing or accessories | Embedded devices designed to automate and control tasks within a home environment |
Medical Devices | Automotive Systems |
Industrial Control Systems | Importance |
User Interface Design Principles | Functionality |
Usability | User Feedback |
Embedded devices used in vehicles to control or monitor various systems, such as engine performance or safety features | Embedded devices used in healthcare settings to monitor patient health or assist with medical procedures |
Embedded devices play a critical role in modern technology, enabling the automation of routine tasks, improving efficiency, and enhancing safety and convenience in everyday life. | Embedded devices used to automate or monitor processes in manufacturing or other industrial settings |
The purpose and abilities of a specific interface element. | The fundamental concepts and guidelines for designing effective user interfaces. |
The response of users to a particular interface design and its features. | The ease and efficiency of use for a particular user interface design. |
Visual Hierarchy | Consistency |
Accessibility | Affordance |
Navigation | User-Centered Design |
Typography | White Space |
The uniformity of design throughout an interface to improve familiarity and ease of use for users. | The arrangement of elements in a visual hierarchy to create a clear and organized interface design. |
The property of an object which determines how it can be used, and how easily it can be recognized. | The ability of users with disabilities or impairments to access and use a particular interface design. |
The practice of designing interfaces around the needs and goals of the intended user. | The use of visual cues and design elements to facilitate movement and exploration within an interface. |
The intentional use of empty space in a design to improve clarity and organization. | The style and use of fonts and text in interface design. |
Expansion Capability | Upgrading |
Expanding Devices | Hardware |
Software | Storage |
Upgradable Devices | Compatibility |
The process of replacing or improving a device's hardware or software components to enhance its performance, efficiency or functionality. | The ability of a device to be upgraded or expanded in terms of hardware, software or storage. |
Physical components of a device, such as the CPU, RAM, hard drive, or display, that can be replaced or upgraded to improve its performance or functionality. | The process of adding new hardware or software components to a device in order to increase its capability, functionality or storage capacity. |
The capacity of a device to store digital data, which can be expanded by adding more storage devices or upgrading existing ones. | Programs, applications or operating systems that are installed on a device, and can be updated or upgraded to improve its functionality or security. |
The ability of a new hardware or software component to work properly with the existing components of a device, without causing conflicts or errors. | Devices that are designed to allow users to upgrade or replace their hardware or software components easily, without requiring advanced technical knowledge or specialized tools. |
Expansion Slots | Peripheral Devices |
Benefits | Performance |
Media Support | CODEC |
Compression | Decompression |
Devices such as printers, scanners, external hard drives, or cameras that can be connected to a computer or other device to expand its functionality or performance. | Spaces on a motherboard or other component of a device that are designed to accept additional hardware components, such as RAM modules, sound cards, or graphics cards. |
The speed, efficiency, or reliability of a device in completing its tasks or functions, which can be improved by upgrading or expanding its components or memory. | Advantages or positive outcomes that can result from upgrading or expanding a device, such as improved performance, increased efficiency, or enhanced capabilities. |
A software algorithm used to compress and decompress digital media files in order to reduce their size without compromising on quality. | The ability of a software or hardware system to handle different types of media files such as audio, video, images, and text documents. |
The process of converting a compressed media file back to its original form using a CODEC algorithm. | The process of reducing the size of a digital media file by removing redundant data and encoding it using a CODEC algorithm. |
Lossy Compression | Lossless Compression |
Media Format | Media Quality |
Frame Rate | Bit Rate |
Resolution | Integration |
A compression technique that reduces the size of a media file without losing any data or compromising on quality. | A compression technique that removes data that is deemed as unnecessary and reduces the quality of the media file. |
The level of excellence in which a digital media file is portrayed, based on factors like resolution, bit rate, frame rate, and compression ratio. | The standardized way in which digital media files are encoded and stored, such as MP4, AVI, FLV, JPEG, GIF, etc. |
The amount of data transferred per second in a digital media file, measured in bits per second (bps). | The number of frames per second at which a video is displayed, ranging from 24fps to 120fps. |
The process of combining different media files into a single product, such as a website, video, or presentation. | The number of pixels displayed on a screen, typically expressed as width x height (e.g. 1920x1080). |
Tablet | Smartphone |
SIM | 3G |
4G | Connection speed |
Mobile data | Battery life |
A handheld device that integrates mobile phone capabilities with the features of a computer. | A mobile computing device with a touchscreen display, battery, and circuitry for data input and output. |
A mobile network that provides data speeds faster than 2G and allows for more advanced mobile services. | A small chip that's inserted into a smartphone or tablet to connect it to a phone network. |
The speed at which data can be transferred between a device and the internet or another device. | A mobile network that provides data speeds faster than 3G and allows for more advanced mobile services. |
Amount of time a smartphone or tablet can function on a single charge. | The amount of data that can be transmitted over a mobile network, typically measured in megabytes or gigabytes. |
Advantages | Disadvantages |
Security risks | Apps |
System software | Operating system |
Device driver | Utility program |
Limitations of using tablets and smartphones, such as low battery life, small screens, and security risks. | Benefits of using tablets and smartphones, such as convenience, portability, and connectivity. |
Software applications that can be downloaded and installed on smartphones and tablets. | Potential hazards or vulnerabilities associated with using tablets and smartphones, such as hacking, theft, or loss of personal data. |
A software program that manages computer hardware resources and provides common services for computer programs. | Software that controls and manages the computer hardware and provides a platform for other software to run on. |
A small program that performs a specific task such as virus scanning, disk clean-up or file compression. | Software that allows the operating system to communicate with hardware devices such as printers, scanners and cameras. |
System call | Kernel |
Memory management | Virtual memory |
File system | System software reliability |
System software compatibility | System software security |
The core component of an operating system that controls all other parts of the system and communicates directly with hardware. | A mechanism used by an application program to request service from the operating system. |
A technique used by the operating system to expand the amount of usable memory available to a program by using hard disk space as if it were memory. | The process of managing the computer's primary memory, which is used to store program instructions and data. |
The measure of how consistently and predictably a system software performs its intended functions over a period of time. | The hierarchy of directories and files used by an operating system to organize and store data on disk. |
The measure to protect the system software from unauthorized access or damage. | The measure of how well a system software works with other software and hardware components. |
Operating System | Features of an Operating System |
Common Operating Systems | BIOS |
BIOS Functions | Types of BIOS |
Legacy BIOS | UEFI |
Features of an Operating System include memory management, process management, file management, input/output management, security, and error detection. | An operating system (OS) is a program that manages the hardware and software resources of a computer and provides common services for computer programs. |
BIOS (Basic Input/Output System) is a program that controls communication between all the input and output devices on a computer system and initializes the operating system when the computer is turned on. | Common operating systems include Windows, macOS, Linux, and Unix. Each operating system has its own unique features and functions. |
There are two types of BIOS: Legacy BIOS and UEFI (Unified Extensible Firmware Interface). Legacy BIOS is an older standard while UEFI is a newer standard. | BIOS functions include testing and initializing hardware components, identifying system configuration, and loading and executing the operating system. |
UEFI (Unified Extensible Firmware Interface) is a newer BIOS standard that provides faster boot times and better security. It is built to support newer hardware and uses a GUID Partition Table (GPT) to help load the operating system. | Legacy BIOS is the traditional BIOS standard used before UEFI. It is built to support older hardware, and uses a Master Boot Record (MBR) to help load the operating system. |
Features of Legacy BIOS | Features of UEFI |
UEFI vs Legacy BIOS | Secure Boot |
CLI | GUI |
difference | advantages |
Features of UEFI include support for newer hardware, a 64-bit processor, larger file size limits, and better security features such as secure boot and cryptographic keys. | Features of Legacy BIOS include support for older hardware, a 16-bit processor, and limitations on the amount of memory that can be addressed. |
Secure boot is a UEFI feature that prevents unauthorized operating systems and malware from loading during the boot sequence. It uses cryptographic keys to verify the validity of the operating system being loaded. | UEFI is faster and more secure than Legacy BIOS but requires newer hardware. Legacy BIOS is slower and less secure than UEFI but can support older hardware. |
A graphical user interface (GUI) is a type of user interface that allows users to interact with a computer program using graphical elements such as icons and buttons. | A command-line interface (CLI) is a type of user interface that allows users to interact with a computer program by typing in commands. |
Advantages of CLI include faster and more precise input, while advantages of GUI include ease of use and accessibility. | The difference between CLI and GUI is that CLI requires commands to be typed in, while GUI allows users to interact with a computer program using graphical elements. |
disadvantages | basic |
tasks | navigate |
functions | compare |
evaluate | efficiency |
Basic CLI commands include 'cd' for changing the current working directory, 'ls' for listing the contents of a directory, and 'mkdir' for creating a new directory. | Disadvantages of CLI include a steeper learning curve and less intuitive interface, while disadvantages of GUI include slower input speed and less precise input. |
In a GUI environment, users can navigate by clicking on icons, menus, and buttons to access different functions and options. | Basic CLI commands can be used to complete tasks such as navigating the file system, creating and deleting files, and managing processes. |
CLI and GUI can be compared based on their respective advantages and disadvantages, as well as on their efficiency and complexity for performing different types of tasks. | Basic functions in a GUI environment include opening and closing windows, minimizing and maximizing windows, and selecting options from menus. |
Efficiency refers to the speed and accuracy with which tasks can be completed using a particular interface, compared to other available options. | Evaluating CLI and GUI involves assessing their relative strengths and weaknesses, as well as considering the specific needs and preferences of individual users. |
Memory Management | RAM |
Virtual Memory | Page File |
Spooling | Printer Driver |
Print Queue | Print Spooler |
Random Access Memory is a type of computer memory that stores data and machine code during computer operations. It is volatile, which means it loses its contents when power is turned off. | The process of managing computer memory to ensure that it is used efficiently and effectively to meet the memory requirements of computer programs and users. |
A file on the hard disk that is used by the operating system as virtual memory when the physical memory is full. | A memory management technique that uses the hard disk to simulate additional RAM when the physical memory is insufficient to execute programs and processes. |
Software that enables a computer to communicate with a printer. It provides the necessary commands and settings for the printer to execute the print job. | The process of sending print jobs to a buffer area on the hard disk before printing them out. This allows multiple print jobs to be stored in the buffer and printed in the order that they were received. |
A service that manages the print queue and sends print jobs to the printer in the correct order. It also monitors the status of the printer and notifies the user if there are any errors or issues. | A list of print jobs that are waiting to be printed. This allows multiple print jobs to be queued and printed in the order that they were received. |
Printer Maintenance | Printer Troubleshooting |
Printer Firmware | Print Server |
System Utilities | Resource Management |
Computer Performance | Security |
The process of diagnosing and solving printer issues such as paper jams, connectivity issues, and print quality issues. It involves identifying the root cause of the problem and implementing appropriate solutions. | The process of cleaning, calibrating, and repairing printers to ensure that they are functioning properly and producing high-quality prints. Regular maintenance can prolong the lifespan of printers and reduce the occurrence of printer issues. |
A device or software that manages one or more printers on a network. It receives print jobs from multiple computers on the network and sends them to the appropriate printer. | Software that controls the operation of the printer hardware. It is stored on a read-only memory chip (ROM) on the printer and can be updated to fix bugs or add new features. |
The process of allocating and managing computer resources, such as memory, CPU and disk space, to ensure optimal system performance. | Tools provided by the operating system to manage computer resources, such as disk cleanup, defragmenter, and task manager. |
The practice of protecting computer systems and data from unauthorized access, attacks, and other potential threats. | The measure of how well a computer system is performing in terms of its speed, response time, and ability to handle multiple tasks simultaneously. |
System Restore | Disk Cleanup |
Disk Defragmenter | Task Manager |
Antivirus | Firewall |
Backup | Password Protection |
A utility that removes unnecessary files and programs from a computer's hard drive to free up disk space and improve performance. | A utility that allows users to restore a computer to a previous state, either to fix problems or undo changes made to the system. |
A utility that allows users to monitor and manage the running programs and processes on a computer to improve performance and troubleshoot problems. | A utility that rearranges fragmented files on a computer's hard drive to improve performance by reducing the time it takes to read and write data. |
A system that controls the incoming and outgoing network traffic based on an organization's previously established security policies. | A program designed to detect, prevent and remove malicious software such as viruses, worms and Trojans from a computer system. |
A security measure that requires users to enter a password in order to access a computer, program, or files, in order to prevent unauthorized access. | The process of creating a copy of important data to protect against data loss and corruption due to hardware failure, software errors, or other potential threats. |
Word processing software | Document formatting |
Presentation software | Slide design |
Bullets and numbering | Graphics |
Hyperlinks | Templates |
The process of applying consistent design elements such as font style, size, color, and layout to a document. | A type of software that allows a user to create, edit and format text-based documents. |
The process of designing the layout, color scheme, and overall appearance of a slide in a presentation. | A type of software that allows a user to create slide-based presentations with text, images, and multimedia content. |
Visual elements such as images, charts, and graphs used in documents and presentations. | A feature in word processing software that automatically creates bulleted or numbered lists. |
Pre-designed documents or presentations that can be customized by the user for their specific needs. | Clickable links that allow the user to navigate to another location within the same document or to an external website. |
Headers and footers | Animations |
Speaker notes | Collaboration |
System Security | System Security Threats |
Print Spooling | Importance of Print Spooling |
Special effects such as movement or transitions between slides in a presentation. | Text or other content that appears at the top or bottom of every page in a document or presentation. |
The ability for multiple users to work on a document or presentation simultaneously and make changes in real-time. | Text that accompanies each slide in a presentation and provides additional information or context for the presenter. |
Potential risks or dangers that can arise and harm a computer system and its data, including hacking, viruses, malware, and phishing. | The measures taken to ensure the safety and security of a computer system and its data from unauthorized access and use. |
The benefits of using print spooling, including improved printing speed, reduced downtime, and better resource management. | The process by which a computer saves multiple print jobs in a queue, allowing for efficient use of printer resources and prioritization of jobs. |
How Print Spooling Works | Issues During Print Spooling |
Authorization | Encryption |
Firewall | Intrusion Detection System (IDS) |
Phishing | Malware |
The potential problems that can occur during print spooling, including printer offline errors, paper jams, and network connectivity issues. | The explanation of the print spooling process, including how the computer sends print jobs to the spooler, which then stores them in a queue until the printer becomes available. |
The process of converting plain text into coded text to protect sensitive information from unauthorized access or interception. | The process of granting or denying access to a computer system or its resources based on an individual's identity and level of permission. |
A network security system designed to detect and respond to unauthorized access or malicious activity on a computer network. | A security system designed to prevent unauthorized access to or from a private computer system by filtering out unwanted traffic. |
A type of software designed to harm or exploit a computer system or its data, including viruses, worms, and Trojan horses. | The fraudulent practice of sending emails or messages that appear to be from reputable sources in order to trick individuals into revealing sensitive information. |
HTML | CSS |
Website | Image file types |
JPEG | PNG |
GIF | Image editing |
A styling language used to add visually appealing design elements to web pages. | A markup language used to display content on the web. |
Different formats such as JPEG, PNG, GIF that are used to store and display images on web pages. | A collection of web pages that are linked together and can be accessed through a domain name. |
A lossless image format that is best for simple graphics and images with transparency. Its file extension is .png. | A commonly used image format that is best for photographs and complex images. Its file extension is .jpg or .jpeg. |
The process of modifying an image using software such as Adobe Photoshop to improve or alter its appearance. | A format that allows for animated images with a limited color range. Its file extension is .gif. |
Adobe Photoshop | Resize |
Crop | Brightness |
Sound Editing Software | Recording |
Editing | Enhancement |
The process of changing the dimensions of an image. | A leading image editing software that allows users to edit and manipulate photos and graphics. |
The amount of light in an image. | The process of removing unwanted portions of an image. |
The process of capturing or creating new audio by using a microphone or other input device. | Software used for modifying, manipulating and improving audio files. |
The process of making an audio file sound better by adjusting the levels, adding effects or removing noise. | The process of altering or modifying an existing audio file. |
Sound Control Software | Mixing |
Mastering | Soundscapes |
Sound Effects | Equalization |
Compression | Limiting |
The process of combining multiple audio tracks into a single output file. | Software used for mixing and mastering audio files. |
A collection of sounds, often used to create an immersive or ambient environment. | The process of finalizing an audio track or album for release, ensuring that it sounds as good as possible on all playback systems. |
The process of adjusting the balance between different sound frequencies in an audio file. | An artificially created or enhanced sound used to add to or enhance an audio or visual media production. |
The process of preventing the volume of an audio file from going above a specified level, typically to prevent distortion or clipping. | The process of reducing the dynamic range of an audio file, typically used to make a track more consistent in volume across different playback systems. |
Project management software | Gantt chart |
Task | Resource |
Project scheduling | Critical path |
Project monitoring | Real-time collaboration |
A horizontal bar chart that represents the project schedule over time. | A software that helps in planning, organizing, and managing resources for successful completion of projects. |
Any people, equipment, or material required to complete a task or project. | A defined piece of work that needs to be completed as part of a project. |
The longest sequence of tasks in a project, and the minimum amount of time required to complete the project. | The process of defining the project start and end dates, as well as the order and timeline of tasks and resources required. |
The ability to work together on the same project at the same time from different locations. | The process of tracking the project's progress against the schedule and identifying and managing any issues or risks. |
Resource allocation | Task dependencies |
Milestone | Risk management |
System Updates | Communication Software |
Productivity | Efficiency |
The relationships between tasks that determine which must be completed before others can be started. | The process of assigning and managing resources to tasks in a project. |
The process of identifying, assessing, and managing risks that could impact project success. | A significant point in a project that marks the completion of a major phase or achievement. |
Applications that enable users to communicate with each other, such as email, instant messaging, video conferencing, and collaboration tools. | The process of applying updates to operating systems, software, or firmware to fix bugs, improve performance, and add new features. |
The degree to which resources are used effectively to complete tasks with minimal waste or unnecessary effort. | The measure of how efficiently tasks are completed, often measured as the amount of work done per unit of time. |
Remote Access | Collaboration Tools |
Web Conferencing | VoIP |
Patch | Firewall |
Backup | Malware |
Software that enables multiple users to work together on the same project, often with real-time updates and version control. | The ability to access a computer, network, or data from a different location, often using a virtual private network (VPN) or remote desktop software. |
Voice over Internet Protocol, a technology that enables voice communication over the internet, often using a headset or microphone and speakers. | Online meetings or presentations that enable multiple users to participate and interact through audio, video, and chat features. |
A security system that monitors and controls incoming and outgoing network traffic, often used to protect against unauthorized access or malicious activity. | A software update that fixes known vulnerabilities or bugs in an operating system or application. |
Malicious software such as viruses, trojans, or spyware that can harm or disrupt computer systems and networks. | The process of creating a copy of important data or software to protect against loss or damage in case of disaster or system failure. |
Open Source | Proprietary |
Creative Commons | Freeware |
Shareware | Software as a Service (SaaS) |
Advantages | Disadvantages |
A type of software where the source code is not freely available and is owned by a company or individual. | A type of software where the source code is freely available and can be modified and redistributed by anyone. |
A type of software that is available for free but may have restrictions on distribution or modification. | A type of software license that allows for the free distribution and modification of creative works. |
A type of software delivery model where software is hosted by a third-party provider and accessed over the internet. | A type of software that is available for free trial but requires payment for continued use. |
Drawbacks or negative aspects of different types of software. | Benefits or positive aspects of different types of software. |
Openness | Control |
Cost | Flexibility |
output device | printer |
monitor | speaker |
A characteristic of Proprietary software where the owner of the software has complete control over its use and distribution. | A characteristic of Open Source software that allows for transparency and collaboration in software development. |
A characteristic of SaaS where users can access the software from any device with an internet connection. | A factor to consider when evaluating which type of software is best suited for particular needs. |
An output device that prints text or graphics on paper or other media. | An electronic device that sends information, in the form of text, images, or sound, from a computer to a user. |
An output device that produces sound from a computer. | An output device that displays text, images, and videos from a computer. |
projector | image |
text | audio |
video | HDMI |
USB | port |
A visual representation of information, such as a photograph or diagram. | An output device that projects images and videos onto a screen or other surface. |
Sound or music that can be played on a computer or other device. | Words and characters that can be typed, displayed, or printed. |
A type of cable used to connect a computer to a high-definition television or monitor. | Moving images that can be played on a computer or other device. |
An interface on a computer or other device used to connect cables and other devices. | A type of cable used to connect a computer to various devices, including printers, speakers, and cameras. |
Laser Printer | Inkjet Printer |
Bubblejet Printer | Resolution |
Print Head | Cartridge |
Duplex Printing | Cost per Page |
A type of printer that sprays droplets of ink onto paper to create an image. | A type of printer that uses a laser beam to create an image on a photosensitive drum, which is then rolled through toner before transferring the image onto paper. |
The measure of printing quality, usually measured in dots per inch (dpi). | A type of inkjet printer that uses heat to create bubbles in ink, which then burst onto paper, creating an image. |
The container in which ink or toner is stored for use in a printer. | The part of the printer that moves back and forth across the page and sprays ink or toner onto it to create an image. |
The cost of printing one page of a document, including the cost of ink or toner and paper. | The ability to print on both sides of a piece of paper, either manually or automatically. |
Speed | Paper Tray |
USB | Wireless Printing |
Plotters | Laser Engravers |
Types of plotters | Types of laser engravers |
The compartment in which paper is stored for use in a printer. | The rate at which a printer can print pages per minute (ppm). |
The ability to print wirelessly from a computer or mobile device to a printer, using Wi-Fi or Bluetooth technology. | A type of connection used to connect a printer to a computer. |
A printing technology that uses a laser beam to burn designs into a variety of materials, including wood, metal, and plastic. | A type of printing technology that uses a pen, pencil, or marker to draw images on paper or other materials. |
Different kinds of laser engravers, such as CO2 laser engravers, fiber laser engravers, and diode laser engravers, each with their own benefits and drawbacks. | Different kinds of plotters, such as drum plotters, flatbed plotters, and inkjet plotters, each with their own benefits and drawbacks. |
Paper selection | Material selection |
Design creation | Design preparation |
Pen plotter | Inkjet plotter |
Drum plotter | CO2 laser engraver |
The process of choosing the right type of material for use with laser engravers, based on factors such as hardness, density, and reflectivity. | The process of choosing the right type of paper for use with plotters, based on factors such as thickness, weight, and surface texture. |
The process of formatting and optimizing a digital design for use with a plotter or laser engraver, including adjusting the size, color, and resolution of the design. | The process of using software tools to create a digital design that can be printed using a plotter or engraved using a laser engraver. |
A type of plotter that uses ink to create designs on paper, typically used in graphic design and printing applications. | A type of plotter that uses a pen to draw designs on paper, typically used in engineering and architectural applications. |
A type of laser engraving machine that uses a carbon dioxide laser to burn designs into materials such as wood, rubber, and plastic. | A type of plotter that uses a rotating drum to move paper while a pen draws the design, typically used in high-volume printing applications. |
Computer-Aided Manufacturing (CAM) | 3D Printing |
CAD Software | STL File |
Slicing | Additive Manufacturing |
Fused Deposition Modeling (FDM) | Selective Laser Sintering (SLS) |
3D Printing is a technology that uses a digital model to create solid objects by layering material in successive, thin layers until the desired shape is formed. | Computer-Aided Manufacturing is the use of software to control manufacturing processes, including fabrication, assembly, inspection, and testing, in order to ensure efficiency and accuracy in production. |
STL File is a file format used for 3D Printing that represents a 3D object as a series of connected triangles. | CAD Software is computer software used to create, modify, analyze, or optimize a design for a product or process. |
Additive Manufacturing is a manufacturing process that creates a three-dimensional object by adding successive layers of material until the object is complete. | Slicing is the process of dividing a 3D model into thin, horizontal layers in order to prepare it for 3D Printing. |
Selective Laser Sintering is an additive manufacturing process that uses a high-power laser to fuse small particles of material together to create a 3D object. | Fused Deposition Modeling is an additive manufacturing process that creates a 3D object by heating and extruding plastic filaments through a nozzle, which then solidifies to form the object layer by layer. |
Stereolithography (SLA) | Rapid Prototyping |
Layer Height | Infill |
Actuator | Control device |
Relay | Transistor |
Rapid Prototyping is the process of quickly creating a physical model or prototype of a product to test or evaluate its design. | Stereolithography is an additive manufacturing process that uses a laser to solidify liquid resin into a 3D object. |
Infill is the pattern or structure inside a 3D-printed object that provides internal support and adds strength to the object. | Layer Height is the thickness of each layer of material deposited during the 3D Printing process. |
An electronic device used to control the operation of a device or system | A device that is responsible for moving or controlling a mechanism or system |
A component used to control the flow of electrical current in a circuit | An electrical switch that is activated by an electromagnet, typically used to control high power devices |
Servo motor | Stepper motor |
PWM | Analog |
Digital | Sensor |
Actuator interface | Control device interface |
A motor that is able to rotate in small, precise steps, commonly used in robotics and automation | A motor that is able to rotate to a precise angle, commonly used in robotics and automation |
A type of control signal that varies continuously over a range of values, as opposed to discrete on/off signals | Pulse width modulation, a technique used to control the power supplied to a device by varying the width of a pulse of current |
A device that detects a physical property and converts it into an electrical signal, commonly used in automation and robotics | A type of control signal that uses binary on/off signals |
The component that allows a computer to communicate with and control a control device | The component that allows a computer to communicate with and control an actuator |
Projector | Speaker |
LCD Projector | DLP Projector |
Short-Throw Projector | Wireless Projector |
Bluetooth Speaker | Wired Speaker |
An electronic device that converts audio signals into sound waves that can be heard. | An optical device that projects an image or a video onto a surface. |
A type of projector that uses a digital micromirror device to produce images. | A type of projector that uses a liquid crystal display panel to produce images. |
A type of projector that can connect to a device without the use of cables. | A type of projector that can project a large image from a short distance. |
A type of speaker that connects to a device using a cable. | A type of speaker that uses Bluetooth technology to connect to devices without the use of cables. |
Surround Sound Speaker | Audio Input |
Video Input | Display Resolution |
Optical input devices | Mouse |
Trackball | Optical mouse |
A port on a projector or speaker that allows audio signals to be inputted. | A type of speaker system that provides a multi-channel audio experience. |
The number of pixels that a projector or display is capable of producing. | A port on a projector that allows video signals to be inputted. |
A pointing device that translates motion of the hand into signals for the computer to move the cursor on the screen. | Devices that are used to input data into a computer through optical sensors. |
A type of mouse that uses an optical sensor to detect movement and communicate with the computer. | An input device that uses a ball to manipulate the cursor on the screen with the fingers. |
Touchpad | Optical character recognition (OCR) |
Barcode scanner | QR code scanner |
Webcam | Optical sensor |
Light pen | Scanner |
The process of recognizing text characters from scanned documents or images and converting them into editable text. | A sensor pad that is used in place of a mouse for pointing, clicking, and scrolling on a laptop. |
An optical input device that reads QR codes by detecting and decoding the patterns of squares and dots. | An optical input device that reads barcodes by detecting and decoding the patterns of lines and spaces. |
A device that converts light into an electrical signal, used in optical input devices to detect movement and position. | A camera that captures video or images and transfers the data to a computer through a USB port. |
An optical input device that scans and digitizes printed images or documents. | An input device that uses a light-sensitive pen to interact with a computer screen, primarily used in design or artistic work. |
Biometric input devices | Magnetic input devices |
Advantages of biometric input devices | Disadvantages of biometric input devices |
Types of biometric input devices | Applications of biometric input devices |
Types of magnetic input devices | Applications of magnetic input devices |
Magnetic input devices are devices that read and/or encode information on magnetic stripes or chips, such as credit cards, identity cards, and passports. | Biometric input devices are devices that authenticate a person's identity, based on their biological characteristics, such as fingerprints, voice, facial recognition, and iris scans. |
Disadvantages of biometric input devices include high cost, susceptibility to technical errors, and concerns about privacy and security. | Advantages of biometric input devices include high accuracy, resistance to fraud, and ease of use. |
Applications of biometric input devices include access control, time and attendance tracking, identification verification, and law enforcement. | Types of biometric input devices include fingerprint scanners, retinal scanners, facial recognition systems, voice recognition systems, and hand geometry scanners. |
Applications of magnetic input devices include credit card processing, identity verification, passport control, and check processing. | Types of magnetic input devices include magnetic stripe readers, magnetic card readers, and magnetic ink character recognition (MICR) readers. |
Security features of biometric input devices | Technical errors of biometric input devices |
Privacy concerns of biometric input devices | Security concerns of biometric input devices |
Scanners | Cameras |
Flatbed Scanners | Sheet-fed Scanners |
Technical errors of biometric input devices include false rejection and false acceptance. False rejection occurs when a valid user is denied access, whereas false acceptance occurs when an impostor is granted access. | Security features of biometric input devices include encryption, match-on-device authentication, and multi-factor authentication. |
Security concerns of biometric input devices include the risk of hacking, spoofing, and tampering. | Privacy concerns of biometric input devices include the risk of identity theft, data breaches, and unauthorized surveillance. |
Devices used to capture digital images and videos. | Devices used to convert physical documents or images into digital format. |
Scanners that can handle multiple pages and are commonly used in offices for scanning large volumes of documents. | Scanners that have a flat glass surface and are commonly used to scan documents and photos. |
Handheld Scanners | Webcams |
Digital Cameras | Industrial Scanners |
Medical Scanners | Architecture |
Fashion | Forensics |
Cameras that are primarily used for video conferencing, live streaming, or recording videos for social media platforms. | Portable scanners that are used to scan documents, photos, or other flat objects that cannot be fed through a traditional scanner. |
Scanners that are designed for heavy-duty usage and are commonly used in manufacturing, logistics, and retail industries. | Cameras that capture digital images and videos, and have multiple features such as zoom, flash, and various shooting modes. |
The industry that uses scanners and cameras to create digital 3D models of buildings and landscapes. | Scanners that are used for medical imaging, such as X-rays, MRI, CT scans, and ultrasounds. |
The field that uses scanners and cameras to collect and analyze digital evidence in criminal investigations. | The industry that uses scanners and cameras to capture images of clothing and accessories for marketing purposes. |
Touch screen | Capacitive touch screen |
Resistive touch screen | Multi-touch screen |
Virtual keyboard | Haptic feedback |
Gesture recognition | Durability |
A type of touch screen that uses the electrical charge of the human body to detect touches. | A display screen that is sensitive to pressure and touch, allowing the user to interact with it by tapping, swiping, or using a stylus. |
A touch screen that can detect and respond to multiple touches simultaneously. | A type of touch screen that works by detecting pressure applied to the screen. It consists of two layers of material, each with a conductive coating, separated by a small gap. |
A tactile response provided by a touch screen in response to user input, such as vibrations or a physical click. | A software-based keyboard that appears on a touch screen device when needed, allowing the user to type in text. |
The ability of a touch screen to resist damage from scratches, impact, and other types of physical wear and tear over time. | The ability of a touch screen device to interpret complex finger movements, such as pinching, swiping, and tapping, as specific commands or actions. |
Ease of use | Space-saving |
Accessibility | Comparison to other input devices |
OCR | OMR |
Barcode | Reader |
The ability of a touch screen to eliminate the need for external input devices, such as a keyboard or mouse, thereby saving space on the desktop or workspace. | The simplicity and intuitiveness of the touch screen interface, and how easily users can learn to interact with it. |
The similarities and differences between touch screens and other input devices, such as keyboards, mice, and trackpads, in terms of functionality, ease of use, and user experience. | The ability of a touch screen to assist users with disabilities, such as those with limited mobility or visual impairments, by providing alternative means of interaction with technology. |
OMR stands for optical mark recognition. It is a technology used to detect the presence or absence of marks on a paper form. | OCR stands for optical character recognition. It is a technology that converts scanned images of text into machine-encoded text. |
A reader is a device that can read and interpret information from different types of documents, such as text, images or barcodes. | A barcode is an image consisting of a series of parallel lines of varying widths that can be read by a barcode reader to identify a product or service. |
Scanned image | Machine-encoded text |
Paper form | Mark detection technology |
Barcode reader | Product identification |
Service identification | Differentiation |
Machine-encoded text is text that has been translated by a computer program into a format that can be interpreted by other machines or systems. | A scanned image is an electronic image obtained by scanning a paper document or photograph. |
Mark detection technology is a method used to detect specific marks on a paper form, often used in OMR readers. | A paper form is a document that contains fields and boxes to be filled in by hand or machine, usually for purposes of data collection or surveys. |
Product identification is the process of assigning unique identifiers to products or items in order to distinguish them from others. | A barcode reader is a device that can read and interpret the information contained in a barcode image. |
Differentiation is the process of distinguishing between two or more things or concepts, often used in reference to OCR, OMR, and barcode readers. | Service identification is the process of assigning unique identifiers to services or actions in order to distinguish them from others. |
Chip & Pin technology | Contactless payments |
Advantages of Chip & Pin technology | Disadvantages of Chip & Pin technology |
Advantages of Contactless payments | Disadvantages of Contactless payments |
Payment terminal | Personal Identification Number (PIN) |
A technology that allows for secure and fast transactions without the need for physical contact between the payment device (card, smartphone, etc.) and the payment terminal. | A technology used in credit and debit cards that requires the user to insert their card into a reader and enter a unique personal identification number (PIN) to complete a transaction. |
Can be slow during high-volume periods, requires the use of a physical card and reader. | Increased security, reduced fraud, quick and efficient transactions. |
Potential for fraud or security breaches, limited transaction amounts, not accepted at all merchants. | Quick and easy transactions, convenient for customers, reduces the need for physical contact with payment devices. |
A unique numeric code used to authenticate the user during credit or debit card transactions. | A device used in businesses to process electronic payments, such as credit and debit cards. |
EMV | NFC |
Biometrics | Tokenization |
Keyboard | Mouse |
Touchpad | Trackball |
A technology that enables contactless communication between devices, often used for mobile payments. | A global standard for credit and debit card payments that uses chip technology to increase transaction security and reduce fraud. |
A process that replaces sensitive payment information, such as credit card numbers, with a unique token that is used for transactions. | Authentication techniques that rely on unique biological characteristics of an individual, such as fingerprints or facial recognition. |
A hand-held pointing device used to navigate and interact with graphical user interfaces. | A device that allows users to type characters and commands into a computer. |
A pointing device that consists of a ball housed in a socket containing sensors to detect rotation of the ball. | A pointing device that is sensitive to touch or pressure, used primarily on laptop computers. |
Scanner | Microphone |
Joystick | Digital Camera |
Barcode Reader | Graphics Tablet |
Touchscreen | Webcam |
A device used to capture audio input, such as spoken words or music. | A device that captures images of printed text or graphics, and converts them into a digital format. |
A device used to capture and store digital images and videos. | A hand-held device that uses a lever and buttons to control the movement of objects on a computer screen. |
A flat surface used for drawing or writing, with a stylus or electronic pen that can detect position and pressure. | A device that reads and decodes information contained in a barcode. |
A camera connected to a computer, used to capture and transmit video over the Internet. | A display screen that is sensitive to touch, and allows users to interact with the computer by tapping or swiping. |
HDD | SSD |
CD | DVD |
Blu Ray | Magnetic Storage |
Flash Memory | Capacity |
A solid state drive is a data storage device that uses NAND-based flash memory to store and retrieve digital information. | A hard disk drive is a data storage device that uses magnetic storage to store and retrieve digital information. |
A digital versatile disc is a digital optical disc data storage format that was introduced in 1995. | A compact disc is a digital optical disc data storage format that was introduced in 1982. |
A type of storage technology that uses magnetism to store and retrieve digital information, typically on a spinning disk or platter. | A Blu-ray disc is a digital optical disc data storage format that was introduced in 2006 and can store high definition video and data. |
The amount of digital information that a storage device can hold, typically measured in bytes or gigabytes. | A type of storage technology that uses NAND-based flash memory chips to store and retrieve digital information, typically in a solid state drive or USB flash drive. |
Speed | Durability |
Cost | Applications |
Flash Drive | Pen Drive |
SD Card | Portable Storage Devices |
The ability of a storage device to withstand physical shock or damage and continue to function properly. | The rate at which a storage device can read or write digital information, typically measured in megabytes per second. |
The specific uses or scenarios in which a particular storage device is best suited, based on its characteristics and capabilities. | The amount of money required to purchase or operate a storage device, typically measured in dollars or euros. |
Another name for a USB flash drive, a type of portable storage device that uses flash memory to store data. | A portable storage device that uses flash memory to store data. |
Electronic devices used to store data that can be easily carried and used on multiple devices. | A type of portable storage device that uses non-volatile flash memory to store data and can be used to expand the storage capacity of devices such as digital cameras and smartphones. |
USB Flash Drive | External Hard Drive |
Cloud Storage | Memory Card |
Backup | File Transfer |
Data Storage | Flash Memory |
A type of portable storage device that uses magnetic disks to store data and connects to devices via a USB or Thunderbolt port. Can store much larger amounts of data than a flash drive. | A type of portable storage device that uses flash memory to store data and connects to devices via a USB port. |
A small, removable electronic device used to store data, often found in devices such as digital cameras and smartphones. | A type of data storage that allows data to be stored and accessed remotely, typically via the internet. |
The act of moving electronic data from one device to another, typically via a cable, wireless connection, or portable storage device. | The process of creating a copy of important data so that it can be easily restored in case of loss or damage. |
A type of non-volatile memory that retains data even when power is turned off and is commonly used in portable storage devices such as flash drives and memory cards. | The process of storing electronic data on a storage device, such as a hard drive or flash drive, for later retrieval and use. |
Magnetic Tape | Floppy Disk |
Obsolete | Digital Data |
Storage Medium | Read/Write Head |
Capacity | Access Time |
A removable storage medium that uses a flexible disk coated with a magnetic material to store digital data. | A storage medium that uses a long strip of tape coated with a magnetic material to store digital data. |
Information that is stored and transmitted in binary form (0s and 1s). | No longer in use or relevant. In the context of storage devices, it refers to devices that have been replaced by newer, more efficient technologies. |
The part of a storage device that reads and writes data to and from the storage medium. | A physical device or material that can be used to store digital data. |
The amount of time it takes for a storage device to locate and retrieve data. | The amount of data that can be stored in a storage device. |
Durability | Portability |
Solid State Drive (SSD) | External Hard Drive |
Computer storage | Magnetic storage |
Optical storage | Solid state storage |
The ease with which a storage device can be transported from one location to another. | The ability of a storage device to withstand physical wear and tear over time. |
A storage device that uses a spinning disk to store data. Compared to magnetic tape and floppy disks, external hard drives have higher capacity and are more portable, but are generally slower and less durable. | A storage device that uses NAND-based flash memory to store digital data. Compared to magnetic tape and floppy disks, SSDs are faster, more durable, and have higher capacity. |
A type of computer storage that uses magnetization to store and retrieve data on disks or tapes. | The act of storing digital data in a computer system for later use. |
A type of computer storage that uses flash memory to store and retrieve data on chips. | A type of computer storage that uses laser light to store and retrieve data on disks or other media. |
Magnetization | Laser light |
Disks | Tapes |
Flash memory | Non-volatile |
Alignment | Digital data |
A highly focused beam of light that is used in optical storage to read and write data. | The process of aligning magnetic particles in a material to store digital information. |
A long, narrow strip of magnetic material that is used in magnetic storage. | A circular, flat storage medium that is used in magnetic and optical storage. |
A type of memory that retains data even when the power is turned off. | A type of non-volatile computer memory that can be electrically erased and reprogrammed. |
Data that is represented using binary digits (1s and 0s) and can be processed by a computer. | The process of positioning something in a precise manner, such as aligning magnetic particles in a material. |
Internet | External storage |
Pros | Cons |
Accessibility | Data security |
Backup | Reliability |
Devices that allow users to store data outside of their computer's hard drive, such as USB flash drives or external hard drives. | A global network of computers and servers that allows individuals and organizations to share and access information. |
Disadvantages of using either internet or external storage for data storage and access. | Advantages or benefits of using either internet or external storage for data storage and access. |
The measures taken to protect digital data from unauthorized access, theft, and damage. | The ease with which data can be accessed and retrieved by authorized users. |
The ability of a storage device or system to consistently provide access to data without failure or error. | A copy of data that can be used to restore the original data in the event of loss or damage. |
Bandwidth | Cost |
Physical storage | Cloud storage |
Recordable Discs | Re-recordable Discs |
CD-R | CD-RW |
The financial expenses associated with using either internet or external storage. | The amount of data that can be transmitted over a network in a given amount of time. |
Storing data on remote servers accessed via the internet. | Storing data on physical devices such as CDs, DVDs, or flash drives. |
A type of disc that can be written and rewritten multiple times. | A type of disc that can be written on one time only. |
A type of re-recordable disc that can be written and rewritten multiple times. | A type of recordable disc that can only be written on once. |
DVD-R | DVD+R |
DVD-RW | DVD+RW |
Capacity | Write Speed |
Read Speed | Disc Burning |
A type of recordable disc that can only be written on once, with a larger capacity than a CD-R. | A type of recordable disc that can only be written on once, with a larger capacity than a CD-R. |
A type of re-recordable disc that can be written and rewritten multiple times. | A type of re-recordable disc that can be written and rewritten multiple times. |
The speed at which data can be written to the disc. | The amount of data that can be stored on a disc. |
The process of writing data to a recordable or re-recordable disc. | The speed at which data can be read from the disc. |
RAM | ROM |
Flash Memory | Difference |
Accessed | Used |
Non-volatile | Volatile |
Read Only Memory is a type of computer memory that is used to store pre-set data and instructions that cannot be changed by the user. | Random Access Memory is a type of computer storage that allows data to be accessed quickly in any order. |
The variance between two or more things, in this case, RAM, ROM, and Flash Memory. | A type of non-volatile computer memory that can be electrically erased and reprogrammed. |
Putting computer memory to a particular purpose in a computing device. | Retrieving data from computer memory. |
Memory that loses its contents when power is turned off or interrupted. | Memory that retains data even when the power is turned off. |
Storage | Data |
Pre-set | Electrically Erased |
Memory Management | Virtual Memory |
Physical Memory | Memory Leak |
Facts, figures, symbols that can be processed by a computer. | A device or medium that is used to store data or information. |
Process of erasing stored data using an electrical charge to reset the memory cells. | Data or instructions which are predetermined and unalterable by the user. |
A memory management technique that uses hard disk space to simulate random access memory (RAM) capacity. | The process of managing and organizing computer memory to optimize its usage and performance. |
A common issue in programming where a program fails to release memory when it is no longer needed, resulting in memory waste and performance issues. | The actual RAM installed in a computer system that is used to execute programs and applications. |
Garbage Collection | Memory Fragmentation |
Memory Compression | Memory Swapping |
Page Fault | Cache Memory |
Memory Mapping | Memory Hierarchy |
A condition that occurs when free memory in a computer system is divided into small, unusable segments. | The process of automatically freeing up memory that is no longer in use by a program or application. |
A memory management technique that moves data between RAM and hard disk space to optimize usage and performance. | A memory management technique that compresses data in memory to free up more space for other processes and applications. |
A type of memory that is used to store frequently accessed data to improve system performance. | A memory management issue that occurs when a program requests data that is not in RAM and needs to be moved from hard disk space. |
The organizational structure of computer memory, arranged in order of speed, capacity, and cost. | The process of assigning memory addresses to data and instructions in a computer program. |
Punch cards | Floppy Disk |
CD-ROM | Hard Disk Drive |
USB Flash Drive | Cloud Storage |
Solid State Drive | RAID |
A removable magnetic storage medium that was popular in the 1980s and 1990s and had a storage capacity of 1.44MB. | Punch cards were used to store data and program instructions for early computers and were widely used until the mid-1970s. |
A magnetic storage device used in most computers today to store data and program instructions. | Compact Disc Read-Only Memory is an optical disc format used in the late 1980s and 1990s to store data and software. |
A method of storing data on remote servers accessed via the internet rather than on a local hard drive. | A portable storage device that uses flash memory to store data and can be plugged into a computer's USB port. |
Redundant Array of Independent Disks is a storage technology that uses multiple hard drives to improve performance and data reliability. | A type of hard drive that uses flash memory to store data and program instructions. |
Network-Attached Storage | Tape Drive |
Virtual Reality | Artificial Intelligence |
Kilobyte | Kibibyte |
Megabyte | Mebibyte |
A magnetic storage device that uses tape to store data and is commonly used for long-term backups. | A specialized device that provides centralized data storage for a network, making it easier to share and backup data across multiple computers. |
A branch of computer science that deals with the creation of intelligent machines that can perform tasks that usually require human intelligence, and relies on storage technology to store the data required to train the machine learning algorithms. | A technology that creates a simulated environment by using computer-generated visuals and sounds, and relies on storage technology to store the data required to create the environment. |
A storage unit of 1024 bits. | A storage unit of 1024 bytes. |
A storage unit of 1024 kibibytes. | A storage unit of 1024 kilobytes. |
Byte | Bit |
Gigabyte | Gibibyte |
Terabyte | Tebibyte |
Data Storage Units | Storage capacity |
The smallest unit of digital information. | A unit of digital information. |
A storage unit of 1024 mebibytes. | A storage unit of 1024 megabytes. |
A storage unit of 1024 gibibytes. | A storage unit of 1024 gigabytes. |
The amount of digital information a storage device can hold. | The units in which digital information is measured and stored. |
Gigabyte | Gibibyte |
Terabyte | Tebibyte |
Conversion | Binary |
Real world scenarios | Bits |
A unit of digital information that is equivalent to 1,073,741,824 bytes. | A unit of digital information that is equivalent to 1 billion bytes or 1,000 megabytes. |
A unit of digital information that is equivalent to 1,099,511,627,776 bytes. | A unit of digital information that is equivalent to 1 trillion bytes. |
A system of numerical notation that has a base of 2 and uses only 2 digits, 0 and 1. | The process of changing a data unit from one size to another. |
The smallest unit of digital information that can be represented or stored in a computer. | Applying knowledge of larger data units to practical situations in everyday life. |
Bytes | Megabyte |
Mebibyte | Petabyte |
CPU | Microprocessor |
Clock Speed | Cache |
A unit of digital information that is equivalent to 1 million bytes or 1,000 kilobytes. | A unit of digital information that is equivalent to 8 bits. |
A unit of digital information that is equivalent to 1 quadrillion bytes or 1,000 terabytes. | A unit of digital information that is equivalent to 1,048,576 bytes. |
A CPU that is contained on a single integrated circuit chip. | The central processing unit (CPU) is the primary component of a computer that performs most of the processing operations. |
Fast memory used by the CPU to store frequently accessed data and instructions. | The speed at which the CPU can execute instructions, measured in gigahertz (GHz). |
Registers | ALU |
Control Unit | Instruction Set |
Pipelining | Multicore Processor |
Thermal Design Power | Overclocking |
The Arithmetic Logic Unit (ALU) performs mathematical and logical operations on data. | Small, high-speed memory locations within the CPU used for temporary storage of data and instructions. |
The set of instructions that the CPU can execute. | The Control Unit (CU) manages the flow of data and instructions between the CPU and other components of the computer. |
A CPU that contains multiple processing cores on a single chip. | A technique used by CPUs to improve performance by overlapping the execution of multiple instructions. |
The process of increasing the clock speed of a CPU to improve performance, which can also increase the heat generated by the CPU. | The maximum amount of heat a CPU can generate under normal conditions, measured in watts (W). |
Processor speed | Clock speed |
Cache | Number of cores |
Thermal design power (TDP) | Overclocking |
Benchmarking | Front-side bus (FSB) |
The speed at which a processor can perform instructions, measured in GHz. | The measure of how fast a computer's processor can perform calculations, usually measured in gigahertz (GHz). |
The number of processing units within a single CPU, which can improve performance for multitasking and multi-threaded applications. | A small amount of memory used by processors to store frequently accessed data for faster processing. |
The practice of increasing a processor’s clock speed beyond its factory default settings in order to improve performance. | The maximum amount of heat that a processor generates under normal operating conditions. |
The communication pathway that connects the processor to the memory and other components on the motherboard. | The practice of measuring the performance of a computer's hardware and software using standardized tests called benchmarks. |
Instruction set | Hyper-threading |
Turbo Boost | Software optimization |
Computer cores | Optimizing performance |
Central processing unit (CPU) | Multicore processors |
A feature of some processors that allows each core to perform multiple tasks simultaneously, improving performance for multi-threaded applications. | The collection of commands and operations that a processor can perform, including arithmetic, logic, and input/output operations. |
The process of writing and designing software to take advantage of a processor's features and capabilities, which can improve performance. | A feature found on some processors that allows them to automatically increase their clock speeds when additional performance is needed. |
The process of improving the speed and efficiency of a computer system. | The processing units within a computer that execute instructions and perform calculations. |
CPUs that contain two or more cores, allowing them to perform multiple tasks concurrently. | The primary component of a computer that contains the cores and controls the rest of the system. |
Hyper-threading | Cache memory |
Core monitoring | CPU utilization |
Task manager | Overclocking |
Parallel processing | Load balancing |
A type of high-speed memory that stores frequently accessed data to improve processing times. | A technology that allows each core to execute multiple threads simultaneously, improving performance. |
The percentage of time that a CPU is actively executing instructions. | The process of monitoring usage and performance of individual cores within a CPU. |
The process of increasing CPU frequency to improve performance, potentially at the cost of stability and longevity. | A system utility that displays information on running processes and CPU usage. |
The process of distributing workloads across multiple cores or processors to maximize utilization and performance. | The use of multiple cores or processors to execute tasks simultaneously, improving performance. |
CPU | Processor Speed |
Cores | Cache |
GPU | Integrated |
Benefits | Limitations |
Processor speed refers to the clock rate of a CPU, which determines the number of operations it can perform per second. | The central processing unit (CPU) is the primary component of a computer that performs most of the processing tasks. |
Cache is a high-speed memory that stores frequently accessed data and instructions to reduce the time it takes to access them. | Cores are individual processing units within a CPU that allow multiple tasks to be performed simultaneously. |
Integration refers to the combination of multiple components into a single system or device, such as integrating CPU, Processor Speed, Cores, Cache and GPU in iGCSE ICT Course. | A graphics processing unit (GPU) is a specialized processor that is designed to handle 3D graphics and image processing tasks. |
Disadvantages or challenges that may arise from integrating CPU, Processor Speed, Cores, Cache and GPU in iGCSE ICT Course. | Advantages or positive outcomes that result from integrating CPU, Processor Speed, Cores, Cache and GPU in iGCSE ICT Course. |
Clock rate | Instruction set |
Multitasking | Rendering |
GPU | iGCSE ICT course |
GPU architectures | gaming |
The instruction set is the set of commands and operations that a CPU is designed to execute. | The clock rate of a CPU refers to the number of clock cycles per second that the CPU can perform. |
The process of creating or generating visual images or animations from computer data using a GPU. | The ability to perform multiple tasks simultaneously using the multiple processing units (cores) in a CPU. |
iGCSE ICT course or International General Certificate of Secondary Education course in Information and Communication Technology is a comprehensive learning program designed to introduce students to the use and application of computer technology in various fields. | A Graphics Processing Unit or GPU is a specialized electronic circuit designed to handle and speed up the creation and rendering of images, videos, and animations on a computer screen. |
Gaming refers to the use of computer technology to play video games, either online or offline, involving interactive and immersive gameplay experiences. | GPU architectures refer to the different designs and models used to create graphics processing units, each with its unique specifications, features, and capabilities. |
video rendering | scientific computing |
GPU programming | performance optimization |
future prospects | higher image and video resolutions |
virtual reality | artificial intelligence |
Scientific Computing is the simulation, modeling, and analysis of scientific and engineering problems using advanced computational tools and algorithms. | Video Rendering is the process of creating and editing digital animations or video content using advanced software tools and techniques. |
Performance Optimization refers to the process of improving and enhancing the speed, efficiency, and output quality of computing applications by using advanced programming and optimization techniques. | GPU Programming refers to the process of writing software programs and code that can directly access and utilize the processing power and capabilities of the Graphics Processing Unit to optimize performance and enhance output results. |
Higher Image and Video Resolutions refer to the advanced features and capabilities of GPU technology that allow for the creation and rendering of high-quality images and videos with high resolution and clarity. | Future Prospects refer to the potential opportunities, trends, and advancements that are predicted to shape the future of computing and technology, including the use and development of GPU technology. |
Artificial Intelligence refers to the development and use of advanced computer algorithms and models to simulate, replicate, and enhance human intelligence and cognitive capabilities, including language processing, decision-making, and problem-solving. | Virtual Reality is a computer-generated simulation of a three-dimensional virtual environment that can be interacted with through specialized hardware and software tools. |
Cache | Hit rate |
Miss rate | Direct mapped cache |
Fully associative cache | Set associative cache |
Cache line | Block size |
The percentage of times a requested piece of data is found in the cache. | A high-speed data storage layer that temporarily stores data so future requests for that data can be served faster. |
A type of cache in which each main memory address is uniquely associated with a particular cache location. | The percentage of times a requested piece of data is not found in the cache. |
A type of cache in which a given memory block can be placed in a specific subset or 'set' of cache locations. | A type of cache in which a given memory block can be placed in any cache location. |
The size of the cache line, typically measured in bytes. | The smallest unit of memory that can be stored and retrieved from the cache. |
Cache hit | Cache miss |
Cache write | Cache read |
Cache optimization | Optimizing performance |
Hardware components | CPU |
An event in which a requested piece of data is not found in the cache, requiring it to be retrieved from main memory. | An event in which a requested piece of data is found in the cache. |
The process of retrieving data from the cache. | The process of updating the cache with modified data. |
The process of improving the speed, efficiency, and overall performance of a computer system. | Techniques used to improve cache performance, including prefetching, spatial and temporal locality, and cache replacement policies. |
Central Processing Unit - the main component of a computer that performs most of the processing. | Physical parts of a computer system that are used to enhance and optimize its performance. |
RAM | Solid-state drive |
Graphics card | Overclocking |
Cooling system | Benchmarking |
Cache | Bus speed |
A type of storage device that uses flash memory to store data and programs, providing faster access times and improved performance over traditional hard drives. | Random Access Memory - a type of computer memory that provides temporary storage for data and programs. |
The process of increasing the clock speed of a computer component, such as a CPU or GPU, to improve its performance beyond its original specifications. | A component of a computer system that is dedicated to processing graphics and video, improving performance for tasks such as gaming and video editing. |
The process of testing and comparing the performance of a computer system to that of other systems, using standardized tests and measurements. | A component of a computer system that is used to keep its temperature under control, preventing overheating and improving performance. |
The speed at which data is transferred between the CPU and other components of a computer system, such as RAM and the graphics card. | A type of high-speed memory that is used to store frequently accessed data and instructions, improving performance by reducing the need to access slower forms of memory. |
Power supply | ICT hardware |
Strategies | Effective |
Developing | Importance |
Key factors | Planning |
Physical devices that make up computer systems and are used to input, process, store and output data. | A component of a computer system that is responsible for converting mains power to the voltage and current needed by the other components, ensuring reliable and stable performance. |
Producing the intended or desired result. | Plan of action designed to achieve a particular goal or set of goals. |
The state or quality of being significant, necessary, or valuable. | The process of creating or improving something over a period of time. |
The process of creating a strategy or plan of action to achieve a particular goal or set of goals. | Critical elements that are required for the successful development of a particular strategy. |
Implementation | Monitoring |
Evaluation | Feedback |
Modification | Telecommunications |
Satellite | Broadcast |
The process of tracking and evaluating the progress of a plan or strategy. | The process of putting a plan or strategy into action. |
Information received in response to a particular action or behavior, which can be used to modify or improve that action or behavior. | The process of assessing the effectiveness of a plan or strategy. |
The transmission of information over a distance for the purpose of communication. | The process of making changes or adjustments to a plan or strategy. |
The distribution of audio or video content to a dispersed audience via any audio or visual mass communications medium. | An object that orbits the earth and is used for communication purposes. |
TV | Radio |
Basics | Different Satellites |
Uses | Broadcast Technologies |
Advantages | Disadvantages |
The transmission and reception of electromagnetic waves of radio frequency, especially those carrying sound messages. | A telecommunication system for broadcasting and receiving images and sound over a distance. |
Various man-made objects placed into orbits around the earth for communication purposes, such as geostationary, low earth orbit and medium earth orbit satellites. | The fundamental elements or principles of a subject or skill. |
The various methods and equipment used for transmitting audio and video content, such as analog, digital and satellite broadcasting technologies. | The functions and applications of the satellites. |
The negative aspects and limitations of using telecommunications, such as security and privacy concerns, infrastructure cost, and dependence on technology. | The benefits and positive aspects of using telecommunications, such as improved communication, efficient use of resources, and convenience. |
Wired communication | Ethernet |
Coaxial cable | Fiber optic |
Twisted pair | LAN |
WAN | Shielding |
A wired networking technology that is commonly used in local area networks (LANs) to connect devices like computers, switches, and routers. | Technology that uses physical wires to transmit data and signals between devices or networks. |
A type of wired communication technology that uses glass or plastic fibers to transmit data via light signals, offering high bandwidth and long-distance transmission capabilities. | A type of electrical cable used for transmitting high-frequency signals over long distances, often used in cable TV systems. |
A local area network that uses wired communication technology, typically covering a relatively small geographic area like an office or building. | A type of copper wire used in telecommunications that has two or more copper wires twisted together, often used in telephone and Ethernet cables. |
A method of protecting wired communication signals from interference or noise, often accomplished through the use of metal shielding or special coatings on cables. | A wide area network that uses wired communication technology, typically covering a larger geographic area and connecting LANs or other networks together. |
Bandwidth | Latency |
Reliability | Security |
Wireless Communication Technology | Radio Waves |
Bandwidth | WLAN |
The delay that occurs when transmitting data over a wired communication channel or network, often measured in milliseconds. | A measure of the amount of data that can be transmitted over a wired communication channel or network in a given amount of time. |
The protection of wired communication signals and data from unauthorized access, interception, or tampering, often achieved through encryption or other security protocols. | The ability of wired communication technology to provide consistent and accurate transmission of data and signals over time. |
Electromagnetic waves of frequency between 30 hertz and 300 gigahertz that are used for transmitting data wirelessly. | The use of radio waves to transmit information without physical connections between sender and receiver devices. |
Wireless Local Area Network. | The range of frequencies available for wireless data transmission. |
WiFi | Bluetooth |
SSID | Encryption |
Security | Interference |
Latency | Range |
A wireless technology standard for exchanging data between devices over short distances. | Wireless Fidelity. |
The process of converting plain text data into a coded message to ensure secure transmission of data over wireless networks. | Service Set Identifier - a unique name that identifies a wireless network. |
The presence of noise or other wireless signals that disrupt the transmission of data over a wireless network. | Measures put in place to protect wireless networks from unauthorized access and data theft. |
The coverage area of a wireless signal, determined by factors such as the signal strength and obstacles in the environment. | The amount of time it takes for data to travel between the sender and receiver devices over a wireless network. |
Infrared communication | NFC communication |
Infrared port | NFC tags |
Line of sight | Peer-to-peer mode |
Data transfer | Contactless payments |
A short-range wireless technology that enables communication between devices when they are brought near each other. | The wireless transmission of data or information using infrared light waves. |
Small chips that can be embedded in everyday objects and can be read by NFC-enabled devices. | A hardware component that sends and receives infrared signals between two devices. |
A mode of NFC communication that allows two devices to exchange data without the need for a wireless network or internet connection. | A requirement for Infrared communication that means the transmitter and receiver must be within range and in clear view of each other. |
A type of payment that allows customers to make secure transactions by waving or tapping their NFC-enabled device near a compatible terminal. | The process of transferring data from one device to another by using Infrared or NFC communication. |
Interference | Range |
Reliability | Security |
LAN | Ethernet |
Node | Switch |
The maximum distance over which Infrared or NFC communication can be established between two devices. | A disturbance that affects the quality of Infrared or NFC communication and can result in data loss or corruption. |
The level of protection and confidentiality of data transmitted over Infrared or NFC communication channels. | The level of trust and consistency in the quality of Infrared or NFC communication. |
Ethernet is a type of LAN technology that allows devices to connect to a network and communicate with each other through a set of rules and protocols. | A local area network (LAN) is a group of devices connected together in a specific geographic location that share common resources and communicate with each other. |
A switch is a networking device that connects different nodes in a LAN and allows them to communicate with each other. | A node is any device connected to a LAN, such as a computer, printer, or server. |
Router | Wireless |
Topology | Client-server |
Peer-to-peer | Bandwidth |
Protocol | Firewall |
Wireless refers to the use of radio waves to connect devices together without the need for physical wires or cables. | A router is a device that connects two or more networks together and directs data traffic between them. |
Client-server refers to a type of network architecture where one or more computers or devices act as servers, providing services or resources to other computers or devices called clients. | Topology refers to the physical or logical layout of a network, including how devices are connected and how data flows between them. |
Bandwidth refers to the amount of data that can be transmitted over a network in a given amount of time, usually measured in bits per second (bps). | Peer-to-peer refers to a type of network architecture where every device on the network can act as both a client and a server, allowing for more decentralized communication. |
A firewall is a type of security software or hardware that monitors and controls incoming and outgoing network traffic, helping to prevent unauthorized access or attacks. | A protocol is a set of rules and standards that govern the communication between devices on a network. |
WAN | Bandwidth |
Router | ISP |
VPN | Latency |
Ethernet | Modem |
The amount of data that can be transmitted over a network in a given amount of time. | A wide area network (WAN) is a network that spans a large geographical area and connects multiple computers and devices over long distances. |
An Internet Service Provider (ISP) is a company that provides access to the Internet. | A device that connects two or more networks together and determines the best path for data to travel between them. |
The delay that can occur when data is transmitted over a network, typically measured in milliseconds. | A Virtual Private Network (VPN) is a secure connection between two or more devices or networks, typically over the Internet. |
A device that converts digital signals into analog signals for transmission over a telephone or cable line, and vice versa. | A type of wired network connection commonly used in LANs and WANs. |
TCP/IP | Circuit Switching |
Packet Switching | Cloud Computing |
GPS | 3G |
4G | 5G |
A type of communication in which a dedicated physical connection is established between two devices for the duration of the communication, and then released when the communication is complete. | The Transmission Control Protocol/Internet Protocol (TCP/IP) is a set of protocols used to communicate over the Internet and other types of networks. |
A model for delivering computing services over the Internet, including software, storage, and processing power. | A type of communication in which data is divided into packets and sent across a network, with each packet transmitted independently and reassembled at the destination. |
3G, or third generation, is a mobile communication technology that allows for faster data transfer speeds than 2G. It enables features such as video calling, mobile internet access, and digital television. | GPS stands for Global Positioning System. It is a satellite-based navigation system that provides location and time information in all weather conditions. |
5G, or fifth generation, is the latest mobile communication technology that offers even faster data transfer speeds than 4G. It enables features such as virtual reality and augmented reality experiences, autonomous vehicles, and advanced robotics. | 4G, or fourth generation, is an improvement over 3G technology that allows for even faster data transfer speeds. It enables features such as high-quality streaming, online gaming, and mobile hotspot capabilities. |
satellite-based navigation system | video calling |
mobile internet access | digital television |
high-quality streaming | online gaming |
mobile hotspot capabilities | virtual reality |
Video calling is a feature of mobile communication technology that allows users to make video calls to other users, typically using a 3G or 4G connection. | A satellite-based navigation system uses satellites to provide location and time information to users on the ground. |
Digital television is a feature of mobile communication technology that enables users to watch television on their mobile devices, typically using a 3G or 4G connection. | Mobile internet access is a feature of mobile communication technology that allows users to access the internet on their mobile devices, typically using a 3G or 4G connection. |
Online gaming is a feature of 4G technology that allows users to play games online with other users, typically without experiencing lag or other issues. | High-quality streaming is a feature of 4G technology that allows users to stream high-quality video and audio content on their mobile devices without buffering. |
Virtual reality is an immersive experience that uses technology to create a simulated environment. | Mobile hotspot capabilities are a feature of 4G technology that allows users to create a Wi-Fi hotspot with their mobile device, which other devices can connect to and access the internet through. |
augmented reality | autonomous vehicles |
advanced robotics | mobile communication technology |
Personal Area Networks (PAN) | Benefits |
PAN Technologies | Bluetooth technology |
Autonomous vehicles are vehicles that are capable of driving themselves, using sensors and other technology to navigate without human input. | Augmented reality is an interactive experience that uses technology to overlay digital information on the real world. |
Mobile communication technology refers to the technology used to facilitate communication between mobile devices, including smartphones, tablets, and other wireless devices. | Advanced robotics is the use of robotic technology to perform complex tasks, such as manufacturing and surgery. |
Advantages of using Personal Area Networks include reduced cable clutter, easy data sharing, and reduced power consumption. | A computer network organized around an individual person within a single building or up to 10 meters radius. |
A wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz) from fixed and mobile devices. | Various PAN technologies include Bluetooth, Zigbee, NFC, and Infrared. |
Devices | Set up PAN |
Computer Network | Individual Person |
Building | Cable Clutter |
Data Sharing | Power Consumption |
To set up PAN using Bluetooth technology, make sure the devices have Bluetooth installed and enabled, turn on discovery, and pair the devices. | Devices to create PAN include laptops, smartphones, headsets, printers, and video game consoles. |
A single human being. | A set of devices connected together to share resources. |
A messy, unorganized, and tangled arrangement of cables. | A structure used as a dwelling, workplace, or for storage purposes. |
The rate at which energy is used over time. | The ability to transfer or exchange data between devices. |
Mbps | Bandwidth |
Latency | Upload speed |
Download speed | Mbps vs MBps |
Wireless vs wired | Fiber-optic |
Bandwidth refers to the amount of data that can be transmitted over a network or internet connection in a given amount of time. It is typically measured in Mbps or gigabits per second (Gbps). | Mbps stands for megabits per second and is a unit of measurement used to indicate data transfer speeds. It is commonly used to describe the speed of internet connections or data transfer rates for devices such as hard drives and USB flash drives. |
Upload speed refers to the speed at which data can be sent from a device to a network or internet connection. It is usually measured in Mbps, and can affect how quickly files can be uploaded or shared online. | Latency refers to the delay that occurs between when data is sent from one point on a network to another and when it is received. It is measured in milliseconds, and can affect the speed of data transfer as well as the overall performance of a network connection. |
Mbps stands for megabits per second, while MBps stands for megabytes per second. Megabits are typically used to describe data transfer speeds, while megabytes are used to measure file size. One byte is equal to eight bits. | Download speed refers to the speed at which data can be received by a device from a network or internet connection. It is usually measured in Mbps, and can affect how quickly files can be downloaded or streamed online. |
Fiber-optic refers to a type of internet or network connection that uses fiber-optic cables to transmit data. Fiber-optic cables are made of glass or plastic and use light to transmit data, allowing for faster transfer speeds and greater bandwidth than other types of cable. | Wireless refers to a network or internet connection that is transmitted over the air using radio waves, while wired refers to a connection that uses physical cables. Wired connections are generally faster and more reliable than wireless connections, but may be less convenient to set up or use. |
Ping | Modem |
ISP | Throughput |
Wired Connection | Wireless Connection |
Ethernet | Wi-Fi |
A modem is a device that connects a computer or other device to the internet or a network via a telephone or cable line. It converts digital data into analog signals that can be transmitted over a telephone or cable line, and vice versa. Modems are often used to connect to the internet via broadband or dial-up connections. | Ping is a measurement of the time it takes for a signal to travel from one point on a network to another and back again. It is often used to measure the latency or speed of a network connection, and is usually measured in milliseconds (ms). |
Throughput refers to the amount of data that can be transmitted over a network or internet connection in a given amount of time, after taking into account factors such as latency and packet loss. Throughput is typically measured in Mbps or Gbps, and represents the actual amount of useful data that can be transferred over a connection. | ISP stands for internet service provider, and refers to a company that provides internet access to customers. ISPs typically offer a range of different plans and packages with varying speeds and features, and may offer services such as email hosting and web hosting as well. |
A type of network connection that uses radio waves to transfer data between devices. | A type of network connection that uses physical cables to transfer data between devices. |
A type of wireless connection that uses radio waves to connect devices to a network. | A type of wired connection that uses cables to connect devices to a network. |
Latency | Bandwidth |
Reliability | Security |
Physical Space | Static IP Address |
Dynamic IP Address | Network Performance |
The amount of data that can be transferred over a network in a certain amount of time. | The amount of delay or time it takes for data to transfer between devices on a network. |
The measures taken to protect a network connection from unauthorized access or attacks. | The ability of a network connection to consistently perform without errors or interruptions. |
A unique numerical identifier assigned to a device on a network that does not change, allowing for easier communication and management. | The distance between devices and the availability of physical cables or radio waves for a network connection. |
The ability of a network to transfer data efficiently and effectively, taking into consideration factors such as latency, bandwidth, reliability and security. | A temporary numerical identifier assigned to a device on a network that may change over time, depending on network settings and activity. |
Bandwidth | Latency |
Data | Network |
Connection | Bandwidth bottleneck |
Latency bottleneck | Data transfer rate |
The time delay experienced in a network communication system, as data packets travel from the source to the destination. | The amount of data that can be transmitted over a network connection in a given amount of time. |
A group of interconnected computers and other devices that can communicate and exchange information with each other. | Information that is processed, stored, or transmitted by computer systems. |
A situation where the available bandwidth on a network connection is insufficient to handle the amount of data being transmitted, resulting in slower network performance. | The physical or logical link between devices in a network, enabling them to communicate with each other. |
The speed at which data can be transmitted over a network connection, measured in bits per second (bps) or bytes per second (Bps). | A situation where the latency in a network communication system is too high, resulting in slower network performance. |
Packet | Ping |
Jitter | Quality of Service (QoS) |
Broadband | Connection |
Types | DSL |
A utility used to test the reachability of a network host and measure the round-trip time for packets sent from the source to the destination. | A unit of data transmitted over a network, consisting of a header that contains routing information and a payload that contains the actual data being transmitted. |
A set of techniques used to manage network resources and ensure that certain types of traffic (such as voice and video) receive priority over other types of traffic. | The variation in latency experienced in a network communication system, as data packets travel from the source to the destination. |
The link between a device and a network through which data is transmitted and received. | A high-speed internet connection that allows data to be transmitted quickly and efficiently. |
Digital Subscriber Line is a type of broadband connection that uses telephone lines to transmit data. | Broadband connections can be divided into different categories such as DSL, cable, fiber optic, and satellite. |
Cable | Fiber Optic |
Satellite | Applications |
Online Education | Video Streaming |
Online Gaming | Telemedicine |
A broadband connection that uses fiber optic cables to transmit data at very high speeds. | A broadband connection that uses coaxial cables to transmit data. |
Broadband has various applications that include online education, video streaming, online gaming, telemedicine, and telecommuting. | A broadband connection that uses a satellite dish to connect to the internet. |
The use of broadband to stream video content over the internet, such as movies, TV shows, and live events. | The use of broadband to facilitate learning over the internet through virtual classrooms, online tutorials, and access to educational resources. |
The use of broadband to deliver healthcare services remotely, such as teleconsultations, telemonitoring, and teleprescriptions. | The use of broadband to play multiplayer games over the internet with other players from around the world. |
Telecommuting | Volume |
Digital audio | Analog audio |
Sample rate | Bit rate |
Compression | Dynamic range |
The amount of space an object occupies in ICT | The use of broadband to work remotely from home or another location using video conferencing, online collaboration tools, and remote access to work files and systems. |
A type of volume where sound is represented as an analog signal in ICT | A type of volume where sound is represented as a digital signal in ICT |
The amount of data per second used to represent audio in ICT | The number of samples of audio per second in ICT |
The range between the softest and loudest sounds in audio in ICT | Reducing the amount of space required to store digital audio in ICT |
Peak volume | RMS volume |
Volume normalization | Gain |
Attenuation | Mobile broadband |
Bandwidth | 3G |
The average volume level in ICT | The highest volume level in ICT |
Increasing the volume of an audio signal in ICT | Adjusting volume levels to make them consistent in ICT |
A high-speed wireless internet connection that can be accessed using a mobile device such as a smartphone or tablet. | Decreasing the volume of an audio signal in ICT |
A mobile broadband technology that provides a minimum data transfer rate of 200 kbps. | The amount of data that can be transmitted over a network connection in a given amount of time, usually measured in bits per second (bps). |
4G | LTE |
Wi-Fi hotspot | Tethering |
Productivity | Connectivity |
Data plan | Roaming |
A 4G mobile broadband technology that stands for Long-Term Evolution, which offers faster data transfer rates, lower latency, and improved network performance. | A mobile broadband technology that provides faster data transfer rates than 3G, with peak download speeds reaching 1 Gbps. |
The process of using a mobile device as a modem to provide internet connectivity to another device, such as a laptop or tablet. | A wireless access point that allows internet access to devices that are within range of its signal, usually found in public places such as coffee shops and airports. |
The ability of a device to connect and communicate with other devices or networks, often used to describe how well a device can access the internet or other online services. | The measure of how much work can be accomplished in a given amount of time, often used to describe how efficient someone is at completing tasks. |
The ability to access mobile broadband while traveling outside of one's home network, often resulting in higher data charges. | A service offered by mobile carriers that provides access to mobile broadband, often with a fixed amount of data usage allowed per month. |
Network coverage | Cellular Technology |
Components | Evolution |
Benefits | Drawbacks |
Society | Economy |
The technology used in mobile communication, operating in a cellular network. | The area within which a mobile carrier's network is available for use, often affected by factors such as geographic location and signal strength. |
The gradual development and improvement of cellular technology over time, from 1G to 5G. | The parts that make up a cellular network, such as base stations, cell phones, and antennas. |
The disadvantages of using cellular technology, such as cost, signal issues, and security concerns. | The advantages of using cellular technology, such as mobility, convenience, and accessibility. |
The impact of cellular technology on business and the economy, including growth, innovation, and job creation. | The impact of cellular technology on people and their way of life, including changes in communication, work, and leisure. |
Base Station | Antenna |
Frequency | Bandwidth |
Roaming | IP address |
MAC address | network |
A device that sends and receives radio signals to allow communication between wireless devices and the cellular network. | A device that connects wireless devices to a cellular network by sending and receiving radio signals. |
The maximum amount of data that can be transmitted over a network in a given time period, usually measured in bits per second (bps). | The number of times a radio signal oscillates per second, measured in Hertz (Hz). |
A numerical label assigned to each device participating in a computer network that uses the Internet Protocol for communication. | The ability to use a cellular network outside of one's home network, usually subject to additional charges. |
A group of two or more devices that are linked together. | A unique identifier attached to most forms of networking equipment. |
communication | device |
protocol | Internet Protocol |
Ethernet | router |
switch | network interface card |
A piece of hardware that can be connected to a computer network. | The exchange of information between multiple systems or devices. |
A protocol used for communicating data across a packet-switched network using the Internet Protocol Suite. | A set of rules that govern how data is transmitted between devices in a network. |
A device that forwards data packets between computer networks. | A family of computer networking technologies used for local area networks. |
A hardware component that connects a computer to a network. | A networking device that connects devices together within a network by using packet switching to forward and receive data to and from its various ports. |
subnet mask | Ethernet networking |
Wireless access point (WAP) | Router |
Gateway | Network |
Ethernet cables | Wireless network |
A type of networking technology that uses Ethernet cables to connect devices in a network. | A number that defines a range of IP addresses in a network. |
A device that forwards data packets between computer networks. | A device that enables wireless devices to connect to a wired network. |
A group of two or more computer systems linked together. | A node that serves as an entry or exit point for data on a network. |
A computer network that uses wireless data connections between network nodes. | Cables that connect devices used in Ethernet networking. |
Access point | LAN |
Wireless LAN | Network node |
Data packets | Booster unit |
Network performance | Bandwidth |
A local area network. | A device that enables devices to connect to a wired network. |
A device or data point on a larger network. | A LAN that uses wireless communication to connect network nodes. |
A device used to enhance or increase network performance by amplifying the signal and reducing interference. | Units of data that are transmitted between network nodes. |
The amount of data that can be sent or received per second over a network. | The effectiveness of a network in terms of speed, reliability, and connectivity. |
Latency | Interference |
Signal strength | Wireless network |
Ethernet cable | Network topology |
Network router | Network switch |
Any signal or noise that disrupts the transmission or reception of data over a network. | The delay between the sending and receiving of data over a network. |
A network that uses radio waves to transmit data between devices. | The power or intensity of a network signal, measured in decibels (dB). |
The physical layout of devices and connections in a network. | A cable used to connect devices to a wired network, usually with an RJ-45 connector. |
A device that connects devices in a network and manages the flow of data between them. | A device that forwards data packets between computer networks. |
Network adapter | Server |
Networking | Types of servers |
File server | Print server |
Proxy server | Mail server |
A computer program that provides services to other computer programs in the same or other computers | A hardware component that allows a device to connect to a network, usually through an Ethernet port or wireless interface. |
File, Print, Proxy, Mail, Web, Application, Database, Gaming, Chat, Video, Audio, FTP servers | The exchange of information and ideas among people with a common profession or special interest, usually in an informal social setting. |
A computer that manages printers on a network. | A computer that shares files and folders with other computers on a network. |
A server that manages email communication. | A server that acts as an intermediary for requests from clients seeking resources from other servers. |
Web server | Application server |
Database server | Benefits of using a server |
Risks associated with server usage | Web Browser |
Internet Explorer | Google Chrome |
A computer program that provides business logic for application programs. | A computer program that delivers web pages to clients based on their requests. |
Centralized management, resource sharing, security, easier backup and recovery, increased scalability | A computer program that provides database services to other computer programs or computers. |
A software application for accessing information on the World Wide Web. | Security risks, hardware failure, software failure, power outages, natural disasters |
A web browser developed by Google that is known for its speed, security and simplicity. | A web browser developed by Microsoft that comes pre-installed with Windows operating system. |
Mozilla Firefox | Safari |
Opera | Web page |
URL | HTTP |
HTTPS | Tab |
A web browser developed by Apple that is designed specifically for Apple devices like Mac, iPhone and iPad. | A free and open-source web browser developed by Mozilla Foundation that is known for its customizability and privacy features. |
A document or file that is written in HTML (Hypertext Markup Language) and accessible through the World Wide Web. | A web browser developed by Opera software that is known for its fast browsing speed and built-in VPN. |
Hypertext Transfer Protocol is a protocol for sending and receiving data on the World Wide Web. | A Uniform Resource Locator is a web address that identifies a web page or resource on the World Wide Web. |
A graphical representation of a web page that is displayed within a web browser window. | Hypertext Transfer Protocol Secure is a protocol for secure communication over the World Wide Web. |
Bookmark | Internet Service Providers (ISPs) |
DSL | Cable |
Fiber optics | Broadband |
Dial-up | Wireless |
Companies that provide access to the internet through various technologies such as DSL, cable, and fiber optics. | A saved link to a web page that allows quick access to the page in future. |
A type of high-speed internet access that uses a cable TV infrastructure to deliver internet service to homes and businesses. | Digital Subscriber Line, a technology that provides high-speed internet access over phone lines. |
A type of high-speed internet access that provides fast download and upload speeds. | A technology that uses thin glass fibers to transmit data as pulses of light, providing high-speed internet access. |
A type of internet access that uses radio waves to connect to the internet, often through a cellular network or Wi-Fi hotspot. | A type of internet access that uses a phone line and a modem to connect to the internet at low speeds. |
Satellite | ISP |
Bandwidth | Download speed |
Upload speed | Effective search techniques |
Web search | Boolean operators |
Internet Service Provider, a company that provides internet access to customers through various technologies. | A type of internet access that uses a satellite dish to connect to the internet, often in rural or remote areas. |
The speed at which data can be downloaded from the internet to a device, usually measured in megabits per second (Mbps). | The amount of data that can be transmitted over a network in a given amount of time, usually measured in bits per second (bps). |
Methods to search for information on the web in the most efficient and accurate way possible. | The speed at which data can be uploaded from a device to the internet, usually measured in megabits per second (Mbps). |
Words used to connect terms in a search query to refine search results, such as AND, OR, and NOT. | The act of using search engines or other web-based tools to find information on the internet. |
Filtering | Advanced search |
Metadata | Citation |
Plagiarism | Keyword search |
Phrase search | Site search |
A search technique that allows users to specify multiple search criteria, which can include keywords, file types, dates, and more. | The process of using specific criteria to limit and refine search results, often by date, location, or format. |
A reference to a source of information, usually including the author, title, and publication details, that can help verify and evaluate the accuracy of information found on the web. | Descriptive information about a resource, including its author, publisher, date, and keywords, that can make it easier to locate and evaluate. |
A search method that involves entering one or more specific terms related to the topic of interest to find relevant information. | The act of using someone else's work or ideas without giving proper credit, which can have serious consequences in academic or professional settings. |
A search technique that allows users to search within a specific website or domain to find relevant information. | A search method that involves enclosing a set of words in quotation marks to find web pages that include only that exact phrase. |
Image search | Tabbed browsing |
Bookmarks | Cache |
Autofill | Incognito mode |
Extensions | Search engine |
A feature in web browsers that allows users to open multiple web pages in a single window. | A search technique that allows users to find images related to a specific topic, often with options to filter by size, color, and type of image. |
A location in a web browser where recently accessed web pages are stored for quick access in the future. | A saved link to a specific webpage that allows users to quickly access the page at a later time. |
A mode in web browsers that allows users to browse privately, without their history being saved in the browser's history or cache. | A feature in web browsers that automatically fills in frequently used information, such as a user's name and address, in online forms. |
An online tool that allows users to search for specific information or content on the internet. | Add-ons or plug-ins that enhance the functionality of a web browser by adding new features or tools. |
Downloads | Settings |
History | Zooming |
Private browsing | ISP |
bandwidth | latency |
An area in a web browser where users can customize and adjust various features and options. | The process of saving files from the internet onto a user's computer or device. |
The ability to enlarge or reduce the size of a webpage displayed in a browser. | A record of the web pages a user has visited in a browser, stored in the browser's cache or history. |
Internet Service Provider. It provides internet access services to customers through wired or wireless connections | A mode in web browsers that allows users to browse privately, without their browsing history and temporary internet files being saved. |
The delay between the time when information is sent and when it is received. It is measured in milliseconds (ms) | The maximum amount of data that can be transmitted over an internet connection in a given time |
download speed | upload speed |
fiber optics | cable modem |
DSL | satellite |
wireless | cost |
The speed at which data is sent from your computer or device to the internet | The speed at which data is sent from the internet to your computer or device |
A device that enables high-speed internet access over a cable TV network. It uses coaxial cables to transmit data | A method of transmitting data using thin glass fibers. It provides higher bandwidth and faster speeds than traditional copper wires |
A method of providing internet access using satellites in space. It is available in remote areas, but has high latency and limited bandwidth | Digital Subscriber Line. It uses telephone lines to provide internet access. It is slower than cable or fiber optics, but is available in more areas |
The price of the internet service. It may vary depending on the type of service and the location | A method of providing internet access without wires. It uses radio waves to transmit data between a modem and a wireless device |
reliability | Filtering software |
Content filtering | Firewall |
Antivirus software | Parental controls |
Blacklist | Whitelist |
A type of software that blocks certain content on the internet based on set parameters or rules. | The consistency of the internet service. It depends on the infrastructure and maintenance of the service provider |
A type of filtering software that is designed to block unauthorized access to a computer or network. | The process of screening and blocking content deemed inappropriate or irrelevant based on set parameters. |
A type of filtering software that allows parents or caregivers to restrict access to certain types of content on the internet. | A type of filtering software that is designed to prevent, detect, and remove malware infections. |
A list of websites or types of content that are deemed safe and allowed by filtering software. | A list of websites or types of content that have been deemed inappropriate or harmful and are therefore blocked by filtering software. |
Phishing | Malware |
Cybersecurity | Netiquette |
Online safety | Peer to Peer Networking |
Adhoc Networking | Advantages of Peer to Peer Networking |
Any type of software designed to harm a computer or network, including viruses, trojan horses, and spyware. | A type of internet scam that involves tricking users into sharing sensitive information or downloading malware by posing as a trustworthy entity. |
The set of social conventions that govern online behavior, including proper etiquette and safety practices. | The practice of protecting computer systems and networks from digital attacks, theft, and damage. |
A type of network topology where all computers are equal and can communicate with each other directly without a central server or hub. | The practices and measures taken to ensure that individuals and their personal information are protected from digital threats and harm when using the internet. |
Cost-effective, easier to set up and expand, no single point of failure, better control over resources. | A type of network where devices directly communicate with each other without the need for an access point or centralized network infrastructure. |
Disadvantages of Peer to Peer Networking | Advantages of Adhoc Networking |
Disadvantages of Adhoc Networking | Wireless Adhoc Networking |
Infrastructure Mode | Peer to Peer Overlay Network |
Centralized Network | Distributed Network |
Easy to set up, can be used where infrastructure is unavailable, flexible and mobile, simple to expand. | Security concerns, limited scalability, potential for conflicts and uncontrolled access to resources. |
A type of adhoc networking where communication is achieved wirelessly among devices without the need for cables or other physical connections. | Limited range and coverage, slower data transfer, reduced security, higher probability of network interference. |
A network in which computers directly communicate with each other and overlay an existing network to provide additional features such as increased security or improved performance. | A type of wireless networking where devices communicate through a central access point or base station, as opposed to directly communicating with each other. |
A network where processing power and data storage is spread out among multiple computers as opposed to being concentrated in one central location. | A type of network topology where all communication flows through a centralized server or hub, as opposed to directly between devices. |
Routing | Server Management |
Types of Servers | File Servers |
Web Servers | Database Servers |
Email Servers | Server Maintenance |
The process of managing and maintaining servers in an organization to ensure optimal performance. | The process by which data packets are directed from their source to their destination in a network. |
A type of server that stores and manages files, providing access to authorized users on a local area network. | Servers can be categorized based on their use, including file servers, web servers, database servers, and email servers. |
A type of server that stores and manages data, providing access to authorized users on a network or the internet. | A type of server that stores web pages and delivers them to clients when requested using the HTTP protocol. |
The process of keeping servers in good working condition by performing regular updates, backups, and repairs. | A type of server that manages email messages, allowing users to send and receive emails on a network or the internet. |
Server Security | Server Monitoring |
Virtual Servers | Cloud Servers |
Server Backup | Client management |
Types of clients | Client needs |
The process of tracking and analyzing server performance metrics like CPU usage, network traffic, and disk space to ensure optimal performance and identify potential issues. | The process of protecting servers from unauthorized access, data theft, and other security threats using measures like firewalls, encryption, and access controls. |
A type of server that is hosted and managed by a cloud service provider, offering scalable and cost-effective computing resources on demand. | A type of server that runs on a virtual machine, allowing multiple servers to share the same physical hardware. |
The process of building and maintaining relationships with customers to meet their needs and expectations in the ICT industry. | The process of copying and storing server data to an external source in case of data loss or system failure. |
The requirements, preferences, and expectations of clients for specific products or services in the ICT industry. | The different categories of clients such as internal, external, government, corporate, and so on, each with specific needs and demands. |
Managing client relationships | Interpersonal skills |
Communication skills | Customer service |
Client satisfaction | Client loyalty |
Relationship management | CRM software |
The ability to communicate, negotiate, and work effectively with others, including clients, colleagues, and stakeholders in the ICT industry. | Strategies, policies, and processes aimed at building trust, satisfaction, and loyalty with clients over time in the ICT industry. |
The support and assistance provided to clients before, during, and after the purchase or use of a product or service in the ICT industry. | The ability to express ideas, thoughts, and feelings in a clear, concise, and persuasive manner using various channels and media in the ICT industry. |
The tendency of clients to stay with a particular company, brand, or product over time, despite external factors or competitors in the ICT industry. | The level of contentment, happiness, and fulfillment experienced by clients from the delivery and use of products or services in the ICT industry. |
A set of tools and applications designed to help companies manage and analyze customer interactions and data throughout the customer lifecycle in the ICT industry. | The process of identifying, analyzing, and developing interactions with clients, partners, and other stakeholders for mutual benefit in the ICT industry. |
Service level agreements | Client-Server Infrastructure |
Architecture | Advantages |
Disadvantages | Components |
Network Architectures | Requests |
A network architecture where the client sends requests to a server to retrieve information or perform actions. | A contract between a service provider and a client that specifies the level, type, and quality of services to be provided, as well as penalties and incentives for non-compliance in the ICT industry. |
The benefits of using a particular infrastructure, such as increased security and centralized management. | The underlying structure of a system or network. |
The various parts of a client-server infrastructure, including servers, clients, and the network connecting them. | The drawbacks of using a particular infrastructure, such as increased complexity and cost. |
Commands sent by the client to the server to ask for information or perform an action. | Different ways of organizing a network, such as peer-to-peer or client-server. |
Centralized Management | Increased Security |
Increased Complexity | Cost |
Peer-to-peer | Shared Peripheral Devices |
Centralized Management | Networking |
An infrastructure that provides additional protection against intrusion and unauthorized access. | A system where all management tasks are performed by a single entity (in this case, the server). |
The expenses associated with implementing and maintaining a client-server infrastructure. | An infrastructure that requires more maintenance and troubleshooting than simpler systems. |
Peripheral devices that can be shared by multiple computers or devices. | A network architecture where each device can act as both a client and a server. |
Connecting multiple devices to share peripheral resources and data. | Managing and controlling shared peripheral devices from a single location or system. |
Print Server | Scanner Server |
Multifunction Devices | Virtual Devices |
Bandwidth | Security |
Cost Savings | Maintenance |
A device that manages and controls scanning from multiple computers or devices connected to a network. | A device that manages and controls printing from multiple computers or devices connected to a network. |
Software-based emulations of peripheral devices that can be shared and accessed from multiple computers or devices. | Devices that combine multiple peripheral functions such as printing, scanning, and copying in a single unit. |
Measures taken to protect shared peripheral devices and data from unauthorized access and misuse. | The amount of data that can be transmitted over a network in a given time period. |
Regular upkeep and repair of shared peripheral devices to ensure their optimal performance and longevity. | Reducing the overall cost of peripheral devices and their maintenance by sharing them among multiple computers or devices. |
Compatibility | Flexible access methods |
Asynchronous learning | Synchronous learning |
Blended learning | Mobile learning |
Personalised learning | 24/7 access |
A method of accessing iGCSE ICT course materials and resources that allows students and teachers to access them at any time, from anywhere, using a variety of devices and technologies. | Ensuring that shared peripheral devices are compatible with the operating systems and software used by different computers or devices. |
A type of flexible access method where students and teachers interact in real-time through digital platforms such as video conferencing, live chats or webinars. | A type of flexible access method where students are not required to be present in the same location and can access the course materials and resources at any time that is convenient for them. |
A flexible access method that allows students to access course materials and resources through their mobile devices, such as smartphones and tablets, anywhere and at any time. | A flexible access method that combines traditional face-to-face instruction with online learning, allowing students to access course materials and resources either in a physical classroom or through digital platforms. |
A flexible access method that allows students to access course materials and resources at any time, including outside of regular school hours. | A flexible access method that allows students to learn based on their individual needs, interests, and abilities, by accessing course materials and resources that are tailored to their specific needs. |
Increased student engagement | Reduced costs |
Potential for distraction | Lack of face-to-face interaction |
Decreased socialisation | Media Streaming |
File Sharing | Advantages |
A benefit of using flexible access methods, as it reduces the need for physical resources and infrastructure such as textbooks, classrooms, and transportation. | A benefit of using flexible access methods that is associated with higher levels of student motivation and participation, due to the flexibility and convenience of learning. |
A potential disadvantage of flexible access methods that reduces the opportunities for face-to-face interaction with teachers and classmates. | A disadvantage of using flexible access methods, as it may increase the likelihood of students being distracted by other activities or devices while studying. |
The process of delivering multimedia content, such as audio or video, over the internet, in real-time or on-demand. | A potential disadvantage of flexible access methods, where students may feel isolated and lack opportunities for socialisation and collaboration with peers. |
Benefits of media streaming and file sharing may include convenience, accessibility, and cost savings. | The process of sharing or distributing digital files over a network or through the internet. |
Disadvantages | Legal Considerations |
Ethical Considerations | Bandwidth |
Peer-to-Peer (P2P) | Streaming Protocol |
Digital Rights Management (DRM) | Torrent |
The laws and regulations that apply to media streaming and file sharing, such as intellectual property rights, privacy laws, and data protection laws. | Risks of media streaming and file sharing may include copyright infringement, legal consequences, and security risks. |
The amount of data that can be transmitted over a network or internet connection, usually measured in bits per second (bps). | The moral principles and values that guide the use of media streaming and file sharing, such as respect for the rights of others, honesty, and integrity. |
A protocol used for delivering multimedia content, such as Real-Time Messaging Protocol (RTMP), HTTP Live Streaming (HLS), or Dynamic Adaptive Streaming over HTTP (DASH). | A distributed network architecture where participants share resources, such as files, without the need for a centralized server. |
A file-sharing method that uses a peer-to-peer network to distribute large files, typically using BitTorrent protocol. | A technology used to control access to digital content and protect it from unauthorized copying or distribution. |
Cloud Storage | communication |
business | effective communication |
advantages | disadvantages |
digital tools | collaboration |
The exchange of messages or information through various means such as oral, written, or electronic forms to convey information or ideas. | A service that allows users to store and access their data over the internet, typically provided by third-party providers. |
The ability to convey information or messages successfully and consistently with the intended message received and understood by the recipient. | An organization or enterprise engaged in commercial, industrial, or professional activities for profit or gains. |
The drawbacks or negative aspects of using certain forms or methods of communication such as low level of detail, lack of personal touch, or security risk. | The benefits or positive aspects of using certain forms or methods of communication such as speed, convenience, cost, or ease of use. |
The process of working together with one or more individuals or groups towards a common goal using various means of communication and cooperation. | Various software, applications, or platforms designed to facilitate communication and collaboration among users through electronic devices, such as computers, tablets or smartphones. |
virtual meetings | |
instant messaging | social networks |
file sharing | Shared Internet Access |
Advantages | Disadvantages |
A digital communication method that allows individuals to exchange messages and files through the internet using electronic mailboxes or clients. | A form of communication that allows individuals to meet remotely through electronic devices such as video conferencing or phone calls to facilitate collaboration and teamwork. |
Online platforms or services that allow users to connect and communicate with others through various means such as messaging, posts, shares or comments. | A communication technology that allows individuals to exchange real-time messages through electronic devices such as smartphones, computers or tablets. |
The ability to access the internet through a network that is shared by multiple devices or users. | The process of sharing digital files or documents with others through various means such as email, cloud storage, or collaborative productivity software. |
Drawbacks of using shared internet access include decreased security, reduced speed, and limited control over the network. | Benefits of using shared internet access include cost savings, ease of use, and increased collaboration. |
Cybersecurity Threats | Viruses |
Malware | Phishing Attacks |
Hacking Attempts | Mitigation Strategies |
Firewalls | Antivirus Software |
Programs that can infect computer systems and spread through shared internet access networks, causing damage and stealing data. | Potential dangers to shared internet access networks include viruses, malware, phishing attacks, and hacking attempts. |
Email-based scams that trick users into revealing sensitive information, such as passwords or financial details, often facilitated through shared internet access networks. | Software that is designed to harm computer systems or steal information, often spread through shared internet access networks. |
Methods for reducing the risk of cybersecurity threats associated with shared internet access networks, such as using firewalls, antivirus software, and strong passwords. | Unauthorized attempts to access or manipulate shared internet access networks, often with malicious intent. |
Programs designed to detect and eliminate viruses and other malware, vital for protecting shared internet access networks. | Security systems that monitor and control incoming and outgoing network traffic, protecting shared internet access networks from unauthorized access and malware. |
Strong Passwords | Centralized Administration |
Benefits | Drawbacks |
Types | Hierarchy |
Domain-based | Policy-based |
The process of managing and controlling an ICT system from a single location or governing body. | Complex combinations of letters, numbers, and symbols that are difficult to guess, reducing the risk of unauthorized access to shared internet access networks. |
The disadvantages of using centralized administration in ICT that include higher costs, increased complexity, and single point of failure. | The advantages of using centralized administration in ICT that include improved security, easier maintenance, and better control. |
A type of centralized administration where management and control is based on a hierarchical structure with levels of authority and responsibility. | Different methods of centralized administration in ICT such as hierarchical, domain-based, and policy-based. |
A type of centralized administration where management and control is based on policies that define rules and permissions for resources or services. | A type of centralized administration where management and control is based on grouping resources or services into domains. |
Real-world scenario | Management |
Control | Security |
Maintenance | Network software |
Client software | Server software |
The process of planning, organizing, controlling, and coordinating resources to achieve specific goals and objectives of an ICT system. | A practical situation that requires centralized administration to manage and control an ICT system effectively. |
The measures taken to protect an ICT system from unauthorized access, use, disclosure, disruption, modification, or destruction. | The process of monitoring, measuring, and adjusting performance to ensure that an ICT system meets its goals and objectives. |
Software designed specifically for use on a network, allowing multiple users to access it simultaneously. | The process of keeping an ICT system running efficiently by detecting and correcting problems, upgrading software and hardware, and performing regular backups. |
Software that provides services or resources to clients on a network. | Software that enables clients to access network services or resources. |
File server | Print server |
Database server | Mail server |
Web server | Remote access software |
Real-time collaboration software | Groupware |
A server that allows users to share printers over a network. | A server that allows users to share files over a network. |
A server that manages and stores e-mail messages on behalf of clients. | A server that stores and manages databases on behalf of clients. |
Software that enables users to access a computer or network remotely. | A server that stores and serves web pages over a network. |
Software that supports teamwork by allowing multiple users to work together on a project over a network. | Software that enables users to collaborate on projects in real-time over a network. |
Software licensing | Shared Storage Management |
Data Access | Efficient |
Benefits | Data Management |
Skills | Risks |
The process of efficiently managing storage devices to provide data to multiple users. | The legal agreements and permissions that allow software to be used across a network. |
The ability to be productive with minimal wasted effort or expense. | The ability to retrieve and work with stored data. |
The process of organizing, storing, protecting, and maintaining data. | The advantages obtained or experienced as a result of shared storage management. |
The potential harm or negative consequences associated with shared storage management. | The learned ability to perform a task or activity. |
Mitigate | Hardware |
Software | Network |
Scalability | Managing User Access Rights and Levels |
User access levels | Administrator |
Physical components associated with shared storage management, such as disk drives or storage area networks. | To reduce or prevent the severity of risks associated with shared storage management. |
The infrastructure used to connect multiple devices and facilitate data sharing. | Programs and applications used to maintain and manage shared storage devices. |
The process of controlling and regulating which users can access specific information or resources in an information system. | The ability of shared storage management to expand or contract in response to user needs or changes in technology. |
A user with the highest level of access rights in an information system, who has full control over the system and its resources. | The different permissions given to users to access information or resources within an information system. |
User accounts | Authentication |
Authorization | Access control |
Role-based access control (RBAC) | Least privilege |
Password policies | Access logs |
The process of verifying the identity of a user attempting to access an information system. | Individual profiles created in an information system that specify the user's access rights and security settings. |
The process of managing user access rights and levels to ensure that users can only access the information and resources they are authorized to access. | The process of granting or denying user access to specific information or resources within an information system. |
The principle of giving users only the minimum level of access necessary to perform their job functions. | A method of controlling user access based on the user's role or job function within an organization. |
A record of all user activity within an information system, including login attempts, resource access, and other system actions. | Rules and requirements regarding the creation, storage, and use of passwords to ensure the security of user accounts. |
Principle of separation of duties | Data Backup |
Centralized Approach | Importance |
Backup System | Disaster Recovery |
Redundancy | Security |
The process of creating a second copy of data in case the original is lost or damaged. | The principle of dividing administrative tasks and access rights among multiple users to prevent any one user from having too much control or power. |
The value or significance of something. | A system where all data backup is managed from a central location. |
The plan and procedures for recovering data and systems following an event that has caused data loss or system failure. | A system used to make copies of data for safekeeping. |
The measures taken to protect data from unauthorized access, theft, or damage. | The use of additional or duplicate systems to provide backup and ensure continued operation in case of failure. |
Automation | Offsite Backup |
Versioning | Cloud Backup |
Synchronization | Unauthorized Access |
Prevention Measures | Common methods |
A backup stored at a location that is separate from the primary backup location. | The use of technology to reduce or eliminate manual effort in performing a task or process. |
The process of backing up data to a remote, cloud-based location. | The process of saving multiple versions of a file to create a history of changes. |
The act of gaining access to a computer system without permission or unlawfully. | The process of updating information in multiple locations to ensure that all copies are consistent and up-to-date. |
Techniques or tools widely used to prevent unauthorized access, such as passwords, firewalls, or biometric authentication. | Security measures taken to prevent unauthorized access to computer systems or networks. |
Strong Passwords | Firewalls |
Security Software | Steps |
Access Control | Encryption |
Intrusion Detection | Authentication |
A security program that controls access to a network by analyzing incoming and outgoing network traffic based on a set of defined rules. | A password that is difficult to guess, consisting of a mixture of upper- and lower-case letters, numbers, and special characters. |
Actions that should be taken to protect against unauthorized access, such as regular updates to security software and strong password protection. | Programs installed on a computer system to protect against malicious attacks such as viruses, spyware or malware. |
The process of transforming data into a coded language that cannot be easily read or deciphered by anyone without access to the key. | The process of granting or denying specific actions or operations to authorized or unauthorized users. |
The process of verifying the identity of a user or the validity of a system or entity. | A security measure used to monitor network traffic for signs of unauthorized access or attack. |
Vulnerability Assessment | Malware |
Virus | Worm |
Trojan | Ransomware |
Spyware | Adware |
Malware is short for 'malicious software', and refers to any program or code that is designed to harm a computer system or disrupt its normal operations. | An evaluation of the potential weaknesses of a computer system or network that could be exploited by an attacker. |
A worm is a type of malware that is similar to a virus, but does not need to attach itself to a program in order to spread. Instead, it replicates itself and spreads across networks and the internet. | A virus is a type of malware that is designed to replicate itself and spread to other computers. It can cause a range of problems, from slowing down a computer to destroying files and data. |
Ransomware is a type of malware that encrypts files on a computer system, and then demands payment in exchange for the decryption key. It can be extremely damaging, as it can lead to the loss of important data. | A Trojan (or Trojan horse) is a type of malware that is disguised as a legitimate program, but is actually designed to carry out malicious actions, such as stealing personal information or providing unauthorized access to a computer system. |
Adware is a type of malware that displays unwanted or intrusive advertisements on a user's computer. It can be annoying and disruptive, and may even lead to further malware infections. | Spyware is a type of malware that is designed to spy on a user's activities without their knowledge or consent. It can collect personal information, log keystrokes, and even take screenshots. |
Phishing | Rootkit |
Botnet | Denial of Service (DoS) |
Antivirus software | SQL attack |
SQL injection | Prevention measures |
A rootkit is a type of malware that is designed to hide its presence on a computer system, often by modifying the operating system. It can be difficult to detect and remove, and can provide unauthorized access to a computer system. | Phishing is a type of social engineering attack that uses email or other messages to trick users into providing sensitive information, such as usernames and passwords. It can be extremely effective and can lead to a wide range of security breaches. |
A Denial of Service (DoS) attack is a type of attack where a computer system is flooded with traffic, making it unable to respond to legitimate requests. It can be used to disrupt or even take down websites and other online services. | A botnet is a network of computers that have been infected with malware, and are under the control of a malicious actor. They can be used for a wide range of purposes, including launching DDoS attacks and distributing spam emails. |
A malicious attempt by an attacker to compromise a database by using SQL queries to gain unauthorized access or to manipulate the data. | Antivirus software is a type of program that is designed to detect and remove malware from a computer system. It can scan files and programs for known malware signatures, and can also use heuristics to detect previously unknown malware. |
Techniques implemented to prevent SQL attacks by securing the database and web application, and sanitizing user inputs. | A form of SQL attack where an attacker inserts malicious SQL code into input fields to execute unauthorized SQL commands. |
Data breach | Injection flaws |
Firewall | Encryption |
Parameterized queries | Stored procedures |
Access control | Vulnerability scanning |
Vulnerabilities in web applications that allow attackers to inject malicious code or SQL commands into a web page or application. | An incident where sensitive and confidential data is stolen, viewed or used by an unauthorized person or group. |
The process of converting plain text into coded text for secure communication and storage to prevent unauthorized access. | A security system designed to prevent unauthorized access to or from a private network. |
Pre-defined programs or scripts stored in a database that can be called from a web application without executing commands directly. | A technique for preventing SQL injection attacks by using placeholders for user inputs in SQL queries. |
The process of scanning and identifying security vulnerabilities in a web application or network infrastructure. | Techniques used to control and limit access to sensitive information or resources based on user roles and permissions. |
Patch management | Brute force attack |
Dictionary attack | Hybrid attack |
Rainbow table | Password strength |
Two-factor authentication | Lockout policy |
A type of cyber attack where a hacker tries various username and password combinations until they find the correct ones to gain access to the system. | The process of applying patches and updates to software or systems to fix known vulnerabilities and security issues. |
A combination of dictionary and brute force attacks, where the hacker tries variations of words in a dictionary along with other possible password combinations. | A form of brute force attack that uses a pre-computed list of possible passwords to try and gain access to the system. |
The level of complexity and uniqueness of a password, which impacts its resistance against brute force attacks. | A pre-computed table of possible passwords and their hash values, often used in dictionary attacks to speed up the cracking process. |
A system setting that limits the number of failed login attempts, effectively preventing brute force attacks from succeeding. | An authentication method that requires users to provide two types of credentials, typically a password and a code or token, to gain access to a system. |
CAPTCHA | Rate limiting |
SSH brute forcing | Firewall |
Intrusion detection system | Phishing |
Pharming | Spoofing |
A strategy of limiting the number of requests or actions a user can perform within a certain time period, in order to prevent abuse and attacks such as brute force. | A challenge-response test used to determine whether a user is a human or automated script, often used to prevent brute force attacks on web applications. |
A network security system that monitors and controls incoming and outgoing traffic based on predetermined rules, often used to prevent brute force attacks. | A specific type of brute force attack that targets secure shell (SSH) services, often using automated tools to guess usernames and passwords. |
A type of cyber attack where a scammer sends a fraudulent email, text or message to trick someone into revealing personal or sensitive information. | A device or software application that monitors network or system activities for malicious activities or violations, often used to detect and prevent brute force attacks. |
A technique used by scammers to imitate a trusted website or email in order to steal sensitive information. | A type of cyber attack where a scammer redirects website traffic to a fake website to trick users into giving away sensitive information. |
Identity Theft | Two-Factor Authentication |
Browser Security | Anti-Virus Software |
Firewall | Data Encryption |
Email Phishing | Website Phishing |
A security process in which the user provides two different authentication factors to verify their identity when logging in. | The stealing of personal information such as financial records, social security number, etc. to commit fraud or other crimes. |
A program designed to prevent, detect, and remove malware from a computer or network. | The use of secure browsers, add-ons, and plug-ins to protect against phishing and pharming attacks. |
The process of encoding data in such a way that only authorized parties can access it. | A security system designed to prevent unauthorized access to or from a private network. |
A type of phishing attack where the scammer creates a fake website that looks like a legitimate one in order to steal sensitive information. | A type of phishing attack where the scammer sends a fraudulent email that appears to be from a legitimate organization or person. |
Social Engineering | Accidental deletion |
Data recovery methods | Backup |
System Restore | Unformatting |
Data Recovery Software | HDD Recovery |
The unintentional removal of data or files that are needed for business operations or personal use. | The use of deception to gain access to sensitive information or systems. |
A copy of data that is used for restoring the data if it gets lost or damaged during the normal course of operation. | The process of recovering lost, deleted, corrupted or damaged data. |
The process of restoring data that has been lost due to formatting errors. | A feature in the Microsoft Windows operating system that allows the user to restore their computer to a previous state in time. |
The process of recovering data from a damaged or malfunctioning hard disk drive. | A computer program designed to recover lost or corrupted data. |
RAID Recovery | Logical Recovery |
Physical Recovery | Cloud Backup |
USB Recovery | PIN |
Biometrics | Captcha |
The process of recovering lost data from a logical failure, such as a corrupt file system or deleted files. | The process of recovering data from a RAID system that has failed due to hardware or software issues. |
A service that automatically backs up data to a remote server over the Internet. | The process of recovering data from a physical failure, such as a broken hard drive or other hardware issues. |
A Personal Identification Number (PIN) is a unique numeric code used as a password to authenticate and secure access to personal information. | The process of recovering data from a USB drive that has been damaged or corrupted. |
A Completely Automated Public Turing test to tell Computers and Humans Apart (Captcha) is a security measure that uses distorted text or image-based challenges to distinguish between human users and automated bots. | Biometrics is the use of physical or behavioral characteristics such as fingerprint or facial recognition to identify and authenticate a person's identity for security purposes. |
Personal Information | Security |
Authentication | Password |
Fingerprint | Facial Recognition |
Automated Attacks | Distorted Text |
Security refers to the measures taken to protect personal information and prevent unauthorized access, use, or disclosure of sensitive data. | Personal Information is any data or information that can be used to identify an individual such as name, date of birth, address, phone number, email address, and financial information. |
A password is a secret string of characters that is used to authenticate and access a system or account. | Authentication is the process of verifying the identity of a user or device to grant access to a system or network. |
Facial recognition is a biometric technology that uses algorithms to analyze facial features and patterns to identify and authenticate a person's identity for security purposes. | A fingerprint is a unique pattern of ridges and valleys on the tip of a person's finger that can be used to identify and authenticate a person's identity for security purposes. |
Distorted Text is a type of challenge-response test used in Captcha systems that presents a distorted image of a word or phrase that must be deciphered by a human user to prove they are not a bot. | Automated attacks are malicious attempts to penetrate a system or network using automated tools or software without human intervention. |
Image-based Challenges | Security questions |
Authentication methods | Password |
Strong password | Password creation |
Two-factor authentication | Biometric authentication |
A form of authentication that involves answering questions that are known only by the user to gain access to their account | Image-based Challenges are a type of challenge-response test used in Captcha systems that presents a series of images that a human user must select based on a specific criteria to prove they are not a bot. |
A secret code or phrase that a user must provide to gain access to their account | The different ways in which a user's identity is verified when accessing an online account |
The process of creating a strong and secure password that meets the requirements of an online account | A password that is difficult to guess and provides high security for an online account |
The use of physical characteristics, such as fingerprint or facial recognition, to verify a user's identity | A type of authentication that requires the user to provide two different forms of identification to gain access to an online account |
Token authentication | Single sign-on |
Phishing | Social engineering |
Password manager | Cybersecurity |
Malware | Virus |
A system that allows a user to access multiple online accounts with just one set of login credentials | A method of authentication that uses a physical device, such as a key fob, to generate a unique code for each login |
A method used by criminals to exploit human behavior and psychology in order to obtain sensitive information | A type of online scam where fraudulent emails or websites are used to trick users into revealing their personal information |
The practice of protecting computer systems, networks, and programs from digital attacks, theft, or damage to hardware, software, or electronic data. | A software application that assists in generating and securely storing complex and unique passwords for different online accounts |
A type of malware that is inserted into a computer or device program and can replicate itself and spread to other computers or devices. | Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. |
Adware | Spyware |
Anti-malware software | Anti-virus software |
Anti-adware software | Anti-spyware software |
Benefits of anti-malware software | Routine checkups |
Software that is designed to secretly track and monitor a computer user's activities or information. | Software that displays unwanted and intrusive advertisements on a computer or device. |
A program designed to detect and remove viruses from a computer or device. | A program designed to detect and remove malware from a computer or device. |
A program designed to detect and remove spyware from a computer or device. | A program designed to detect and remove adware from a computer or device. |
Regular scans and updates that help to ensure the computer or device is secure and free from malware. | Protects against potential loss or damage to important personal and business information and enhances the overall computer system's performance. |
Secure computer environment | Email Attachments |
Hyperlinks | Malware |
Phishing attacks | Safe email practices |
Suspicious emails | Virus |
Files that are sent along with an email message. | Refers to a system that is protected from unauthorized access, theft, or damage to hardware, software, or electronic data. |
Software designed to harm or exploit any programmable device, service, or network. | Clickable links within an email that direct the recipient to a webpage. |
Adopting and using secure email practices to avoid cyberattacks. | Fraudulent attempts to obtain sensitive information, such as passwords and credit card details, by disguising oneself as a trustworthy entity in an electronic communication. |
A type of malware that replicates itself by inserting its code into other programs or files. | Messages that are possibly fraudulent, dangerous, or contain malware. |
Firewall | Encryption |
Two-factor authentication | Backup |
Patch | Online payment systems |
Payment gateway | Encryption |
The process of converting plain text into coded language to protect sensitive information from being accessed by unauthorized individuals. | Security program that monitors and controls incoming and outgoing network traffic, based on predetermined security rules. |
A copy of important data that is stored separately from the original, in case the original is lost or damaged. | A security process in which the user is required to provide two forms of identification to access an account or service. |
Electronic method used for making payments for goods or services over the internet. | A piece of code that is added to a software program to fix a known vulnerability or bug. |
Process of converting data into a code for secure transmission over the web. | Third-party entity that helps to facilitate online transactions by securing, encrypting and transferring necessary data between parties. |
Two-factor authentication | Tokenization |
Fraud detection | Fraud prevention |
PCI DSS | Authentication |
SSL | Firewall |
Process of replacing sensitive payment information with a unique identifier or token. | Security feature that requires authentication through at least two methods, such as a password and a biometric scan. |
Efforts taken to stop fraudulent activities from happening in the first place. | Technology and/or processes used to identify and prevent fraudulent activities during online payment transactions. |
Process of verifying the identity of a user or device attempting to access a system or application. | Payment Card Industry Data Security Standard set by major credit card companies to ensure secure handling of credit card information. |
Hardware or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules. | Secure Sockets Layer, a security protocol used to establish a secure link between a user's browser and a web server. |
Risk assessment | Third-party payment system |
Transaction | Online transaction |
Security | Encryption |
Authentication | Fraud prevention |
A payment system that allows individuals or businesses to make transactions online through a third-party service provider. | Process of identifying, evaluating and prioritizing risks associated with online payment systems and taking appropriate measures to manage them. |
The exchange of goods, services or currency between two or more parties over the internet. | The process of exchanging goods, services or currency between two or more parties. |
The process of converting data into a coded language to protect it from unauthorized access. | The protection of information and systems from unauthorized access, theft, damage or disruption. |
The measures taken to prevent or detect fraudulent activity in online transactions. | The process of verifying the identity of a user or system before allowing access to protected information or services. |
Bank card | PIN |
CVV | Phishing |
Two-factor authentication | Health and Wellness |
Digital World | Technology |
A personal identification number used to verify the identity of a user when making electronic transactions. | A plastic card issued by a bank that allows users to make electronic transactions, including purchases and withdrawals. |
The fraudulent practice of sending emails or messages to trick people into divulging personal or financial information. | Card verification value, a 3- or 4-digit number printed on the back or front of a bank card used to verify the identity of the cardholder. |
The overall state of physical and mental wellbeing that includes different aspects such as nutrition, exercise, sleep, and stress management. | A security measure that requires users to provide two forms of identification, such as a password and a code sent to a mobile device, to access protected information or services. |
The use of scientific knowledge for practical purposes, especially in industry, engineering, and everyday life, such as digital health applications, wearables, and telemedicine. | The technological environment that allows people to interact, communicate and access information through digital devices and platforms such as smartphones, computers, internet and social media. |
Impact | Strategies |
Promotion | Digital Health Literacy |
Privacy | Security |
Ethical Considerations | Telemedicine |
The actions and plans that individuals, organizations, and governments can implement to improve health and wellness in a digital world, such as education, awareness campaigns, and technology-based interventions. | The effect that technology has on health and wellness, including positive and negative consequences on physical, mental, and social aspects of people's lives. |
The ability to access, understand, evaluate, and use health information and technologies available in a digital world, such as health apps, wearables, and social media. | The process of encouraging and motivating people to adopt and maintain healthy behaviors and lifestyles in a digital world, such as healthy food choices, physical activity, sleep hygiene or digital detox. |
The measures and safeguards that ensure the protection and confidentiality of personal and sensitive information in digital health systems, such as data encryption, authentication, and backup. | The right to control and protect personal information that is collected, stored, and accessed through digital devices and platforms, such as health records, fitness trackers, and online accounts. |
The use of remote communication technologies such as videoconferencing, chatbots, or remote monitoring to diagnose, treat, and manage health conditions in a digital world. | The moral principles and values that guide the development, implementation, and use of technology for health and wellness in a digital world, such as transparency, equity, responsibility, and trust. |
Digital Detox | Collaborative working practices |
Flexible working practices | Technology |
Benefits | Common tools |
Techniques | Practical setting |
A way of working that involves people from different departments or areas of a business working together on a project or task. | The intentional and temporary disconnection from digital devices and platforms to reduce stress, improve mental health, and enhance social interactions in a digital world. |
The use of scientific knowledge and tools to invent useful things or solve problems. | A type of working arrangement that allows employees to work within flexible hours and arrangements. |
Tools and resources that are widely used for collaborative and flexible working practices, such as video conferencing, email, and shared calendars. | Advantages or positive outcomes that are gained from using technology for collaborative and flexible working practices. |
A real-world context where collaborative and flexible working practices are applied to achieve specific goals or objectives. | Methods and approaches that are used to improve collaborative and flexible working practices, such as agile methodology and lean practices. |
Communication | Collaboration |
Productivity | Remote work |
Cloud computing | Cyberbullying |
Online harassment | Examples |
Working together with others towards a common goal or objective. | The exchange of information and ideas between individuals or groups. |
A type of flexible working arrangement where employees work from a location outside of the traditional workplace, such as their home or a co-working space. | The rate at which work is completed, often measured by the amount of work completed in a certain amount of time. |
The use of technology, such as the internet or social media, to deliberately harass, intimidate, or humiliate someone. | The use of remote servers hosted on the internet to store, manage, and process data. |
Instances of cyberbullying and online harassment may include spreading rumors, sharing embarrassing photos or videos, sending threatening messages, or creating fake profiles. | The act of using digital communication tools to threaten, intimidate, or harm someone. |
Impact | Prevention |
Response | Digital communication |
Social media | Harassment |
Humiliate | Anxiety |
Ways to prevent cyberbullying and online harassment include educating people about the issue, setting privacy settings on social media accounts, and reporting any instances to authorities or the website/platform. | Cyberbullying and online harassment can have negative psychological effects on the victim, such as anxiety, depression, and even suicidal thoughts. It can also cause social isolation and damage the reputation of the victim. |
The use of technology to communicate with others. | Ways to respond to cyberbullying and online harassment may include talking to a trusted adult, saving evidence of the harassment, and blocking the harasser on social media. |
To subject someone to aggressive pressure or intimidation, especially over a prolonged period. | Platforms, such as Facebook, Twitter, or Instagram, that allow users to connect with others and share information. |
A feeling of worry, nervousness, or unease about something with an uncertain outcome. | To cause someone to feel ashamed or foolish, especially in front of others. |
Isolation | Accessing information |
Information Age | Methods of accessing information |
Advanced search techniques | Relevant information |
Reliability of information | Primary sources |
The process of obtaining data or knowledge, typically from a database or the internet. | The state of being on one's own, away from others. |
The different techniques or ways to search for and obtain data or knowledge, such as using search engines, databases, or online libraries. | The period in modern history characterized by the rapid shift from traditional industry to an economy primarily based on information technology. |
Data or knowledge that is closely connected or applicable to a particular topic or problem. | The tools or methods used to refine online searches, typically involving the use of keywords, Boolean operators, and filters. |
Original materials or documents created at the time of an event or phenomenon, such as eyewitness accounts or government records. | The degree to which data or knowledge obtained from a source can be trusted or believed to be true and accurate. |
Secondary sources | Credibility |
Bias | Fact-checking |
Plagiarism | Social media algorithms |
Echochambers | Algorithmic bias |
The quality of being trusted and believed in, often based on a source's reputation, expertise, or authority. | Materials or documents produced after an event or phenomenon, such as news articles or scholarly analyses. |
The process of verifying the accuracy and reliability of information, often by comparing it to multiple sources or consulting experts. | The inclination or prejudice toward a certain point of view or opinion, often influencing the accuracy or fairness of information. |
The mathematical formulas that determine what content a user sees on their social media feed. | The act of using someone else's work or ideas without proper attribution or permission, often violating copyright laws or ethical standards. |
The systematic and discriminatory favoritism of certain groups or perspectives by a social media algorithm. | A social media phenomenon where individuals are only exposed to information that confirms their existing beliefs and values. |
Impression | Engagement |
Reach | Filter bubble |
Algorithmic transparency | Curation |
Engagement bait | Demographic bias |
The measurement of how users interact with a social media post; includes likes, shares, and comments. | The number of times a post appears on a user's social media feed. |
A state where an individual is only exposed to information that agrees with their existing beliefs and values; often created by social media algorithms. | The number of unique users who have viewed a social media post. |
The process by which a social media platform selects and prioritizes content to show its users. | The degree to which the inner workings of a social media algorithm are publicly known and accessible. |
The consistent favoritism of certain age, gender, or other demographic groups by a social media algorithm. | A tactic used by some social media users to artificially inflate their engagement metrics. |
Ad targeting | Leisure |
Entertainment | Digital world |
Types of leisure | Types of entertainment |
Benefits of digital leisure | Drawbacks of digital leisure |
The use of free time for enjoyment and relaxation, often through various digital platforms. | The practice of showing advertisements to specific segments of a social media platform's user base, based on user data and behavior. |
The environment created by the use of digital technologies, including the internet, social media, and mobile devices. | Content or activities designed to provide pleasure and enjoyment, often through digital media. |
Different categories of content and activities that people engage in for entertainment purposes, which may include movies, TV shows, games, and more. | Different categories of activities that people engage in for leisure purposes, which may include gaming, streaming, social media use, and more. |
Disadvantages or challenges associated with digital leisure, which may include addiction, decreased physical activity, and privacy concerns. | Advantages provided by digital platforms for leisure activities, which may include convenience, access to a wide range of content, and social connections. |
Benefits of digital entertainment | Drawbacks of digital entertainment |
Maximizing benefits | Minimizing drawbacks |
Online safety | Potential online risks |
Personal information | Social media |
Disadvantages or challenges associated with digital entertainment, which may include exposure to inappropriate content, decreased social interaction, and information overload. | Advantages provided by digital platforms for entertainment, which may include cost savings, personalized recommendations, and accessibility. |
Strategies for reducing or avoiding the negative effects of digital leisure and entertainment, such as balancing screen time with other activities, being mindful of personal information, and seeking social support. | Strategies for getting the most out of digital leisure and entertainment opportunities, such as setting limits, prioritizing quality content, and engaging in active rather than passive activities. |
The possible dangers or hazards that can be encountered while using the internet or other online technologies. | The act of staying safe while using the internet or other online technologies. |
Online platforms and tools that allow people to create, share, or exchange information, ideas, and opinions, such as Facebook, Twitter, Instagram, or Snapchat. | Any private details about a person that can be used to identify them, such as their name, address, phone number, email, or date of birth. |
Cyberbullying | Privacy settings |
Phishing | Malware |
Two-factor authentication | Digital footprint |
Privacy policy | Data breach |
The controls or options that allow users to specify who can see or access their personal information or content on social media platforms or other online services. | The act of using digital technologies, such as the internet or mobile phones, to harass, humiliate, threaten, or intimidate someone else. |
Any software or code that is intentionally designed to harm or disrupt computer systems or networks, such as viruses, worms, Trojan horses, or ransomware. | The fraudulent practice of sending emails, messages, or links that appear to be from reputable sources, but actually are designed to steal personal information or infect devices with malware. |
The trail or record of someone's online activity, behavior, or presence, including the information they share, the sites they visit, and the interactions they have with others. | A security process that requires users to provide two separate forms of identification or verification (such as a password and a code sent to a phone) to access their accounts or devices. |
The unauthorized or accidental release, access, or exposure of sensitive or confidential data, such as personal information or financial records, to an untrusted environment or entity. | The official statement or document that outlines how an organization or website collects, uses, and protects the personal information of its users or customers. |
Information and Communication Technology | Positive impacts |
Negative impacts | Social norms |
Social values | Privacy |
Security | Ethical considerations |
The beneficial effects of ICT on society such as facilitating communication, increasing productivity, and providing access to information. | The technologies used for communication and processing, which includes computers, the internet, and mobile devices. |
The unwritten rules and expectations that guide human behavior, which are influenced by ICT. | The harmful effects of ICT on society such as addiction, cyberbullying, and loss of privacy. |
The right of an individual to control their personal information and how it is used. | The beliefs and principles that a society holds to be important and desirable, which can be affected by ICT. |
The issues of morality and fairness that arise from the use of ICT, such as cybercrime, intellectual property rights, and social inequality. | The protection of information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. |
Cybercrime | Intellectual property rights |
Social inequality | Netiquette |
Telecommuting | Virtual meetings |
Collaboration tools | Productivity software |
The legal rights that creators have over their inventions, artistic works, and other productions. | Illegal activities carried out in the digital world, such as hacking, identity theft, and fraud. |
The etiquette rules for online communication and behavior, which help maintain a respectful and positive internet culture. | The unequal distribution of resources, opportunities, and benefits in society, which can be exacerbated by ICT. |
Virtual meetings are meetings conducted between people in remote locations using video conferencing tools such as Zoom, Skype, and Teams. | Telecommuting refers to working from a remote location away from the central office by making use of the internet and other forms of technology. |
Productivity software is a type of application software that is used to help employees perform tasks more efficiently. | Collaboration tools are software applications that allow multiple users to work simultaneously on a project while being geographically separated. |
Cloud computing | Virtual private network (VPN) |
Remote access | Web-based applications |
Internet of Things (IoT) | Mobile devices |
Virtual assistants | Screen sharing |
VPN is a secure and private network connection to secure the internet connection and thus protect sensitive data. | Cloud computing refers to the delivery of computing services, including servers, storage, databases, networking, software, and analytics over the internet, to offer fast innovation, incredibly flexible resources, and economies of scale. |
Web-based applications are software applications that are designed to run on a web browser, which makes them accessible from any location with an internet connection. | Remote access refers to the capability of accessing a computer or network from a remote location by using the internet to allow employees to work from anywhere. |
Mobile devices are small electronic devices such as smartphones and tablets, which are designed to be portable and can be used from any location. | The Internet of Things (IoT) is the interconnection between internet-enabled devices that automate most home and office tasks. |
Screen sharing is the process of viewing the desktop of a remote computer's screen on another, typically local, computer screen, over the internet. | Virtual assistants are computer programs or AI devices that perform automated tasks and provides quick guidance to the users. |
Hardware components | Specifications |
Features | Computer |
Central Processing Unit (CPU) | Random Access Memory (RAM) |
Hard Disk Drive (HDD) | Keyboard |
The technical details of a hardware component such as processor speed, storage capacity, and screen resolution that determine its performance. | Physical components of a computer system such as Central Processing Unit (CPU), Random Access Memory (RAM), hard disk drive (HDD), keyboard, mouse, and monitor that are required for remote work. |
An electronic device that can receive, store, process and output data to perform various tasks required for remote work. | The additional functionalities of a hardware component such as built-in webcam, microphone, and speakers that enhance its usability. |
The temporary memory of a computer that stores data and instructions that the CPU can access quickly. | The brain of a computer that carries out instructions of a program and manages the performance of hardware components. |
A hardware input device that allows a user to type letters, numbers, and symbols into a computer system. | The secondary storage of a computer that stores data and programs even when the computer is turned off. |
Mouse | Monitor |
Appropriate hardware components | Importance |
Software solutions | Remote work |
Importance | Types of software solutions |
A hardware output device that displays text, images, and videos on a computer screen. | A hardware input device that allows a user to select and move objects on a computer screen. |
The significance of selecting appropriate hardware components for remote work to ensure smooth and productive operations. | Hardware components that meet the requirements of remote work and can perform the tasks effectively and efficiently. |
A work arrangement where employees carry out their tasks from a location outside of the traditional office setting. It allows employees to work flexibly, save time and costs, and contribute to a better work-life balance. | Tools or applications that are designed to help in remote work scenarios. They enable communication and collaboration among remote teams, increase productivity, and ensure efficiency. |
Different categories of software solutions that address different aspects of remote work. They include communication tools, project management software, time tracking applications, and others. | The degree to which software solutions impact the effectiveness and success of remote work. Their importance is measured by how they help overcome the challenges of remote work and enable the achievement of organizational goals. |
Choosing the right software solution | Implementation |
Effective remote work | Best practices |
Communication tools | Project management software |
Time tracking applications | Data security |
The process of installing and configuring software solutions for remote work. It involves setting up user accounts, defining user permissions, configuring settings, and ensuring integration with other tools and applications. | The process of selecting a software solution that best meets the requirements of a specific remote work scenario. It involves assessing the features, cost, ease of use, and compatibility of different software solutions and matching them with the needs of the organization. |
Proven methods and techniques for using software solutions effectively in remote work scenarios. They include establishing clear communication protocols, setting priorities and goals, tracking progress, and ensuring data security and privacy. | The ability of remote teams to work efficiently and productively while adhering to organizational policies and standards. It is influenced by factors such as communication, collaboration, time management, and quality of work. |
Software solutions that help in planning, organizing, and tracking project tasks and resources. They enable remote teams to collaborate on projects, monitor progress, and ensure timely delivery of results. | Software solutions that facilitate communication among remote team members. They include email clients, instant messaging applications, voice and video conferencing tools, and others. |
The protection of sensitive and confidential data from unauthorized access, use, disclosure, or destruction. It is essential in remote work scenarios where data is transmitted over the internet or stored in cloud-based applications. | Software solutions that help in tracking the time spent on specific tasks and projects. They enable remote employees to keep track of their work hours, monitor productivity, and ensure accurate billing and invoicing. |
Home network | Remote work |
Security risks | Cybersecurity |
Password | Firewall |
Encryption | Antivirus software |
Work that is conducted from home or outside of a traditional office setting. | A group of devices including computers, printers, routers and modems that are connected to the internet within a house or apartment. |
The practice of protecting devices, networks and data from unauthorized access, use, disclosure, disruption, modification or destruction. | Any potential threat or danger to the confidentiality, integrity and availability of data or devices on a home network. |
A security system that controls network traffic and filters out unauthorized access to a network based on predetermined security rules. | A sequence of characters that is used to authenticate or verify the identity of a user and allow access to a device or network. |
A computer program that is designed to detect, prevent and remove malicious software from a device or network. | The process of converting plaintext into cipher text to protect sensitive data from unauthorized access or tampering. |
Patch | Virtual private network |
Two-factor authentication | Best practices |
Remote work | Disadvantages |
Social isolation | Lack of work-life balance |
A secure network connection that allows users to access a private network from a remote location over the internet. | A software update that fixes vulnerabilities or bugs in operating systems, applications or firmware. |
A set of guidelines, standards or procedures that are widely accepted as effective or efficient in a particular industry or domain. | A security mechanism that requires two different forms of authentication to verify the identity of a user before granting access to a device or network. |
Negative aspects or drawbacks of remote work for individuals and businesses. | Work done outside of a traditional office setting, typically from home or a co-working space. |
The difficulty in maintaining clear boundaries between work and personal life, resulting in longer work hours and increased stress. | The decreased social interaction experienced by remote workers, which can lead to feelings of loneliness and detachment. |
Difficulty collaborating | Increased distractions |
Reduced productivity | Less face-to-face interaction |
Difficulty monitoring employees | Security risks |
Equipment and technology issues | Mitigate |
The numerous distractions that can occur in a remote work environment, such as household chores, family members, or pets. | The challenges of working with team members who are in different locations, which can lead to communication breakdowns and inefficiencies. |
The reduced ability to have in-person meetings or discussions, which can lead to misunderstandings or missed opportunities. | The potential decrease in productivity caused by the challenges outlined above, especially for individuals who need a structured work environment. |
The increased risk of data breaches or cyber attacks when remote workers access company networks or use personal devices for work purposes. | The challenge of tracking employee work hours, progress, or performance when they are working remotely. |
To lessen or reduce the negative effects of remote work by implementing strategies or solutions. | The potential for technical problems with computers, internet connections, or other equipment that can impact productivity. |
Working from home | Flexibility |
Productivity | Cost savings |
Autonomy | Technology |
Communication | Collaboration |
The ability to work on a schedule that suits one's needs rather than a rigid 9-to-5 structure. | The practice of performing work, tasks or activities from the comfort of one’s private residence instead of commuting to a physical office or workplace. |
The financial benefits that arise from not having to incur expenses such as transportation, meals, clothing, and other work-related expenditures that would be necessary if required to work in a physical office. | The amount of work accomplished by an individual within a given period of time. |
Various hardware and software tools that are employed to facilitate work communications, data sharing and collaboration from remote locations. | The ability to exercise control over one’s work schedule, environment and conditions. |
The act of working together harmoniously on a project or task to achieve a common goal. | The act of conveying information or exchanging ideas through various channels such as email, video conferencing, chat platforms and social media. |
Work-life balance | Isolation |
Distractions | Self-discipline |
Remote work | Benefits of remote work |
Challenges of remote work | Communication tools |
The feeling of being disconnected or detached from one’s colleagues or company culture that can arise from not working in a physical office. | The equilibrium between one’s personal and professional life that can be achieved by working from home. |
The ability to focus and stay motivated to complete work-related tasks even when there are numerous distractions present. | Any interruptions that can interfere with an individual's ability to work, such as family members, pets, household chores and entertainment options. |
Includes reduced commuting time, increased flexibility in schedule, increased job satisfaction, and improved work-life balance. | A working arrangement that allows employees to work from a location other than the office, typically from home. |
Technology platforms and applications used to facilitate communication among remote workers, such as video conferencing, chat software, and email. | Includes communication difficulties, lack of supervision, feelings of isolation, and distractions at home. |
Collaboration tools | Best practices for remote work |
Productivity | Distractions |
Time management | Work-life balance |
Virtual meetings | Telecommuting |
Establishing a designated workspace, maintaining regular working hours, communicating clearly and frequently with colleagues, and setting expectations with family or roommates. | Technology platforms and applications used to facilitate collaboration and project management among remote workers, such as shared documents, project management software, and virtual whiteboards. |
Anything that diverts one's attention away from work, such as children, pets, or household chores. | The degree to which work is completed efficiently and effectively. |
The balance between work obligations and personal responsibilities, such as family and social interactions. | The ability to effectively allocate time to complete tasks and meet deadlines. |
A work arrangement in which an employee performs their job duties from home or another remote location for all or some of their workweek. | Meetings conducted via technology platforms, such as video conferencing, to allow remote workers to collaborate and communicate effectively. |
Communication | Collaboration |
Effective Communication | Active Listening |
Empathy | Nonverbal Communication |
Workplace Collaboration | Virtual Collaboration |
Working together towards a common goal or objective, often involving shared decision-making and mutual accountability. | The exchange of information, ideas, or thoughts between individuals or groups. |
The process of fully concentrating, understanding, responding and then remembering what is being said by the speaker. | The ability to convey a message or idea clearly and accurately to others, resulting in a shared understanding. |
Communication without the use of words, often involving body language, facial expressions, and tone of voice. | The ability to understand and share the feelings of another person. |
The coordinated effort of a group of individuals working towards a common goal or objective using digital tools and technology. | The coordinated effort of a group of individuals working towards a common goal or objective within a business or organization. |
Conflict Resolution | Feedback |
Trust | Cross-Cultural Communication |
Global markets | Export |
Import | International trade |
Information provided by others that is used to improve performance or gain insight into behavior. | The process of addressing and resolving disagreements or conflicts between individuals or groups. |
The exchange of information, ideas, or thoughts between individuals or groups from different cultural backgrounds. | A belief in the reliability and integrity of others to fulfill their commitments and obligations. |
The process of selling goods or services to other countries. | Refers to the interconnected economies of the world and the international trade of goods and services between countries. |
Refers to the exchange of goods and services between countries. | The process of buying goods or services from other countries. |
Localization | Cultural differences |
Tariff | Import quota |
Exchange rate | Globalization |
Economic development | Market saturation |
The varied norms, values, attitudes, and behaviors of different cultures that need to be considered while doing business in global markets. | The process of adapting a product or service to meet the specific needs and preferences of a particular country or region. |
A limit on the amount of a certain product that can be imported into a country during a specified period of time. | A tax imposed on goods that are traded across international borders. |
The process of increasing interconnectedness and interdependence among the world's economies, societies, and cultures. | The rate at which one currency can be exchanged for another. |
The point at which a market is so well developed that further growth is difficult to achieve. | The process by which a country improves the economic, political, and social well-being of its people through various measures such as increasing the availability of goods and services, creating jobs, and reducing poverty. |
ICT security | Cybersecurity |
Data encryption | Firewall |
The protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data. | The practice of protecting electronic devices, systems, or networks from theft, damage, or unauthorized access. |
A security system that monitors and controls incoming and outgoing network traffic based on preset security rules. | The conversion of data into a form that cannot be easily understood except by authorized persons who have the cryptographic key. |
Malware | Phishing |
Password policy | Security audit |
Two-factor authentication | Vulnerability assessment |
Data backup | Access control |
The fraudulent practice of sending emails claiming to be from reputable companies in order to induce individuals to reveal personal information. | A type of software designed to harm or exploit any programmable system including desktops, servers, mobile devices, and networks. |
The process of assessing, measuring, and reporting the effectiveness of an organization's security controls, policies, and procedures. | A set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. |
The process of evaluating and identifying vulnerabilities, weaknesses, and loopholes in a system or network to support further security measures. | An authentication method that requires the user to provide two forms of identification, typically a password and a smart card or biometric identification. |
The process of controlling who can access what information and resources in a system or network. | The process of creating a secondary copy of important data to protect against accidental loss, corruption, or deletion. |
Competitive Environment | Navigation |
Differentiation | ICT Skills |
Thrive | Market |
Competition | Customer |
The ability to move through and understand a specific environment or situation in order to maximize success. | A market in which multiple businesses offer similar products or services, resulting in competition for customers and profits. |
The abilities and knowledge needed to effectively use information and communication technology in a competitive environment. | The process of creating a unique and valued position in a market to distinguish oneself from competitors. |
A group of potential customers with a need or desire for a specific product or service. | The ability to grow and succeed in a competitive environment by utilizing skills and differentiating oneself from competitors. |
A person or organization who purchases or uses a product or service. | The act of businesses or individuals vying for the same customers, resources, or profits. |
Profit | Success |
Value | Positioning |
iGCSE ICT Course | Online Presence |
Learning Experience | Online Learning |
The achievement of one's goals and objectives, typically by utilizing skills and knowledge to navigate a specific environment. | The revenue remaining after all costs and expenses have been paid in a business or financial venture. |
The process of creating a specific image or brand in the mind of a customer or market to differentiate oneself from competitors. | The perceived benefit or worth of a product or service in the eyes of a customer or market. |
The extent to which an entity, such as a person, organization, or course, is visible and active on the internet. | An international curriculum of study designed to prepare students for further studies, work, and life in an ICT-dependent contemporary and globalized environment. |
The use of internet-based technologies and methods to provide educational content, resources, activities, and services to learners, regardless of time and place. | The process of acquiring knowledge, skills, attitudes, and values through formal or informal study, instruction, or training, as well as through direct or indirect exposure to new situations, events, or interactions with others. |
Impact | Effective Use |
Online Resources | Contemporary |
Globalized | Preparation |
Further Studies | Work |
The ability to utilize online resources, such as websites, applications, forums, blogs, or social media, in a productive and meaningful way that supports learning and achievement of goals. | The influence, effect, or consequence of a particular action, event, or phenomenon on something else, such as a person, group, system, or environment. |
Pertaining to the present time, epoch, or style, characterized by modernity, innovation, and relevance to current issues or trends. | The digital materials, tools, and platforms that are accessible via the internet and can be used for learning, research, communication, collaboration, and other purposes related to education. |
The act or process of getting ready for something, such as a test, exam, project, or career, by acquiring knowledge, skills, and attitudes that are relevant and useful for that purpose. | Having a worldwide scope, impact, or perspective, reflecting the interconnectedness and interdependence of different regions, cultures, economies, and societies. |
The activity of doing something that provides income, employment, or occupation, typically involving physical or mental effort and skills. | The pursuit of advanced education or training beyond the secondary or high school level, such as college, university, vocational school, or professional development programs. |
Unequal access | Community |
Impact | Socioeconomic status |
Marginalized communities | Digital divide |
Inequality | Assistive technology |
A community refers to a group of people who share common interests, beliefs, goals, or geographical location. It can be a small or large group of people living in the same area or having a similar identity. | Unequal access refers to a situation where some individuals have limited or no access to resources, goods, services, or information that are available to others in the same community or society. |
Socioeconomic status (SES) refers to a person's position in society based on their income, education, occupation, and social status. It can influence their access to resources and opportunities. | Impact refers to the effect that unequal access has on individuals, groups, or society as a whole. It can be positive, negative, or neutral depending on the circumstances. |
Digital divide refers to the unequal access to technology and information among individuals or communities. It can create disparities in education, health, employment, and social participation. | Marginalized communities refers to groups of people who are systematically excluded, discriminated against, or disadvantaged in society based on their race, gender, ethnicity, religion, or other factors. They may have limited access to resources and opportunities. |
Assistive technology refers to devices, software, or equipment that helps people with disabilities or limitations to access information, communicate, and perform daily tasks. It can improve their quality of life and increase their participation in society. | Inequality refers to the unequal distribution of resources, opportunities, or power in society. It can be based on various factors such as income, gender, race, or ethnicity. |
Empowerment | Universal design |
E-inclusion | E-government |
Unequal access to ICT | Socio-economic factors |
Geographical factors | Digital divide |
Universal design refers to the design of products, environments, or services that are accessible and usable by people with diverse abilities, ages, and backgrounds. It can improve the quality of life for everyone. | Empowerment refers to the process of enabling individuals or communities to have control over their lives, make decisions, and take actions that lead to positive outcomes. It can involve providing them with resources, skills, or opportunities. |
E-government refers to the use of technology to provide public services, information, and communication between governments and citizens. It can improve transparency, efficiency, and accessibility of government services. | E-inclusion refers to the use of technology to promote social inclusion, equality, and participation. It can involve providing access to technology, training, and support to marginalized or underprivileged groups. |
The social and economic conditions and factors that influence an individual's access to ICT resources, such as income, education, and occupation. | The unequal distribution and availability of Information and Communication Technology (ICT) resources among individuals and communities based on socio-economic and geographical factors. |
The gap between individuals or communities who have access to and knowledge of ICT resources and those who do not, resulting in social, economic, and educational inequalities. | Factors related to the physical location of an individual or community that impact their access to ICT resources, such as distance from urban centers, availability of infrastructure, and terrain. |
Gender gap | Age gap |
Rural-urban gap | Infrastructure |
Education | Income |
Occupation | Consequences of unequal access to ICT |
The disparity in access to and use of ICT resources between different age groups, influenced by factors such as education, income, and cultural barriers. | The disparity between men and women in their access to and use of ICT resources, often caused by social and cultural biases and norms. |
The physical components and facilities necessary for the operation and use of ICT resources, such as internet connectivity, computers, and servers. | The disparity in access to and use of ICT resources between urban and rural communities, often caused by differences in infrastructure, education, income, and culture. |
The financial resources available to individuals and communities, which can impact their ability to afford and access ICT resources. | The knowledge, skills, and training necessary to effectively use and benefit from ICT resources. |
The negative impact of unequal access to ICT resources on individuals, including decreased educational and career opportunities, decreased access to information, and decreased social and political participation. | The type of work or profession an individual is engaged in, which can impact their access and use of ICT resources. |
Social networking sites | Instant messaging |
Online gaming | Social media addiction |
Online dating | Cyberbullying |
Virtual reality | Video conferencing |
Real-time communication through text messages sent and received via computer or mobile devices. | Online platforms where people can create a profile, share information, and connect with others who share similar interests or social circles. |
Excessive use of social networking sites, resulting in negative impacts on one's daily life, such as decreased productivity or social isolation. | Connecting with others through video games played over the internet, often involving multiplayer cooperation or competition. |
Using technology to harm, harass, or intimidate others, often anonymously or from a distance. | Using websites or apps to connect with potential romantic partners, often involving matching algorithms and profile information. |
Real-time audio and video communication between two or more people in different locations, often used for business or remote collaboration. | Immersive computer-generated environments, often experienced through headsets or other devices, allowing users to feel present in a different world. |
Online privacy | Catfishing |
Social skills | Digital footprint |
Unequal access | Challenges |
Performance | Reflect |
Creating a fake online identity to deceive others, often for romantic or financial gain. | Controlling what personal information is shared online, and who can access it, through privacy settings or careful online behavior. |
The trail of data left by one's online activity, including posts, messages, and other content, which can affect one's reputation or privacy in the future. | Abilities to communicate effectively, read social cues, and build relationships in various settings, often enhanced or challenged by technology use. |
Obstacles that iGCSE ICT students face due to unequal access, such as limited access to computers, slow internet connection, and lack of ICT tools. | The uneven distribution or availability of resources such as technology, internet connection, and other amenities needed for iGCSE ICT students to succeed. |
To think deeply and critically about the effects of unequal access on iGCSE ICT students and to consider ways to address this problem. | The level of success and achievement of iGCSE ICT students affected by unequal access, as demonstrated in exams, projects, and coursework. |
Technology | Internet connection |
Digital divide | Access |
Inequality | Socio-economic status |
Skills | Digital literacy |
The link between iGCSE ICT students and the worldwide web, which enables them to access digital resources and communicate with others online. | The tools, devices, and applications used by iGCSE ICT students, such as computers, tablets, software, and online platforms. |
The ability of iGCSE ICT students to use ICT resources, tools, and facilities needed for their studies and future careers. | The gap between the haves and have-nots in terms of access to technology and the internet, which can lead to inequality in education, job opportunities, and social status. |
The measure of iGCSE ICT students' economic and social position in society, which can impact their access to resources and opportunities for success. | The situation where some iGCSE ICT students have better access to resources and opportunities than others, leading to unfair differences in performance and outcomes. |
The knowledge, skills, and attitudes iGCSE ICT students need to effectively use and communicate with digital tools and media, often affected by unequal access to technology and education. | The abilities and competencies of iGCSE ICT students needed to navigate, create, and innovate with digital technology, which can be hindered by unequal access. |
Social Networking | Online Gaming |
Concept | Features |
Benefits | Risks |
Interaction | Virtual World |
A type of video game that is played over the internet or online networked device. | The use of dedicated websites and applications to interact with other users, or to find people with similar interests to oneself. |
Distinctive attributes or aspects of something. | An abstract idea or general notion that represents a class or category of things. |
Potential negative effects or dangers of social networking and online gaming, such as cyberbullying or addiction. | Advantages or positive effects of social networking and online gaming, such as socializing with friends or improving cognitive abilities. |
A computer-based simulated environment that allows users to interact with a computer-generated environment and other users in a quasi-realistic manner. | The exchange of information or communication between individuals or groups within a social networking or online gaming environment. |
MMORPG | Privacy |
Cyberbullying | Addiction |
Online gaming | Social networking |
Benefits | Drawbacks |
The state or condition of being free from public attention or observation, typically as it relates to personal information shared or obtained through social networking or online gaming. | Massively multiplayer online role-playing game, a type of online gaming where multiple players interact in a virtual world. |
A psychological and physical dependence on a substance or activity, such as social networking or online gaming, that can lead to negative consequences. | The use of technology to harass, humiliate, or intimidate others online, typically through social networking or online gaming. |
The use of dedicated websites and applications to interact with other users | Refers to video games which are played over the internet |
Negative effects of online gaming and social networking such as addiction and cyberbullying | Positive effects of online gaming and social networking such as entertainment and social connections |
Mental health | Physical health |
Impact | Social interactions |
Relationships | Influence |
Evaluation | iGCSE ICT course |
The state of a person's bodily functions and fitness level | The state of a person's psychological and emotional well-being |
The ways in which people communicate and relate to each other | The effect that online gaming and social networking have on mental and physical health |
The ability of online gaming and social networking to shape social interactions and relationships | The connections and bonds that people form with each other |
A course of study for the International General Certificate of Secondary Education in Information and Communication Technology | The process of judging the value or worth of online gaming and social networking |
Online workspaces | Collaborative projects |
Communication tools | Cloud-based |
Real-time collaboration | Version control |
Task management | Data security |
Efforts undertaken by a team of people working together to achieve a shared goal | Virtual platforms that enable users to collaborate on projects remotely |
Refers to software or services that are hosted remotely on servers accessible through the internet | Software and applications used to facilitate communication between team members, such as chat or video conferencing |
A system that tracks and manages revisions to a project document, allowing users to review and revert changes if necessary | Any collaboration that happens instantly in real-time, rather than through delayed modes of communication |
Protecting information by preventing unauthorized access, use, disclosure, disruption, modification, or destruction | The process of organizing, tracking, and monitoring tasks related to a specific project or goal |
Access control | File sharing |
Editing permissions | Feedback loop |
Virtual Learning Environments (VLEs) | Online Education |
iGCSE ICT | Learning Management System (LMS) |
The practice of allowing multiple users to access and edit the same file or document | A security technique that regulates and restricts access to resources or data based on the permissions granted to users or roles |
A process where information and feedback received from users is used to improve a product or service | Controls that allow users to determine who can make changes to a file or document |
A form of education where instruction is delivered through the internet or other digital technologies. | A digital platform that allows students and teachers to interact and learn in a virtual environment. |
A software platform that enables the administration, documentation, tracking, reporting, and delivery of educational courses, training programs, or learning and development programs. | A course that focuses on the development of skills that are necessary to manipulate and use information and communication technologies (ICT) in the digital age. |
Asynchronous Learning | Synchronous Learning |
Blended Learning | Gamification |
Adaptive Learning | Social Learning |
Mobile Learning | Open Educational Resources (OERs) |
A learning approach where students learn in real-time with their instructors or peers. | A learning approach where students learn at different times, rather than in real-time, and at their own pace. |
The use of game-like elements, such as scoring systems and rewards, in non-game contexts to motivate and engage learners. | A learning approach that combines traditional in-person instruction with online learning activities. |
A learning approach that emphasizes the role of social interaction and collaboration in the learning process. | A learning approach that uses technology to adapt instruction to the learner's individual needs and abilities. |
Teaching, learning, and research resources that reside in the public domain or have been released under an intellectual property license that permits their free use and re-purposing by others. | A learning approach that uses mobile devices, such as smartphones and tablets, to deliver educational content and activities. |
User-generated reference sites | Wikipedia |
Stack Overflow | Benefits |
Limitations | Credibility |
Reliability | Navigation |
A user-generated online encyclopedia, where registered users can create, edit, and maintain articles on a wide range of topics. | Websites where users contribute their own content and collaborate in creating and editing articles and entries on various topics. |
Advantages or good points of using user-generated reference sites such as Wikipedia and Stack Overflow include a vast amount of information and the ability to learn from other users. | A user-generated website where programmers and developers ask and answer technical questions related to software development. |
The quality of being trusted and believed, which is an important factor to consider when evaluating the usefulness and reliability of information obtained from user-generated reference sites. | Disadvantages or drawbacks of using user-generated reference sites such as Wikipedia and Stack Overflow include the potential for inaccurate or biased information and the need to evaluate the credibility of the sources. |
The process of moving around and exploring a website, which is an important skill when using user-generated reference sites such as Wikipedia and Stack Overflow. | The ability of information to be trusted and used with confidence, which is important when determining the accuracy and usefulness of information obtained from user-generated reference sites. |
Search | Skills |
Software development | Articles |
Social Bookmarking | Benefits |
Diigo | Delicious |
The abilities and knowledge required to effectively use user-generated reference sites such as Wikipedia and Stack Overflow, including evaluating credibility and navigating and searching for relevant information. | The process of finding specific information on a website, which is an important skill when using user-generated reference sites such as Wikipedia and Stack Overflow. |
Pieces of content created by users on user-generated reference sites such as Wikipedia, typically focused on specific topics and subject areas. | The process of designing, creating, testing, and maintaining software, which is the primary focus of user-generated reference sites such as Stack Overflow. |
The advantages of using social bookmarking, such as easy access to saved websites from any device with internet access and the ability to share resources with others. | A way of storing and categorizing websites online for easy access and sharing with others. |
A social bookmarking tool that allows users to save and tag websites, and share them with others through networks. | A social bookmarking tool that allows users to save and organize websites, as well as highlight and annotate web pages. |
Organizing | Sharing |
Online Resources | Categorizing |
Tags | Annotation |
Retrieval | Networks |
The act of making saved websites available to others through social bookmarking networks or direct sharing. | The process of categorizing and labeling websites with tags or keywords for easy retrieval. |
The action of classifying websites into specific groups or categories based on their content or other characteristics. | Information or content available on the internet, such as websites, articles, or videos. |
Notes or comments added to web pages through social bookmarking tools like Diigo, to provide additional context or information. | Keywords or labels used to categorize and identify websites for easy retrieval and organization. |
A group of individuals or organizations that share information or resources through social bookmarking tools. | The act of accessing saved websites through social bookmarking tools for later use or sharing. |
User-generated content | Advantages |
Disadvantages | Authenticity |
Engagement | Freshness |
Quality control | Bias |
Positive outcomes or benefits gained from something; pros. | Content created by users of a website or online platform, rather than by the site's own editorial staff. |
The quality of being genuine or real; not fake or artificial. | Negative outcomes or drawbacks of something; cons. |
The novelty or timeliness of user-generated content. | The level of interaction between users and user-generated content. |
The tendency of user-generated content to reflect the opinions, perspectives, or interests of its creators rather than a balanced or objective view. | The measures taken to ensure that user-generated content meets certain standards of accuracy, relevance, and appropriateness. |
Misinformation | Reputation |
Copyright infringement | Legal liability |
Responsible Use Policies | Consequences |
Adhere | Strategies |
The way in which user-generated content can impact the perceived trustworthiness and credibility of a business or individual. | False or misleading information that can be spread through user-generated content. |
The responsibility that businesses or individuals may have for user-generated content that violates laws or regulations. | The unauthorized use or reproduction of someone else's creative work, which can occur through user-generated content. |
Results of breaking a rule or not following a policy, such as loss of privileges or disciplinary action | Rules and guidelines that dictate appropriate behavior when using technology, especially in an academic setting, intended to ensure confidentiality, integrity, and availability of data |
Planning and implementing actions to promote responsible behavior to ensure the objectives set out in responsible use policies are met | To comply with or conform to the guidelines set out in responsible use policies |
Security Measures | Acceptable Use |
Privacy | Permissions |
Code of Conduct | Cyberbullying |
Plagiarism | Intellectual Property |
Describes the ways in which technology can be used in accordance with responsible use policies | Preventive measures taken to protect data and the IT infrastructure from unauthorized access, alteration or destruction |
Authorization granted by the owner of data or the person in charge of the computer system to access or manipulate data | Protection of an individual's personal information from unauthorized access, modification, or disclosure |
the use of technology to harass, humiliate, or bully individuals, which is prohibited by responsible use policies | Set of ethical guidelines and principles that govern behavior when using technology and are based on responsible use policies |
The legal right to control the use and distribution of an original work of authorship which is protected by responsible use policies | The act of presenting someone else's work or ideas as your own, which is explicitly prohibited under responsible use policies |
Functions | Concept |
Target audience | iGCSE ICT course |
Identify | Course unit |
Lesson objectives | Understand |
An abstract or generic idea that represents a group of similar things or ideas. | A named section of code that performs a specific task and can be called from other parts of a program. |
An educational program designed to teach students about information and communication technology. | The group of people for whom the iGCSE ICT course is intended. |
A module or segment of a larger educational program. | To recognize and differentiate something from other things. |
To comprehend and grasp the meaning of something. | Specific and measurable goals that students are expected to achieve by the end of a lesson. |
ICT | Code |
Named section | Perform |
Advanced functions | Types of advanced functions |
Program efficiency | Target audience analysis |
A language or system of words, letters, figures, or symbols used to represent instructions or programs in a machine-readable form. | Information and Communication Technology, the study and use of digital technology to access, process and communicate information. |
To execute or carry out a specific task or function. | A recognizable and descriptive label given to a specific set of instructions or programs within a larger codebase. |
Different categories of advanced functions such as mathematical functions, string functions, and date and time functions. | A type of function used in programming that performs complex tasks and has multiple inputs and outputs. |
Researching and understanding the characteristics, preferences, and needs of the intended audience of a program or product. | The ability of a program to function optimally and effectively with minimal resource utilization. |
Demographics | Psychographics |
User-centered design | Usability testing |
Accessibility | Localization |
Internationalization | Cultural sensitivity |
Personality traits, values, interests, and lifestyles of individuals. | Characteristics of a population, such as age, gender, income, education, and occupation. |
A process of evaluating a product or program by testing it with representative users to identify any issues or problems. | Design process that involves the end user in every aspect of development to create a product or program that suits their needs. |
Adapting a product or program to meet the language, cultural, and other unique needs of a specific location or region. | The degree to which a product or program can be used by individuals with varying abilities and disabilities. |
Being aware and respectful of cultural differences and nuances when designing and developing a product or program. | Designing a product or program to be adapted easily for localization to different countries and regions. |
Personal Data | Privacy |
Protection | Consent |
GDPR | Data breaches |
Cyber security | Phishing |
The ability to keep one's personal information from being known or shared without their consent. | Refers to any information that can identify a specific individual. |
Permission given by an individual for their personal data to be used, shared or collected. | The implementation of measures to prevent unauthorized access to personal data. |
When personal data is accessed, disclosed, or stolen by unauthorized individuals. | General Data Protection Regulation - The European Union legislation that aims to protect the privacy and personal data of EU citizens. |
The practice of tricking individuals into revealing sensitive information through fake websites or emails. | The practice of protecting computer systems, networks, and programs from digital attacks. |
Encryption | Two-Factor Authentication |
Data Minimization | Cookie |
Data protection | Privacy laws |
Disclosure | Consent |
The use of a secondary authentication method, such as a password and unique code sent to a device, to verify a user's identity. | The process of encoding information to make it unreadable without a decryption key. |
A small piece of data stored on a user's device by a website, which is used to track their browsing activity and remember their preferences. | The practice of collecting and processing only the minimum amount of necessary personal data to fulfill a specific purpose. |
Legal regulations that protect an individual's right to privacy. | The act of safeguarding data from unauthorized access or corruption. |
Permission given by an individual for the disclosure of personal data. | The act of sharing or providing access to personal data. |
Consequences | Ethical handling |
Legal handling | Sensitive data |
Data breaches | Data protection officer |
Data minimization | Third-party access |
The morally appropriate way to handle personal data. | The results or outcomes of an action, in this case, the disclosure of personal data without consent. |
Data that can be used to identify a person and may require a higher level of protection. | Handling of personal data that complies with relevant laws and regulations. |
An individual designated to oversee data handling practices to ensure compliance with relevant laws and regulations. | An incident where unauthorized access or disclosure of personal data occurs. |
Access to personal data provided to external entities or individuals. | The practice of collecting and processing only personal data that is necessary for a specific purpose. |
Responsible Online Behavior | Risks |
Consequences | Privacy |
Security | Digital Citizenship |
Cyberbullying | Online Reputation |
The potential for harm or negative consequences from sharing personal information, engaging in cyberbullying, or other forms of irresponsible online behavior. | Conducting oneself in a respectful, ethical, and safe manner while using the internet and digital devices. |
The ability to control what personal information is shared online and with whom, including adjusting privacy settings on social media accounts and avoiding sharing sensitive information. | The results of irresponsible online behavior that can range from mild to severe, including losing online privileges, damaging one's reputation, or even legal consequences. |
Using technology and the internet in a responsible, ethical, and safe manner to contribute positively to society and respect the rights of others online. | Protecting oneself from online threats such as identity theft, viruses, and hacking by using strong passwords, avoiding suspicious links, and keeping software up to date. |
The way in which one is perceived by others online, including through social media posts and other digital activities. | The use of digital devices to harass, intimidate, or harm others, including posting hurtful messages or spreading rumors online. |
Phishing | Two-Factor Authentication |
Encryption | Acceptable Use Policy |
Personal Data | Risks |
Safeguards | Encryption |
A security measure that requires two forms of verification, such as a password and a code sent to a mobile device, to access an online account. | A type of online scam where someone attempts to obtain personal information by posing as a trustworthy entity, such as a bank or government agency. |
Guidelines outlining the proper and appropriate use of technology and the internet as defined by schools, businesses, or other organizations. | The process of transforming data into a non-readable format to prevent unauthorized access by third parties. |
The potential negative consequences or harms that can result from disclosing personal data online, including identity theft, fraud, and cyberbullying. | Any information about a living individual that can be used to identify the person, such as name, address, date of birth, or social security number. |
The process of converting data into ciphertext, a form that cannot be easily read or understood without the corresponding decryption key. | Measures or actions taken to protect personal data from unauthorized access, use, disclosure, or destruction, such as encryption, password protection, and privacy settings. |
Password Protection | Privacy Settings |
Identity Theft | Fraud |
Cyberbullying | Consent |
Data Breach | Personal Data Protection Laws |
The controls or options provided by online services and social media platforms to limit the visibility and sharing of personal data, such as private profiles, friend lists, and post visibility. | The use of a password or passphrase to restrict access to personal data on a device, service, or account. |
Intentional deception or misrepresentation for personal gain, often involving personal data such as bank account numbers, credit card information, or social security numbers. | The fraudulent use of someone else's personal data to gain access to financial, medical, or other sensitive information or to commit various crimes. |
The voluntary and informed agreement by an individual to the collection, use, and disclosure of their personal data, often obtained through privacy policies and terms of service. | The use of digital devices or platforms to harass, intimidate, or humiliate someone, often involving personal data such as photos or contact information. |
The legal framework and regulations that govern the collection, use, and disclosure of personal data by individuals, organizations, and governments, often involving privacy principles, data subject rights, and enforcement mechanisms. | The unauthorized or accidental release, transfer, or exposure of personal data to an unintended recipient or system, often resulting in harm or loss. |
Personal Data Protection | Cybersecurity |
Confidentiality | Identity Theft |
Phishing | Two-factor authentication |
Encryption | Data Breach |
The practice of protecting systems, networks, and programs from digital attacks, theft, or damage by implementing preventive measures to detect, prevent and respond to online threats. | The practice of safeguarding individual's personal information by controlling access to it and preventing unauthorized people from obtaining, using or disclosing it. |
The criminal act of stealing an individual's personal data such as social security number, credit card number, etc to commit fraud and other illegal activities. | The principle of keeping private or sensitive information concealed from unauthorized access or disclosure. |
An authentication mechanism which requires users to provide two different factors for verifying their identity such as a password and a fingerprint or a text message and a pin code. | A technique used by cybercriminals to steal personal information like login credentials, credit card details, by disguising as a trustworthy entity via email or text message. |
A security incident in which sensitive, protected, or confidential data is accessed or disclosed by an unauthorized person. | The process by which data is scrambled or translated into a secret code to make it secure and prevent unauthorized access. |
Internet Privacy | Privacy Settings |
Data Minimization | Incident Response Plan |
Data Protection | Legal Rights |
Risks | Data Breaches |
User-configurable features that limit how much personal data is visible or accessible to others on a web service or application. | The protection of personal and sensitive information on the internet by controlling what information is collected, used, and disclosed by third parties. |
A plan that outlines the steps to be taken to detect, respond to, and recover from a security incident or data breach. | A principle of data protection which states that only necessary and relevant data should be collected, processed, and stored. |
Entitlements under the law that protects an individual's personal information, including the right to privacy, the right to access their own data, and the right to request data deletion. | The process of safeguarding sensitive information to prevent unauthorized access, use, disclosure, modification, or destruction. |
Unauthorized access, use, or disclosure of personal information, which can result in identity theft or financial loss for individuals and reputational damage for organizations. | Potential threats or vulnerabilities that could compromise the security of personal data, such as hacking, theft, or accidental disclosure. |
Best practices | Personal data |
Encryption | Authorization |
Data backup | Identity theft |
Privacy | Data deletion |
Information that relates to an identifiable individual, including names, addresses, phone numbers, email addresses, financial information, health records, and online activities. | Recommended methods for protecting personal data, including regular data backups, strong passwords, encryption, and secure data storage and disposal. |
The process of granting access to sensitive data to authorized personnel only. | The process of converting plain text into cyphertext to prevent data from being read by unauthorized parties. |
The unauthorized use of an individual's personal information for fraudulent purposes, such as opening credit card accounts, applying for loans, or filing tax returns. | The process of copying and saving data files to a secure location to protect against data loss in case of a system failure or a disaster. |
The process of permanently removing personal data from a storage device or system, ensuring that it is no longer accessible or recoverable. | The right of an individual to control the collection, use, and disclosure of their personal information, including the right to access, correct, and delete their own data. |
Fair use | Attribution |
Legal responsibilities | Ethical responsibilities |
Sources | Acknowledge |
Attribute | Consequences |
Giving credit to the original creator or source of a work when it is used or reproduced in a different work. | The legal principle allowing for limited use of copyrighted material without obtaining permission from the owner. |
The obligations to act in a morally right way when using others' works, such as giving credit where it is due and not claiming others' work as one's own. | The obligations to follow laws and regulations related to the use of others' works, such as fair use and attribution requirements. |
Publicly recognizing or giving credit to the original creator or source of a work when it is used or reproduced in a different work. | The materials used as references or inspiration for a work, such as books, articles, images, and videos. |
The results or effects, positive or negative, that can arise from not following fair use and attribution practices, such as legal action or damage to reputation. | Indicating the author or creator of a work and the source where it can be found, such as in a citation or a watermark. |
Limited use | Permission |
Original creator | Exemption |
Copyright | Intellectual Property |
Trademark | Patent |
The formal authorization or approval granted by the owner or creator of a work to allow others to use or reproduce it in a certain way or for a certain purpose. | The permitted use of a portion or an excerpt of a work for specific purposes such as criticism, commentary, news reporting, teaching, scholarship, or research. |
The special circumstances in which a specific use of a work is not considered an infringement of the owner's rights, such as in cases of fair use, public domain, or creative commons licensing. | The person or entity who first produced or authored a work, and who has the exclusive legal right to control its use, distribution, and reproduction. |
The creations of the mind, such as inventions, literary and artistic works, symbols, names, and designs that are protected by law. | The exclusive legal right given to the creator of an original work to control how it is used and distributed. |
A government grant that gives the inventor of a new product or process the exclusive right to manufacture, use, and sell it for a certain period of time. | A symbol, word, or set of words that is legally registered and used to represent a company or product. |
Fair use | Infringement |
Public domain | Derivative work |
Moral rights | License |
DMCA | Creative Commons |
The act of violating a copyright, trademark, or patent by using someone else's intellectual property without permission or authorization. | The legal principle that allows limited use of copyrighted material without requiring permission from the rights holder, for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. |
A work that is based on or derived from one or more preexisting works, such as a translation, adaptation, or new version of a song or book. | Works that are not protected by intellectual property laws and are available for anyone to use or reproduce without permission. |
A legal agreement that allows someone else to use or distribute a work, under specific terms and conditions. | The right of the creator of an original work to control how it is attributed, presented, and treated by others. |
A set of licenses that allow creators to share their work with the public while still retaining some rights, such as attribution, non-commercial use, and derivative works. | The Digital Millennium Copyright Act, a US law that criminalizes the production and dissemination of technology, devices, or services that are designed to circumvent measures that control access to copyrighted works. |
Cybersecurity | Identity theft |
Phishing | Malware |
Firewall | Encryption |
Backups | Password |
The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. | Protecting computer systems and networks from theft or damage to their hardware, software or electronic data. |
Short for malicious software, malware refers to any type of software or code designed to harm a computer, server, or network. | A type of cyber attack where scammers send emails that appear to be from reputable sources in order to trick individuals into revealing personal information. |
The process of converting information or data into a code that can only be understood by authorized individuals who possess the key to decode the information. | A security system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. |
A string of characters used to authenticate a user and provide access to a secured system or document. | The process of creating copies of important data or files to ensure that they can be retrieved in the event of a system failure or data loss. |
Virus | Social engineering |
Two-factor authentication | Digital footprint |
Health and Safety | Potential Hazards |
Risk Minimization | Safe Computing Practices |
The use of psychological manipulation to deceive individuals into sharing sensitive information or performing actions that may not be in their best interest. | A type of malicious code or software that replicates itself by modifying other computer programs and inserting its own code. |
The trail of data or information that is left behind while using digital technologies such as the internet or social media. | A security process in which a user provides two different authentication factors to verify their identity, such as a password and a fingerprint scan. |
Any possible danger or risk that can cause harm or damage to people and equipment in the ICT environment. | The practice of identifying and minimizing potential hazards in ICT to maintain a safe working environment. |
The use of guidelines and procedures to ensure the safety and security of individuals and equipment while using ICT. | The process of identifying, preventing, and reducing potential risks and hazards in ICT to uphold a safe working environment. |
Emergency Procedures | Personal Protective Equipment (PPE) |
Safety Checks | Hazardous Materials |
Fire Safety | Manual Handling |
Electrical Safety | Data Protection |
Specialized clothing, gear, and safety devices used to protect individuals from hazards and injuries in the ICT environment. | Protocols and plans to follow in the event of a crisis or accident in the ICT environment. |
Any chemicals or substances that can cause harm or damage to people or the environment in the ICT workplace. | Routine inspections and assessments of ICT equipment, workstations, and environments to identify potential hazards and ensure safe conditions. |
The safe and proper methods of lifting and moving equipment in the ICT environment to prevent injuries and damage. | Preventative measures and emergency procedures implemented to minimize the risk of fire-related accidents and injuries in the ICT environment. |
The policies and procedures that ensure the confidentiality, integrity, and availability of data in the ICT environment. | Implementation of safe practices and procedures to prevent electrical accidents and injuries in the ICT workplace. |
Monitoring individuals | ICT equipment |
Data | Safe movement practices |
ICT tools | Techniques |
Data protection | Security measures |
Any hardware or software device used for communication, data storage, processing, and/or transmission. | The process of keeping track of individuals' data and activities using ICT tools and techniques. |
The techniques and procedures used to transport, handle, and store ICT equipment and data in a secure and safe manner. | Information that is stored, processed, or transmitted by ICT devices and systems. |
Methodologies or approaches used for monitoring and handling individuals' data and activities. | Software or hardware devices that are used for monitoring, tracking, and managing data and activities. |
The procedures and mechanisms used to prevent and detect unauthorized access, use or disclosure of ICT equipment and data. | The process of safeguarding data from unauthorized access, use, disclosure, or modification. |
Privacy | Encryption |
Authentication | Authorization |
Sustainability | Environmental Impact |
ICT | Carbon Footprint |
The process of converting data into a code that is only readable with a secret key or password. | The right of individuals to keep their personal information and activities confidential and protected from unauthorized access or use. |
The process of granting or restricting access levels to ICT equipment or data based on the individual's role or responsibilities. | The process of verifying the identity of an individual or system before allowing access to ICT equipment or data. |
The effect that technology has on the natural environment. | The ability to use natural resources in a way that meets the needs of the present without compromising the ability of future generations to meet their own needs. |
The amount of greenhouse gas emissions generated by human activities, such as transportation and energy use. | Information and Communication Technology, including hardware, software, and networks used to process, store, and communicate information. |
Renewable Energy | Green Computing |
Energy Efficiency | Lifecycle Assessment |
Sustainable Design | E-Waste |
Ecological Footprint | Personal Responsibility |
The practice of designing, developing, using, and disposing of computers, servers, and associated subsystems in an environmentally-responsible manner. | Energy derived from natural resources that can be replenished, such as wind, solar, and hydroelectric power. |
The process of evaluating the environmental impact of a product or service over its entire lifecycle, from raw material sourcing to disposal. | The use of technology to reduce the amount of energy needed to perform a task while maintaining the same level of output. |
Electronic waste, or discarded electronic devices that may contain hazardous materials and pollutants. | The practice of designing products, buildings, and environments that minimize negative impacts on the natural environment and promote long-term sustainability. |
The obligation of individuals to act in a way that promotes sustainability and minimizes negative impacts on the natural environment. | A measure of the amount of land and water required to produce the resources a population consumes and to absorb the waste it generates. |
RSI | sitting posture |
workstation ergonomics | muscle tension |
stretching exercises | wrist support |
typing technique | monitor height |
The position of the body when sitting and how it relates to the design, arrangement, and use of furniture and equipment to prevent discomfort and injury. | Repetitive Strain Injury, a condition caused by overuse or strain of muscles and tendons from repeated movements. |
The state of being tight, stiff, or strained muscles that can cause discomfort and pain. | The science of designing the job, equipment, and workplace to fit the worker to reduce physical stress and discomfort and increase productivity and efficiency. |
A device or accessory that holds the wrist in a neutral position to reduce strain and pressure on the muscles and tendons. | Physical activities that aim to improve flexibility, mobility, and range of motion in the muscles and joints. |
The distance between the eye level and the top of the screen when using a computer to reduce eye strain and neck pain. | The proper way of using the keyboard to minimize the risk of RSI, such as keeping the wrists straight, using the correct finger placement, and avoiding excessive force and repetition. |
mouse usage | breaks |
ergonomic chair | ergonomic keyboard |
Online Banking | Secure Payment |
Encryption | Two-Factor Authentication |
Regular periods of rest or stretching during work to relieve muscle tension and prevent RSI. | The correct way of using the mouse to avoid discomfort, such as keeping the arm and wrist in a relaxed position, using the whole arm to move the mouse, and avoiding excessive clicking and dragging. |
A specialized keyboard designed to reduce strain on the hands, wrists, and arms during typing. | A type of chair designed to provide proper support and posture for the body to minimize the risk of discomfort and injury. |
A payment made through a secure channel, ensuring that sensitive financial information is kept confidential. | The use of internet to access traditional banking services, such as paying bills, transferring funds, checking balances, and more. |
A security process that requires users to provide two different methods of identification to access an account. | The process of converting information or data into a code, to prevent unauthorized access. |
Virtual Private Network (VPN) | Phishing |
Malware | Firewall |
Digital Certificate | Backup |
Virus | Cybersecurity |
A type of online fraud where criminals create fake websites or emails to trick individuals into providing personal information. | A network that allows users to access the internet securely and privately, using an encrypted connection to a remote server. |
A security system designed to prevent unauthorized access to or from a private network. | Software designed to damage or disrupt computer systems, often spread through email attachments or unsecure downloads. |
The process of making a copy of data or files to prevent data loss in case of hardware failure or cyber attack. | A digital document used to verify the identity of a website or individual, ensuring secure data transmission. |
The practice of protecting computer systems and networks from theft, damage, or unauthorized access. | A type of malicious software that can replicate itself and cause damage to computer systems, usually spread through infected email attachments or downloads. |
Online news providers | Advantages |
Disadvantages | Reliability |
Credibility | Sensationalism |
Clickbait | Confirmation bias |
Benefits or positive aspects of online news, such as ease of access and convenience. | Websites and apps that distribute news over the internet. |
The degree to which a news source can be trusted to provide accurate and unbiased information. | Drawbacks or negative aspects of online news, such as the potential for inaccurate or biased reporting. |
The use of shocking or exaggerated headlines and content to attract readers or viewers. | The trustworthiness or believability of a news source or story. |
The tendency to seek out or believe information that confirms one's preconceptions or beliefs. | Headlines or links designed to entice people to click on them, often misleading or oversimplified. |
Primary sources | Secondary sources |
Fact-checking | Bias |
On-Demand | Streaming |
Download | Bandwidth |
Sources that interpret or analyze primary sources, such as news articles or academic papers. | Original sources of information, such as firsthand accounts or official documents. |
A tendency to favor one side or perspective over another, often resulting in incomplete or unfair reporting. | The process of verifying the accuracy of information in news stories through research and investigation. |
A method of delivering content over the internet where the content is played as it is downloaded. | A service that allows users to request and consume content whenever they want, without the need to download it. |
The amount of data that can be transmitted over a network in a given time period. | The process of copying data from a remote server to a local device. |
Buffering | Offline Viewing |
Quality | Access |
Cost | Ownership |
Licensing | Security |
The ability to watch content without an internet connection by downloading it beforehand. | The process of preloading data into a temporary storage area in order to prevent interruptions or delays in playback. |
The ability to interact with and consume digital content. | The level of resolution and fidelity of audio and video content. |
The legal rights of an individual or organization to access and control digital content. | The amount of money required to access or own digital content. |
The measures taken to protect digital content from unauthorized access or piracy. | The legal agreement between a content creator and a distributor that outlines the terms of distribution and use. |
Online shopping | Shopping basket |
Item selection | Add item |
Remove item | Checkout |
Payment | Online purchase |
A virtual container that holds items selected for purchase while shopping online | The act of purchasing goods or services over the internet |
The action of placing an item into the shopping basket | The process of picking items to add to the shopping basket for online purchase |
The process of finalizing an online purchase by providing payment and shipping information | The action of taking an item out of the shopping basket |
A transaction done over the internet where a customer buys and pays for goods or services | The exchange of money for goods or services |
Shipping information | Confirmation |
Transaction | Order history |
Online Gaming | Gaming Sites |
Benefits of Online Gaming | Drawbacks of Online Gaming |
The notification received by the customer once an online purchase is completed | Details required for delivery of goods, including address and contact information |
The record of online purchases made by a customer | The exchange of goods, services or payment online |
Gaming sites are websites that allow users to play games online. | Online gaming refers to the act of playing games on the internet with other players connected via a network or server. |
Drawbacks of online gaming include addiction, exposure to inappropriate content, and loss of productivity. | Benefits of online gaming include improved cognitive skills, socialization, and stress relief. |
Multiplayer | Avatar |
PvP | PvE |
MMORPG | Free-to-Play |
In-Game Purchases | Simple Online Game |
An avatar is a virtual representation of a player in an online game. | Multiplayer refers to the ability to play games with multiple players online. |
PvE stands for player versus environment and refers to games where players cooperate against computer-controlled enemies. | PvP stands for player versus player and refers to games where players compete against each other. |
Free-to-play refers to games that are available to play for free but may offer paid upgrades or items. | MMORPG stands for massively multiplayer online role-playing games, which are games that involve a large number of players interacting in a virtual world. |
A simple online game is a game created using a gaming site that has basic features and functionality. | In-game purchases refer to paid items or upgrades that can be purchased within a game. |
online auctions | account |
bid | cautious bidder |
winning an auction | auction platform |
reserve price | buy it now |
A personal or business profile created on an auction site, that enables users to bid on auctions, keep track of their bidding history and manage listings. | A type of auction that takes place on the Internet, where individuals or businesses bid on items sold by other individuals or businesses through a bidding platform. |
A user on an auction site who takes careful consideration before placing a bid, by researching the item, the seller's reputation, and the terms and conditions of the auction. | An offer made by a user on an auction site to buy an item for a certain price. Bids are generally binding and cannot be retracted. |
The website or app on which an auction is held, and on which bids are placed. | Successfully making the highest bid on an item on an auction site, and being awarded the right to purchase the item. |
An option on an auction site that allows a user to purchase an item immediately, without having to wait for the auction to end. | A minimum price set by the seller on an auction item which must be met before the item can be sold. |
maximum bid | feedback |
sniping | proxy bidding |
Technology | Lifestyle |
Behaviour | Positive Influences |
Comments or ratings left by buyers or sellers on an auction site, regarding their experience with a particular transaction. | The highest amount a user is willing to bid on an auction item. The auction system will automatically increase the user's bid up to this maximum amount. |
A bidding system in which the auction system automatically places bids on behalf of a user up to a pre-set maximum bid amount. | The practice of placing a bid on an auction item at the very last moment in order to avoid giving other bidders the opportunity to increase their bids. |
The way a person lives, including their behaviors, habits, and activities. | Tools and equipment that are designed to make life easier and more efficient, such as computers, smartphones, and the internet. |
The beneficial effects of technology on lifestyle and behavior, such as increased productivity, communication, and access to information. | The actions or reactions of a person in response to internal or external stimuli. |
Negative Influences | Excessive Use |
Consequences | Responsible Use |
Digital Footprint | Cyberbullying |
Internet Addiction | Screen Time |
The overuse or misuse of technology, which can result in negative consequences such as addiction, fatigue, and poor sleep. | The detrimental effects of technology on lifestyle and behavior, such as addiction, social isolation, and reduced physical activity. |
Using technology in a way that balances its benefits and risks, taking into account one's own needs and those of others, and avoiding or minimizing negative consequences. | The effects or results of excessive use of technology on lifestyle and behavior, such as physical, psychological, and social problems. |
The use of technology to harm, intimidate, or harass others, often through social media, messaging apps, or online forums. | The trail of data and information that is left behind by a person's online activity, which can have consequences for their privacy, reputation, and security. |
The amount of time a person spends using screens, such as computers, smartphones, or TVs, which can have effects on physical, psychological, and social health. | An excessive or compulsive use of the internet, which can lead to a loss of control, withdrawal symptoms, and negative effects on daily functioning. |
Automation | E-commerce |
Cloud computing | Big data |
Cybersecurity | Mobile devices |
Artificial intelligence | Virtual reality |
The buying and selling of goods and services online. | The use of technology to perform tasks or processes without human intervention. |
The use of technology to process and analyze large amounts of data. | The use of shared computing resources, such as servers and storage, to provide services over the internet. |
Electronic devices, such as smartphones and tablets, that are portable and can be used on the go. | The protection of computer systems and networks from theft, damage, or unauthorized access. |
A computer-generated environment that simulates a physical presence in a real or imagined world. | The simulation of human intelligence processes by computer systems, used to perform tasks such as visual perception, speech recognition, and decision making. |
Social media | Internet of Things (IoT) |
Supply chain management | Telecommuting |
Cookies | Session Cookies |
Persistent Cookies | First-Party Cookies |
The interconnection via the internet of everyday devices, appliances, and machines. | Websites and applications that enable users to create and share content or to participate in social networking. |
Working from a remote location, typically using technology to stay connected with colleagues and clients. | The management of the flow of goods and services from the point of origin to the point of consumption. |
Temporary cookies that are deleted once a user closes their web browser | Small text files stored on a user's device by a website |
Cookies that are set by the website the user is visiting | Cookies that remain on a user's device until their expiration date or until the user deletes them |
Third-Party Cookies | Tracking Cookies |
HTTP Cookies | Secure Cookies |
Cookie Consent | Cookie Law |
Cookie Notice | Online Experience |
Cookies that are used by advertisers or other third-party entities to track a user's web activity | Cookies that are set by domains other than the website the user is visiting |
Cookies that are transmitted only over HTTPS (HTTP Secure) connections | Cookies that are transmitted over HTTP (Hypertext Transfer Protocol) connections |
Laws and regulations pertaining to the use of cookies and user privacy | The act of obtaining a user's explicit consent before setting cookies |
The overall experience of a user while browsing the internet | A notification displayed on a website to inform users about the use of cookies |
Transactional Data | Types of Transactional Data |
Structured Data | Semi-Structured Data |
Unstructured Data | Importance of Transactional Data |
Data Integrity | Data Security |
Structured, semi-structured, or unstructured data that is generated by transactions. | Data that records a business transaction such as sales, purchases, refunds, and returns. This data is constantly updated within a database or spreadsheet. |
Data that does not conform to a strict schema/format but still contains some organization through tags or labels. Examples: email messages or invoices. | Data that has a defined schema/format that can be easily organized and analyzed with software tools. Examples: sales orders or customer details. |
This data is essential for decision making, planning, and analysis in any organization. It helps to identify patterns, trends, and relationships that can be used to make strategic decisions and drive business growth. | Data that has no predefined schema or organization. It includes text, images, audio, and video files. Examples: customer reviews or social media posts. |
Protecting data from unauthorized access, use, disclosure, disruption, modification, or destruction. It includes physical, technical, and administrative measures to safeguard data. | Data is accurate, complete, and consistent across all applications, systems, and processes. |
Data Redundancy | Data Consistency |
Data Normalization | Data Mining |
Personalisation | Customisation |
ICT | Importance |
Ensuring that data is consistent and accurate across all databases and applications. Consistent data helps to avoid errors and discrepancies in reporting and analysis. | Storing the same data in multiple places to improve reliability and availability. It is usually used as a backup in case of data loss or corruption. |
A process of discovering hidden patterns, trends, and relationships within data. It involves analyzing large datasets using statistical and machine learning techniques to identify insights and make predictions. | A process of organizing data in a database to reduce redundancy and improve data integrity. It involves breaking down large tables into smaller ones and creating relationships between them. |
The action of modifying or adapting a product or service to better suit the needs of an individual user or group of users. | The process of tailoring or customizing products, services or experiences to meet the specific needs and preferences of individual users. |
The value or significance of personalisation and customisation in ICT, which can result in increased productivity, engagement, and satisfaction for users. | Information and Communication Technology, a term that encompasses all technologies used to communicate and process information. |
Types | Customise |
Tools | Applications |
Personal needs | Ethical issues |
Social issues | Local services |
To make changes or modifications to an ICT tool or application in order to meet individual user needs or preferences. | The various ways personalisation can be implemented in ICT, such as through user interfaces, data analytics, and machine learning. |
Software programs designed to perform specific functions or tasks, such as email clients, web browsers, or mobile apps. | Software or hardware products used to perform specific tasks or functions, such as word processing, email, or social media applications. |
The moral dilemmas or concerns that can arise from personalisation and customisation in ICT, such as privacy violations or discriminatory algorithms. | The unique requirements or preferences of individual users, which can be met through customization or personalization features in ICT tools and applications. |
Services that are available within a particular geographic area, such as a town or a city. | The broader implications of personalisation and customisation in ICT for society, such as the impact on cultural norms, social inequality, or collective decision-making. |
Types of local services | Online services |
Features of online services | Risks of using online services |
Benefits of using online services | Search engines |
Online payment systems | User profiles |
Services that are accessed through the internet, such as email, social media, online shopping and e-learning websites. | Different categories of services provided at a local level, such as medical, transport, entertainment and educational services. |
Potential dangers associated with using online services, such as identity theft, viruses, fraud and cyberbullying. | Characteristics and tools available on online services, such as search engines, online payment systems, user profiles and ratings and reviews. |
Tools that allow users to search and retrieve information from the internet, such as Google, Bing and Yahoo. | Advantages of using online services, such as convenience, accessibility, communication and speed of information retrieval and sharing. |
Customizable online representations of users that provide personal information, preferences, activities and connections, such as Facebook, Twitter and LinkedIn. | Tools that enable users to make transactions online, such as PayPal, Stripe and Apple Pay. |
Ratings and reviews | Identity theft |
Cyberbullying | Accuracy |
Spell Check | Autocorrect |
Formatting | Cut |
Theft of personal information, such as names, addresses, social security numbers, credit card numbers and passwords, for criminal purposes, such as fraud or impersonation. | Feedback and evaluations shared by users about products, services, businesses or individuals, such as Yelp, TripAdvisor and Amazon. |
The degree of preciseness and correctness when entering or editing text. | Harassment, humiliation, threats or intimidation of someone using digital communication devices or platforms, such as social media, email or messaging apps. |
A feature in word processing software that automatically corrects common misspellings or typos. | A feature in word processing software that detects and suggests corrections for misspelled words. |
To remove selected text and save it to the clipboard for pasting elsewhere. | The process of adjusting the appearance of text by changing font type, size, color, and other attributes. |
Copy | Paste |
Undo | Redo |
Find and Replace | Keyboard Shortcuts |
Word Wrap | Headings |
To insert text from the clipboard at the current cursor location. | To duplicate selected text and save it to the clipboard for pasting elsewhere. |
To reverse the last undo action and restore the document to the state prior to undoing. | To reverse the last action taken in a document, such as deleting text or formatting. |
A combination of keys on the keyboard that perform a specific function in a word processing application. | A feature in word processing software that locates specific words or phrases and allows them to be replaced with different text. |
Headings are titles or subtitles that indicate the topic of a section. They are used to organize and structure a document or webpage. | The automatic adjustment of text to fit within the boundaries of a document's margins. |
Sub-headings | Page breaks |
Document | Webpage |
Well-structured | Organized |
Layout | Hierarchy |
Page breaks are used to start a new page in a document or webpage. They are useful for separating content and improving the readability of a document. | Sub-headings are subtitles that indicate the topic of a subsection. They are used to further organize and structure a document or webpage. |
A webpage is a single, hypertext document that is viewed on the internet. It can include text, images, videos, and other multimedia elements, and is accessed using a web browser. | A document is a written or printed piece of information that serves as a record or proof of something. In the context of ICT, a document can refer to a variety of digital formats including text documents, spreadsheets, and presentations. |
Organized refers to a document or webpage that has a clear and systematic arrangement of information. It includes the use of headings, sub-headings, and page breaks to improve readability, and the use of lists and tables to present information in a structured way. | Well-structured refers to a document or webpage that has a logical and organized layout. It includes the use of headings, sub-headings, and page breaks to separate content and make it easier to navigate. |
Hierarchy refers to the order or ranking of elements on a page. In the context of a document or webpage, hierarchy is created using headings, sub-headings, and page breaks to indicate the relative importance of different sections. | Layout refers to the arrangement of elements on a page. In the context of a document or webpage, layout includes the use of headings, sub-headings, and page breaks to create a visual hierarchy, as well as the placement of images, videos, and other multimedia elements. |
Content | Readability |
Navigation | Integrating |
File types | Single document |
Methods | Copy and paste |
Readability refers to the ease with which a document or webpage can be read and understood. It includes the use of headings, sub-headings, and page breaks to create a logical structure and the use of appropriate font sizes and styles to make text easy to read. | Content refers to the information that is presented on a document or webpage. It includes text, images, videos, and other multimedia elements that are used to convey a message or communicate information. |
The process of combining multiple file types into a single document unit. | Navigation refers to the process of moving through a document or webpage. It includes the use of headings, sub-headings, and page breaks to create a clear and logical structure, as well as the use of hyperlinks and buttons to enable users to move to different sections or pages. |
A file that contains multiple file types in a combined format. | Different types of files such as text, images, audio, and video. |
A method of integrating files where you select content in one file and paste it into another file. | Different ways of integrating files including copy and paste, drag and drop, and embedding. |
Drag and drop | Embedding |
Compatibility | Formatting |
Layout | Edit |
Proofread | Documents |
A method of integrating files where you insert a file into another file as an object or link. | A method of integrating files where you drag content from one file and drop it into another file. |
The appearance of text, images, and other content in a file. | The ability of different file types to be integrated with each other. |
To make changes to content in a file. | The arrangement of content in a document including spacing, margins, and page orientation. |
A piece of written, printed, or electronic matter that provides information or evidence or that serves as an official record. | To check a document for errors in spelling, grammar, and punctuation. |
Letters | Reports |
Newsletters | Purpose |
Structure | Formatting |
Language | Content |
A document that presents information in an organized format for a specific audience and purpose. | A written or printed message addressed to a person or organization. |
The reason for which something is done or created or for which something exists. | A regularly distributed publication that focuses on a specific topic or theme. |
The process of preparing a document for printing or electronic dissemination by arranging text, graphics, and other elements to achieve a particular aesthetic or functional result. | The arrangement of and relations between the parts or elements of something complex. |
The substance or material dealt with in a document, speech, or other expression of thought. | A system of communication used by a particular country or community. |
Style | Audience |
Distribution | Salutations |
Dates | Standard conventions |
Communication | Importance |
The person or group of people for whom a document is intended. | The manner in which something is expressed or performed, considered as separate from its intrinsic content, meaning, or structure. |
A polite greeting or expression of goodwill, especially at the beginning of a conversation or written communication. | The process of making a document available to its intended audience. |
Established norms or practices that are widely accepted in a particular context, often used to ensure clear communication and avoid misunderstandings. | A specific day, month, and year assigned to an event or document, often used as a reference point in communication. |
The quality of being significant or necessary in a particular context or situation. | The exchange of information or ideas between individuals or groups, often facilitated by the use of language or symbols. |
Properly | Contexts |
Various situations | Practice |
Proficiency | Understand |
Learn | Mail merge |
The circumstances, setting, or conditions in which something occurs or is understood or interpreted. | In a correct or appropriate manner, often referring to adherence to established norms or standards. |
Repeated performance or application of a skill or knowledge, often with the goal of improving proficiency or understanding. | A diverse range of circumstances, settings, or conditions in which salutations and dates may be used or applied. |
To comprehend or grasp the meaning, significance, or import of something, often through study or reflection. | The quality of having expertise or skill in a particular area or discipline, often developed through repeated practice or experience. |
A feature that allows merging of data from a word processor, spreadsheet, or database into a single document or set of documents. | To acquire knowledge or skill through study, practice, or experience, often with the goal of increasing understanding or proficiency. |
Data source | Main document |
Merge fields | Merge to new document |
Filter | Sorting |
Preview | Data set |
The document that will contain the merged data, such as a form letter or address labels. | The original file, typically a spreadsheet or database, from which data is merged into a document. |
An option to create a new document with the merged data instead of updating the main document. | Tags within the main document that indicate where data from the data source should be merged. |
The process of arranging data in a particular order, such as alphabetical or numerical. | A way to limit the data that is merged based on specified criteria. |
A collection of data that can be used for mail merge operations. | A view of the merged data prior to printing or saving. |
Word processor | Spreadsheet |
Database | Bullets |
Numbering | Alignment |
Indentation | Bullet points |
A software used for organizing, analyzing, and presenting numerical data. | A software used for creating or editing text documents. |
A symbol used in formatting text to indicate a list of items. | A software used for storing, managing, and retrieving large amounts of data. |
The position of text in relation to the margins of a document or other UI element. | A sequential numbering system used to format text to indicate a list of items. |
A formatting element used to highlight and separate items in a list. | The space between the margin and the beginning of a paragraph or a list item's text. |
Numbered lists | Alignment options |
Left align | Center align |
Right align | Justify |
Bullet library | Columns |
Formatting options to change the alignment of text in a document or other UI element. | A formatting element used to create a list which has a sequence of numbers. |
Align text along the center of a document or other UI element. | Align text along the left margin of a document or other UI element. |
Align text along both the left and right margins of a document or other UI element, creating clean and straight lines. | Align text along the right margin of a document or other UI element. |
Vertical divisions in a table used to organize and display data in a structured manner. | A collection of predefined bullet symbols that can be used to format text. |
Tables | Text alignment |
Formatting | Software applications |
Cell | Merging cells |
Borders | Shading |
Adjusting the position of text within a column or table to align with a specific margin or baseline. | Grids of cells or boxes that can be used to organize and display data. |
Programs used to create columns and tables such as Microsoft Word or Excel. | Modifying the appearance of text and tables to improve readability and visual appeal. |
Combining two or more adjacent cells into a single larger cell. | The intersection of a row and column in a table where data can be entered. |
Adding color to the background of cells in a table. | Lines separating cells and defining the edges of a table. |
Alignment | Header row |
Sorting | Bullet Point |
Numbered List | Indentation |
Hierarchy | Multilevel List |
The top row of a table used to provide labels for the data in the columns below. | Adjusting the position of text or objects within a cell to align with a specific margin or baseline. |
A symbol used to introduce items in a list without indicating any priority or order. | Organizing data in a table by a particular column or row. |
The act of moving text in a little from the left or right margin to visually set it off from other text. | A list of items in which each item is preceded by a number for priority or order. |
A list that has more than one level of numbering or bullet points. | A system or organization in which people or groups are ranked one above the other according to status or authority. |
Sub-bullets | Nesting |
Formatting | Alignment |
Symbol | Character |
Typography | Alignment |
The process of placing items within items in a list to create a hierarchy. | Secondary bullets used to associate with a main bullet point in a multilevel list. |
The horizontal or vertical placement of text on a page or screen relative to other elements. | The process of changing the appearance of text to enhance its meaning or for aesthetic purposes. |
Any letter, number, symbol, or punctuation mark that can be typed on a keyboard. | A character or object used to represent something abstract. |
The arrangement of text in a document in a straight line. | The style and appearance of printed matter or text on a screen. |
Tabs | Line spacing |
Formatting | Readability |
Professionalism | Enhance |
Bold | Italic |
The amount of space between lines of text in a document. | Stops in a document that allow for easy movement between positions. |
The ease with which text can be read and understood. | The process of adjusting the layout, appearance and style of text in a document. |
To improve or make better. | The standard of behavior expected in a workplace. |
A formatting option that makes text appear slanted. | A formatting option that makes text appear darker and thicker. |
Underline | Justified |
Spacing | Advanced text formatting |
Color | Font size |
Font style | Text wrap |
A formatting option that aligns text to both the left and right margins of a document. | A formatting option that adds a line under text. |
The process of applying different styles, colors, and font sizes to text in a document to make it look visually appealing. | The amount of space between text and other elements in a document. |
The size of the text in a document. It can be increased or decreased based on the need. | A property of text that allows you to change the color of the text to a desired color. |
The process of wrapping text around an image or an object, so it does not overlap with other content on the page. | The way text is styled. It can be bold, italic, or underlined. |
Text boxes | Visually appealing documents |
Application of different colors to text | Wrapping text |
Working with text boxes | Development of skills |
IGCSE ICT course | Horizontal text alignment |
A document that looks attractive and is easy to read and understand. | A container that holds text in a specific area within a document, it can be resized and formatted based on the need. |
The process of positioning text around an object or image in a document so that it does not overlap. | The process of changing the color of the text in a document to a desired color to make it stand out. |
The process of acquiring new knowledge and improving current skills to create visually appealing documents. | The process of inserting, formatting and positioning text boxes within a document to create visually appealing documents. |
The placement of text in a table, horizontally along a line, for example, left, center, or right. | A course that teaches the fundamentals of computer applications and information technology. |
Vertical text alignment | Readability |
Table | Alignment tools |
Software | Left alignment |
Center alignment | Right alignment |
The ease in which text can be read and comprehended. | The placement of text in a table, vertically along a line, for example, top, middle, or bottom. |
Tools that enable the user to set and adjust text alignment in tables, for example, rulers and guides. | An arrangement of data in rows and columns. |
The placement of text in a table, where it is justified to the left. | Computer programs designed to perform specific tasks. |
The placement of text in a table, where it is justified to the right. | The placement of text in a table, where it is centered horizontally. |
Top alignment | Middle alignment |
Bottom alignment | Merge Cells |
Split Cells | Table |
Column | Row |
The placement of text in a table, where it is centered vertically. | The placement of text in a table, where it is justified to the top. |
Combining two or more adjacent cells into a single cell. | The placement of text in a table, where it is justified to the bottom. |
A grid of cells arranged in rows and columns. | Dividing or separating a single cell into multiple cells. |
A horizontal group of cells in a table. | A vertical group of cells in a table. |
Cell | Merge Across |
Merge Down | Unmerge Cells |
Table Tools | Table Design |
Table Layout | Gridlines |
Combining cells horizontally across one or more columns. | The intersection point of a row and a column in a table. |
Undoing the merge operation to separate the merged cell back into multiple cells. | Combining cells vertically down one or more rows. |
A feature in Table Tools used to customize the look and feel of a table, such as changing the color, font, and borders. | A set of tools in Microsoft Word or Google Docs used to manage tables. |
Lines that appear between cells in a table to create a grid-like structure. | A feature in Table Tools used to manage the structure of a table, such as adding or deleting rows and columns. |
Borders | Shading |
Customizing | Table |
Default settings | Line style |
Line weight | Fill color |
The background color or pattern applied to a cell or table. | Lines that surround a cell or table to create a border. |
A grid-like structure used to organize information into rows and columns. | The process of modifying the appearance of gridlines, borders, and shading in a table beyond their default settings. |
The appearance of a gridline or border, such as solid, dashed, or dotted. | The initial gridlines, borders, and shading applied to a table before any customization is done. |
The color applied to a cell or table background. | The thickness of a gridline or border, expressed in points. |
Pattern | Formatting |
Real-life scenarios | hierarchies |
headings | sub-headings |
content | professional page layouts |
The process of modifying the appearance of text, numbers, or other data to make it more visually appealing and easier to read. | A design applied to a cell or table background, such as stripes or dots. |
A system of levels or rankings used to organize and display content in page layout design. | Practical situations where the skills learned in this lesson can be applied, such as creating a table for a report or organizing data in a spreadsheet. |
Secondary text elements used to break down and organize content under headings in page layout design. | Text elements used to introduce or summarize content in a page layout design. |
Well-designed pages that are aesthetically pleasing, easy to read, and effectively deliver their intended message. | The substance or material presented on a web page, including text, images, videos, and other media. |
typography | best practices |
visual hierarchy | consistency |
white space | alignment |
feedback | Templates |
Generally accepted and recognized approaches, methods, or techniques that have been proven effective in achieving desired outcomes for page layout design. | The art or process of arranging type to make written language legible, readable, and appealing to the eye when displayed in page layout design. |
The use of a unified and predictable design style throughout a web page, including headings and sub-headings, for clarity, readability, and visual appeal in page layout design. | The arrangement or prioritization of elements on a web page to guide the user's attention and highlight their relative importance in page layout design. |
The arrangement of text and other design elements to create a balanced, cohesive, and aesthetically pleasing web page layout design. | The empty space between design elements on a web page used to reduce clutter, improve readability, and create visual balance in page layout design. |
Pre-designed documents or pages that have a structure and formatting (e.g. font, color, and layout) applied to them, which can be used as a guide for creating new documents with a similar look and feel. | Information or responses provided to the user by the web page to help guide their actions and improve their experience when interacting with the content in page layout design. |
Page Layout Tools | Document Design |
Visually Appealing | Proficiency |
Reader Engagement | Formatting |
Hierarchy | Alignment |
The process of organizing content, images, and other elements on a page to create an aesthetically pleasing and reader-friendly document that conveys a clear message. | Tools within software programs used to organize or adjust the layout, style, and appearance of a document, including margins, columns, headers/footers, and text boxes. |
A high level of skill or expertise in using a particular tool or software program, typically demonstrated through efficiency and accuracy. | An appearance that is attractive, engaging, and easy on the eyes, using elements such as color, typography, spacing, and images to create a cohesive look and feel. |
The process of applying consistent styles, such as font, size, color, and spacing, to text and other page elements to create a cohesive and organized look and feel. | The level of interest, attention, and involvement a reader has with a document or piece of content, often influenced by design choices such as layout, color, and imagery. |
The arrangement of page elements to create a sense of visual order and balance, typically achieved through the use of grids and guides that align content with page edges and other elements. | The organization of content on a page according to its relative importance, achieved through the use of techniques such as headings, subheadings, and bullet points. |
Composition | Elements |
Templates vs. Themes | Page orientation |
Breaks | Numbering |
Portrait mode | Landscape mode |
The individual parts that make up a document or page, such as text, images, shapes, colors, and other design elements. | The process of arranging and combining page elements such as text, images, and other visual elements to create a cohesive and effective whole. |
The direction in which the content of a document is displayed, either in portrait or landscape mode. | A template provides a specific structure and formatting for a document, while a theme is a pre-designed set of visual elements, such as color schemes and fonts, that can be applied to a document or presentation. |
A labeling system used to help readers easily navigate through a document or refer to specific sections/pages. | A tool used to insert blank spaces between content in a document, allowing for better organization and readability. |
Page orientation in which the longer side of the paper is at the top, commonly used for documents with images or tables. | Page orientation in which the shorter side of the paper is at the top, commonly used for text-heavy documents. |
Page break | Section break |
Column break | Automatic page numbering |
Manual page numbering | Formatting |
Document presentation | Images |
A type of break used to divide a document into different sections, with different formatting or page numbering for each section. | A type of break used to end a page and start a new one. |
A tool used to automatically label document pages, typically used for longer documents. | A type of break used to separate text into columns on the same page. |
The process of applying styles, fonts, colors, and other design elements to make a document visually appealing and easy to read. | A process of manually adding page numbers to a document, typically used for shorter documents. |
Visual representation of data or information. | The overall layout, formatting, and organization of a document, including the use of page orientation, breaks, and numbering. |
Callouts | Types of Images |
Types of Callouts | Effective Use of Images |
Effective Use of Callouts | Visual Hierarchy |
Pixelation | Compression |
Different formats, resolutions, and file sizes of images, including JPEG, PNG, and GIF. | Text or speech bubbles that highlight and draw attention to a specific area or information. |
Using images that are relevant, high quality, and enhance the message being conveyed. | Different styles and shapes of callouts, such as arrows, boxed text, and speech bubbles. |
The arrangement of visual elements in a document to guide the viewer's eye through the content. | Using callouts that are clear, concise, and appropriately placed to draw attention to important information. |
The process of reducing the file size of an image by removing some of its data. | The distortion of images due to low resolution or enlargement. |
Alt Text | Copyright |
Plagiarism | Combining Text Boxes |
Layering | Document design |
Text boxes | Formatting tools |
The legal protection of artistic, literary, or other creative works from being used or copied without permission. | Descriptive text that is added to an image's HTML code to describe it to visually impaired users and search engine bots. |
Using multiple text boxes together in a design to create a cohesive document layout. | The act of using someone else's work or ideas without giving them proper credit. |
The overall layout and composition of a document, including the use of text, images and other visual elements. | The process of placing one object on top of another, creating a hierarchy of visual elements. |
Tools used to modify the appearance of text, such as font, size, color, and alignment. | Containers used to hold and display text within a document. |
Word processor | Layer order |
Background layer | Foreground layer |
Transparency | Grouping |
Alignment | Charts |
The arrangement of objects on a page, from back to front. | A software application used for creating, editing, and formatting text documents. |
The layer that is positioned at the front of a page, often used for adding text or other important visual elements. | The layer that is positioned at the back of a page, often used for adding color or a background image. |
The process of combining multiple objects into a single entity that can be easily manipulated as one. | The level of opacity an object has, allowing it to blend with other objects on the page. |
A graphical representation of data, in which data is represented by symbols such as bars in a bar chart, lines in a line chart, or slices in a pie chart. | The process of positioning objects in a document relative to other objects or the page margins. |
Tables | Data |
Appropriate Chart | Appropriate Table |
Microsoft Excel | Create Charts |
Create Tables | Interpret Charts |
Information that is in a form that can be analyzed or used, such as facts, figures, or statistics. | An arrangement of data in rows and columns, used for organizing and presenting data which can be easily analyzed. |
Selecting the appropriate type of table can help to analyze the data easily. | Choosing the correct chart type can help in understanding the data better. |
To make a chart, select the data you want to include, and then click the desired chart type from the charts group on the insert tab. | A program developed by Microsoft, used to create spreadsheets, charts, and graphs which helps in analyzing data to make informed decisions. |
Analyze data presented in a chart using the appropriate techniques, to identify trends and patterns. | To create an Excel table, click any cell within the data range, then go to the Insert tab and choose the Table command. |
Interpret Tables | Report |
Purpose | Data |
Analysis | Design |
Appealing | Information |
A document that presents information in an organized manner for a specific audience. | Analyze data presented in a table using the appropriate techniques, to identify trends and patterns. |
Facts, figures, and other information that is gathered and analyzed for the report. | The reason for creating the report and the intended outcome. |
The arrangement of visual elements on a page to create an aesthetically pleasing and effective report. | The process of examining and interpreting data to identify patterns and insights. |
The data, facts, and other details included in the report, and presented in a clear and logical manner. | The quality of being attractive or interesting to the audience, and encouraging them to read the report. |
Audience | Section |
Conclusion | Recommendations |
Leaflet | Advertisement |
Design concepts | Typography |
A distinct part of the report that deals with a specific topic or set of information. | The intended readership or viewership of the report, and the expectations and needs of this group. |
Advice, suggestions, or solutions offered by the report based on the data and analysis. | The final section of the report that summarizes the main findings, insights, and recommendations. |
A promotional message or material used to promote a product, service or event. | A printed or electronic advertising material that is usually informative about a particular event, product, or service. |
The art and technique of arranging type to make written language legible, readable, and appealing when displayed. | The foundational principles of good design, including layout, typography, color, balance, contrast, and hierarchy. |
Color | Microsoft Publisher |
Professional-looking | Targeting |
Specific audience | Informational leaflet |
Promotional leaflet | Call to action |
A desktop publishing software application used to design professional documents, such as flyers, brochures, and newsletters. | An aspect of visual design that can impact mood, emotions, and the overall perception of a piece of information. |
The process of identifying and selecting specific audiences or groups that are most likely to respond positively to a marketing message or campaign. | Design that appears polished and well-executed, typically reflecting the values and messaging of a company or organization. |
A leaflet that is primarily designed to provide information, often promoting a particular product or service. | A defined group of people with similar characteristics or interests who are the intended recipients of a marketing message or campaign. |
A statement or instruction that encourages the reader to take a particular action, such as contacting a business, making a purchase, or visiting a website. | A leaflet that is primarily designed to promote a particular product, service, or event. |
Information Sheets | Purpose |
Audience | Design |
Effective | Organizing Information |
Design Elements | Readability |
The reason for which something is done or created. | Documents that are designed to present information in a structured and organized manner. |
The visual layout and structure of the information sheet. | The group of people who the information sheet is intended for. |
The process of arranging information in a logical and structured manner. | Creating a design that is successful in conveying the intended message to the audience. |
The ease with which the audience can read and understand the information presented on the information sheet. | The visual components that make up the information sheet, such as typography, images, and colors. |
Headings | Subheadings |
Bullet Points | White Space |
Memo | Purpose |
Structure | Components |
Secondary titles or subtitles used to further divide the information into smaller sections within a larger section. | Titles or subtitles used to divide the information into sections. |
The empty space on the information sheet that helps to visually organize and separate different sections. | A concise and effective way to present information. |
The reason why a memo is written, which may be to inform, request, or persuade. | A brief, written communication for internal use in a business or organization. |
The key parts of a memo, such as the heading, date, recipient, message, and closing. | The format and layout of a memo, including headings, paragraphs, and sections. |
Clear | Concise |
Effective | Communication |
Message | Recipient |
Indentation | Spacing |
Using the minimum number of words necessary to convey the message, without unnecessary detail. | Easy to understand, with concise and accurate language that avoids ambiguity. |
The exchange of messages between two or more people, using a common language or code. | Achieving the desired outcome or responding to the purpose, with a clear and convincing message. |
The person or group who will receive and read the memo, either individually or collectively. | The main idea or point that the memo is trying to convey, which may be a request, instruction, or announcement. |
The distance between lines and paragraphs in a memo, which affects readability and visual appeal. | The space left at the beginning of a paragraph to indicate a new idea or topic within the memo. |
Professional Letters | Components of a Letter |
Heading | Inside Address |
Salutation | Body |
Closing | Signature |
The different parts of a letter, including the heading, date, inside address, salutation, body, closing, and signature. | A type of correspondence that is typically used for business or academic purposes and requires a formal tone and structure. |
The part of a letter which contains the name and address of the person or organization the letter is being sent to. | The part of a letter which contains the writer's address, the date, and the recipient's address or name. |
The main content of a letter, which includes the message or information the writer wishes to convey. | The opening greeting of a letter, such as 'Dear' followed by the recipient's name. |
The writer's name written or typed at the end of a letter. | The part of a letter which contains the writer's final words, usually a phrase like 'Sincerely' or 'Thank you'. |
Writing Skills | Formatting |
Editing | Software Tools |
Newsletters | Communication |
Components | Engaging |
The process of arranging text or other elements in a specific way, such as to create headings, bullet points, or tables. | The ability to communicate effectively through writing, including grammar, vocabulary, and organization. |
Various programs or applications that can be used to create, format, and edit documents, such as word processors, email clients, or desktop publishing software. | The process of reviewing and revising text to ensure that it is free of errors and meets the intended purpose and audience. |
The exchange of information and ideas between individuals or groups. | A regularly distributed publication that shares news, information, and updates about a particular topic, industry, or organization with its subscribers. |
Attracting and holding the attention or interest of the readers through interesting and relevant content, visual design, and interactivity. | The different parts that make up a successful newsletter, such as the header, body, footer, images, and call-to-action. |
Design | Technical aspects |
Subscribers | Opt-in |
Open rate | Click-through rate (CTR) |
Conversion rate | A/B testing |
The tools, techniques, and platforms used to send, track, and analyze the performance of newsletters, such as email marketing software, analytics tools, and A/B testing. | The process of creating a visual and structural layout for the newsletter, including the use of typography, color, graphics, and other elements. |
The process by which an individual or organization chooses to subscribe to a newsletter by providing their email address and giving explicit permission to receive communications from the sender. | Individuals or organizations who have signed up to receive the newsletter on a regular basis, usually through an opt-in process. |
The percentage of subscribers who clicked on a link in the newsletter and landed on the sender's website or landing page. | The percentage of newsletters that are opened by the subscribers, usually tracked through email marketing software and influenced by the subject line, sender name, and sender reputation. |
The practice of sending two versions of the newsletter to a small segment of the subscribers and measuring the performance of each version based on specific metrics, such as open rate, CTR, and conversion rate, in order to determine the optimal version to send to the larger audience. | The percentage of subscribers who completed a desired action, such as making a purchase or filling out a form, after clicking on a link in the newsletter. |
Design Principles | Visual Appeal |
ICT Tools | Poster Design |
Typography | Color Scheme |
Image Editing | Visual Hierarchy |
The overall attractiveness of a design, achieved through the use of colors, typography, images, and other visual elements. | The fundamental concepts and guidelines for creating an effective design, such as balance, contrast, proximity, and hierarchy. |
The process of developing a visual message through the use of text, images, and graphics on a flat surface, such as paper or a screen. | Software applications and online platforms that enable the use of digital media for creating and editing visual content, such as Adobe Photoshop, Canva, or Google Slides. |
The set of colors used in a design, which can convey a particular mood or theme and create visual harmony or contrast. | The art and technique of arranging type to make written language legible, readable, and appealing when displayed. |
The arrangement of visual elements in a way that guides the viewer's attention and emphasizes the most important information or focal point of the design. | The process of modifying digital images to enhance their quality, adjust their size and proportions, or add visual effects or other elements. |
Message Communication | Layout |
Alignment | Contrast |
Salutation | Complimentary close |
Date | Subject |
The arrangement of text, images, and other design elements on a page or screen, which affects readability, balance, and overall visual impact. | The act of conveying a particular meaning, idea, or emotion through the use of visual and textual elements in a design. |
The difference in visual properties such as color, brightness, or size between design elements, used to enhance their individual characteristics and create interest or emphasis. | The placement of design elements relative to each other or to a common axis, which creates a sense of order and connection between them. |
A polite phrase used to end an email, such as 'Sincerely' or 'Regards'. | A greeting used at the beginning of an email to address the recipient. |
A brief summary of the topic of an email, which helps the recipient understand the purpose of the email. | The current date or the date an email was sent, which is usually included at the beginning of an email. |
Logo | Standard email conventions |
Effective communication | Professionalism |
Etiquette | Clarity |
Consistency | Attention to detail |
A set of guidelines for formatting and composing professional emails. | A symbol or design used to represent a company or organization, often included in the header or footer of an email. |
The quality or character of conducting oneself in a manner befitting a professional. | The successful transmission of a message from the sender to the recipient in a way that is easily understood and interpreted. |
The quality of being clear, concise, and easily understood. | The customary code of polite behavior in society or a particular group. |
The act of carefully reviewing an email for errors or typos before sending, which can help to prevent misunderstandings or confusion. | The quality of conformity in formatting and language usage throughout an email, which helps to ensure that the message is well-organized and easily understood. |
Mail Merge | Personalization |
Data Source | Main Document |
Field | Merge Field |
Recipient List | Preview Results |
The process of creating customized documents for each recipient by inserting unique information from a data source. | A feature in Microsoft Word that allows users to create personalized letters and emails by merging data from different sources. |
The document in Microsoft Word that contains the basic content and formatting for the personalized letters and emails. | A file or database that contains the recipient's personal information such as name, address, and other relevant details. |
A type of field used in mail merge that is linked to a specific column in the data source containing the recipient's information. | A placeholder in the main document that will be replaced with the corresponding information from the data source. |
A feature in Microsoft Word that allows users to preview the personalized documents before printing or sending them. | A list of all the recipients and their corresponding information used for the mail merge process. |
Filter | Sorting |
Duplicates | Data Mapping |
Processed Data | Import |
Excel | Google Sheets |
The process of arranging data in the recipient list in a specific order such as alphabetical or numeric. | A feature in mail merge that allows users to select specific recipients from the recipient list based on certain criteria. |
The process of linking the fields in the main document to the corresponding columns in the data source. | Multiple occurrences of the same recipient in the recipient list that can be removed or merged using mail merge tools. |
To bring data from an external source into a particular application or software. | Data that has been organized, cleaned, and transformed to improve its quality and usability. |
A cloud-based spreadsheet program developed by Google that allows users to create, edit, and share spreadsheets online. | A spreadsheet program developed by Microsoft that allows users to organize, analyze, and manipulate data. |
Mail Merge | Data Source |
Personalized Document | CSV |
Delimiter | Data Mapping |
Merge Field | Preview |
A location where data is stored and can be accessed by other software programs or applications. | A feature in word processing software that allows users to create personalized documents by merging a main document with a data source. |
Comma-separated values, which is a file format used to store tabular data, commonly exported from spreadsheets and databases. | A document that is customized to include specific information for each recipient, often using mail merge. |
The process of aligning fields in a data source with fields in a mail merge document. | A character used to separate or distinguish data within a larger set of data, such as a comma or semicolon. |
To view a document or data source before finalizing or making changes. | A placeholder in a main document that will be replaced with data from a data source during a mail merge. |
Mail merge | Database |
SQL queries | Connect |
Microsoft Word | Feature |
Combination | Names |
A collection of data that is organized and can be easily accessed, managed and updated. | A feature in Microsoft Word that allows users to combine a Word document with a list of names and addresses stored in a database. |
To establish a communication link between two different software applications. | Statements used to retrieve data from a database using Structured Query Language (SQL). |
A functionality available in a software that enables users to perform a specific task. | A word processing software developed by Microsoft Corporation. |
A representation of a person or place in a database. | A process of merging two or more things together. |
Addresses | Organized |
Accessed | Updated |
Data types | Text |
Numeric | Boolean |
To arrange data in a logical and systematic way. | Information on the location of a person or place in a database. |
To make changes or modifications to existing data in a database. | To be able to retrieve or use data stored in a database. |
A data type used to store alphanumeric data such as names, descriptions, or addresses. | The different kinds of data that can be stored in a database. |
A data type used to store true/false or yes/no values in a database. | A data type used to store numbers in a database. |
Date/Time | Currency |
AutoNumber | Binary |
Long Text | Lookup |
Hyperlink | Attachment |
A data type used to store monetary values in a database. | A data type used to store dates and times in a database. |
A data type used to store images, videos, or other non-text data in a database. | A data type used to assign a unique, incremental number to each record in a database table automatically. |
A data type used to create a dropdown list of values from another table in a database. | A data type used to store large amounts of text such as comments or descriptions in a database. |
A data type used to attach files to a record in a database, such as a resume or cover letter. | A data type used to store web addresses or email addresses in a database. |
Primary key | Foreign key |
Relationship | Table |
Field | Record |
Data | Create |
A field that refers to a unique identifier in another database table, thereby establishing a relationship between the two tables. | A unique identifier in a database table that is designated to be the main way to access and retrieve data. |
An arrangement of data into rows and columns, comprising fields and records. | The association between tables in a database, established through the use of primary and foreign keys. |
A row in a database table that represents a unique instance of data. | A column in a database table that contains a specific piece of information. |
To establish or bring into existence. | Information that is stored in a database table. |
Operations | Access |
Retrieve | Designate |
database | components |
data | organized |
The ability to retrieve, view, or modify data in a database. | The actions that can be performed on data in a database, such as inserting, deleting, and updating records. |
To assign or identify something for a particular purpose or function. | To obtain or access data from a database. |
The different parts that make up a database, such as tables, forms, queries, and reports. | A structured set of data held in a computer and organized in such a way that it can be easily accessed, managed, and updated. |
Arranged in a systematic way, often according to specific rules or guidelines. | Facts and statistics collected together for reference or analysis. |
stored | create |
query | table |
form | report |
field | record |
To build or make something new, such as a database or table. | Saved or held in a particular place, often for future use or reference. |
A collection of related data held in a structured format within a database. | A specific request for information from a database, often used to filter or sort through data. |
A formatted view of database data that can be printed or viewed on screen, often used for analysis or communication purposes. | A type of database object used to enter, edit, or view data in a table or query. |
A complete set of related information within a database, often represented by a row in a table. | A specific piece of data within a database, such as a name or date. |
Database Validation | Database Verification |
Record Count Verification | Field Specification Verification |
Range Check Validation | Format Check Validation |
Consistency Check Validation | Completeness Check Validation |
The process of ensuring that a database is valid, accurate, and consistent by comparing it with a source of truth. | The process of checking if the data in a database is accurate and conforms to certain rules and constraints. |
The technique used for ensuring that the data in a database is of the correct type, length, and format. | The technique used for checking if the number of records in a database is correct. |
The technique used for checking if the data in a database field conforms to a specified format, such as a phone number or email address. | The technique used for checking if the values in a database field fall within a specified range or set of values. |
The technique used for ensuring that all required data is present in a database. | The technique used for ensuring that the data in a database is consistent across tables and fields. |
Redundancy Check Validation | Data Type Check Validation |
Referential Integrity Verification | Practical Scenario |
Database validation | Database verification |
Validation error | Verification error |
The technique used for checking if the data in a database is of the correct data type, such as text, numeric, or date. | The technique used for checking if there are any duplicate or unnecessary records or fields in a database. |
An application of the techniques learned in this lesson in a real-world situation. | The technique used for ensuring that the relationships between tables and fields in a database are valid and consistent. |
The process of checking and confirming that data entered into a database is correct and matches the original source data. | The process of ensuring that data entered into a database meets specified requirements and is accurate. |
An error that occurs when data entered into a database does not match the original source data, such as incorrect data entry or data corruption during transmission. | An error that occurs when data entered into a database does not meet specified requirements, such as incorrect or incomplete data. |
Syntax error | Logical error |
Input error | Output error |
Redundancy error | Normalization error |
Data integrity | Data validation |
An error that occurs when the program logic or database design is flawed, causing incorrect or unexpected results. | An error that occurs when data entered into a database does not adhere to the syntax rules of the database engine or programming language used. |
An error that occurs when the output or result of a database query or operation is incorrect or unexpected. | An error that occurs when incorrect or incomplete data is entered into a database. |
An error that occurs when a database is not properly normalized, leading to data inconsistencies, inefficiencies and potential errors. | An error that occurs when data is duplicated or repeated unnecessarily in a database, leading to inefficiency and potential data inconsistencies. |
The process of verifying that input data is correct, complete and meets specified requirements. | The assurance that data entered into a database is accurate, consistent and meets specified requirements. |
Sorting data | Multiple fields |
Descending order | Database |
Importance | Learn |
Practice | Spreadsheet |
The process of sorting data based on two or more fields. | The process of arranging data in some logical order. |
A collection of data that is organized in a way that allows users to access, manage, and update it easily. | The process of arranging data from highest to lowest or from A to Z. |
The act of gaining knowledge or skill through study, instruction, or experience. | The degree to which something is of significance or value. |
A program used to organize and manipulate data in rows and columns. | The act of repeatedly doing something in order to improve skill or proficiency. |
Arranging | Logical order |
Degree | Significance |
Consistent Formatting | Inputting Data |
Tables | Forms |
The process of arranging data in a way that makes sense or is understandable to people. | The process of putting things in a particular order based on some criteria. |
The quality of being important or having an impact on something. | A measure of the extent or amount of something. |
The act of entering data into a table or form. | The process of ensuring that the way data is presented in tables and forms remains uniform throughout the document. |
A document used to gather information for a specific purpose. | A tool used to organize data into rows and columns. |
Real-World Scenarios | Data Accuracy |
Data Integrity | Data Security |
Data Validation | Input Mask |
Data Type | Field |
The degree to which data is correct and error-free. | Situation outside of a classroom setting where data is being inputted into tables and forms with consistent formatting. |
The protection of data from unauthorized access. | The assurance that data is consistent and reliable. |
A predetermined format for inputting data into a form. | The process of verifying that data conforms to a predefined set of rules or requirements. |
A specific area within a form or table for entering data. | A category assigned to data for the purposes of validation and presentation. |
Search/Query | Single Criterion Search/Query |
Multiple Criteria Search/Query | Key Features |
Boolean Operators | Wildcards |
Filters | Sorting |
A type of search/query that uses only one attribute or parameter to find relevant information. | A process of finding and retrieving specific information from a database or search engine. |
The important and distinguishing aspects or characteristics of search/query functions. | A type of search/query that uses multiple attributes or parameters to find relevant information. |
Characters used in a search query to stand for unknown or variable parts of a search term. | The logical operators (AND, OR, NOT) used to combine search terms for more effective search results. |
The process of arranging search results in a specific order, based on a chosen attribute or parameter. | Parameters used to refine or narrow search results based on specific criteria. |
Practical Scenarios | Comparison |
Contrast | Attribute |
Relational operators | Logical operators |
AND operator | OR operator |
The process of identifying similarities and differences between single criterion and multiple criteria search/query functions. | Real-world situations where search/query functions are applied to find specific information or solve a problem. |
A characteristic or property of a database record or object that can be used to query or filter information. | The process of highlighting the differences between single criterion and multiple criteria search/query functions. |
Symbols used to combine two or more conditions, such as AND or OR | Symbols used to compare two values, such as less than (<) or equal to (=) |
A logical operator that returns true if at least one of the conditions is true | A logical operator that returns true only if both conditions are true |
Comparison operator | Query |
Successful query | Unsuccessful query |
Boolean value | Logical expression |
Conditional expression | Troubleshoot |
A request for information from a database using specific criteria | Symbols used to compare two values for equality or inequality, such as = or != |
A query that does not return the desired information from a database | A query that returns the desired information from a database |
A combination of conditions using logical operators | A value that is either true or false |
To identify and fix problems in a process or system | A combination of conditions using comparison and logical operators |
Creating reports | Customizing reports |
Specified fields | Microsoft Access |
Effective data analysis | Report customization |
Database management system | Generating reports |
The act of modifying reports to suit specific needs and preferences. | The process of generating reports using Microsoft Access. |
A database management system developed by Microsoft Corporation. | Certain fields in a database selected for inclusion in a report. |
The process of tailoring reports to meet specific requirements. | The use of meaningful insights derived from data to improve decision making. |
The act of creating reports using a database management system. | Software that enables users to create, manipulate, and maintain databases. |
Data analysis | Database |
Decision making | Modifying reports |
A structured collection of data stored and retrieved using a computer system. | The process of examining data to draw conclusions or identify patterns. |
Changing the layout, format or content of reports. | The process of making choices by identifying and evaluating options. |