Telecommunications | Satellite |
Broadcast | TV |
Radio | Basics |
Different Satellites | Uses |
An object that orbits the earth and is used for communication purposes. | The transmission of information over a distance for the purpose of communication. |
A telecommunication system for broadcasting and receiving images and sound over a distance. | The distribution of audio or video content to a dispersed audience via any audio or visual mass communications medium. |
The fundamental elements or principles of a subject or skill. | The transmission and reception of electromagnetic waves of radio frequency, especially those carrying sound messages. |
The functions and applications of the satellites. | Various man-made objects placed into orbits around the earth for communication purposes, such as geostationary, low earth orbit and medium earth orbit satellites. |
Broadcast Technologies | Advantages |
Disadvantages | Wired communication |
Ethernet | Coaxial cable |
Fiber optic | Twisted pair |
The benefits and positive aspects of using telecommunications, such as improved communication, efficient use of resources, and convenience. | The various methods and equipment used for transmitting audio and video content, such as analog, digital and satellite broadcasting technologies. |
Technology that uses physical wires to transmit data and signals between devices or networks. | The negative aspects and limitations of using telecommunications, such as security and privacy concerns, infrastructure cost, and dependence on technology. |
A type of electrical cable used for transmitting high-frequency signals over long distances, often used in cable TV systems. | A wired networking technology that is commonly used in local area networks (LANs) to connect devices like computers, switches, and routers. |
A type of copper wire used in telecommunications that has two or more copper wires twisted together, often used in telephone and Ethernet cables. | A type of wired communication technology that uses glass or plastic fibers to transmit data via light signals, offering high bandwidth and long-distance transmission capabilities. |
LAN | WAN |
Shielding | Bandwidth |
Latency | Reliability |
Security | Wireless Communication Technology |
A wide area network that uses wired communication technology, typically covering a larger geographic area and connecting LANs or other networks together. | A local area network that uses wired communication technology, typically covering a relatively small geographic area like an office or building. |
A measure of the amount of data that can be transmitted over a wired communication channel or network in a given amount of time. | A method of protecting wired communication signals from interference or noise, often accomplished through the use of metal shielding or special coatings on cables. |
The ability of wired communication technology to provide consistent and accurate transmission of data and signals over time. | The delay that occurs when transmitting data over a wired communication channel or network, often measured in milliseconds. |
The use of radio waves to transmit information without physical connections between sender and receiver devices. | The protection of wired communication signals and data from unauthorized access, interception, or tampering, often achieved through encryption or other security protocols. |
Radio Waves | Bandwidth |
WLAN | WiFi |
Bluetooth | SSID |
Encryption | Security |
The range of frequencies available for wireless data transmission. | Electromagnetic waves of frequency between 30 hertz and 300 gigahertz that are used for transmitting data wirelessly. |
Wireless Fidelity. | Wireless Local Area Network. |
Service Set Identifier - a unique name that identifies a wireless network. | A wireless technology standard for exchanging data between devices over short distances. |
Measures put in place to protect wireless networks from unauthorized access and data theft. | The process of converting plain text data into a coded message to ensure secure transmission of data over wireless networks. |
Interference | Latency |
Range | Infrared communication |
NFC communication | Infrared port |
NFC tags | Line of sight |
The amount of time it takes for data to travel between the sender and receiver devices over a wireless network. | The presence of noise or other wireless signals that disrupt the transmission of data over a wireless network. |
The wireless transmission of data or information using infrared light waves. | The coverage area of a wireless signal, determined by factors such as the signal strength and obstacles in the environment. |
A hardware component that sends and receives infrared signals between two devices. | A short-range wireless technology that enables communication between devices when they are brought near each other. |
A requirement for Infrared communication that means the transmitter and receiver must be within range and in clear view of each other. | Small chips that can be embedded in everyday objects and can be read by NFC-enabled devices. |
Peer-to-peer mode | Data transfer |
Contactless payments | Interference |
Range | Reliability |
Security | LAN |
The process of transferring data from one device to another by using Infrared or NFC communication. | A mode of NFC communication that allows two devices to exchange data without the need for a wireless network or internet connection. |
A disturbance that affects the quality of Infrared or NFC communication and can result in data loss or corruption. | A type of payment that allows customers to make secure transactions by waving or tapping their NFC-enabled device near a compatible terminal. |
The level of trust and consistency in the quality of Infrared or NFC communication. | The maximum distance over which Infrared or NFC communication can be established between two devices. |
A local area network (LAN) is a group of devices connected together in a specific geographic location that share common resources and communicate with each other. | The level of protection and confidentiality of data transmitted over Infrared or NFC communication channels. |
Ethernet | Node |
Switch | Router |
Wireless | Topology |
Client-server | Peer-to-peer |
A node is any device connected to a LAN, such as a computer, printer, or server. | Ethernet is a type of LAN technology that allows devices to connect to a network and communicate with each other through a set of rules and protocols. |
A router is a device that connects two or more networks together and directs data traffic between them. | A switch is a networking device that connects different nodes in a LAN and allows them to communicate with each other. |
Topology refers to the physical or logical layout of a network, including how devices are connected and how data flows between them. | Wireless refers to the use of radio waves to connect devices together without the need for physical wires or cables. |
Peer-to-peer refers to a type of network architecture where every device on the network can act as both a client and a server, allowing for more decentralized communication. | Client-server refers to a type of network architecture where one or more computers or devices act as servers, providing services or resources to other computers or devices called clients. |
Bandwidth | Protocol |
Firewall | WAN |
Bandwidth | Router |
ISP | VPN |
A protocol is a set of rules and standards that govern the communication between devices on a network. | Bandwidth refers to the amount of data that can be transmitted over a network in a given amount of time, usually measured in bits per second (bps). |
A wide area network (WAN) is a network that spans a large geographical area and connects multiple computers and devices over long distances. | A firewall is a type of security software or hardware that monitors and controls incoming and outgoing network traffic, helping to prevent unauthorized access or attacks. |
A device that connects two or more networks together and determines the best path for data to travel between them. | The amount of data that can be transmitted over a network in a given amount of time. |
A Virtual Private Network (VPN) is a secure connection between two or more devices or networks, typically over the Internet. | An Internet Service Provider (ISP) is a company that provides access to the Internet. |
Latency | Ethernet |
Modem | TCP/IP |
Circuit Switching | Packet Switching |
Cloud Computing | GPS |
A type of wired network connection commonly used in LANs and WANs. | The delay that can occur when data is transmitted over a network, typically measured in milliseconds. |
The Transmission Control Protocol/Internet Protocol (TCP/IP) is a set of protocols used to communicate over the Internet and other types of networks. | A device that converts digital signals into analog signals for transmission over a telephone or cable line, and vice versa. |
A type of communication in which data is divided into packets and sent across a network, with each packet transmitted independently and reassembled at the destination. | A type of communication in which a dedicated physical connection is established between two devices for the duration of the communication, and then released when the communication is complete. |
GPS stands for Global Positioning System. It is a satellite-based navigation system that provides location and time information in all weather conditions. | A model for delivering computing services over the Internet, including software, storage, and processing power. |
3G | 4G |
5G | satellite-based navigation system |
video calling | mobile internet access |
digital television | high-quality streaming |
4G, or fourth generation, is an improvement over 3G technology that allows for even faster data transfer speeds. It enables features such as high-quality streaming, online gaming, and mobile hotspot capabilities. | 3G, or third generation, is a mobile communication technology that allows for faster data transfer speeds than 2G. It enables features such as video calling, mobile internet access, and digital television. |
A satellite-based navigation system uses satellites to provide location and time information to users on the ground. | 5G, or fifth generation, is the latest mobile communication technology that offers even faster data transfer speeds than 4G. It enables features such as virtual reality and augmented reality experiences, autonomous vehicles, and advanced robotics. |
Mobile internet access is a feature of mobile communication technology that allows users to access the internet on their mobile devices, typically using a 3G or 4G connection. | Video calling is a feature of mobile communication technology that allows users to make video calls to other users, typically using a 3G or 4G connection. |
High-quality streaming is a feature of 4G technology that allows users to stream high-quality video and audio content on their mobile devices without buffering. | Digital television is a feature of mobile communication technology that enables users to watch television on their mobile devices, typically using a 3G or 4G connection. |
online gaming | mobile hotspot capabilities |
virtual reality | augmented reality |
autonomous vehicles | advanced robotics |
mobile communication technology | Personal Area Networks (PAN) |
Mobile hotspot capabilities are a feature of 4G technology that allows users to create a Wi-Fi hotspot with their mobile device, which other devices can connect to and access the internet through. | Online gaming is a feature of 4G technology that allows users to play games online with other users, typically without experiencing lag or other issues. |
Augmented reality is an interactive experience that uses technology to overlay digital information on the real world. | Virtual reality is an immersive experience that uses technology to create a simulated environment. |
Advanced robotics is the use of robotic technology to perform complex tasks, such as manufacturing and surgery. | Autonomous vehicles are vehicles that are capable of driving themselves, using sensors and other technology to navigate without human input. |
A computer network organized around an individual person within a single building or up to 10 meters radius. | Mobile communication technology refers to the technology used to facilitate communication between mobile devices, including smartphones, tablets, and other wireless devices. |
Benefits | PAN Technologies |
Bluetooth technology | Devices |
Set up PAN | Computer Network |
Individual Person | Building |
Various PAN technologies include Bluetooth, Zigbee, NFC, and Infrared. | Advantages of using Personal Area Networks include reduced cable clutter, easy data sharing, and reduced power consumption. |
Devices to create PAN include laptops, smartphones, headsets, printers, and video game consoles. | A wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz) from fixed and mobile devices. |
A set of devices connected together to share resources. | To set up PAN using Bluetooth technology, make sure the devices have Bluetooth installed and enabled, turn on discovery, and pair the devices. |
A structure used as a dwelling, workplace, or for storage purposes. | A single human being. |
Cable Clutter | Data Sharing |
Power Consumption | Mbps |
Bandwidth | Latency |
Upload speed | Download speed |
The ability to transfer or exchange data between devices. | A messy, unorganized, and tangled arrangement of cables. |
Mbps stands for megabits per second and is a unit of measurement used to indicate data transfer speeds. It is commonly used to describe the speed of internet connections or data transfer rates for devices such as hard drives and USB flash drives. | The rate at which energy is used over time. |
Latency refers to the delay that occurs between when data is sent from one point on a network to another and when it is received. It is measured in milliseconds, and can affect the speed of data transfer as well as the overall performance of a network connection. | Bandwidth refers to the amount of data that can be transmitted over a network or internet connection in a given amount of time. It is typically measured in Mbps or gigabits per second (Gbps). |
Download speed refers to the speed at which data can be received by a device from a network or internet connection. It is usually measured in Mbps, and can affect how quickly files can be downloaded or streamed online. | Upload speed refers to the speed at which data can be sent from a device to a network or internet connection. It is usually measured in Mbps, and can affect how quickly files can be uploaded or shared online. |
Mbps vs MBps | Wireless vs wired |
Fiber-optic | Ping |
Modem | ISP |
Throughput | Wired Connection |
Wireless refers to a network or internet connection that is transmitted over the air using radio waves, while wired refers to a connection that uses physical cables. Wired connections are generally faster and more reliable than wireless connections, but may be less convenient to set up or use. | Mbps stands for megabits per second, while MBps stands for megabytes per second. Megabits are typically used to describe data transfer speeds, while megabytes are used to measure file size. One byte is equal to eight bits. |
Ping is a measurement of the time it takes for a signal to travel from one point on a network to another and back again. It is often used to measure the latency or speed of a network connection, and is usually measured in milliseconds (ms). | Fiber-optic refers to a type of internet or network connection that uses fiber-optic cables to transmit data. Fiber-optic cables are made of glass or plastic and use light to transmit data, allowing for faster transfer speeds and greater bandwidth than other types of cable. |
ISP stands for internet service provider, and refers to a company that provides internet access to customers. ISPs typically offer a range of different plans and packages with varying speeds and features, and may offer services such as email hosting and web hosting as well. | A modem is a device that connects a computer or other device to the internet or a network via a telephone or cable line. It converts digital data into analog signals that can be transmitted over a telephone or cable line, and vice versa. Modems are often used to connect to the internet via broadband or dial-up connections. |
A type of network connection that uses physical cables to transfer data between devices. | Throughput refers to the amount of data that can be transmitted over a network or internet connection in a given amount of time, after taking into account factors such as latency and packet loss. Throughput is typically measured in Mbps or Gbps, and represents the actual amount of useful data that can be transferred over a connection. |
Wireless Connection | Ethernet |
Wi-Fi | Latency |
Bandwidth | Reliability |
Security | Physical Space |
A type of wired connection that uses cables to connect devices to a network. | A type of network connection that uses radio waves to transfer data between devices. |
The amount of delay or time it takes for data to transfer between devices on a network. | A type of wireless connection that uses radio waves to connect devices to a network. |
The ability of a network connection to consistently perform without errors or interruptions. | The amount of data that can be transferred over a network in a certain amount of time. |
The distance between devices and the availability of physical cables or radio waves for a network connection. | The measures taken to protect a network connection from unauthorized access or attacks. |
Static IP Address | Dynamic IP Address |
Network Performance | Bandwidth |
Latency | Data |
Network | Connection |
A temporary numerical identifier assigned to a device on a network that may change over time, depending on network settings and activity. | A unique numerical identifier assigned to a device on a network that does not change, allowing for easier communication and management. |
The amount of data that can be transmitted over a network connection in a given amount of time. | The ability of a network to transfer data efficiently and effectively, taking into consideration factors such as latency, bandwidth, reliability and security. |
Information that is processed, stored, or transmitted by computer systems. | The time delay experienced in a network communication system, as data packets travel from the source to the destination. |
The physical or logical link between devices in a network, enabling them to communicate with each other. | A group of interconnected computers and other devices that can communicate and exchange information with each other. |
Bandwidth bottleneck | Latency bottleneck |
Data transfer rate | Packet |
Ping | Jitter |
Quality of Service (QoS) | Broadband |
A situation where the latency in a network communication system is too high, resulting in slower network performance. | A situation where the available bandwidth on a network connection is insufficient to handle the amount of data being transmitted, resulting in slower network performance. |
A unit of data transmitted over a network, consisting of a header that contains routing information and a payload that contains the actual data being transmitted. | The speed at which data can be transmitted over a network connection, measured in bits per second (bps) or bytes per second (Bps). |
The variation in latency experienced in a network communication system, as data packets travel from the source to the destination. | A utility used to test the reachability of a network host and measure the round-trip time for packets sent from the source to the destination. |
A high-speed internet connection that allows data to be transmitted quickly and efficiently. | A set of techniques used to manage network resources and ensure that certain types of traffic (such as voice and video) receive priority over other types of traffic. |
Connection | Types |
DSL | Cable |
Fiber Optic | Satellite |
Applications | Online Education |
Broadband connections can be divided into different categories such as DSL, cable, fiber optic, and satellite. | The link between a device and a network through which data is transmitted and received. |
A broadband connection that uses coaxial cables to transmit data. | Digital Subscriber Line is a type of broadband connection that uses telephone lines to transmit data. |
A broadband connection that uses a satellite dish to connect to the internet. | A broadband connection that uses fiber optic cables to transmit data at very high speeds. |
The use of broadband to facilitate learning over the internet through virtual classrooms, online tutorials, and access to educational resources. | Broadband has various applications that include online education, video streaming, online gaming, telemedicine, and telecommuting. |
Video Streaming | Online Gaming |
Telemedicine | Telecommuting |
Volume | Digital audio |
Analog audio | Sample rate |
The use of broadband to play multiplayer games over the internet with other players from around the world. | The use of broadband to stream video content over the internet, such as movies, TV shows, and live events. |
The use of broadband to work remotely from home or another location using video conferencing, online collaboration tools, and remote access to work files and systems. | The use of broadband to deliver healthcare services remotely, such as teleconsultations, telemonitoring, and teleprescriptions. |
A type of volume where sound is represented as a digital signal in ICT | The amount of space an object occupies in ICT |
The number of samples of audio per second in ICT | A type of volume where sound is represented as an analog signal in ICT |
Bit rate | Compression |
Dynamic range | Peak volume |
RMS volume | Volume normalization |
Gain | Attenuation |
Reducing the amount of space required to store digital audio in ICT | The amount of data per second used to represent audio in ICT |
The highest volume level in ICT | The range between the softest and loudest sounds in audio in ICT |
Adjusting volume levels to make them consistent in ICT | The average volume level in ICT |
Decreasing the volume of an audio signal in ICT | Increasing the volume of an audio signal in ICT |
Mobile broadband | Bandwidth |
3G | 4G |
LTE | Wi-Fi hotspot |
Tethering | Productivity |
The amount of data that can be transmitted over a network connection in a given amount of time, usually measured in bits per second (bps). | A high-speed wireless internet connection that can be accessed using a mobile device such as a smartphone or tablet. |
A mobile broadband technology that provides faster data transfer rates than 3G, with peak download speeds reaching 1 Gbps. | A mobile broadband technology that provides a minimum data transfer rate of 200 kbps. |
A wireless access point that allows internet access to devices that are within range of its signal, usually found in public places such as coffee shops and airports. | A 4G mobile broadband technology that stands for Long-Term Evolution, which offers faster data transfer rates, lower latency, and improved network performance. |
The measure of how much work can be accomplished in a given amount of time, often used to describe how efficient someone is at completing tasks. | The process of using a mobile device as a modem to provide internet connectivity to another device, such as a laptop or tablet. |
Connectivity | Data plan |
Roaming | Network coverage |
Cellular Technology | Components |
Evolution | Benefits |
A service offered by mobile carriers that provides access to mobile broadband, often with a fixed amount of data usage allowed per month. | The ability of a device to connect and communicate with other devices or networks, often used to describe how well a device can access the internet or other online services. |
The area within which a mobile carrier's network is available for use, often affected by factors such as geographic location and signal strength. | The ability to access mobile broadband while traveling outside of one's home network, often resulting in higher data charges. |
The parts that make up a cellular network, such as base stations, cell phones, and antennas. | The technology used in mobile communication, operating in a cellular network. |
The advantages of using cellular technology, such as mobility, convenience, and accessibility. | The gradual development and improvement of cellular technology over time, from 1G to 5G. |
Drawbacks | Society |
Economy | Base Station |
Antenna | Frequency |
Bandwidth | Roaming |
The impact of cellular technology on people and their way of life, including changes in communication, work, and leisure. | The disadvantages of using cellular technology, such as cost, signal issues, and security concerns. |
A device that connects wireless devices to a cellular network by sending and receiving radio signals. | The impact of cellular technology on business and the economy, including growth, innovation, and job creation. |
The number of times a radio signal oscillates per second, measured in Hertz (Hz). | A device that sends and receives radio signals to allow communication between wireless devices and the cellular network. |
The ability to use a cellular network outside of one's home network, usually subject to additional charges. | The maximum amount of data that can be transmitted over a network in a given time period, usually measured in bits per second (bps). |
IP address | MAC address |
network | communication |
device | protocol |
Internet Protocol | Ethernet |
A unique identifier attached to most forms of networking equipment. | A numerical label assigned to each device participating in a computer network that uses the Internet Protocol for communication. |
The exchange of information between multiple systems or devices. | A group of two or more devices that are linked together. |
A set of rules that govern how data is transmitted between devices in a network. | A piece of hardware that can be connected to a computer network. |
A family of computer networking technologies used for local area networks. | A protocol used for communicating data across a packet-switched network using the Internet Protocol Suite. |
router | switch |
network interface card | subnet mask |
Ethernet networking | Wireless access point (WAP) |
Router | Gateway |
A networking device that connects devices together within a network by using packet switching to forward and receive data to and from its various ports. | A device that forwards data packets between computer networks. |
A number that defines a range of IP addresses in a network. | A hardware component that connects a computer to a network. |
A device that enables wireless devices to connect to a wired network. | A type of networking technology that uses Ethernet cables to connect devices in a network. |
A node that serves as an entry or exit point for data on a network. | A device that forwards data packets between computer networks. |
Network | Ethernet cables |
Wireless network | Access point |
LAN | Wireless LAN |
Network node | Data packets |
Cables that connect devices used in Ethernet networking. | A group of two or more computer systems linked together. |
A device that enables devices to connect to a wired network. | A computer network that uses wireless data connections between network nodes. |
A LAN that uses wireless communication to connect network nodes. | A local area network. |
Units of data that are transmitted between network nodes. | A device or data point on a larger network. |
Booster unit | Network performance |
Bandwidth | Latency |
Interference | Signal strength |
Wireless network | Ethernet cable |
The effectiveness of a network in terms of speed, reliability, and connectivity. | A device used to enhance or increase network performance by amplifying the signal and reducing interference. |
The delay between the sending and receiving of data over a network. | The amount of data that can be sent or received per second over a network. |
The power or intensity of a network signal, measured in decibels (dB). | Any signal or noise that disrupts the transmission or reception of data over a network. |
A cable used to connect devices to a wired network, usually with an RJ-45 connector. | A network that uses radio waves to transmit data between devices. |
Network topology | Network router |
Network switch | Network adapter |
Server | Networking |
Types of servers | File server |
A device that forwards data packets between computer networks. | The physical layout of devices and connections in a network. |
A hardware component that allows a device to connect to a network, usually through an Ethernet port or wireless interface. | A device that connects devices in a network and manages the flow of data between them. |
The exchange of information and ideas among people with a common profession or special interest, usually in an informal social setting. | A computer program that provides services to other computer programs in the same or other computers |
A computer that shares files and folders with other computers on a network. | File, Print, Proxy, Mail, Web, Application, Database, Gaming, Chat, Video, Audio, FTP servers |
Print server | Proxy server |
Mail server | Web server |
Application server | Database server |
Benefits of using a server | Risks associated with server usage |
A server that acts as an intermediary for requests from clients seeking resources from other servers. | A computer that manages printers on a network. |
A computer program that delivers web pages to clients based on their requests. | A server that manages email communication. |
A computer program that provides database services to other computer programs or computers. | A computer program that provides business logic for application programs. |
Security risks, hardware failure, software failure, power outages, natural disasters | Centralized management, resource sharing, security, easier backup and recovery, increased scalability |
Web Browser | Internet Explorer |
Google Chrome | Mozilla Firefox |
Safari | Opera |
Web page | URL |
A web browser developed by Microsoft that comes pre-installed with Windows operating system. | A software application for accessing information on the World Wide Web. |
A free and open-source web browser developed by Mozilla Foundation that is known for its customizability and privacy features. | A web browser developed by Google that is known for its speed, security and simplicity. |
A web browser developed by Opera software that is known for its fast browsing speed and built-in VPN. | A web browser developed by Apple that is designed specifically for Apple devices like Mac, iPhone and iPad. |
A Uniform Resource Locator is a web address that identifies a web page or resource on the World Wide Web. | A document or file that is written in HTML (Hypertext Markup Language) and accessible through the World Wide Web. |
HTTP | HTTPS |
Tab | Bookmark |
Internet Service Providers (ISPs) | DSL |
Cable | Fiber optics |
Hypertext Transfer Protocol Secure is a protocol for secure communication over the World Wide Web. | Hypertext Transfer Protocol is a protocol for sending and receiving data on the World Wide Web. |
A saved link to a web page that allows quick access to the page in future. | A graphical representation of a web page that is displayed within a web browser window. |
Digital Subscriber Line, a technology that provides high-speed internet access over phone lines. | Companies that provide access to the internet through various technologies such as DSL, cable, and fiber optics. |
A technology that uses thin glass fibers to transmit data as pulses of light, providing high-speed internet access. | A type of high-speed internet access that uses a cable TV infrastructure to deliver internet service to homes and businesses. |
Broadband | Dial-up |
Wireless | Satellite |
ISP | Bandwidth |
Download speed | Upload speed |
A type of internet access that uses a phone line and a modem to connect to the internet at low speeds. | A type of high-speed internet access that provides fast download and upload speeds. |
A type of internet access that uses a satellite dish to connect to the internet, often in rural or remote areas. | A type of internet access that uses radio waves to connect to the internet, often through a cellular network or Wi-Fi hotspot. |
The amount of data that can be transmitted over a network in a given amount of time, usually measured in bits per second (bps). | Internet Service Provider, a company that provides internet access to customers through various technologies. |
The speed at which data can be uploaded from a device to the internet, usually measured in megabits per second (Mbps). | The speed at which data can be downloaded from the internet to a device, usually measured in megabits per second (Mbps). |
Effective search techniques | Web search |
Boolean operators | Filtering |
Advanced search | Metadata |
Citation | Plagiarism |
The act of using search engines or other web-based tools to find information on the internet. | Methods to search for information on the web in the most efficient and accurate way possible. |
The process of using specific criteria to limit and refine search results, often by date, location, or format. | Words used to connect terms in a search query to refine search results, such as AND, OR, and NOT. |
Descriptive information about a resource, including its author, publisher, date, and keywords, that can make it easier to locate and evaluate. | A search technique that allows users to specify multiple search criteria, which can include keywords, file types, dates, and more. |
The act of using someone else's work or ideas without giving proper credit, which can have serious consequences in academic or professional settings. | A reference to a source of information, usually including the author, title, and publication details, that can help verify and evaluate the accuracy of information found on the web. |
Keyword search | Phrase search |
Site search | Image search |
Tabbed browsing | Bookmarks |
Cache | Autofill |
A search method that involves enclosing a set of words in quotation marks to find web pages that include only that exact phrase. | A search method that involves entering one or more specific terms related to the topic of interest to find relevant information. |
A search technique that allows users to find images related to a specific topic, often with options to filter by size, color, and type of image. | A search technique that allows users to search within a specific website or domain to find relevant information. |
A saved link to a specific webpage that allows users to quickly access the page at a later time. | A feature in web browsers that allows users to open multiple web pages in a single window. |
A feature in web browsers that automatically fills in frequently used information, such as a user's name and address, in online forms. | A location in a web browser where recently accessed web pages are stored for quick access in the future. |
Incognito mode | Extensions |
Search engine | Downloads |
Settings | History |
Zooming | Private browsing |
Add-ons or plug-ins that enhance the functionality of a web browser by adding new features or tools. | A mode in web browsers that allows users to browse privately, without their history being saved in the browser's history or cache. |
The process of saving files from the internet onto a user's computer or device. | An online tool that allows users to search for specific information or content on the internet. |
A record of the web pages a user has visited in a browser, stored in the browser's cache or history. | An area in a web browser where users can customize and adjust various features and options. |
A mode in web browsers that allows users to browse privately, without their browsing history and temporary internet files being saved. | The ability to enlarge or reduce the size of a webpage displayed in a browser. |
ISP | bandwidth |
latency | download speed |
upload speed | fiber optics |
cable modem | DSL |
The maximum amount of data that can be transmitted over an internet connection in a given time | Internet Service Provider. It provides internet access services to customers through wired or wireless connections |
The speed at which data is sent from the internet to your computer or device | The delay between the time when information is sent and when it is received. It is measured in milliseconds (ms) |
A method of transmitting data using thin glass fibers. It provides higher bandwidth and faster speeds than traditional copper wires | The speed at which data is sent from your computer or device to the internet |
Digital Subscriber Line. It uses telephone lines to provide internet access. It is slower than cable or fiber optics, but is available in more areas | A device that enables high-speed internet access over a cable TV network. It uses coaxial cables to transmit data |
satellite | wireless |
cost | reliability |
Filtering software | Content filtering |
Firewall | Antivirus software |
A method of providing internet access without wires. It uses radio waves to transmit data between a modem and a wireless device | A method of providing internet access using satellites in space. It is available in remote areas, but has high latency and limited bandwidth |
The consistency of the internet service. It depends on the infrastructure and maintenance of the service provider | The price of the internet service. It may vary depending on the type of service and the location |
The process of screening and blocking content deemed inappropriate or irrelevant based on set parameters. | A type of software that blocks certain content on the internet based on set parameters or rules. |
A type of filtering software that is designed to prevent, detect, and remove malware infections. | A type of filtering software that is designed to block unauthorized access to a computer or network. |
Parental controls | Blacklist |
Whitelist | Phishing |
Malware | Cybersecurity |
Netiquette | Online safety |
A list of websites or types of content that have been deemed inappropriate or harmful and are therefore blocked by filtering software. | A type of filtering software that allows parents or caregivers to restrict access to certain types of content on the internet. |
A type of internet scam that involves tricking users into sharing sensitive information or downloading malware by posing as a trustworthy entity. | A list of websites or types of content that are deemed safe and allowed by filtering software. |
The practice of protecting computer systems and networks from digital attacks, theft, and damage. | Any type of software designed to harm a computer or network, including viruses, trojan horses, and spyware. |
The practices and measures taken to ensure that individuals and their personal information are protected from digital threats and harm when using the internet. | The set of social conventions that govern online behavior, including proper etiquette and safety practices. |
Peer to Peer Networking | Adhoc Networking |
Advantages of Peer to Peer Networking | Disadvantages of Peer to Peer Networking |
Advantages of Adhoc Networking | Disadvantages of Adhoc Networking |
Wireless Adhoc Networking | Infrastructure Mode |
A type of network where devices directly communicate with each other without the need for an access point or centralized network infrastructure. | A type of network topology where all computers are equal and can communicate with each other directly without a central server or hub. |
Security concerns, limited scalability, potential for conflicts and uncontrolled access to resources. | Cost-effective, easier to set up and expand, no single point of failure, better control over resources. |
Limited range and coverage, slower data transfer, reduced security, higher probability of network interference. | Easy to set up, can be used where infrastructure is unavailable, flexible and mobile, simple to expand. |
A type of wireless networking where devices communicate through a central access point or base station, as opposed to directly communicating with each other. | A type of adhoc networking where communication is achieved wirelessly among devices without the need for cables or other physical connections. |
Peer to Peer Overlay Network | Centralized Network |
Distributed Network | Routing |
Server Management | Types of Servers |
File Servers | Web Servers |
A type of network topology where all communication flows through a centralized server or hub, as opposed to directly between devices. | A network in which computers directly communicate with each other and overlay an existing network to provide additional features such as increased security or improved performance. |
The process by which data packets are directed from their source to their destination in a network. | A network where processing power and data storage is spread out among multiple computers as opposed to being concentrated in one central location. |
Servers can be categorized based on their use, including file servers, web servers, database servers, and email servers. | The process of managing and maintaining servers in an organization to ensure optimal performance. |
A type of server that stores web pages and delivers them to clients when requested using the HTTP protocol. | A type of server that stores and manages files, providing access to authorized users on a local area network. |
Database Servers | Email Servers |
Server Maintenance | Server Security |
Server Monitoring | Virtual Servers |
Cloud Servers | Server Backup |
A type of server that manages email messages, allowing users to send and receive emails on a network or the internet. | A type of server that stores and manages data, providing access to authorized users on a network or the internet. |
The process of protecting servers from unauthorized access, data theft, and other security threats using measures like firewalls, encryption, and access controls. | The process of keeping servers in good working condition by performing regular updates, backups, and repairs. |
A type of server that runs on a virtual machine, allowing multiple servers to share the same physical hardware. | The process of tracking and analyzing server performance metrics like CPU usage, network traffic, and disk space to ensure optimal performance and identify potential issues. |
The process of copying and storing server data to an external source in case of data loss or system failure. | A type of server that is hosted and managed by a cloud service provider, offering scalable and cost-effective computing resources on demand. |
Client management | Types of clients |
Client needs | Managing client relationships |
Interpersonal skills | Communication skills |
Customer service | Client satisfaction |
The different categories of clients such as internal, external, government, corporate, and so on, each with specific needs and demands. | The process of building and maintaining relationships with customers to meet their needs and expectations in the ICT industry. |
Strategies, policies, and processes aimed at building trust, satisfaction, and loyalty with clients over time in the ICT industry. | The requirements, preferences, and expectations of clients for specific products or services in the ICT industry. |
The ability to express ideas, thoughts, and feelings in a clear, concise, and persuasive manner using various channels and media in the ICT industry. | The ability to communicate, negotiate, and work effectively with others, including clients, colleagues, and stakeholders in the ICT industry. |
The level of contentment, happiness, and fulfillment experienced by clients from the delivery and use of products or services in the ICT industry. | The support and assistance provided to clients before, during, and after the purchase or use of a product or service in the ICT industry. |
Client loyalty | Relationship management |
CRM software | Service level agreements |
Client-Server Infrastructure | Architecture |
Advantages | Disadvantages |
The process of identifying, analyzing, and developing interactions with clients, partners, and other stakeholders for mutual benefit in the ICT industry. | The tendency of clients to stay with a particular company, brand, or product over time, despite external factors or competitors in the ICT industry. |
A contract between a service provider and a client that specifies the level, type, and quality of services to be provided, as well as penalties and incentives for non-compliance in the ICT industry. | A set of tools and applications designed to help companies manage and analyze customer interactions and data throughout the customer lifecycle in the ICT industry. |
The underlying structure of a system or network. | A network architecture where the client sends requests to a server to retrieve information or perform actions. |
The drawbacks of using a particular infrastructure, such as increased complexity and cost. | The benefits of using a particular infrastructure, such as increased security and centralized management. |
Components | Network Architectures |
Requests | Centralized Management |
Increased Security | Increased Complexity |
Cost | Peer-to-peer |
Different ways of organizing a network, such as peer-to-peer or client-server. | The various parts of a client-server infrastructure, including servers, clients, and the network connecting them. |
A system where all management tasks are performed by a single entity (in this case, the server). | Commands sent by the client to the server to ask for information or perform an action. |
An infrastructure that requires more maintenance and troubleshooting than simpler systems. | An infrastructure that provides additional protection against intrusion and unauthorized access. |
A network architecture where each device can act as both a client and a server. | The expenses associated with implementing and maintaining a client-server infrastructure. |
Shared Peripheral Devices | Centralized Management |
Networking | Print Server |
Scanner Server | Multifunction Devices |
Virtual Devices | Bandwidth |
Managing and controlling shared peripheral devices from a single location or system. | Peripheral devices that can be shared by multiple computers or devices. |
A device that manages and controls printing from multiple computers or devices connected to a network. | Connecting multiple devices to share peripheral resources and data. |
Devices that combine multiple peripheral functions such as printing, scanning, and copying in a single unit. | A device that manages and controls scanning from multiple computers or devices connected to a network. |
The amount of data that can be transmitted over a network in a given time period. | Software-based emulations of peripheral devices that can be shared and accessed from multiple computers or devices. |
Security | Cost Savings |
Maintenance | Compatibility |
Flexible access methods | Asynchronous learning |
Synchronous learning | Blended learning |
Reducing the overall cost of peripheral devices and their maintenance by sharing them among multiple computers or devices. | Measures taken to protect shared peripheral devices and data from unauthorized access and misuse. |
Ensuring that shared peripheral devices are compatible with the operating systems and software used by different computers or devices. | Regular upkeep and repair of shared peripheral devices to ensure their optimal performance and longevity. |
A type of flexible access method where students are not required to be present in the same location and can access the course materials and resources at any time that is convenient for them. | A method of accessing iGCSE ICT course materials and resources that allows students and teachers to access them at any time, from anywhere, using a variety of devices and technologies. |
A flexible access method that combines traditional face-to-face instruction with online learning, allowing students to access course materials and resources either in a physical classroom or through digital platforms. | A type of flexible access method where students and teachers interact in real-time through digital platforms such as video conferencing, live chats or webinars. |
Mobile learning | Personalised learning |
24/7 access | Increased student engagement |
Reduced costs | Potential for distraction |
Lack of face-to-face interaction | Decreased socialisation |
A flexible access method that allows students to learn based on their individual needs, interests, and abilities, by accessing course materials and resources that are tailored to their specific needs. | A flexible access method that allows students to access course materials and resources through their mobile devices, such as smartphones and tablets, anywhere and at any time. |
A benefit of using flexible access methods that is associated with higher levels of student motivation and participation, due to the flexibility and convenience of learning. | A flexible access method that allows students to access course materials and resources at any time, including outside of regular school hours. |
A disadvantage of using flexible access methods, as it may increase the likelihood of students being distracted by other activities or devices while studying. | A benefit of using flexible access methods, as it reduces the need for physical resources and infrastructure such as textbooks, classrooms, and transportation. |
A potential disadvantage of flexible access methods, where students may feel isolated and lack opportunities for socialisation and collaboration with peers. | A potential disadvantage of flexible access methods that reduces the opportunities for face-to-face interaction with teachers and classmates. |
Media Streaming | File Sharing |
Advantages | Disadvantages |
Legal Considerations | Ethical Considerations |
Bandwidth | Peer-to-Peer (P2P) |
The process of sharing or distributing digital files over a network or through the internet. | The process of delivering multimedia content, such as audio or video, over the internet, in real-time or on-demand. |
Risks of media streaming and file sharing may include copyright infringement, legal consequences, and security risks. | Benefits of media streaming and file sharing may include convenience, accessibility, and cost savings. |
The moral principles and values that guide the use of media streaming and file sharing, such as respect for the rights of others, honesty, and integrity. | The laws and regulations that apply to media streaming and file sharing, such as intellectual property rights, privacy laws, and data protection laws. |
A distributed network architecture where participants share resources, such as files, without the need for a centralized server. | The amount of data that can be transmitted over a network or internet connection, usually measured in bits per second (bps). |
Streaming Protocol | Digital Rights Management (DRM) |
Torrent | Cloud Storage |
communication | business |
effective communication | advantages |
A technology used to control access to digital content and protect it from unauthorized copying or distribution. | A protocol used for delivering multimedia content, such as Real-Time Messaging Protocol (RTMP), HTTP Live Streaming (HLS), or Dynamic Adaptive Streaming over HTTP (DASH). |
A service that allows users to store and access their data over the internet, typically provided by third-party providers. | A file-sharing method that uses a peer-to-peer network to distribute large files, typically using BitTorrent protocol. |
An organization or enterprise engaged in commercial, industrial, or professional activities for profit or gains. | The exchange of messages or information through various means such as oral, written, or electronic forms to convey information or ideas. |
The benefits or positive aspects of using certain forms or methods of communication such as speed, convenience, cost, or ease of use. | The ability to convey information or messages successfully and consistently with the intended message received and understood by the recipient. |
disadvantages | digital tools |
collaboration | virtual meetings |
instant messaging | |
social networks | file sharing |
Various software, applications, or platforms designed to facilitate communication and collaboration among users through electronic devices, such as computers, tablets or smartphones. | The drawbacks or negative aspects of using certain forms or methods of communication such as low level of detail, lack of personal touch, or security risk. |
A form of communication that allows individuals to meet remotely through electronic devices such as video conferencing or phone calls to facilitate collaboration and teamwork. | The process of working together with one or more individuals or groups towards a common goal using various means of communication and cooperation. |
A communication technology that allows individuals to exchange real-time messages through electronic devices such as smartphones, computers or tablets. | A digital communication method that allows individuals to exchange messages and files through the internet using electronic mailboxes or clients. |
The process of sharing digital files or documents with others through various means such as email, cloud storage, or collaborative productivity software. | Online platforms or services that allow users to connect and communicate with others through various means such as messaging, posts, shares or comments. |
Shared Internet Access | Advantages |
Disadvantages | Cybersecurity Threats |
Viruses | Malware |
Phishing Attacks | Hacking Attempts |
Benefits of using shared internet access include cost savings, ease of use, and increased collaboration. | The ability to access the internet through a network that is shared by multiple devices or users. |
Potential dangers to shared internet access networks include viruses, malware, phishing attacks, and hacking attempts. | Drawbacks of using shared internet access include decreased security, reduced speed, and limited control over the network. |
Software that is designed to harm computer systems or steal information, often spread through shared internet access networks. | Programs that can infect computer systems and spread through shared internet access networks, causing damage and stealing data. |
Unauthorized attempts to access or manipulate shared internet access networks, often with malicious intent. | Email-based scams that trick users into revealing sensitive information, such as passwords or financial details, often facilitated through shared internet access networks. |
Mitigation Strategies | Firewalls |
Antivirus Software | Strong Passwords |
Centralized Administration | Benefits |
Drawbacks | Types |
Security systems that monitor and control incoming and outgoing network traffic, protecting shared internet access networks from unauthorized access and malware. | Methods for reducing the risk of cybersecurity threats associated with shared internet access networks, such as using firewalls, antivirus software, and strong passwords. |
Complex combinations of letters, numbers, and symbols that are difficult to guess, reducing the risk of unauthorized access to shared internet access networks. | Programs designed to detect and eliminate viruses and other malware, vital for protecting shared internet access networks. |
The advantages of using centralized administration in ICT that include improved security, easier maintenance, and better control. | The process of managing and controlling an ICT system from a single location or governing body. |
Different methods of centralized administration in ICT such as hierarchical, domain-based, and policy-based. | The disadvantages of using centralized administration in ICT that include higher costs, increased complexity, and single point of failure. |
Hierarchy | Domain-based |
Policy-based | Real-world scenario |
Management | Control |
Security | Maintenance |
A type of centralized administration where management and control is based on grouping resources or services into domains. | A type of centralized administration where management and control is based on a hierarchical structure with levels of authority and responsibility. |
A practical situation that requires centralized administration to manage and control an ICT system effectively. | A type of centralized administration where management and control is based on policies that define rules and permissions for resources or services. |
The process of monitoring, measuring, and adjusting performance to ensure that an ICT system meets its goals and objectives. | The process of planning, organizing, controlling, and coordinating resources to achieve specific goals and objectives of an ICT system. |
The process of keeping an ICT system running efficiently by detecting and correcting problems, upgrading software and hardware, and performing regular backups. | The measures taken to protect an ICT system from unauthorized access, use, disclosure, disruption, modification, or destruction. |
Network software | Client software |
Server software | File server |
Print server | Database server |
Mail server | Web server |
Software that enables clients to access network services or resources. | Software designed specifically for use on a network, allowing multiple users to access it simultaneously. |
A server that allows users to share files over a network. | Software that provides services or resources to clients on a network. |
A server that stores and manages databases on behalf of clients. | A server that allows users to share printers over a network. |
A server that stores and serves web pages over a network. | A server that manages and stores e-mail messages on behalf of clients. |
Remote access software | Real-time collaboration software |
Groupware | Software licensing |
Shared Storage Management | Data Access |
Efficient | Benefits |
Software that enables users to collaborate on projects in real-time over a network. | Software that enables users to access a computer or network remotely. |
The legal agreements and permissions that allow software to be used across a network. | Software that supports teamwork by allowing multiple users to work together on a project over a network. |
The ability to retrieve and work with stored data. | The process of efficiently managing storage devices to provide data to multiple users. |
The advantages obtained or experienced as a result of shared storage management. | The ability to be productive with minimal wasted effort or expense. |
Data Management | Skills |
Risks | Mitigate |
Hardware | Software |
Network | Scalability |
The learned ability to perform a task or activity. | The process of organizing, storing, protecting, and maintaining data. |
To reduce or prevent the severity of risks associated with shared storage management. | The potential harm or negative consequences associated with shared storage management. |
Programs and applications used to maintain and manage shared storage devices. | Physical components associated with shared storage management, such as disk drives or storage area networks. |
The ability of shared storage management to expand or contract in response to user needs or changes in technology. | The infrastructure used to connect multiple devices and facilitate data sharing. |
Managing User Access Rights and Levels | User access levels |
Administrator | User accounts |
Authentication | Authorization |
Access control | Role-based access control (RBAC) |
The different permissions given to users to access information or resources within an information system. | The process of controlling and regulating which users can access specific information or resources in an information system. |
Individual profiles created in an information system that specify the user's access rights and security settings. | A user with the highest level of access rights in an information system, who has full control over the system and its resources. |
The process of granting or denying user access to specific information or resources within an information system. | The process of verifying the identity of a user attempting to access an information system. |
A method of controlling user access based on the user's role or job function within an organization. | The process of managing user access rights and levels to ensure that users can only access the information and resources they are authorized to access. |
Least privilege | Password policies |
Access logs | Principle of separation of duties |
Data Backup | Centralized Approach |
Importance | Backup System |
Rules and requirements regarding the creation, storage, and use of passwords to ensure the security of user accounts. | The principle of giving users only the minimum level of access necessary to perform their job functions. |
The principle of dividing administrative tasks and access rights among multiple users to prevent any one user from having too much control or power. | A record of all user activity within an information system, including login attempts, resource access, and other system actions. |
A system where all data backup is managed from a central location. | The process of creating a second copy of data in case the original is lost or damaged. |
A system used to make copies of data for safekeeping. | The value or significance of something. |
Disaster Recovery | Redundancy |
Security | Automation |
Offsite Backup | Versioning |
Cloud Backup | Synchronization |
The use of additional or duplicate systems to provide backup and ensure continued operation in case of failure. | The plan and procedures for recovering data and systems following an event that has caused data loss or system failure. |
The use of technology to reduce or eliminate manual effort in performing a task or process. | The measures taken to protect data from unauthorized access, theft, or damage. |
The process of saving multiple versions of a file to create a history of changes. | A backup stored at a location that is separate from the primary backup location. |
The process of updating information in multiple locations to ensure that all copies are consistent and up-to-date. | The process of backing up data to a remote, cloud-based location. |