Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
46 Cards in this Set
- Front
- Back
Smart phone
|
a phone offering advanced features, e.g the ability to send emails, surf the internet
|
|
Multifunctional
|
having the ability to do many different things on one device
|
|
SD cards
|
Secure Digital (SD) cards are a type of flash memory card that store data up to 2GB.
|
|
SDHC cards
|
Secure Digital High Capacity. Can store up to 32GB of data
|
|
File Format
|
the particular code a file is stored in.
|
|
Compatible
|
the ability of a device to communicate and share information with another device
|
|
Bluetooth
|
allows wireless exchange of data over short distances
|
|
WiFi
|
Wireless Fidelity.
|
|
GPS
|
Global Positioning System. Satellites which find the exact position on earth of the device.
|
|
User interface
|
the way in which a user interacts with a system. e.g. keyboard screens ect
|
|
RSI
|
Repetitive Strain Injury. Damage or strain to the muscles due to repeatedly carrying out the same action.
|
|
Etiquette
|
a set of rules that people try to abide by out of respect for others.
|
|
Public Domain
|
Materials that are available for anyone to use for any purpose ( free of copyright laws)
|
|
Specification
|
the technical details of a device or system
|
|
Primary storage
|
built-in storage designed to be directly accessed by the CPU
|
|
Network
|
devices connected together to allow communication and exchange of data
|
|
Peripherals
|
external devices connected to a computer, e.g. printer, microphone
|
|
Software
|
programs that give instructions to a computer and which allow the user to carry out different tasks
|
|
Future Proofing
|
anticipating future developments so that the device will not go out of date as quickly
|
|
VoIP
|
Voice over Internet Protocol. Used to make calls over the Internet
|
|
3G
|
3rd Generation wireless communication allows high speed wireless data transfer
|
|
Latency
|
time delay between the moment something is initiated and the moment it becomes detectable
|
|
ISP
|
Internet Service Provider
|
|
Protocol
|
a set of rules used by computers to communicate with each other across a network.
|
|
Virus
|
a programme designed to cause other programs to malfunction or stop working
|
|
Copyright Designs and Patents Act 1988
|
law enforced to protect people's original work or ideas from being used without their permission
|
|
Data Protection Act 1998
|
Prevents against the misuse of personal details
|
|
Cookie
|
a small file which stores information related to your Internet activity
|
|
Biometrics
|
an automated method of recognising a person based on physical characteristics
|
|
USB
|
Universal Serial Bus
|
|
Convergence
|
When one device is developed to carry out functions originally performed by several devices
|
|
HDMI
|
High Definition Multimedia Interface. Required for connecting devices to show HD videos
|
|
Firewall
|
a system designed to prevent unauthorised access to your computer
|
|
Spyware
|
software that can be installed on your computer without your knowledge which collects information about your logins and passwords
|
|
IP address
|
Internet Protocol address. personal address of your computer
|
|
Encryption
|
data is translated into a secret code and can only be un scrambled by the person with the key
|
|
Streaming
|
Data is downloaded as a continuous stream of data as the user is watching
|
|
Ergonomics
|
the science of designing equipment so that it reduces the users fatigue, discomfort and injury
|
|
Teleworking
|
working from home but keeping in touch with others via technology
|
|
Hot Desking
|
sharing desks or workstations between others as a way of saving space and resources
|
|
Open source software
|
software that is available to download free and can be edited by anyone
|
|
Validation
|
the process of checking that the data entered is reasonable
|
|
Verification
|
the process of checking that the data entered is accurate
|
|
SSL
|
Secure Socket Layer. A method of encrypting data
|
|
Third Party Payment Processor
|
a business that offers a safer alternative to pay for online goods
|
|
Phishing
|
a form of Internet fraud that aims to steal Information such as credit card details usernames and passwords
|