Vocabulary Bank organized by module

Similar documents
RPS Technology Standards Grades 9 through 12 Technology Standards and Expectations

Review Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning

THINGS TO REMEMBER INTRODUCTION TO COMPUTERS

A Comprehensive Guide. IC3 - Module 1: Computing Fundamentals

Glossary

GRADE 11 NOVEMBER 2012 COMPUTER APPLICATIONS TECHNOLOGY P2

4.03 IT PowerPoint. Objective 4.03 Understand Information Technology activities and careers.

SECTION 2 (Part B) Types And Components Of Computer Systems. Sophia Pratzioti

Definitions Know What I Mean?

IT JARGON BUSTERS NETWORKING TERMS

Key Stage 1: Computing

Introduction to the Internet. Part 1. What is the Internet?

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

STUDIO 7.0 USER MANUAL

This is a list of vocabulary related to information and communication technology. Coloque el significado en español sobre las líneas.

Class IX FIT Notes for Short Answer Questions

Module 1 Concepts of Information and Communication Technology (ICT)

A1 ASSIGNMENT TERMINOLOGY.

Unit A: Computer and Internet Basics

Using the Internet and the World Wide Web

Contents at a Glance

Computing Key Skills

Frequently Asked Questions- Communication, the Internet, Presentations Question 1: What is the difference between the Internet and the World Wide Web?

Computer Concepts - Illustrated Introductory, Ninth Edition

The process by which a user can associate specific permissions to each username.

UMD: Using mobile IT devices

NEO 4.5. User Manual

Outside the Box: Networks and The Internet

Communication Technology/Technicians & Support Services CIP Task Grid

Chapter 1 Introduction to Computers

Inside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011

Acceptable Use Policy

Utah CTE/Business Education Core Computer Technology I

Resource:

FAQ: Privacy, Security, and Data Protection at Libraries

Information & Communications Technology (ICT) Essentials 2 (2017/2018)

Total Mark out of 35

Acceptable Use Policy

Introduce using desktop icons to open programs and menus. Introduce using a keyboard. Students should be able to locate keys with both hands

VISUAL SUMMARY ACCESS INTERNET AND WEB. The Internet, the Web, and Electronic Commerce

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 5 Host, Application, and Data Security

IMO S User Manual

Available Instructor Resources Resource File Name Found

INTERNET SAFETY IS IMPORTANT

USER'S MANUAL MY9308P/844522/844523

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Computer and Online Basics.

National Digital Literacy Mission Module 1: Power in Your Hands

WELCOME Mobile Applications Testing. Copyright

The Internet and World Wide Web. Chapter4

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

Communication Technology/Technicians & Support Services CIP Task Grid

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

DCSZ Student AUP Policy

Emerging Technologies

Practice Examination 3

Acceptable Use Policy

Computer Systems. Communication (networks, radio links) Meatware (people, users don t forget them)

7. Proofread and edit writing using appropriate resources (e.g., dictionary, spell checker, grammar resources).

Topic Course Activities

G, William James. The smartphone & tablet have changed the course of real estate

Training UNIFIED SECURITY. Signature based packet analysis

elc International School

Instructions On How To Use Nokia Lumia 710 Bluetooth Files >>>CLICK HERE<<<

The ICT4me Curriculum

The ICT4me Curriculum

Chapter 1 Introduction to Computers

MS-CIT Day Wise Breakup Batch : 2 months

Computer Applications I Vocabulary (Frameworks)

Fundamentals of Digital Media Lesson Objectives

Airplane mode Android app application Back key bandwidth

Discovering Computers Chapter 2 The Internet and World Wide Web

Presenter Name. Date

Managing Information and Technology: Finding New Ways to Learn and Link

Portage Township Schools K-12 Technology Skills Scope and Sequence. Technology Categories. IDOE Standard K

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

Brooklyn City School District Technology Learning Targets Checklist

VISUAL SUMMARY PEOPLE INFORMATION SYSTEMS. Information Technology, the Internet, and You. Rev.Confirming Pages

ESKIUMD2 (SQA Unit Code - F9AA 04) Using mobile IT devices

Office 365. Quick Start User Guide

Contents. 1. Hardware Software Networks St Ignatius Girls JL - Form 3

Emerging Technology in Business (CIW) Course Review (1 semester class) Course Number:

Bowie Senior Center Surfing the Web

Bring Your Own Device (BYOD) Information for Parents and Carers

SAMPLE COURSE OUTLINE APPLIED INFORMATION TECHNOLOGY ATAR YEAR 11

Working with Google Tools

POS Perkins Statewide Articulation Agreement Documentation Coversheet

Which one of the following terms describes the physical components of a computer system?

MIS 300 Exam 2 Spring 2011

Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University

Technology, E-Textbooks and BYOD Initiative at The Webb School

Base Module - Computer Essentials

Set up in 6 easy steps

Discovering Computers Chapter 2 The Internet and World Wide Web

Acceptable Use Policy

COMPUTER MERIT BADGE TROOP 301 HUTCHINSON

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation

The Lester Vaughan School Information Technology (Theory) Unit Plans Year 1 Term 1

What computer? Or how do I choose the right computer

Transcription:

Vocabulary Bank organized by module

Module 1: Choosing a Computer Application: also called an "app," it is computer software created for a particular task or tasks; it is increasingly used to mean software that is downloaded for use on cell phones Central Processing Unit (CPU): the central processing unit carries out the functions in a computer Cloud computing: a computer network that allows for software and hardware to be placed on it, thereby removing the need to have them stored on your computer; some examples include word processing documents, e- mail, and music files Downloading: receiving data, such as a music or video file, from a server or another computer system Hard disk drive: a computer device that reads, writes, and stores digital data Hardware: the physical parts of a computer Hosting service: a service, such as web hosting, that is usually operated by a company in order to provide access to the Internet through servers Internet: a vast global computer network, which links smaller computer networks together Memory: any data or information in a computer; it is commonly used to refer to read- access memory (RAM) which is temporary and used to operate software; at times, it can also refer the amount of disk space available on a computer Moore s Law: suggests that the number of transistors that can be placed in an integrated circuit will double every 18 months, making computer speeds increase exponentially; this law is related to other trends in digital technology, like how much memory can go on a hard drive Open source: a way in which software is developed that allows access to the source code of an application or software and is free to update and use Operating system: a group of software programs that provide instructions to a computer so that it may operate Plug- in: something you can add to a software application to enhance its abilities Presentation: a computer program used to display information, normally in the form of a slide show 2

Processor: another term for the CPU of a computer the central processing unit that runs computer programs Programming: the process of designing, writing, testing, debugging, and maintaining the source code of computer programs QR code: Quick Response code; a type of two- dimensional bar code, consisting of black modules in a square pattern on a white background, that can hold a large amount of any kind of data RAM: computer memory that is temporarily used to allow programs to operate, which would be quicker than if they accessed ROM Software: a group of computer programs that give instructions to a computer so that it functions Spam: e- mail that s sent to large group of people who didn't sign up to receive it; spam often requests information or money or may contain viruses Spreadsheet: a computer application that simulates a paper accounting worksheet Tablet: a highly portable computer shaped like slate or pad of paper, featuring a touchscreen Uploading: sending data, such as a music or video file, from a local computer system to another computer system or server Wi- Fi: networking technology that allows computer devices such as personal computers, laptops, and cell phones to communicate over a wireless signal Word processing: a computer application used for the production (including composition, editing, formatting, and possibly printing) of any sort of printable material 3

Module 2: Wireless Communication Application: also called an "app," it is computer software created for a particular task or tasks; it is increasingly used to mean software that is downloaded for use on cell phones Cell tower: a site containing antennas and other electronic communications equipment, usually in a high place, that makes up a cell in a cellular network Coverage area: refers to the area in which a service provider offers its communication service Data package: what the cell phone company charges for use of the internet of your smartphone Dead zone: an area where a cell phone does not receive a signal E- mail: electronic mail sent between computer networks Interference: refers to any disruption or alteration of a signal in cell phones Location- based service: a service provided through cell phone networks and accessed by cell phones which uses location to provide information on various places like restaurants, offices, museums, schools, etc. MMS: an abbreviation for multimedia messaging service, which allows for sending video, audio, pictures, ringtones, and any other media through a cell phone Roaming: the extension of service or coverage in a wireless telecommunications system SMS: also known as short message service; it is a text messaging service for cell phones Service Provider: a company or organization that offers a service, such as web, cable television, or phone access Signal strength: refers to the strength of a connection over a wireless (radio) telecommunication system Smartphone: a cell phone that is designed to perform various computer applications including, but not limited to e- mail, browsing the web, playing video games, playing music, and watching videos 4

Module 3: The Viral World Adware: computer software that displays advertisements Cookie: a packet of data sent by an Internet server to a browser, which is returned by the browser each time it subsequently accesses the same server, used to identify the user or track their access to the server Database: a computer system that stores enormous amounts of data Digital addiction: a type of addiction characterized by a dependence on the use of digital technologies such as cell phones and computers HTTP: a protocol or group of rules and functions that is used to transfer data over the World Wide Web; it is required before a web address in a URL and is indicated by /"http:///" HTTPS: the same as HTTP a protocol or group of rules and functions that is used to transfer data over the World Wide Web and is secure; it is used for websites that handle sensitive information that would require greater security, such as payments and bank account information Hacked: getting hacked means that your computer or computer network has been broken into without your permission Identity theft: a form of fraud where one person assumes the identity of another person Malware: computer software designed to harm a computer SSL: an abbreviation for Secure Sockets Layer; it is a protocol that provides security when communicating on the Internet Server farm: a cluster of computer servers used when there is the need for large server capacity and capability Server: a computer or series of computers that link other computers together and often store important information Sexting: the act of sending inappropriate sexual material, usually text or images, between cell phones Social media: media that use Internet and cell phone applications to interact, collaborate, and create content 5

Social network: a website designed for groups of people who publish their own information and share it with others such as friends, family, co- workers, etc. Spam: e- mail that s sent to large group of people who didn't sign up to receive it; spam often requests information or money or may contain viruses Spyware: a type of malware that unknowingly collects information from a computer URL: the address of a website Viral: an object or pattern that is quickly replicated and shared Virus: a type of malware that replicates itself and spreads to other computers WWW: called "World Wide Web" or simply, "the web," it is a portion of the Internet that can be used through a web browser Web browser: software that allows for navigating the web; it is different from a search engine in that it provides a window in which to search, but does not search itself Module 4: Internet Resources and Credibility Bias: a personal and sometimes unreasoned judgment or prejudice Citation: an act of quoting providing the specific source of the material Credible: offering reason to be believed Domain name: a type of Internet address such as.gov for government,.edu for educational institutions,.com for commercial sites, etc. Digital security certificate: a certificate given to websites that verifies whether a website is secure or not Search engine: a computer program that locates information on the web Wiki: a website that allows users to add and edit interlinking web pages 6

Module 5: Creating Multimedia Products Blog: a website that is regularly updated and operates like a journal with writing, opinions, experiences, photos, videos, and links to other information on it Copyright: exclusive rights given to someone who creates original work; the individual is protected for his or her lifetime and 50 years after his or her death Emoticon: the use of letters and punctuation in a message that indicates the emotion of the text (e.g., :) to mean happy) Fair use: a limitation and exception to the exclusive right granted by copyright law to the author of a creative work Intellectual property: property created from an original thought or idea MP3: a common audio format for playback and storage of music on digital audio players Multimedia: content and media that combines different content forms, such as text, audio, animation, and still images Piracy: the unauthorized reproduction or copying of music, video, or literature without proper compensation or permission Plagiarism: representing the language or thoughts of an author as your own, without indicating where the information is from Template: a standard display design used in blogs to provide a structure for information to be viewed Textspeak: abbreviations and slang commonly used to shorten a text or instant message, like using "?s" for "questions" Web 2.0: refers to applications on the web that allow users to interact through user- generated content, design, and collaboration; includes the functions of social media websites Webcam: a video camera for computers typically used to provide real- time video footage 7

Module 6: Digital Relationships and Respect Cyberbullying: using technology to harm others through deliberate, repeated, and hostile attacks IP address: a string of numbers that indicates the location of a computer or server; commonly referred to as a web address or URL Module 7: The Future of Technology and You E- reader: a device or computer program used for reading electronic books STEM: refers to careers in science, technology, engineering, and mathematics 8