Computer Applications Technology Terminology List TERM Margins Orientation Database Database Management Datasheet View Design View Field Filter Foreign Key Form Form View Input Mask Primary key Query Record Referential Integrity Relational Database Relationship DEFINITION The distance between the text and the sides of a whole page or whole document. The horizontal (landscape) and vertical (portrait) orientation of a page. A collection of related tables store data about a subject or a group of subjects. Software that can be used to store data in an organized manner, manipulate data and process data into information. Shows the contents of your table in rows and columns and allows the user to enter and change data. Describes the layout of the records, and can be used to create a new table/query/report/form or change the layout of an existing table/query/report/form A single detail or smallest unit of data that can be stored Basic enquiries, i.e. only one field at a time, all fields are displayed, criteria can only be applied to one field; no order, results cannot be stored. A field in a table that is a primary in another table. An object that enables a user to perform the storage and viewing of data in a user-friendly manner Shows the form with its fields and allows the user to enter and change data. Allows us to format the data e.g. Telephone numbers The field that uniquely defines a record. The object that allows you to retrieve specific information from a vast database based on certain criteria. Advanced queries can be made, i.e. more than one field, certain fields can be displayed, criteria can be applied to a number of fields in a specific order and results are stored. A collection of fields that contain details on a specific subject or entity. Makes sure that you cannot refer to a record that does not exist. A collection of related tables store data about a subject or a group of subjects. Connects the primary key of one table to the foreign key of another table. Links data from several tables CATEGORY Applications Applications Database Database Database Database Database Database Database Database Database Database Database Database Database Database Database Database Advantages of a relationship: Referential Integrity can be enforced (meaning that you may not add a record to the table that contains the foreign key unless there is a corresponding record in the linked table). Queries can be created using fields from the linked tables. 1|Page Last updated: 15 Aug 2013 Report Table/File Validation Rule FAT (File Allocation Table) File compression File extension NTFS (New Technology File System) Read-only property Wildcards Address Bus AGP (Advanced Graphics Port) 2|Page Enables data in one table to be joined to data in another table which generally serves as the basis for queries and reports. Allows the user to view information so it can be presented in a printed format in various different ways. Collection of records which store information about a particular object such as a video. To limit errors by forcing the input of pre-set values only, e.g. allowing negative numbers for an age. A data structure/table used internally by the operating system to keep a record the physical location of each cluster of each file on a disk. This makes computer data smaller so less is needed to represent the same information and, consequently, the information takes up less disk or file space and may be transmitted in less time. WinZip and WinRAR are examples of an application that compresses files. A short series of letters and/or numerals at the end of a personal computer filename, used to indicate the type of file and the software that will be required to operate or open it. JPG: Jpeg Image file - the most common type of graphics file EXE: Executable file – double-clicking on this file will make a program run. BMP: Bitmap Image file DOCX: Microsoft Word Document 2010 PPTX: Microsoft PowerPoint 2010, PPT – older version of PowerPoint. ZIP: Zipped or Compressed file – indicates that this file has been compressed (with a WinZip or WinRAR program) A newer version of FAT, used since Windows NT, which is faster, more robust and offers better security. Setting a file to read-only helps you to protect the file from accidental deletion and changes to the file's content. If a file is set to read-only, you will not be able to save changes to it unless you turn off the file's read-only status. Find the file you want to edit. Right-click the file, and then click Properties. Click the General tab, clear the Read-only check box, and then click OK. Edit and save your file as needed. Wildcards are like the blank pieces in Scrabble, or like the Jokers you can use in some card games to stand in for any card. The wildcards “*” and “?” can be used to display all files with the extension “.doc” by typing “*.doc”, or all files “01062001.doc”, “01072001.doc”,“01122001.doc”... by typing “01??2001.doc”. The address bus transfers the address of the data and address of the program instructions to the CPU Expansion slot for graphics card. It introduced a dedicated point-to- point channel so that the graphics controller can directly access main memory. Database Database Database File Management File Management File Management File Management File Management File Management Hardware Hardware Last updated: 15 Aug 2013 Athlon Blu-ray Buffers Bus Cache Caching (Web) CD (Compact Disk) Celeron Centrino Clusters CMOS (Complementary Metal-Oxide Semiconductor) Control Bus Core i3 (i5 or i7) or Quad Core CPU (Central Processing Unit) CRT (Cathode Ray Tube) 3|Page A CPU manufactured by AMD. There are various versions, including 64 bit and dual core. A storage technology that was developed to enable recording, rewriting and playback of high-definition (HD) video, as well as storing large amounts of data. Temporary storage areas in RAM used to speed up slow input/output devices. An electronic pathway along which signals can be sent from one part of the computer to another. Special high speed memory (SRAM) reserved for temporary storage of data or instructions needed next by the processor. Primary Cache (L1): Internal cache - built onto the CPU External Cache (L2): External cache - located just outside of the CPU A technique that the processor uses to store frequently accessed items from the WWW. CD-ROM: Optical disc - can store large amounts of data. CD-R: A disc that has no pre-formed pits and lands that hold data instead has layers of dye. Can be written to once only. CD-RW: A disc that does not contain a dye but rather phase changing chemicals. It can be erased and re-written to. A line Intel microprocessors introduced in June, 1998. Celeron chips are based on the same P6 architecture as the Pentium II microprocessor, but are designed for low-cost PCs. They run at somewhat lower clock speeds (266 and 300 MHz) and are not as expandable as Pentium II microprocessors. A brand used for a laptop that uses Intel’s Pentium M processor, Intel’s Wi-Fi networking chip and Intel’s motherboard. Any laptop not using all three of these components may not use the word ‘Centrino’ but must be called a laptop with ‘Pentium M’ processor. The smallest addressable unit of disk space that stores data. Hardware A non-volatile memory chip which stores configuration settings such as your boot sequence and your date and time. The chip retains its data when the power is turned off as long as it receives a trickle of electricity from a battery. The control bus carries the signals that tells memory if the CPU wants to read or write memory. A more modern model of the Core 2 Duo manufactured by Intel. Fetches data and instructions from memory and carries out the processing. Consists of: Arithmetic Logic Unit: Performs all mathematical and logical operations Control Unit: Fetches and decodes instructions from memory and carries them out. Invented in 1897, CRT is the most common display technology for televisions. The tube uses an electron beam to scan lines on the screen coated with phosphor, which glows when struck by the beam. Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Last updated: 15 Aug 2013 Cylinders Data bus DDR Dedicated device Digital camera DIMM (Dual Inline Memory Module) Dot pitch DPI (Dots per inch) Dual Core Dual Core / Core 2 Duo DVD (Digital Versatile Disk) All the tracks on top and below one another that can be accessed without moving the read write heads on a hard disk drive. The data bus transfers data and program instructions to the CPU Double Data Rate RAM refers to the type of RAM that can be inserted in the RAM slots on the motherboard. Devices that are designed to perform one specific task only, e.g. traffic lights, washing machines, etc. A camera that stores images digitally rather than recording them on film. Once a picture has been taken, it can be downloaded to a computer system, and then manipulated with a graphics program and printed. Unlike film photographs, which have an almost infinite resolution, digital photos are limited by the amount of memory in the camera, the optical resolution of the digitizing mechanism, and, finally, by the resolution of the final output device. A small circuit board that holds memory (RAM) chips. Hardware The distance between the holes in the shadow mask of a monitor. The smaller dot pitch, the sharper the monitor. Print resolution refers to the quality of the print or dots per inch (dpi). The average is around 4800 x 1200 dpi. Scan resolution is important for those that make a lot of high quality copies and scan pictures. 2 physical CPUs are included on a single chip. This chip alone is therefore equivalent to plugging two separate single core CPUs into a multi-processor motherboard. Technologies which incorporate two processor cores in one physical package. Core 2 Duo is a brand name for a specific architecture by Intel. Hardware Benefits: Is capable of processing more than one instruction at a time. Has faster performance Greater energy efficiency More responsive multitasking A type of optical disk technology similar to the CD-ROM. A DVD holds a minimum of 4.7 GB of data, enough for a fulllength movie. DVDs are commonly used as a medium for digital representation of movies and other multimedia presentations That combines sound with graphics. The DVD specification supports disks with capacities of from 4.7GB to 17GB and access rates of 600KBps to 1.3 Mbps. One of the best features of DVD drives is that they are backwardcompatible with CD-ROMs, meaning they can play old CDROMs, CD-I disks, and video CDs, as well as new DVD-ROMs. Newer DVD players can also read CD-R disks. Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware DVD +/-RW optical disk: hybrid (dual-format) drive capable of reading both DVD+ and DVD- formats. Lightscribe DVD writer: uses a light (laser technology) to burn direct-to-disc labels (as opposed to stick-on labels). 4|Page Last updated: 15 Aug 2013 e-book reader/e-book device/e-reader Embedded Intel Graphics media Entry-level Computer Expansion card External Bus Fan Fat Client FDD FireWire Flash memory GB (Gigabyte) General-purpose device GHz (Gigahertz) GPS (Global Positioning System) Hard disk drive HDMI (High Definition Multimedia Interface) Heatsink 5|Page A mobile electronic device that is designed primarily for the purpose of reading digital e-books and magazines. The graphics controller is built into the motherboard Hardware For users that will be using their desktop for basic applications such as e-mail, Internet surfing and general documentation and are looking for an affordable price. Also called an adapter. Is a card that fits into an expansion slot on the Mother Board and has a cable or device connected to it, e.g. Sound Card, NIC. Allows the CPU to communicate with the plug-in slots To cool the processor. A normal stand alone computer with full CPU, memory, storage and local software. The network is only used for communication / accessing shared resources. A floppy disk is a data storage medium that is composed of a disk of thin, flexible ("floppy") magnetic storage medium encased in a square or rectangular plastic shell. Floppy disks are read and written by a floppy disk drive. A high speed serial data transfer connection between devices such as a video camera and a computer. Can connect up to 63 devices, transfer high quantities of data at high speeds, without loss of quality, carries sound and video over same medium. Used for connecting video cameras. FireWire 400 – transfer rates up to 400 Mbps, FireWire 800 – 800 Mbps. A rewritable memory chip that retains its data without a power supply. Measure of storage. One gigabyte is equal to 1,024 megabytes. Gigabyte is often abbreviated as G or GB. Devices, i.e. computers that can perform more than one function, e.g. tablets, computers, smartphones One GHz represents 1 billion cycles per second. The speed of microprocessors, called the clock speed, often is measured in gigahertz. For example, a microprocessor that runs at 200 GHz executes 200 billion cycles per second. Each computer instruction requires a fixed number of cycles, so the clock speed determines how many instructions per second the microprocessor can execute. To a large degree, this controls how powerful the microprocessor is. A device that allows you to determine your position on the earth based on signals from satellites. The mechanism that reads and writes data on a hard disk. Hard disk drives (HDDs) for PCs generally have seek times of about 12 milliseconds or less. Many disk drives improve their performance through a technique called caching. A compact audio/video interface for transferring uncompressed digital audio/video data from an HDMIcompliant device ("the source") to a compatible digital audio device, computer monitor, video projector, and digital television A piece of hardware usually placed over the CPU, the north bridge chipset and the GPU on a 3D graphics accelerator that is usually made of copper or aluminium and Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Last updated: 15 Aug 2013 Hot swapping / Hot plugging Ink jet Printer Integrated Interlacing Internal Bus Interrupts iPod ISA (Industry Standard Architecture) Laptops vs Desktops incorporates fins or ridges over which air flow. It is meant to cool the circuitry by conducting heat away from it. Hot swapping is when devices can be plugged in and out without switching off or rebooting the PC. The ability to add and remove devices to a computer while the computer is running and have the operating system automatically recognize the change. Hot plugging is also called hot swapping. Produce high-quality text and graphics by spraying ink onto a sheet of paper. A device that is built into the notebook or monitor, e.g. integrated webcam. In order to reduce the flicker a monitor will refresh the odd rows alternately to the even rows. Allows the CPU to communicate with RAM Signals given by a peripheral or device that wants to get the CPU’s attention. An example of a very popular portable digital audio player. ISA is an older technology for connecting computer peripherals. Common current devices include modems and sound cards. ISA is much slower than PCI, so PCI devices are generally better if you have a choice. Advantages of Laptops over Desktops: The laptops, being portable, can be used in different venues throughout the school. Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Laptops are small and convenient to carry around and take up less space; they also don’t need a desk, they can be used on a student’s lap. Teachers will be able to demonstrate or display simulations for lesson content Laptops can get its power supply from a battery for short periods of time without connecting to the main electricity supply. Laptops can be used for Internet connectivity in a WiFi access area or hotspots. Disadvantages of Laptops over Desktops: The easy ability to be stolen due to its small size and portability. They can easily be damaged and can cost a lot to replace or fix. A laptop is not as easy to upgrade as a desktop; it will last only a few years before it is out of date. The laptop battery will need to be charged regularly. An upgrade on a laptop is more expensive than a desktop. Laptops are usually less powerful. Laptops are generally more expensive. Laser Printer 6|Page Uses a laser beam to produce an image onto a drum. Hardware Last updated: 15 Aug 2013 LCD (Liquid Crystal Display) Mainframe computer MB (Megabyte) Memory card Memory card reader MHz (Megahertz)/KHz (Kilohertz) Mid-range Computers Monitor Motherboard Multi-function printer NIC (Network Interface Card) North Bridge 7|Page A monitor that does not need to be refreshed. Found in Laptops and PDAs. A large digital computer serving 100-400 users and occupying a special air-conditioned room. Megabyte is a multiple of the unit byte for digital information storage or transmission and is equal to 106 (1000000) bytes. However, due to historical usage in computer-related fields it is still often used to represent 220 (1024×1024 or 1048576) bytes. Memory for use in mobile devices that makes use of flash memory technology. Most frequently used in cameras / PDA’s, etc. There are many different standards (the cards have different physical sizes and connections) including, amongst others, Compact Flash, Secure Digital, Multi-Media card, Memory stick, etc. A card reader is a hardware device which plugs directly into your computer (normally via a USB port) and it allows one to read the contents of a media (storage) card without, for example, having to plug the digital camera into the PC. Card readers generally will read a number of different media card formats. The speed of the processor, i.e. how many instructions per second the processor can execute. Hardware For users that will be using their desktop for basic applications such as e-mail, Internet surfing and general documentation, but are more frequent users, require multitasking and are looking for a PC with slightly better specs than the entry-level range shown above. Paying this little bit extra will give your PC better performance as well as build in more future capacity. A monitor is a user interface designed to allow the user to see the functions being performed. A visual display unit, often called simply a monitor or display, is a piece of electrical equipment which displays images generated from the video output of devices such as computers, without producing a permanent record. A printed circuit board, which is found inside the unit. The main function is to provide connections for all the main components (RAM, CPU, etc.) so they can communicate with each other. Multi Function Product/ Printer/ Peripheral), multifunction all-in-one (AIO), or Multifunction Device (MFD), is an office machine which incorporates the functionality of multiple devices in one, so as to have a smaller footprint in a home or small business setting (the SOHO market segment), or to provide centralized document management/ distribution/production in a large-office setting. A typical MFP may act as a combination of some or all of the following devices: E-mail, Fax, Photocopier, Printer, Scanner A card that plugs into the Mother Board and the network cables plug into it from the outside. Part of the chipset on the motherboard. Connects the CPU, the RAM, the graphics card and the South Bridge together. Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Last updated: 15 Aug 2013 Numeric keypad Parallel (LPT) PCI (Peripheral Component Interconnect) PCI Express PDA (Personal Digital Assistant) Peripherals Phosphor dots Pixels Plotter Ports Ppm (Pages per minute) Primary Memory (storage) Printers Processor PS2 RAID (Redundant array of inexpensive disks) RAM (Random Access Memory) 8|Page For inputting large quantities of numbers. Used to connect the computer to the printer. Data is sent 8 bits at a time. Type of expansion slot - faster than ISA. Hardware Hardware Fastest type of expansion slot - used in modern computers for graphics cards that have DVI, HDMI. An improvement and refinement of the PCI-bus that is specifically designed to enhance video performance. PCI Express is a new bus design for communication between CPU, memory and peripherals. Typically provides bandwidth and speed improvements for demanding peripherals such as graphics accelerators. It uses serial connections and a switch to provided dedicated point-to-point link between components on a motherboard. A handheld computer, also known as a palmtop computer. Newer PDAs also have both colour screens and audio capabilities, enabling them to be used as mobile phones (smartphones), web browsers, or portable media players. A computer device, such as a CD-ROM drive or printer that is not part of the essential computer, i.e. the memory and processor. Peripheral devices can be external, such as mouse, keyboards, mouse, printer, monitor, external hard drives, speakers, microphones, and scanner – or internal, such as a CD-ROM drive, CD-R drive or Internal modem. Internal peripheral devices are often referred to as integrated peripherals. The “phosphor” dot which cover the back of the screen on a CRT monitor. 1 Phosphor dot = 1 physical pixel. Picture element=Glowing dots that make up image on a screen. More logical pixels give higher resolution. A device which draws pictures onto large sheets of paper using coloured pens. Connections for peripheral devices. The measurement of printing speed. The primary memory is electronic and fast. It holds the instructions that the computer is using whilst it is on. Examples include RAM (Random Access Memory). A device that prints text or illustrations on paper. Central processing unit: the part of a computer (a microprocessor chip) that does most of the data processing; "the CPU and the memory form the central part of a computer to which the peripherals are attached." A small serial port which allows the connection of a key board and/or mouse to the computer. A technology that provides increased storage reliability through redundancy, combining multiple low-cost, lessreliable disk drives components into a logical unit. A form of computer data storage (volatile memory) that holds the programs that we run on the computer and that data that these programs work with. The word random thus refers to the fact that any piece of data can be returned in a constant time, regardless of its physical location and whether or not it is related to the previous piece of data. Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Last updated: 15 Aug 2013 Refresh rate Registers Resolution Retina Display RFID (Radio Frequency Identification) Memory that can operate at high speeds and is used to store the Operating , program instructions and data in use whilst the computer is running includes ROM. How often a monitor’s screen is “refreshed”/redrawn each second, e.g. 50-80 times per second. Storage area within the CPU which holds the current instruction. The number of pixels (horizontally and vertically) grouped on a monitor; e.g.: 640x480 is a low resolution whereas 1152x864 is a high resolution. The number of pixels per square inch on a computergenerated display; the greater the resolution, the better the picture. Retina Display is a marketing term developed by Apple to refer to devices and monitors that have a resolution and pixel density so high – roughly 300 or more pixels per inch – that a person is unable to discern the individual pixels at a normal viewing distance. A standard that uses a tag reader to generate radio signals to communicate with a transponder (or tag) that contains identification data. An RFID chip can hold a variety of data, including: ID, name, surname, location, years (age), nationality, etc. An RFID chip is a small electronic circuit embedded in labels, material etc. for purposes of tracking and stock control. When brought near a sensor the RFID unit broadcasts its unique ID number on low power radio. RFID has serious privacy implications. Robotics The science and study of technology associated with design and invention machines that can be programmed and reprogrammed to perform a series of tasks, involving sensors and actuators. ROM (Read Only Memory) Computer Memory on which data has been pre-recorded. Once data has been written onto a ROM chip, it cannot be removed and can only be read. Unlike main memory (RAM), ROM retains its contents even when the computer is turned off. ROM is referred to as being non-volatile, whereas RAM is volatile. Most personal computers contain a small amount of ROM that stores critical programs such as the program that boots the computer. In addition, ROMs are used extensively in calculators and peripheral devices such as laser printers, whose fonts are often stored in ROMs. SCSI (Small computer system Standard high-speed parallel interface for connecting interface) peripherals to a computer via standard hardware interface. For fast hard drive access. SD Card (Media card) The most common storage medium for storing photographs on a digital camera. Secondary Memory The secondary memory is mechanical and is slower than (Storage) primary memory. It is used to store data permanently. Examples include Hard disk drive, Flash drive, Memory card, Stiffy Disk. 9|Page Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Last updated: 15 Aug 2013 Serial port (Com) Smartphone Solid state drives South Bridge Stand-alone computer Supercomputer System Clock Tablet Thin Client 10 | P a g e Used to connect an external modem or mouse to the computer. Data is sent one bit at a time. Smartphones are a handheld device that integrates mobile phone capabilities with the more common features of a handheld computer or PDA. Smartphones allow users to store information, e-mail, and install programs, along with using a mobile phone in one device. For example a Smartphone could be a mobile phone with some PDA functions integrated into the device, or visa versa. Hardware Hardware A smartphone as a mobile device: Uses an operating Runs different application software A multi-purpose device Has input, processing, output and storage Distinctions between smartphones and normal phones are blurring. Normal phones have many high end features such as music players, cameras, synching of contacts, games, basic application support and even GPS. True smartphones have greater storage, touch screen interface, larger, higher resolution screens and the ability to run more sophisticated and useful applications. The traditional spinning hard drive (HDD) is the basic nonvolatile storage on a computer, i.e. it doesn't "go away" like the data on the system memory when you turn the system off. Hard drives are essentially metal platters with a magnetic coating. A read/write head on an arm accesses the data while the platters are spinning in a hard drive closure. An SSD does much the same job functionally (saving your data while the system is off, booting your system, etc.) as an HDD, but instead of a magnetic coating on top of platters, the data is stored on interconnected flash memory chips that retain the data even when there's no power present. Compared with electromechanical disks, SSDs are typically less susceptible to physical shock, run more quietly, have lower access time, and less latency. However, while the price of SSDs has continued to decline in 2012, SSDs are still about 7 to 8 times more expensive per unit of storage than HDDs. Part of the chipset on the motherboard. Connects the external buses, USB, etc. to the North Bridge. A stand-alone computer means “not networked” or “not connected to any other computer”. The most suitable computer type for processing massive amounts of information, such as weather forecasting. Determines the frequency of the processing functions of the system unit. A computer on a network with reduced CPU, memory and storage. Relies on a powerful server on the network to perform most of these functions. Some thin client solutions have no storage at all. Thin clients are supposed to be cheaper and easier to maintain. Hardware Hardware Hardware Hardware Hardware Hardware Hardware Last updated: 15 Aug 2013 Top-range Computer For users that will be using their desktop for more demanding applications such as CAD, games, photo and video editing, graphic rendering, etc. as well as basic applications such as e-mail, Internet surfing and general documentation, and who are looking for a PC with more power. Paying extra for a higher performance PC will ensure that your PC can cope with more demanding applications while building future capacity. Upgrade Replace old and obsolete hardware and software with newer equivalents. UPS (Uninterruptible Power A device that can help to prevent loss of data on your Supply) desktop PC where there is a power failure. A surge protector must be used to stop electrical spikes from overloading the system USB (Universal Serial Bus) Serial port that can connect up to 127 devices. USB 1 – transfer rates up to 12 Mbps, USB 2.0 – 480 Mbps USB supports Plug-and-Play installation and hot plugging. VDU Visual Display Unit=Monitor VGA (Video Graphics Array) Display hardware first introduced with the IBM PS/2 line of computers in 1987, but through its widespread adoption has also come to mean either an analogue computer display standard. While this resolution was superseded in the personal computer market in the 1990s, it is becoming a popular resolution on mobile devices. Warranty: Carry-in Customer has to take the computer himself/herself to designated supplier for them to fix/replace. Warranty: Collect, repair For one year the shop where the notebook was purchased and return from will collect the notebook from the buyer’s premises, repair it and then return it to the premises. Warranty: Global Collect and Company collect from anywhere in the world, fixes/replaces Return and returns to customer. Warranty: On-site Company will go out to your site / house free of charge anywhere in South Africa. The unit will then be repaired at no extra cost to the client unless determined by the technician that the problem was caused by malicious damage. Webcam A webcam is a digital camera installed in a location that feeds live images to a web server. Zip disk A portable disk drive that uses a disk with large capacity Cashless society When all transactions are done via networks, e.g. The Internet, Debit Orders, Salaries paid directly in employee’s bank accounts and the use of credit cards and debit cards, to alleviate ALL cash transactions. CTS (Carpal Tunnel A type of RSI where the tendons in the wrist place pressure Syndrome) on the nerves in the hand causing pain and tingling sensations. Digital convergence The technological trend whereby a variety of different digital devices such as televisions, mobile telephones, and now refrigerators are merging into a multi-use communications appliance employing common software to communicate through the Internet. Digital Divide The gap that exists between those people that have access to the use and benefits of ICT and those people that do not. To narrow the gap of the Digital Divide: 11 | P a g e Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Hardware Impact Impact Impact Impact Last updated: 15 Aug 2013 Digital Footprint Ergonomics E-Waste GIGO (Garbage-In-GarbageOut) Green computing RSI (Repetitive Strain Injury) Smart Card Offer lessons on computer literacy to people in need. Offer obsolete computers to people who need them. Make the computer facilities more accessible. Provide Internet access free of charge. A digital footprint is a trail left by an entity's interactions in a digital environment; including their usage of TV, mobile phone, Internet and World Wide Web, mobile web and other devices and sensors. A digital footprint is the size of an individual's online presence; as it relates to the number of individuals with whom they interact mainly on social networking sites. The science of designing equipment and furniture in the workplace so that it does not place undue strain on the human body. Specific computer areas of interest include keyboards (curved so that the user’s arms and wrists are at a more comfortable angle when they type), chairs, mouse, etc. Waste materials generated from using or discarding electronic devices, such as computers, televisions, and mobile phones. E-waste tends to be highly toxic to humans, plants, and animals, and has been known to contaminate water, air and dirt. Disposing of e-waste: Redeployment within the company Sale to members of the company / sale to outside bodies Recycle parts Donations to a charitable or community organisation, school, etc. Disposal in a secure and environmentally friendly manner GIGO in the field of computer science or information and communications technology refers to the fact that computers will unquestioningly process the most nonsensical of input data, "garbage in", and produce nonsensical output, "garbage out". The environmentally responsible use of computers and related resources. Such practices include the implementation of energy-efficient central processing units (CPUs), servers and peripherals (refilling ink and toner cartridges) as well as reduced resource consumption (Energy Star compliant) and proper disposal of electronic waste (e-waste). An occupational illness caused by repetitive movements (usually of the hands and arms) - causes damage to nerves in hands, arms, shoulders and neck. A smart card is a plastic card about the size of a credit card, with microchip inside that can be loaded with data, used for telephone calls and used for cash payments Impact Impact Impact Impact Impact Impact Impact A smart card, chip card, or integrated circuit card (ICC), is in any pocket-sized card with embedded integrated circuits which can process data. 12 | P a g e Last updated: 15 Aug 2013 Telecommuting Virtual Reality Blog RSS (Really Simple Syndication) Search engine Wiki Certification stamp Cloud Computing Cookie 13 | P a g e Employment at home while communicating with the workplace by phone or fax or modem. Virtual reality (VR) is a computer-simulated environment that can simulate physical presence in places in the real world or imagined worlds. A blog is short for weblog, an on-line journal or diary of one’s thoughts, normally published in reverse chronological order. Blogs have evolved. They have become commercially oriented businesses and brought into corporate environments. They are no longer personal online diaries but more like private online newspapers / journals that compete for readerships and advertising as a way to make money. A technology that allows web users to be notified every time content is updated on websites that they have subscribed to. Benefits: RSS Feeds allows the user to get the latest news from all the websites they are interested in without having to visit each web site individually. RSS Feeds ensure user’s privacy as they would not need to join a newsletter. RSS Feeds allow users to get the latest headlines in one place, as soon as they are published, without visiting the websites to which they have subscribed. A search engine is a software program or website used to find webpages that match the search criteria entered. Ways of refining a search: Use quotation marks Use + or – in front of keywords Use an advanced search, e.g. domain, date, file types Search within a search Use alternative words or synonyms Use another search engine Webpages from South Africa Select languages from Home page of search engine Use Boolean operators (AND/OR/NOT + - ) Use the correct spelling A website designed for multiple people to collaborate by adding and editing content. A company that provides verification of the quality and reliability of an e traders. A technology consisting of a network of remote servers hosted on the Internet to store, manage and process data Upload to a website that the person will have access to. Examples include DropBox and Skydrive A small text file downloaded to a user’s computer that can be used to track user behaviour (preferences) on a web site. A message given to a Web browser by a Web server. The browser stores the message in a text file. The message is then sent back to the server each time the browser requests a page from the server. Impact Impact Information Information Information Information Internet Internet Internet Last updated: 15 Aug 2013 Domain Name A string of characters that uniquely identifies the website on the Internet (a subsection of the URL) A Domain name identifies one or more IP addresses on the Internet. It is made up of two parts: the part on the left which names the organisation and the part on the right which identifies the country or type of organisation, e.g. www.michaelhouse.org (Domain name is michaelhouse.org) E-Commerce The general term used for business transactions on the Internet. e-mail spoofing Forging an e-mail header to make it appear as if it came from somewhere or someone other than the actual source. The main protocol that is used when sending e-mail -- SMTP -- does not include a way to authenticate. e-trader Any business that trades on the Internet Extranet An Intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the Internet securely. Facebook A social networking site popular with teenagers. The term has become synonymous with social networking just as Google has become synonymous with search. GMail A term that is creeping in as a replacement for e-mail for users who are using Google’s free e-mail service. GMail is special because you have 5 GB (and continually increasing) of storage space that is indexed by Google, making your email easily searchable. It does, however, display adverts related to the mail you are reading – and so raises privacy concerns. Gmail now includes the ability to read and work with mail whilst offline using ‘Google Gears’. Hits Each file that is sent to a web browser by a web server. Hotspot A hotspot is a location that offers Internet access over a wireless network through the use of a router connected to a link to an ISP. Hotspots typically use Wi-Fi technology. Typically found in airports, hotels, coffee shops, etc. Hotspots have a limited range depending on the power of the radio antenna used. Typically uses the 802.11 x wireless standard HTML (Hypertext Mark-up The predominant mark up language for web pages. It is Language) written in the form of HTML elements consisting of "tags" surrounded by angle brackets within the web page content. It is the building blocks of all basic websites. HTTP (Hypertext Transfer A networking protocol for distributed, collaborative, Protocol) hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. Hyperlink Links from a hypertext file to another location or file; typically activated by clicking on a highlighted word or icon at a particular location on the screen. Hyperlink A pointer that typically takes the form of highlighted text, or a button, or a picture that points to related web pages. Intranet A private company network on which websites can only be accessed by employees of the company. ISP (Internet Service A company that provides a fast, permanent connection for Provider) its customers to access the Internet for a fee. 14 | P a g e Internet Internet Internet Internet Internet Internet Internet Internet Internet Internet Internet Internet Internet Internet Internet Last updated: 15 Aug 2013 Macro A single instruction that expands automatically into a set of instructions to perform a particular task. Mbps (Megabits per second) The measure of bandwidth (the total information flow over a given time) on a telecommunications medium. Moodle Learning management system designed to facilitate online learning. Free & OSS. Online banking Online banking (or Internet banking or E-banking) allows customers of a financial institution to conduct financial transactions on a secure website operated by the institution, which can be a retail or virtual bank, credit union or building society. Podcast Audio / Video files that are designed to be downloaded and played on mobile devices such as an iPod. These are regular episodes like radio programs or TV programs that you download, synch to your device and watch / listen to as and when you feel like it. Shopping online Measure that companies provide to users to keep their online shopping safe: Authentication: Users require an email address and password to register and login in to the site. Digital certificate: indicates that all transactions and information are secure, i.e. Norton secured. Privacy statement – indicates that the website has a privacy policy and that are only supplying the necessary information for the transaction. Secure Site: exists which explains the various security measures. HTTPS. Secure Socket Layer SSL: shown by the padlock icon. Money back guarantee/Returns policy: all items carry a 100% money back guarantee and they have a returns policy. Terms and conditions: to protect the company against any legal matters, these are included on the website. About us: supplies all contact details of the company showing that it is a valid company. Skype A company that provides free VOIP software for pure internet telephony – and supplies VOIP – normal telephone connectivity at a fee. Social networking Social networking is a web based technology that allows you to communicate, share data and otherwise connect with friends, family, and colleagues and even strangers online – it also allows you to meet and co connect to people with similar interests, backgrounds, activities or hobbies. SPAM Electronic equivalent of junk mail Terrorism Use of computers to exchange information and plan strategies or attacks. It is very difficult to track/ trace this kind of activity Twitter A microblog – entries are limited to 140 characters. You ‘follow’ someone and their ‘tweets’ (what they post) is forwarded to you as e-mail or, in the USA, SMS. This means you get immediate updates on their thoughts / activities as they post them. 15 | P a g e Internet Internet Internet Internet Internet Internet Internet Internet Internet Internet Internet Last updated: 15 Aug 2013 VoIP (Voice over Internet Protocol) WAP (Wireless Application Protocol) Web 2.0 Wi-Max Privacy Statement 3G (Third Generation) A node ADSL (Asynchronous Digital Subscriber Line) Area Networks Attenuation Bandwidth Bluetooth 16 | P a g e Technology that allows voice conversation to take place via a network such as the Internet. Devices needed: camera, microphone, speakers. Software: Google Talk, Skype A technology that allows you to use the internet to carry telephonic conversations. This bypasses the normal telecommunications channels and so reduces the cost of communication to the cost of your internet connectivity. Companies supplying VOIP to conventional connectivity include SKYPE, Vonage, etc. An internet based protocol for transferring data to small handheld devices. Often called ‘the Social Web’. A movement away from static pages to dynamically generated content, interactive applications and collaborative content – wikis, social networking and ‘cloud computing’. An incremental improvement in wireless networking (Wi-Fi) technology that allows high speed wireless connectivity over ranges of 20 – 30 km. Uses the 802.16 wireless standards. A statement that describes, often in legalese, what a company / person / the owner of a web site will do with the data it collects from you. This data may be collected using cookies / online forms / e-mail, etc. A cellular technology that describes the new wave of wireless communications involving Internet access and data delivery to mobile phones with moving colour images and audio and sophisticated internet services. Any computing device connected in a network, e.g. A PC, a printer, a mainframe. It is a permanent (fixed) digital connection which is split into two channels, one for making normal phone calls and one for connecting to the internet. Costs involved a monthly ISP cost, and a fixed cost for the line rental. No cost for the connection time to the Internet. Faster download speed and slower upload speed. Good coverage, best value for money, sustainable and fast. A form of data communications technology that allows high speed data transfer over conventional copper lines. The technology uses a signal that can only be transmitted over short distances (usually within 5 km of a compatible exchange). Networks arranged in ascending order of size: PAN, LAN, WAN, GAN. When the signal strength is lost over a long distance. The total amount of data that can be carried from one point to another in a given period of time. Bluetooth connects with devices using radio signals A short-range radio technology aimed at simplifying communications among Internet devices and between devices and the Internet. It also aims to simplify data synchronization between Internet devices and other computers. Bluetooth has a range of over 10 metres, not affected by line-of-sight, not always secure due to omnidirectional (every direction) nature. Internet Internet Internet Internet Legal Network Network Network Network Network Network Network Last updated: 15 Aug 2013 Bounded Bridge Broadband Cap/capped Centralised processing Coaxial cable Crosstalk Data Communication Dedicated line Dial-up Distributed processing Eavesdropping EDGE (Enhanced Data rates for GSM Evolution) E-mail (Electronic Mail) 17 | P a g e Media connected by means of wires, e.g.: co-axial, fibre optics or twisted pair. Like a repeater, a bridge also connects network segments and increases the maximum size of the network. It selectively determines the correct segment to which it should pass signal. Broadband is a high speed, high bandwidth connection to the Internet that can transmit multiple signals simultaneously. Benefits of having a Broadband connection: Speed - the connection will be faster as broadband is the fastest connection. Need a fast connection to download pictures and video clips. Mobility – a wireless option such as 3G could be used which provides you with a wider coverage availability. Downloads – you would be able to view pictures and video clips. A bandwidth cap, also known as a band cap, limits the transfer of a specified amount of data over a period of time. Internet service providers commonly apply a cap when a channel intended to be shared by many users becomes overloaded, or may be overloaded, by a few users. A central computer is responsible for all the tasks – originated with a powerful central mainframe and dumb terminals (with no CPU / memory / storage) but can still be found in systems such as the Windows Terminal Services network and thin client computing. Consists of a single copper wire surrounded by three layers. Used for T.V aerial cables. The magnetic fields of wires that are close to one another can interfere with transmission and create crosstalk. The electronic transfer of data from a sender to a receiver via some form of media. Provides a dedicated continuous connection between two points, does not need the use of a modem, reliable and costly, always available, examples include: Diginet, ADSL Temporary connection available on a time-and-distance charge, needs a modem to send and receive data, makes a connection by dialling up a computer, cheap and accessible, slow, unreliable, examples: ISDN This is a processing method designed so that a task is broken up into segments, the segments are sent off to different computers that work on the segments and then send the answer back to the co-ordinating / controlling computer. Because a cable is susceptible to EMI, it becomes possible for someone to access your data without piercing your cable. A standard cellphone technology that allows improved data transmission rates as a backward-compatible extension of GSM. EDGE is considered a pre-3G radio technology. Mail or messages that are transmitted electronically by computers to people anywhere else in the world. Network Network Network Network Network Network Network Network Network Network Network Network Network Network Last updated: 15 Aug 2013 EMI (Electromagnetic interference) Ethernet Fibre optic cable FTP (File Transfer Protocol) GAN (Global Area Network) Gateway GPRS (General Packet Radio Service) GSM (Global System for Mobile Communications) HSDPA (High Speed Downlink Packet Access) HTML (Hyper Text Mark-up Language) HTTP (Hyper Text Transfer Protocol) Hypertext Infrared IP Address (Internet Protocol Address) IRC (Internet Relay Chat) ISDN (Integrated Services Digital Network) LAN (Local Area Network) 18 | P a g e A signal which interferes with normal transmission. Network A type of network technology for local area networks; coaxial cable carries radio frequency signals between computers at a rate of 10 megabits per second. Consists of thin strands of glass surrounded by glass cladding. Fibre uses light beams to transmit data, Fibre cable is used for connecting different LANs. Immune to EMI and eavesdropping and lightning. Enables one to transfer files across the Internet. Spread over the entire world, e.g. The Internet Similar to a Router but a gateway translates the different protocols of different networks instead of just connecting them. Gateways sit between two networks and converts requests from one into formats which the receiver can understand. A packet oriented mobile data service on the 2G and 3G cellular communication system's global system for mobile communications (GSM). GPRS provides moderate-speed data transfer. A standard set developed to describe protocols for second generation (2G) digital cellular networks used by mobile phones. A 3G (third generation) mobile telephony communications protocol which allows networks to have higher data transfer speeds and capacity. Current HSDPA deployments support down-link speeds of up to 42 Mbit/s. The programming language to create web pages. Network The rules by which web pages are linked together and how browsers communicate with web servers. A document with highlighted words or pictures, which when clicked on links to other information. Infrared connects devices in a short range, devices need to be line-of-sight and only one-to-one connections can be made. The address of the physical computer attached to the Internet. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be zero to 255. For example, 1.160.10.240 could be an IP address. Within an isolated network, you can assign IP addresses at random as long as each one is unique. However, connecting a private network to the Internet requires using registered IP addresses (called Internet addresses) to avoid duplicates. A Chat through the Internet which allows people, anywhere in the world, to join in live discussions. A set of communications standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network. Network in relatively small area, owned by one organisation on one property, e.g. computers in an office building are connected together to share files and printers. Network Network Network Network Network Network Network Network Network Network Network Network Network Network Network Last updated: 15 Aug 2013 Mailing Lists MAN (Metropolitan Area Network) Mbits (Megabits) per second Microwave Modem Netiquette Network Newsgroups NIC (Network Interface Card) PAN (Personal Area Network) 19 | P a g e The process of setting up a LAN is simple because you own or rent the building and you can install cables wherever you need. A number of e-mail addresses grouped together, in order that you can address that “list” as a whole. A data network designed for a town or city. In terms of geographic breadth, MANs are larger than local-area networks (LANs), but smaller than wide-area networks (WANs). MANs are usually characterized by very high-speed connections using fibre-optical cable or other digital media. Measures the rate at which data is transferred over a medium. Both Downlink and Uplink are measure in Mbits per second. Downlink is the speed of the connection from the ISP to the user. Uplink is the speed of connection from the user to the ISP. It consists of two directional antennas that face each other to implement the communication of signals. The dishes are separated by long distances and have to be in line of sight facing each other. Modem (from modulator-demodulator) is a device that modulates an analogue carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. The name given to the use of good manners when using the Internet and respect for other users. A collection of computing devices that are connected via some form of medium. Benefits of a network: Peripherals can be shared (instead of everyone having to use flash drives to print, etc.) Data can be shared. Improved communication. Anti-virus and other security measures to protect the data. A collection of electronic messages arranged by interest groups, and distributed and accessible over the Internet. Converts data stored on the comp into a format necessary to be transmitted via a medium. The network of small, personal devices (printer, cellphone, PDA, laptops, smartphones, headset, etc.) connected by Bluetooth technology. Requirements to set up a PAN: Hardware – wireless capabilities (Bluetooth) or physical cables. Software – operating on laptop and smartphone that allows connection via cable or via Bluetooth. Location – the computers must be located close together, i.e. 10m in order to be connected to the network. Network Network Network Network Network Network Network Network Network Network Last updated: 15 Aug 2013 Repeater Router Satellite Search engine Server Shaped STP (Shielded Twisted Pair) Switch TCP/IP (Transmission Control Protocol/Internet Protocol) The Internet Topology Unbounded Uncapped Unshaped URL (Uniform Resource Locator) UTP (Unshielded Twisted Pair) 20 | P a g e Repeaters simply amplify and regenerate signals received from one LAN cable and then transmits the upgraded signal on another LAN cable. A networking device used to link different networks together. A switch links items within a LAN. A router joins various LANs together. Used to establish communication links in remote locations or over long distances. Used by Telkom, Military and other media organisations. A software program that searches documents located on the internet for key word or phrases entered by a person looking for information. A server is a system (software and suitable computer hardware) that responds to requests across a computer network to provide, or help to provide, a network service. Servers can be run on a dedicated computer, which is also often referred to as "the server", but many networked computers are capable of hosting servers. In many cases, a computer can provide several services and have several servers running. Data transfer is controlled by the ISP. Namely, certain operations of your account are given priority over others, e.g. e-mail is completed first before any file downloads OR certain protocols are given preference. Same as UTP except cable is shielded with foil to protect from EMI. In networks, a device that filters and forwards packets between LAN segments. Regenerates and amplifies the signal and performs an intelligent path selection as well as network management. An essential communications protocol which controls the transmission of data across the Internet. Network A worldwide collection of computers or networks that are linked all over the world using telephone lines, microwave and satellite. The physical layout of the computer network. (i.e. How the nodes are physically connected to one another) Star Topology – most commonly used with UTP, fast and easy to set up, easy to add new users, if one node breaks there is still access to the other nodes, uses a central switch and is therefore more secure. Media connected by means of a wireless connection, e.g. Infrared, Bluetooth and Wi-Fi. There is no data transfer limit, you only pay a single rental amount each month. Data transfer is not controlled by the ISP and is operated on a first come first served basis FIFO OR all protocols are treated in the same way and no protocol is given priority. The unique address of every web site. Network A pair of wires twisted about each other forming a twisted pair. Used for most star LANs. Network Network Network Network Network Network Network Network Network Network Network Network Network Network Last updated: 15 Aug 2013 VPN (Virtual Private Network) A private network that uses the Internet to allow computers to connect as though they are connected in a LAN. Any TWO benefits: The VPN ensures privacy in terms of who can access the data by using encryption and usernames and passwords to log in. A VPN can be provided at a much lower cost by using a shared infrastructure. Managers can access the company network when they are on trips, at home, etc. always available. A VPN eliminates the need for expensive long-distance leased lines as they require only a dedicated connection to ISP. This is a much cheaper alternative as it reduces long-distance telephone charges and support costs. Network spread over many provinces or countries, e.g. GAN and an Enterprise WAN. An example: a country-wide network of a bank. Creating a WAN is not as easy and you cannot simply lay a cable across a city – you don’t own the land and there are laws that govern this. To establish a WAN means getting a 3rd party involved, e.g. Telkom, to supply the connection. WAN (Wide Area Network) Network Network Benefits of setting up a WAN: Connect various offices, rangers, organisations and antipoaching units. To ensure that data is always up-to-date. To ensure that data is available to everyone, all the time. Communication via email, telephone, instant messaging, chat rooms, video telephone calls and video conferencing. Access can be restricted to confidential data by allocating users specific rights and making use of passwords. Web Browser Wi-Fi 21 | P a g e Various WAN Connections: Cable – e.g. Telkom connects most of the towns in the country and undersea cables connecting continents. Satellite – e.g. DSTV, Internet. Microwave – e.g. transmit data and voice signals in built-up areas. Cellular phone network – surfing, phoning, texting, watching videos, TV – high bandwidth needed for multimedia applications such as video. Software that allows you to view and explore Web pages on the Internet, e.g. Internet Explorer, Netscape Navigator, Google Chrome. A popular technology that allows an electronic device to exchange data wirelessly (using radio waves) over a computer network, including high-speed Internet connections. A device that can use Wi-Fi (such as a personal computer, video game console, Network Network Last updated: 15 Aug 2013 WLAN (Wireless LAN) smartphone, tablet, or digital audio player) can connect to a network resource such as the Internet via a wireless network access point. Hotspot coverage can comprise an area as small as a single room with walls that block radio waves or as large as many square miles — this is achieved by using multiple overlapping access points. Links two or more devices using some wireless distribution method, and usually providing a connection through an access point to the wider internet. This gives users the mobility to move around within a local coverage area and still be connected to the network. Wireless LANs have become popular in the home due to ease of installation, and in commercial complexes offering wireless access to their customers; often for free. Network Benefits of wireless: More flexible as not limited by cables. High-speed Internet access as well as high quality data, video and music services offered using cellular phone networks. A variety of different package options for users to choose from depending on their particular needs. It is a permanent, ‘always on’ connection on the Internet. Low cost – no cost for connection time, the costs are for the amount of data uploaded and downloaded and are included in the monthly costs. Signals can be sent through doors and walls so the stations can be mobile. Easier to install equipment as no cabling is required. Access anywhere, anytime / wider accessibility or coverage. WWW (World Wide Web) Adware Anti-spyware Anti-virus program 22 | P a g e Disadvantages of wireless: If the user is in an area without 3G coverage, they will encounter slower speeds or lose their connection. Can be expensive when downloading large amount of information as you pay for the amount of data you download. More difficult to configure / needs experienced network technician. Potentially less secure. Signals cannot always be accessed. (World wide web) A collection of multi-media, interactive documents linked together and governed by the HTTP Software that causes unwanted advertising to appear in various programs Programs designed to remove or block spyware, as well as various user practices which reduce the chance of getting spyware on a system. Programs which scan the entire memory of a computer for “signatures” of known viruses, and alert the user if any are found. Anti-virus software must be kept up to date, e.g. Norton Anti-Virus, McAfee, Dr Solomon’s Network Security Security Security Last updated: 15 Aug 2013 AUP (Acceptable Use Policy) Backup Biometrics Copyright Cracker Cyber stalking Data Protection Act Data Theft Digital Signature DOS (Denial of Service) attacks Encryption EULA (End-user Licence Agreement) 23 | P a g e An agreement specifying the terms of use agreed to by the user. Each employee could sign an AUP (Acceptable Use Policy) so that they are aware of the acceptable use of computer equipment and network resources. Some items to include in an AUP: Restrict employees’ time on social networking sites. Employers could monitor or restrict use of the computer for personal use. Playing computer games. Installing software not licensed to the organisation. Installing business software on a personal computer. Vandalism and theft of equipment. The size of file downloads and email attachments. Misuse of Internet facilities for downloading software, private shopping, browsing instead of working or accessing pornography. Employers could add disclaimers to all company email. A utility to make copies of your data on to a medium such as CD or tape in case of future loss of data. It is important to keep backed up data off-site to prevent data getting lost when computers are stolen or damaged in a fire. The security option that authenticates someone’s identity by verifying personal characteristics. Software is developed and all rights belong to the owner/developer. Someone who breaks into a computer with an intention of committing a crime. People who are intruding in other peoples personal details online. This was brought 1984 in the UK. It provides a legal framework and allows for the privacy of personal data. The theft of passwords, code names, etc. to commit a crime or even the theft of actual data for blackmailing purposes. Preventing Data Theft: Never give out your password to anyone or leave your computer logged on with easy access to your data. An electronic, rather than a hand-written signature that can be used by someone to authenticate the identity of the sender of the message. Generally via a virus, overloads the website making it unusable. The process of transforming information (referred to as plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is information (in cryptography, referred to as ciphertext). The reverse process, i.e., to make the encrypted information readable again, is referred to as decryption (i.e., to make it unencrypted). In the proprietary software industry, an end-user license agreement or software license agreement is the contract between the licensor and purchaser, establishing the purchaser's right to use the software. Security Security Security Security Security Security Security Security Security Security Security Security Last updated: 15 Aug 2013 Extortion Fingerprint of virus Firewall Fraud Good password practice Hacker Hoax Identity Theft 24 | P a g e Companies are sometimes threatened with viruses and hacker attacks such as DOS (Denial of Service). The company may pay extortionists to prevent them from embarrassing the company. Also, valuable information can also be stolen electronically and then sold back to the company, at a high price, to prevent the information getting into the wrong hands. The specific pattern of behaviour of the virus program. (What the anti-virus program looks for) Software designed to prevent unauthorised access to or from a private network. A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system. It is also a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all computer traffic between different security domains based upon a set of rules and other criteria. Using modern technology for the creation of false documents, e.g. ID documents Passwords should be changed frequently Your identity number is not a good example of a secure password Keep your password a secret Avoid using conventional words or regular words with numbers tacked on the end Avoid personal information, i.e. your ID number is not a good example of a secure password As a general rule the following character sets should all be included in every password: uppercase letters such as A, B, C; lowercase letters such as a, b,c; numerals such as 1, 2, 3; special characters such as $, ?, &; and alt characters such as µ, £, Æ. (Cliff) Somebody who breaks into computers but have no intention of committing a crime. A cybercrime where chain messages are used in committing fraud. Usually an e-mail message that warns people about a virus that does not exist. Usually is over-the-top, warning people that the virus can do impossible things (like burning out your hard drive or frying your RAM). Often contains capitals, exclamation marks, bad spelling and grammar, says it comes from several well-known companies (few of which are likely to be anti-virus companies) and encourages you to forward the message to all the people you know before the world ends! A form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Preventing Identity Theft: Monitor your credit closely, keep records of your financial data and transactions, install Security Security Security Security Security Security Security Security Last updated: 15 Aug 2013 Keylogging Logic bomb Malware Payload Pharming Phishing Physical Security Measures Piggybacking PIN (Personal Identification Number) 25 | P a g e security software, use an updated Web browser, be wary of e-mail attachments and links in both e-mail and instant messages, store sensitive data securely, shred confidential documents, protect your PIN, stay alert to the latest scams. Software that records all the keystrokes (and possibly mouse movements, clicks and screenshots of where the mouse is when clicked) of your activity on a computer. This data can be analysed to discover otherwise hidden information such as passwords, back account details etc. Keyloggers are often Trojans (programs that pretend to do one thing and actually have hidden features such as the keylogging code). A virus which lies dormant until it is executed a certain number of times, or on a certain date. A category of software that is intended to damage the computer, corrupt data and/or steal data/identities. In computer security, payload refers to the part of a computer virus which performs a malicious action. A dishonest trick when fraudsters lure you to a look like website with the express purpose of defrauding you. A computer crime where criminals attempt to access your confidential information, e.g. bank login and identity details through an e-mail request in order to defraud you. Identify if an e-mail is fraudulent: Requests the user to confirm and update their personal details. The subject line is deceptive indicating the importance of the email and that it deals with security issues. Requests the user to click on a link; this could be a disguised hyperlink which might take you to a spoofed website. The format of the email as well as accuracy (capital letters) is not professional. The email is not signed by a company official. The email is not addressed to a specific person. Any TWO physical security measures: Install a security camera Allow room key access only (accept lock room) Use security cables to ‘lock down’ equipment Security guards Tracking devices Alarm Biometric device Thumb print scanning Access card key Physical fire related walls and doors The practice of establishing a wireless Internet connection by using another subscriber's wireless Internet access service without the subscriber's explicit permission or knowledge. A secret numeric password shared between a user and a system that can be used to authenticate the user to the system. PINs are most often used for automated teller Security Security Security Security Security Security Security Security Security Last updated: 15 Aug 2013 machines (ATMs) but are increasingly used at the point of sale, for debit cards and credit cards. The use of materials and sources without acknowledging the author. A form of online advertising on the World Wide Web intended to attract web traffic or capture email addresses. Pop-ups are generally new web browser windows to display advertisements. A specific software-based key for certain computer programs which is also used to track the number of installations of the product. Extracting small amounts of money from financial transactions, for one’s own gain. False organisations that trick you into doing business with them online, which means you, lose money. The illegal copying or downloading of programs for commercial or personal use. Unsolicited e-mail messages. The act of impersonating as a person or organisation, usually be giving a false e-mail name or URL. Software that gathers information about a person or organization without their knowledge. On the Internet, spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties. Spyware can get in a computer as a software virus or as the result of installing a new program. Plagiarism Pop-ups Product Key Salami technique Scams Software Piracy SPAM Spoofing Spyware Trapdoor Trojan horse Validity of website Virus Web filter 26 | P a g e Preventing Spyware: Use a firewall, update your software, adjust web browser security settings, download and install anti-spyware software, only download programs from reputable websites. Leaving a backdoor in a program for unauthorised access. A program that pretends to be innocent, but carries out harmful activities when activated. Checking validity of a website: Cross reference the site – see which sites link to this site and which sites they link to. Google the site name to see if it is a scam. Look through the entire website – if the form and donations section is all that the site consists of then be suspicious. Check the contact details of the site. (3) Check the site for a digital certificate, e.g. Verisign – secure payment. A program that has been written with malicious intent to do something unwanted or unexpected to one’s Computer, AND it copies itself. Software designed and optimized for controlling what content is permitted to a reader, especially when it is used to restrict material delivered over the Internet via the Web, e-mail, or other means. Content-control software determines what content will be available or perhaps more often what content will be blocked. Security Security Security Security Security Security Security Security Security Security Security Security Security Security Last updated: 15 Aug 2013 Worm Zapping A.I. (Artificial Intelligence) Add/remove programs Application Attachment Batch processing BIOS (Basic Input Output System) Bitmap Graphics C.B.T. (Computer Based Training) CAD (Computer Aided Design) Command-line OS Configuration D.T.P. (Desk Top Publishing) Desktop 27 | P a g e A self-replicating program that copies itself into memory (usually through a network connection) and fills up memory and disk space, often slowing down the computer dramatically or having a detrimental effect on a computer. Bypassing any security with the aid of an illegally acquired software package. Computers created with capabilities of human intelligence, e.g. Voice recognition, Virtual doctor. A utility program that is used to remove all parts of the programs on your computer, including Registry entries and shortcuts. Application software is any tool that functions and is operated by means of a computer, with the purpose of supporting or improving the software user's work. A computer file sent along with an e-mail message. One or more files can be attached to any e-mail message, and be sent along with it to the recipient. This is typically used as a simple method to share documents and images. A paper clip image is the standard image for an attachment in an email client. Precautions to take when opening attachments: The attachment could contain a virus or other malware. The attachment might have exceeded the maximum allowed size. The firewall may have blacklisted the website that is referred to in the attachment. The attachment might contain potentially dangerous files such as exe files, etc. When data is gathered in transaction files, and then processed against the Master file “offline”; usually overnight. Sits on the ROM chip which is invoked to boot up the P.C., and controls communication between the O.S. and some of the basic hardware devices, e.g. keyboard, hard drive. A bitmap is one of many types of file formats for images stored in a computerized form. The image is made up of a collection of bits (pixels) that form the image. Example: .bmp, .jpeg, .gif, .tiff Any training that uses a computer and software as the main point of instruction. Usually with screen instruction and headphones, (Multimedia). Application Software used in Art / Architecture/ engineering, etc. “Older” operating system, such as DOS, which require the user to type text-based instructions; no WIMP. Specific arrangement your hardware components and software settings (and programs) to meet your specific requirements. Page Layout (like Typesetting) for publications such as newspapers, magazines and brochures, e.g. Microsoft Publisher. In graphical user interfaces, a desktop is the metaphor used to portray file systems. Such a desktop consists of pictures, Security Security Software Software Software Software Software Software Software Software Software Software Software Software Software Last updated: 15 Aug 2013 Device Driver Disk Cleanup Disk Defragmenter (Defrag) Disk Optimiser Disk Recovery Embedded Operating System FAQ (Frequently Asked Questions) FAT32 28 | P a g e called icons that show cabinets, files, folders, and various types of documents. You can arrange the icons on the electronic desktop just as you can arrange real objects on a real desktop -- moving them around, putting one on top of another, reshuffling them, and throwing them away. A program that facilitates communication between a computer and a peripheral device, e.g. printer, mouse, scanner, etc. A computer maintenance utility included in Microsoft Windows designed to free up disk space on a computer's hard drive. The utility first searches and analyses the hard drive for files that are no longer of any use, and then removes the unnecessary files. There are a number of different file categories that Disk Cleanup targets when performing the initial disk analysis: Compression of old files Temporary Internet files Temporary Windows file Downloaded program files Recycle Bin Removal of unused applications or optional Windows components Setup log files Off-line files A housekeeping utility included in Microsoft Windows that physically organises the contents of the disk to store the pieces of each file close together and contiguously. Defragmentation refers to the condition of a disk in which files are divided into pieces scattered around the disk. Fragmentation occurs naturally when you use a disk frequently, creating, deleting, and modifying files. At some point, the operating system needs to store parts of a file in non-contiguous clusters. This is entirely invisible to users, but it can slow down the speed at which data is accessed because the disk drive must search through different parts of the disk to put together a single file. A utility program which scans the computer and optimises the performance by making the disk more efficient. It uses a variety of techniques including defragmenting the disk. Software that makes it possible to retrieve lost files that cannot be accessed by standard computer procedures. Data loss can occur due to many reasons like accidental formatting of a hard drive, sudden power spikes, virus attacks, computer hardware malfunction, impairment of the file system components, etc. Software that resides on a ROM chip inside most electronic consumer devices such as smartphones, media players, PDA’s and tablets. A common type of document found on a website that contains a list of questions and answers. A more recent version of the File Allocation Table which uses space more efficiently. Software Software Software Software Software Software Software Software Last updated: 15 Aug 2013 Formatting Freeware GIMP GUI (Graphical User Interface) Hot Swappable Kernel Linux Mobile Operating System (Mobile OS) Multi user /multi access Multiprocessing Multitasking NTFS (NT File System) OCR (Optical Character Recognition) Office Suite 29 | P a g e The process of preparing a disk for reading and writing. Formatting a disk removes all contents and wipes the disk clean. Software that can be downloaded and used without a charge. A free, open source image editor that provides advanced features close to those of Photoshop. A user-friendly environment which implements Windows, icons, menus and Pointers (WIMP). An extension of plug and play. A new device can be attached to a computer whilst the computer is still running, without powering down, setting up the device and rebooting. The core of the Operating System which is loaded into RAM at boot- up, and remains there. A freely-distributable open source operating system that runs on a number of hardware platforms. Linux has become an extremely popular alternative to proprietary operating systems. The operating system that operates a smartphone, tablet, PDA, or other digital mobile devices. Modern mobile operating systems combine the features of a personal computer operating system with touchscreen, cellular, Bluetooth, Wi-Fi, GPS mobile navigation, camera, video camera, speech recognition, voice recorder, music player, Near field communication, personal digital assistant (PDA), and other features. Some examples include: iOS, Windows Mobile, Android (Linux based), Symbian, OS X (iPhone – Unix Based), Palm OS Many users accessing the same computer / files simultaneously, e.g. Autobank, Mainframe environment. When a computer is able to run more than one program at the same time. The ability to open more than one application at a time and switch between them, e.g. In Windows you may have three Word documents open, at the same time as an Excel document, at the same time as an Internet site, etc. One of the file systems for the Windows NT operating system (Windows NT also supports the FAT file system). NTFS has features to improve reliability, such as transaction logs to help recover from disk failures. To control access to files, you can set permissions for directories and/or individual files. NTFS files are not accessible from other operating systems such as DOS. The mechanical or electronic conversion of scanned images of handwritten, typewritten or printed text into machine-encoded text. It is widely used as a form of data entry from some sort of original paper data source, whether documents, sales receipts, mail, or any number of printed records. It is a common method of digitizing printed texts so that they can be electronically searched, stored more compactly and displayed on-line. A package which includes a number of standalone programs provides a similar user interface for all packages, easy to move between applications, easy to transfer data between Software Software Software Software Software Software Software Software Software Software Software Software Software Software Last updated: 15 Aug 2013 OpenOffice Open-source Software Operating System applications, cheaper as bought as one – packages do not have to be purchased separately. Types of applications included: Word processing, spreadsheet, presentations, e-mail, and database. A free, open source alternative to commercial office suites. Includes, word processor, spreadsheet, presentations and a database. Compatible with most commercial packages. Software for which the source code is available to the user. The software is free to use, copy, modify or redistribute to the community. Linux is an example. The most important program that runs on a computer. Every general-purpose computer must have an operating system to run other programs. Operating systems perform basic tasks, such as recognizing input from the keyboard, sending output to the display screen, keeping track of files and directories on the disk, and controlling peripheral devices such as disk drives and printers. Software Software Software Any TWO functions: CPU Management: Manages the way that the CPU is fed with data and instructions and controlling which program gets to use the CPU and for how long Memory Management: Manage the allocation of memory to programs to ensure that each application has sufficient memory available. Storage Management: Controls the management of files on storage devices and the transfer of data and instructions from storage to memory and vice versa. Device Management - Manages and controls input/output to and from peripherals OR controlling peripherals. User Interface – Accepts and interprets commands and instructions from the user OR makes it easier for the user to communicate. Security Management – Ensures that unauthorised users do not access the system. Error Handling – Prevents damage to hardware and data. Hardware and Software Management – controls the management of all hardware devices and installation and removal of software. Patch 30 | P a g e A type of software program which fixes another software flaw or vulnerability in a program. Software Last updated: 15 Aug 2013 PDF (Portable Document Format) Plug n Play Plug-in POS (Point of Sale) POST (Power on Self Test) Proprietary Software Real Time Processing Registry Scandisk Shareware Software SP3 (Service Pack 3) 31 | P a g e A type of document format which is independent of the application it was created in. Advantages of saving in PDF format: Other computer users will not always have the appropriate software to open/edit the documents you send them; the software to read PDF files is free and widely used. Compatible across various platforms, i.e. Windows, Linux, MacOS. Secure, almost no chance of getting infected with viruses. Securable, avoid people from modifying and redistributing your work – read-only. Easy and quick to create when using the right software from any source document/application. Software to view PDF Files is completely free. Compatible with modern portable readers. Compressed, therefore small in size. Multiple documents can be merged into one single PDF file. PDF files can be digitally signed or password protect. Final stage ready for printing. PDF files can be viewed in your favourite web browser. When a new hardware device attached to a computer can be detected and configured automatically without requiring a manual installation. A set of software components that adds specific capabilities to a larger software application. The software used to manage tills in shops and supermarkets. Usually linked to some form of stock control software. A routine called by BIOS to check that all hardware components are OK according to the CMOS settings. Privately owned and controlled software that is offered for sale or licence and cannot be freely distributed. The developer holds the source and the code generally cannot be viewed or edited. When access and updates are made against the “live” Master file immediately. A hierarchical table, which stores hardware and software settings, user profile settings and network settings. A Windows utility used to check your hard disk for errors and correct problems that are found, especially lost clusters and cross-linked files. Shareware (also termed trialware or demoware) is proprietary software that is provided to users on a very limited basis and only for a certain limited trial basis and legally to a license which restricts any commercial benefit, use or exploitation of the software. Programs written to control, support and operate the computer itself (It enables everything on your computer to work better) e.g. operating system, utilities, drivers etc. Service Pack 3 shows which release/version of XP Pro must be used, as later releases have upgraded features. Software Software Software Software Software Software Software Software Software Software Software Software Last updated: 15 Aug 2013 Spooler Symbian Synchronising System software Utility Software Vector Graphics Virtual keyboard Virtual Memory Virtualisation 32 | P a g e A program to “spool” (manage) printout sent to a printer. It may have logic to give some users priority over other users, keep BIG jobs back, etc. An OS used in mobile devices such as smartphones. In competition with other mobile OS’s such as Windows Mobile, OS X (on the iPhone), Android (Linux based on the GPhone) and Palm OS. Symbian is an open industry standard (i.e. everyone can find out how it works and how to program for it) but it is neither free nor open source. When a cell phone is synchronised with a PC a list of contacts and appointments on each device is updated to reflect changes made on each of them, e.g. you add a new contact on your phone and delete an old one on your PC. When you synch the contact is deleted on the phone as well and the new contact is added to the contacts on the pc. Synching can take place through cable connections, Bluetooth or using a web technology like apple’s ‘Mobile Me’. Programs written to operate and control the computer itself (It enables everything on your computer to work better) e.g. O/S, utilities, drivers etc. A program that performs a very specific task, usually related to managing system resources. Operating systems contain a number of utilities for managing disk drives, printers, and other devices. Vector graphics consist of layers and shapes that can be moved and changed, e.g. AutoShapes, WordArt. A software component that allows a user to enter characters. A virtual keyboard can usually be operated with multiple input devices, which may include a touchscreen, an actual keyboard and a computer mouse. Use of hard drive space to swap out data when insufficient RAM exists to hold all such data. Software Creating a ‘virtual’ (i.e. not real) computer (i.e. a full simulation of the hardware) on your computer using software. This allows all types of software that can work with this hardware to be installed on the ‘virtual’ computer. A virtual computer has the advantage of allowing the user to work with different configurations on the same physical machine, e.g. you can run different operating systems with different software installed at the same time – or test out different drivers / application software / utilities without changing the configuration of your real system. An example of usage: – let’s say you want to test Linux but don’t want to remove your current set up and install Linux on your computer, nor do you want to make a dual boot system. Using Virtualisation software you create a virtual PC Software Software Software Software Software Software Software Software Last updated: 15 Aug 2013 Wizard Absolute cell reference Conditional Formatting COUNTIF Data validation Error messages Formula Function Range Relative cell reference SUMIF Text functions Booting in safe mode Boot-up process Cannot open a file 33 | P a g e and install Linux on that. You can then run Linux and test it on the virtual PC without affecting your current setup at all. A feature that guides a user through a process such as creating a document. The cell address in a formula is not changed when it is copied. Formatting of data on reports or computer programs those changes based upon specific criteria. An example of conditional formatting would include printing and displaying negative quantities in red. Counts the number of cells within a range that meet the given criteria. Control the accuracy of data being input into a database or spreadsheet. Features used, i.e. input mask, validation rule, drop-down boxes, changing the property size of a field. #REF! – occurs when the value in a cell referred to in a formula has been deleted. ####### - column is too narrow. #DIV/0! A statement written by the user to be calculated. Formulas can be as simple or as complex as the user wants. A formula can contain values, references to cells, defined names, and functions. All formulas must start with the equals sign. =1+2+3 A named and store procedure that performs a specific operation and returns a value. Functions are typed alongside brackets, where in the arguments if any are listed in between. To use functions in a formula, for example: =NOW() returns the current date and time. =SUM(A1:A3) *2 will multiply the sum by 2 MAX, MIN, MID, MEDIAN, MODE, VLOOKUP, IF Two or more adjacent cells on a spreadsheet. A cell address in a formula that changes when copied to another cell. Adds all numbers in a range of cells, based on given criteria. UPPER, LOWER, CONCATENATE, LEFT, RIGHT, LEN, MID Booting in safe mode is when Windows starts up and loads very bare bones configuration, it does not load the drivers for all the hardware on your computer but uses its own stable and safe drivers for the minimum set of hardware to allow the computer to function. The instructions that display this information are stored on a ROM. Since the ROM is a microchip (hardware) that contains programs (software), it is referred to as firmware. Results of hardware checks such as the drives that are available, the operating logo and the amount of RAM installed. Possible cause: File extension left out – not associated to a program Could be trying to open a file with an older software version. Solution: Rename the file with the correct extension. Software Spreadsheet Spreadsheet Spreadsheet Spreadsheet Databases Spreadsheet Spreadsheet Spreadsheet Spreadsheet Spreadsheet Spreadsheet Spreadsheet Troubleshooting Troubleshooting Troubleshooting Last updated: 15 Aug 2013 Check that the correct software has been installed. Faulty hardware Files taking long to open Monitor not displaying a picture Non- disk error Non-responding application Out of space on HDD Power-saving Mode Printer spooling Printing 34 | P a g e Possible cause: The computer BIOS POST test has picked up a fault with the HDD, RAM, keyboard, etc. Solution: The technician would have to check the motherboard and all components to see which one is faulty. Hardware fault/ hardware repair. Possible solution: The simplest solution would be to reboot your computer. Restarting your PC can help clear out temporary files that build up on the hard disk. OR Perform a Disk Cleanup by selecting Start, All programs, Accessories, System Tools and then click on Disk Cleanup. OR Defragmenting the hard drive so the files are grouped together making access time faster. Cause – solution: Monitor might not be switched on – switch on monitor. Power cable might be loose – re-connect. Graphic card may be faulty – replace. Troubleshooting It is a message relating to the fact that the operating cannot be found or a drive is Non- meaning the media is not bootable. It could be very possible that pupils use CDs or DVDs to save their work and they have left them I the disk drive. The program does not respond, too many programs running at once, needs more RAM, power surges or her computer is overheating. Troubleshooting Solution: Press <Ctrl><Alt><Delete> to bring up the Windows Task Manager or select Task Manager on the taskbar, select Task List, then under Applications, choose the program that is not responding and end the task. Downloaded too much music and photos. Solution: Disk Cleanup Utility program to remove temporary files and empty the Recycle Bin. Compress files that are not used regularly. The power options in the Control Panel have been set to reduce the power consumption of devices and the computer has gone on standby after a specified period of inactivity. This is when the process of printing is slower than the speed of the notebooks/PC and a technique is used where documents waiting to be printed are stored on a disk, in a queue until the printer is ready to process them. Documents waiting to be printed are temporarily stored on a disk and are held in a queue until the printer is ready to print them – this is referred to as printer spooling. Printer not printing Troubleshooting Troubleshooting Troubleshooting Troubleshooting Troubleshooting Troubleshooting Troubleshooting Last updated: 15 Aug 2013 Possible causes: The wireless link has been broken and they are no longer connected to the printer. No paper in the printer. Printer is jammed. Too many jobs in the queue. Problem with speakers ScanDisk Bookmark Charts Footnote / Endnote Form Letter Hyperlink Mail merge Subscript 35 | P a g e Solution: Check that the printer is on. Check that the connection from the computer is working. Check that the printer has paper. Check for paper jams. Cancel any duplicate jobs Possible causes: Speakers not connected into the correct socket. Volume is not muted. CD might be faulty. Solution: Plug speakers into correct socket Unmute volute Try another CD Check the speaker settings A windows utility used to check your hard disk for errors and correct problems that are found. (especially lost clusters and cross linked files) Identifies a location or selection of text that you name and identify for future reference, e.g. you might use a bookmark to identify text that you want to revise at a later time. Line chart: often used to visualize a trend in data over intervals of time. Bar chart: a chart with bars whose lengths are proportional to quantities. Pie chart: show and compare the cost percentages of items. Both footnotes and endnotes are used in documents to give a more detailed explanation of certain text, make comments on certain statements, and refer to the source from which certain facts were obtained or to supply the name of the person who is quoted. Footnote – inserted under specific text or at the end of the page. Endnotes – inserted at the end of the document or the end of a section. A standard letter created to be personally addressed and distributed to a mailing list. A link to another place in a document or to an external website or document. A document is merged with a list of names/addresses to avoid having to type out letters out individually. Text that appears in smaller script below the text line, e.g. H2O. Troubleshooting Troubleshooting Word processing Word processing Word processing Word processing Word processing Word processing Word processing Last updated: 15 Aug 2013 Superscript Text that appears in smaller script above the text line, e.g. 23 Table of contents An alphabetical list of terms and topics discussed in a document, along with the pages they appear on. Prepare heading by using built-in styles The ready-prepared document layout. Template Track changes Track changes 36 | P a g e An editing command that is commonly used when you create a document and make changes and want to keep track of the changes that you made. It is also a useful tool for collaborating on a document as it allows multiple users to make revisions without losing the context of the original document. Changes made to a document are shown. Deletions are shown as strike-through text and insertions are underlined. Word processing Word processing Word processing Word processing Word processing Last updated: 15 Aug 2013