Terminology List with meanings - rttathk

advertisement
Computer Applications Technology
Terminology List
TERM
Margins
Orientation
Database
Database Management
Datasheet View
Design View
Field
Filter
Foreign Key
Form
Form View
Input Mask
Primary key
Query
Record
Referential Integrity
Relational Database
Relationship
DEFINITION
The distance between the text and the sides of a whole
page or whole document.
The horizontal (landscape) and vertical (portrait) orientation
of a page.
A collection of related tables store data about a subject or a
group of subjects.
Software that can be used to store data in an organized
manner, manipulate data and process data into information.
Shows the contents of your table in rows and columns and
allows the user to enter and change data.
Describes the layout of the records, and can be used to
create a new table/query/report/form or change the layout
of an existing table/query/report/form
A single detail or smallest unit of data that can be stored
Basic enquiries, i.e. only one field at a time, all fields are
displayed, criteria can only be applied to one field; no order,
results cannot be stored.
A field in a table that is a primary in another table.
An object that enables a user to perform the storage and
viewing of data in a user-friendly manner
Shows the form with its fields and allows the user to enter
and change data.
Allows us to format the data e.g. Telephone numbers
The field that uniquely defines a record.
The object that allows you to retrieve specific information
from a vast database based on certain criteria. Advanced
queries can be made, i.e. more than one field, certain fields
can be displayed, criteria can be applied to a number of
fields in a specific order and results are stored.
A collection of fields that contain details on a specific
subject or entity.
Makes sure that you cannot refer to a record that does not
exist.
A collection of related tables store data about a subject or a
group of subjects.
Connects the primary key of one table to the foreign key of
another table. Links data from several tables
CATEGORY
Applications
Applications
Database
Database
Database
Database
Database
Database
Database
Database
Database
Database
Database
Database
Database
Database
Database
Database
Advantages of a relationship:
 Referential Integrity can be enforced (meaning that you
may not add a record to the table that contains the
foreign key unless there is a corresponding record in the
linked table).
 Queries can be created using fields from the linked
tables.
1|Page
Last updated: 15 Aug 2013
Report
Table/File
Validation Rule
FAT (File Allocation Table)
File compression
File extension
NTFS (New Technology File
System)
Read-only property
Wildcards
Address Bus
AGP (Advanced Graphics
Port)
2|Page
 Enables data in one table to be joined to data in another
table which generally serves as the basis for queries and
reports.
Allows the user to view information so it can be presented
in a printed format in various different ways.
Collection of records which store information about a
particular object such as a video.
To limit errors by forcing the input of pre-set values only,
e.g. allowing negative numbers for an age.
A data structure/table used internally by the operating
system to keep a record the physical location of each cluster
of each file on a disk.
This makes computer data smaller so less is needed to
represent the same information and, consequently, the
information takes up less disk or file space and may be
transmitted in less time. WinZip and WinRAR are examples
of an application that compresses files.
A short series of letters and/or numerals at the end of a
personal computer filename, used to indicate the type of
file and the software that will be required to operate or
open it.
JPG: Jpeg Image file - the most common type of graphics file
EXE: Executable file – double-clicking on this file will make a
program run.
BMP: Bitmap Image file
DOCX: Microsoft Word Document 2010
PPTX: Microsoft PowerPoint 2010, PPT – older version of
PowerPoint.
ZIP: Zipped or Compressed file – indicates that this file has
been compressed (with a WinZip or WinRAR program)
A newer version of FAT, used since Windows NT, which is
faster, more robust and offers better security.
Setting a file to read-only helps you to protect the file from
accidental deletion and changes to the file's content. If a file
is set to read-only, you will not be able to save changes to it
unless you turn off the file's read-only status.
Find the file you want to edit.
Right-click the file, and then click Properties.
Click the General tab, clear the Read-only check box, and
then click OK.
Edit and save your file as needed.
Wildcards are like the blank pieces in Scrabble, or like the
Jokers you can use in some card games to stand in for any
card. The wildcards “*” and “?” can be used to display all
files with the extension “.doc” by typing “*.doc”, or all
files “01062001.doc”, “01072001.doc”,“01122001.doc”... by
typing “01??2001.doc”.
The address bus transfers the address of the data and
address of the program instructions to the CPU
Expansion slot for graphics card. It introduced a dedicated
point-to- point channel so that the graphics controller can
directly access main memory.
Database
Database
Database
File
Management
File
Management
File
Management
File
Management
File
Management
File
Management
Hardware
Hardware
Last updated: 15 Aug 2013
Athlon
Blu-ray
Buffers
Bus
Cache
Caching (Web)
CD (Compact Disk)
Celeron
Centrino
Clusters
CMOS (Complementary
Metal-Oxide Semiconductor)
Control Bus
Core i3 (i5 or i7) or Quad
Core
CPU (Central Processing
Unit)
CRT (Cathode Ray Tube)
3|Page
A CPU manufactured by AMD. There are various versions,
including 64 bit and dual core.
A storage technology that was developed to enable
recording, rewriting and playback of high-definition (HD)
video, as well as storing large amounts of data.
Temporary storage areas in RAM used to speed up slow
input/output devices.
An electronic pathway along which signals can be sent from
one part of the computer to another.
Special high speed memory (SRAM) reserved for temporary
storage of data or instructions needed next by the
processor.
Primary Cache (L1): Internal cache - built onto the CPU
External Cache (L2): External cache - located just outside of
the CPU
A technique that the processor uses to store frequently
accessed items from the WWW.
CD-ROM: Optical disc - can store large amounts of data.
CD-R: A disc that has no pre-formed pits and lands that hold
data instead has layers of dye. Can be written to once only.
CD-RW: A disc that does not contain a dye but rather phase
changing chemicals. It can be erased and re-written to.
A line Intel microprocessors introduced in June, 1998.
Celeron chips are based on the same P6 architecture as the
Pentium II microprocessor, but are designed for low-cost
PCs. They run at somewhat lower clock speeds (266 and 300
MHz) and are not as expandable as Pentium II
microprocessors.
A brand used for a laptop that uses Intel’s Pentium M
processor, Intel’s Wi-Fi networking chip and Intel’s
motherboard. Any laptop not using all three of these
components may not use the word ‘Centrino’ but must be
called a laptop with ‘Pentium M’ processor.
The smallest addressable unit of disk space that stores data.
Hardware
A non-volatile memory chip which stores configuration
settings such as your boot sequence and your date and
time. The chip retains its data when the power is turned off
as long as it receives a trickle of electricity from a battery.
The control bus carries the signals that tells memory if the
CPU wants to read or write memory.
A more modern model of the Core 2 Duo manufactured by
Intel.
Fetches data and instructions from memory and carries out
the processing. Consists of:
Arithmetic Logic Unit: Performs all mathematical and logical
operations
Control Unit: Fetches and decodes instructions from
memory and carries them out.
Invented in 1897, CRT is the most common display
technology for televisions. The tube uses an electron beam
to scan lines on the screen coated with phosphor, which
glows when struck by the beam.
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Last updated: 15 Aug 2013
Cylinders
Data bus
DDR
Dedicated device
Digital camera
DIMM (Dual Inline Memory
Module)
Dot pitch
DPI (Dots per inch)
Dual Core
Dual Core / Core 2 Duo
DVD (Digital Versatile Disk)
All the tracks on top and below one another that can be
accessed without moving the read write heads on a hard
disk drive.
The data bus transfers data and program instructions to the
CPU
Double Data Rate RAM refers to the type of RAM that can
be inserted in the RAM slots on the motherboard.
Devices that are designed to perform one specific task only,
e.g. traffic lights, washing machines, etc.
A camera that stores images digitally rather than recording
them on film. Once a picture has been taken, it can be
downloaded to a computer system, and then manipulated
with a graphics program and printed. Unlike film
photographs, which have an almost infinite resolution,
digital photos are limited by the amount of memory in the
camera, the optical resolution of the digitizing mechanism,
and, finally, by the resolution of the final output device.
A small circuit board that holds memory (RAM) chips.
Hardware
The distance between the holes in the shadow mask of a
monitor. The smaller dot pitch, the sharper the monitor.
Print resolution refers to the quality of the print or dots per
inch (dpi). The average is around 4800 x 1200 dpi. Scan
resolution is important for those that make a lot of high
quality copies and scan pictures.
2 physical CPUs are included on a single chip. This chip alone
is therefore equivalent to plugging two separate single core
CPUs into a multi-processor motherboard.
Technologies which incorporate two processor cores in one
physical package. Core 2 Duo is a brand name for a specific
architecture by Intel.
Hardware
Benefits:
 Is capable of processing more than one instruction at a
time.
 Has faster performance
 Greater energy efficiency
 More responsive multitasking
A type of optical disk technology similar to the CD-ROM. A
DVD holds a minimum of 4.7 GB of data, enough for a fulllength movie. DVDs are commonly used as a medium for
digital representation of movies and other multimedia
presentations That combines sound with graphics. The DVD
specification supports disks with capacities of from 4.7GB to
17GB and access rates of 600KBps to 1.3 Mbps. One of the
best features of DVD drives is that they are backwardcompatible with CD-ROMs, meaning they can play old CDROMs, CD-I disks, and video CDs, as well as new DVD-ROMs.
Newer DVD players can also read CD-R disks.
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
 DVD +/-RW optical disk: hybrid (dual-format) drive
capable of reading both DVD+ and DVD- formats.
 Lightscribe DVD writer: uses a light (laser technology) to
burn direct-to-disc labels (as opposed to stick-on labels).
4|Page
Last updated: 15 Aug 2013
e-book reader/e-book
device/e-reader
Embedded Intel Graphics
media
Entry-level Computer
Expansion card
External Bus
Fan
Fat Client
FDD
FireWire
Flash memory
GB (Gigabyte)
General-purpose device
GHz (Gigahertz)
GPS (Global Positioning
System)
Hard disk drive
HDMI (High Definition
Multimedia Interface)
Heatsink
5|Page
A mobile electronic device that is designed primarily for the
purpose of reading digital e-books and magazines.
The graphics controller is built into the motherboard
Hardware
For users that will be using their desktop for basic
applications such as e-mail, Internet surfing and general
documentation and are looking for an affordable price.
Also called an adapter. Is a card that fits into an expansion
slot on the Mother Board and has a cable or device
connected to it, e.g. Sound Card, NIC.
Allows the CPU to communicate with the plug-in slots
To cool the processor.
A normal stand alone computer with full CPU, memory,
storage and local software. The network is only used for
communication / accessing shared resources.
A floppy disk is a data storage medium that is composed of a
disk of thin, flexible ("floppy") magnetic storage medium
encased in a square or rectangular plastic shell. Floppy disks
are read and written by a floppy disk drive.
A high speed serial data transfer connection between
devices such as a video camera and a computer. Can
connect up to 63 devices, transfer high quantities of data at
high speeds, without loss of quality, carries sound and video
over same medium. Used for connecting video cameras.
FireWire 400 – transfer rates up to 400 Mbps, FireWire 800
– 800 Mbps.
A rewritable memory chip that retains its data without a
power supply.
Measure of storage. One gigabyte is equal to 1,024
megabytes. Gigabyte is often abbreviated as G or GB.
Devices, i.e. computers that can perform more than one
function, e.g. tablets, computers, smartphones
One GHz represents 1 billion cycles per second. The speed
of microprocessors, called the clock speed, often is
measured in gigahertz. For example, a microprocessor that
runs at 200 GHz executes 200 billion cycles per second. Each
computer instruction requires a fixed number of cycles, so
the clock speed determines how many instructions per
second the microprocessor can execute. To a large degree,
this controls how powerful the microprocessor is.
A device that allows you to determine your position on the
earth based on signals from satellites.
The mechanism that reads and writes data on a hard disk.
Hard disk drives (HDDs) for PCs generally have seek times of
about 12 milliseconds or less. Many disk drives improve
their performance through a technique called caching.
A compact audio/video interface for transferring
uncompressed digital audio/video data from an HDMIcompliant device ("the source") to a compatible digital
audio device, computer monitor, video projector, and digital
television
A piece of hardware usually placed over the CPU, the north
bridge chipset and the GPU on a 3D graphics accelerator
that is usually made of copper or aluminium and
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Last updated: 15 Aug 2013
Hot swapping / Hot plugging
Ink jet Printer
Integrated
Interlacing
Internal Bus
Interrupts
iPod
ISA (Industry Standard
Architecture)
Laptops vs Desktops
incorporates fins or ridges over which air flow. It is meant to
cool the circuitry by conducting heat away from it.
Hot swapping is when devices can be plugged in and out
without switching off or rebooting the PC.
The ability to add and remove devices to a computer while
the computer is running and have the operating system
automatically recognize the change. Hot plugging is also
called hot swapping.
Produce high-quality text and graphics by spraying ink onto
a sheet of paper.
A device that is built into the notebook or monitor, e.g.
integrated webcam.
In order to reduce the flicker a monitor will refresh the odd
rows alternately to the even rows.
Allows the CPU to communicate with RAM
Signals given by a peripheral or device that wants to get the
CPU’s attention.
An example of a very popular portable digital audio player.
ISA is an older technology for connecting computer
peripherals. Common current devices include modems and
sound cards. ISA is much slower than PCI, so PCI devices are
generally better if you have a choice.
Advantages of Laptops over Desktops:
 The laptops, being portable, can be used in different
venues throughout the school.
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
 Laptops are small and convenient to carry around and
take up less space; they also don’t need a desk, they
can be used on a student’s lap.
 Teachers will be able to demonstrate or display
simulations for lesson content
 Laptops can get its power supply from a battery for
short periods of time without connecting to the main
electricity supply.
 Laptops can be used for Internet connectivity in a WiFi access area or hotspots.
Disadvantages of Laptops over Desktops:
 The easy ability to be stolen due to its small size and
portability.
 They can easily be damaged and can cost a lot to
replace or fix.
 A laptop is not as easy to upgrade as a desktop; it will
last only a few years before it is out of date.
 The laptop battery will need to be charged regularly.
 An upgrade on a laptop is more expensive than a
desktop.
 Laptops are usually less powerful.
 Laptops are generally more expensive.
Laser Printer
6|Page
Uses a laser beam to produce an image onto a drum.
Hardware
Last updated: 15 Aug 2013
LCD (Liquid Crystal Display)
Mainframe computer
MB (Megabyte)
Memory card
Memory card reader
MHz (Megahertz)/KHz
(Kilohertz)
Mid-range Computers
Monitor
Motherboard
Multi-function printer
NIC (Network Interface
Card)
North Bridge
7|Page
A monitor that does not need to be refreshed. Found in
Laptops and PDAs.
A large digital computer serving 100-400 users and
occupying a special air-conditioned room.
Megabyte is a multiple of the unit byte for digital
information storage or transmission and is equal to 106
(1000000) bytes. However, due to historical usage in
computer-related fields it is still often used to represent 220
(1024×1024 or 1048576) bytes.
Memory for use in mobile devices that makes use of flash
memory technology. Most frequently used in cameras /
PDA’s, etc. There are many different standards (the cards
have different physical sizes and connections) including,
amongst others, Compact Flash, Secure Digital, Multi-Media
card, Memory stick, etc.
A card reader is a hardware device which plugs directly into
your computer (normally via a USB port) and it allows one to
read the contents of a media (storage) card without, for
example, having to plug the digital camera into the PC. Card
readers generally will read a number of different media card
formats.
The speed of the processor, i.e. how many instructions per
second the processor can execute.
Hardware
For users that will be using their desktop for basic
applications such as e-mail, Internet surfing and general
documentation, but are more frequent users, require multitasking and are looking for a PC with slightly better specs
than the entry-level range shown above. Paying this little bit
extra will give your PC better performance as well as build in
more future capacity.
A monitor is a user interface designed to allow the user to
see the functions being performed.
A visual display unit, often called simply a monitor or
display, is a piece of electrical equipment which displays
images generated from the video output of devices such as
computers, without producing a permanent record.
A printed circuit board, which is found inside the unit. The
main function is to provide connections for all the main
components (RAM, CPU, etc.) so they can communicate
with each other.
Multi Function Product/ Printer/ Peripheral), multifunction
all-in-one (AIO), or Multifunction Device (MFD), is an office
machine which incorporates the functionality of multiple
devices in one, so as to have a smaller footprint in a home
or small business setting (the SOHO market segment), or to
provide centralized document management/
distribution/production in a large-office setting. A typical
MFP may act as a combination of some or all of the
following devices: E-mail, Fax, Photocopier, Printer, Scanner
A card that plugs into the Mother Board and the network
cables plug into it from the outside.
Part of the chipset on the motherboard. Connects the CPU,
the RAM, the graphics card and the South Bridge together.
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Last updated: 15 Aug 2013
Numeric keypad
Parallel (LPT)
PCI (Peripheral Component
Interconnect)
PCI Express
PDA (Personal Digital
Assistant)
Peripherals
Phosphor dots
Pixels
Plotter
Ports
Ppm (Pages per minute)
Primary Memory (storage)
Printers
Processor
PS2
RAID (Redundant array of
inexpensive disks)
RAM (Random Access
Memory)
8|Page
For inputting large quantities of numbers.
Used to connect the computer to the printer. Data is sent 8
bits at a time.
Type of expansion slot - faster than ISA.
Hardware
Hardware
Fastest type of expansion slot - used in modern computers
for graphics cards that have DVI, HDMI. An improvement
and refinement of the PCI-bus that is specifically designed to
enhance video performance.
PCI Express is a new bus design for communication between
CPU, memory and peripherals. Typically provides bandwidth
and speed improvements for demanding peripherals such as
graphics accelerators. It uses serial connections and a
switch to provided dedicated point-to-point link between
components on a motherboard.
A handheld computer, also known as a palmtop computer.
Newer PDAs also have both colour screens and audio
capabilities, enabling them to be used as mobile phones
(smartphones), web browsers, or portable media players.
A computer device, such as a CD-ROM drive or printer that
is not part of the essential computer, i.e. the memory and
processor. Peripheral devices can be external, such as
mouse, keyboards, mouse, printer, monitor, external hard
drives, speakers, microphones, and scanner – or internal,
such as a CD-ROM drive, CD-R drive or Internal modem.
Internal peripheral devices are often referred to as
integrated peripherals.
The “phosphor” dot which cover the back of the screen on a
CRT monitor. 1 Phosphor dot = 1 physical pixel.
Picture element=Glowing dots that make up image on a
screen. More logical pixels give higher resolution.
A device which draws pictures onto large sheets of paper
using coloured pens.
Connections for peripheral devices.
The measurement of printing speed.
The primary memory is electronic and fast. It holds the
instructions that the computer is using whilst it is on.
Examples include RAM (Random Access Memory).
A device that prints text or illustrations on paper.
Central processing unit: the part of a computer (a
microprocessor chip) that does most of the data processing;
"the CPU and the memory form the central part of a
computer to which the peripherals are attached."
A small serial port which allows the connection of a key
board and/or mouse to the computer.
A technology that provides increased storage reliability
through redundancy, combining multiple low-cost, lessreliable disk drives components into a logical unit.
A form of computer data storage (volatile memory) that
holds the programs that we run on the computer and that
data that these programs work with. The word random thus
refers to the fact that any piece of data can be returned in a
constant time, regardless of its physical location and
whether or not it is related to the previous piece of data.
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Last updated: 15 Aug 2013
Refresh rate
Registers
Resolution
Retina Display
RFID (Radio Frequency
Identification)
Memory that can operate at high speeds and is used to
store the Operating , program instructions and data in use
whilst the computer is running includes ROM.
How often a monitor’s screen is “refreshed”/redrawn each
second, e.g. 50-80 times per second.
Storage area within the CPU which holds the current
instruction.
The number of pixels (horizontally and vertically) grouped
on a monitor; e.g.: 640x480 is a low resolution whereas
1152x864 is a high resolution.
The number of pixels per square inch on a computergenerated display; the greater the resolution, the better the
picture.
Retina Display is a marketing term developed by Apple to
refer to devices and monitors that have
a resolution and pixel density so high – roughly 300 or more
pixels per inch – that a person is unable to discern the
individual pixels at a normal viewing distance.
A standard that uses a tag reader to generate radio signals
to communicate with a transponder (or tag) that contains
identification data. An RFID chip can hold a variety of data,
including: ID, name, surname, location, years (age),
nationality, etc.
An RFID chip is a small electronic circuit embedded in labels,
material etc. for purposes of tracking and stock control.
When brought near a sensor the RFID unit broadcasts its
unique ID number on low power radio. RFID has serious
privacy implications.
Robotics
The science and study of technology associated with design
and invention machines that can be programmed and reprogrammed to perform a series of tasks, involving sensors
and actuators.
ROM (Read Only Memory)
Computer Memory on which data has been pre-recorded.
Once data has been written onto a ROM chip, it cannot be
removed and can only be read. Unlike main memory (RAM),
ROM retains its contents even when the computer is turned
off. ROM is referred to as being non-volatile, whereas RAM
is volatile.
Most personal computers contain a small amount of ROM
that stores critical programs such as the program that boots
the computer. In addition, ROMs are used extensively in
calculators and peripheral devices such as laser printers,
whose fonts are often stored in ROMs.
SCSI (Small computer system Standard high-speed parallel interface for connecting
interface)
peripherals to a computer via standard hardware interface.
For fast hard drive access.
SD Card (Media card)
The most common storage medium for storing photographs
on a digital camera.
Secondary Memory
The secondary memory is mechanical and is slower than
(Storage)
primary memory. It is used to store data permanently.
Examples include Hard disk drive, Flash drive, Memory card,
Stiffy Disk.
9|Page
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Last updated: 15 Aug 2013
Serial port (Com)
Smartphone


Solid state drives
South Bridge
Stand-alone computer
Supercomputer
System Clock
Tablet
Thin Client
10 | P a g e
Used to connect an external modem or mouse to the
computer. Data is sent one bit at a time.
Smartphones are a handheld device that integrates mobile
phone capabilities with the more common features of a
handheld computer or PDA. Smartphones allow users to
store information, e-mail, and install programs, along with
using a mobile phone in one device. For example a
Smartphone could be a mobile phone with some PDA
functions integrated into the device, or visa versa.
Hardware
Hardware
A smartphone as a mobile device:
 Uses an operating
 Runs different application software
 A multi-purpose device
 Has input, processing, output and storage
Distinctions between smartphones and normal phones are
blurring. Normal phones have many high end features such
as music players, cameras, synching of contacts, games,
basic application support and even GPS. True smartphones
have greater storage, touch screen interface, larger, higher
resolution screens and the ability to run more sophisticated
and useful applications.
The traditional spinning hard drive (HDD) is the basic nonvolatile storage on a computer, i.e. it doesn't "go away" like
the data on the system memory when you turn the system
off. Hard drives are essentially metal platters with a
magnetic coating. A read/write head on an arm accesses the
data while the platters are spinning in a hard drive closure.
An SSD does much the same job functionally (saving your
data while the system is off, booting your system, etc.) as an
HDD, but instead of a magnetic coating on top of platters,
the data is stored on interconnected flash memory chips
that retain the data even when there's no power present.
Compared with electromechanical disks, SSDs are typically
less susceptible to physical shock, run more quietly, have
lower access time, and less latency. However, while the
price of SSDs has continued to decline in 2012, SSDs are still
about 7 to 8 times more expensive per unit of storage than
HDDs.
Part of the chipset on the motherboard. Connects the
external buses, USB, etc. to the North Bridge.
A stand-alone computer means “not networked” or “not
connected to any other computer”.
The most suitable computer type for processing massive
amounts of information, such as weather forecasting.
Determines the frequency of the processing functions of the
system unit.
A computer on a network with reduced CPU, memory and
storage. Relies on a powerful server on the network to
perform most of these functions. Some thin client solutions
have no storage at all. Thin clients are supposed to be
cheaper and easier to maintain.
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Last updated: 15 Aug 2013
Top-range Computer
For users that will be using their desktop for more
demanding applications such as CAD, games, photo and
video editing, graphic rendering, etc. as well as basic
applications such as e-mail, Internet surfing and general
documentation, and who are looking for a PC with more
power. Paying extra for a higher performance PC will ensure
that your PC can cope with more demanding applications
while building future capacity.
Upgrade
Replace old and obsolete hardware and software with
newer equivalents.
UPS (Uninterruptible Power A device that can help to prevent loss of data on your
Supply)
desktop PC where there is a power failure. A surge protector
must be used to stop electrical spikes from overloading the
system
USB (Universal Serial Bus)
Serial port that can connect up to 127 devices.
USB 1 – transfer rates up to 12 Mbps, USB 2.0 – 480 Mbps
USB supports Plug-and-Play installation and hot plugging.
VDU
Visual Display Unit=Monitor
VGA (Video Graphics Array)
Display hardware first introduced with the IBM PS/2 line of
computers in 1987, but through its widespread adoption has
also come to mean either an analogue computer display
standard. While this resolution was superseded in
the personal computer market in the 1990s, it is becoming a
popular resolution on mobile devices.
Warranty: Carry-in
Customer has to take the computer himself/herself to
designated supplier for them to fix/replace.
Warranty: Collect, repair
For one year the shop where the notebook was purchased
and return
from will collect the notebook from the buyer’s premises,
repair it and then return it to the premises.
Warranty: Global Collect and Company collect from anywhere in the world, fixes/replaces
Return
and returns to customer.
Warranty: On-site
Company will go out to your site / house free of charge
anywhere in South Africa. The unit will then be repaired at
no extra cost to the client unless determined by the
technician that the problem was caused by malicious
damage.
Webcam
A webcam is a digital camera installed in a location that
feeds live images to a web server.
Zip disk
A portable disk drive that uses a disk with large capacity
Cashless society
When all transactions are done via networks, e.g. The
Internet, Debit Orders, Salaries paid directly in employee’s
bank accounts and the use of credit cards and debit cards,
to alleviate ALL cash transactions.
CTS (Carpal Tunnel
A type of RSI where the tendons in the wrist place pressure
Syndrome)
on the nerves in the hand causing pain and tingling
sensations.
Digital convergence
The technological trend whereby a variety of different
digital devices such as televisions, mobile telephones, and
now refrigerators are merging into a multi-use
communications appliance employing common software to
communicate through the Internet.
Digital Divide
The gap that exists between those people that have access
to the use and benefits of ICT and those people that do not.
 To narrow the gap of the Digital Divide:
11 | P a g e
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Hardware
Impact
Impact
Impact
Impact
Last updated: 15 Aug 2013
Digital Footprint
Ergonomics
E-Waste

GIGO (Garbage-In-GarbageOut)
Green computing
RSI (Repetitive Strain Injury)
Smart Card
 Offer lessons on computer literacy to people in need.
 Offer obsolete computers to people who need them.
 Make the computer facilities more accessible.
 Provide Internet access free of charge.
A digital footprint is a trail left by an entity's interactions in
a digital environment; including their usage of TV, mobile
phone, Internet and World Wide Web, mobile web and
other devices and sensors. A digital footprint is the size of
an individual's online presence; as it relates to the number
of individuals with whom they interact mainly on social
networking sites.
The science of designing equipment and furniture in the
workplace so that it does not place undue strain on the
human body. Specific computer areas of interest include
keyboards (curved so that the user’s arms and wrists are at
a more comfortable angle when they type), chairs, mouse,
etc.
Waste materials generated from using or discarding
electronic devices, such as computers, televisions, and
mobile phones. E-waste tends to be highly toxic to humans,
plants, and animals, and has been known to contaminate
water, air and dirt.
Disposing of e-waste:
 Redeployment within the company
 Sale to members of the company / sale to outside bodies
 Recycle parts
 Donations to a charitable or community organisation,
school, etc.
 Disposal in a secure and environmentally friendly
manner
GIGO in the field of computer science or information and
communications technology refers to the fact
that computers will unquestioningly process the most
nonsensical of input data, "garbage in", and produce
nonsensical output, "garbage out".
The environmentally responsible use of computers and
related resources. Such practices include the
implementation of energy-efficient central processing units
(CPUs), servers and peripherals (refilling ink and toner
cartridges) as well as reduced resource consumption
(Energy Star compliant) and proper disposal of electronic
waste (e-waste).
An occupational illness caused by repetitive movements
(usually of the hands and arms) - causes damage to nerves
in hands, arms, shoulders and neck.
A smart card is a plastic card about the size of a credit card,
with microchip inside that can be loaded with data, used for
telephone calls and used for cash payments
Impact
Impact
Impact
Impact
Impact
Impact
Impact
A smart card, chip card, or integrated circuit card (ICC), is in
any pocket-sized card with embedded integrated circuits
which can process data.
12 | P a g e
Last updated: 15 Aug 2013
Telecommuting
Virtual Reality
Blog
RSS (Really Simple
Syndication)
Search engine
Wiki
Certification stamp
Cloud Computing
Cookie
13 | P a g e
Employment at home while communicating with the
workplace by phone or fax or modem.
Virtual reality (VR) is a computer-simulated environment
that can simulate physical presence in places in the real
world or imagined worlds.
A blog is short for weblog, an on-line journal or diary of
one’s thoughts, normally published in reverse chronological
order. Blogs have evolved. They have become commercially
oriented businesses and brought into corporate
environments. They are no longer personal online diaries
but more like private online newspapers / journals that
compete for readerships and advertising as a way to make
money.
A technology that allows web users to be notified every
time content is updated on websites that they have
subscribed to.
Benefits:
 RSS Feeds allows the user to get the latest news from all
the websites they are interested in without having to
visit each web site individually.
 RSS Feeds ensure user’s privacy as they would not need
to join a newsletter.
 RSS Feeds allow users to get the latest headlines in one
place, as soon as they are published, without visiting the
websites to which they have subscribed.
A search engine is a software program or website used to
find webpages that match the search criteria entered.
Ways of refining a search:
 Use quotation marks
 Use + or – in front of keywords
 Use an advanced search, e.g. domain, date, file types
 Search within a search
 Use alternative words or synonyms
 Use another search engine
 Webpages from South Africa
 Select languages from Home page of search engine
 Use Boolean operators (AND/OR/NOT + - )
 Use the correct spelling
A website designed for multiple people to collaborate by
adding and editing content.
A company that provides verification of the quality and
reliability of an e traders.
A technology consisting of a network of remote servers
hosted on the Internet to store, manage and process data
Upload to a website that the person will have access to.
Examples include DropBox and Skydrive
A small text file downloaded to a user’s computer that can
be used to track user behaviour (preferences) on a web site.
A message given to a Web browser by a Web server. The
browser stores the message in a text file. The message is
then sent back to the server each time the browser requests
a page from the server.
Impact
Impact
Information
Information
Information
Information
Internet
Internet
Internet
Last updated: 15 Aug 2013
Domain Name
A string of characters that uniquely identifies the website on
the Internet (a subsection of the URL)
A Domain name identifies one or more IP addresses on the
Internet. It is made up of two parts: the part on the left
which names the organisation and the part on the right
which identifies the country or type of organisation, e.g.
www.michaelhouse.org (Domain name is michaelhouse.org)
E-Commerce
The general term used for business transactions on the
Internet.
e-mail spoofing
Forging an e-mail header to make it appear as if it came
from somewhere or someone other than the actual source.
The main protocol that is used when sending e-mail -- SMTP
-- does not include a way to authenticate.
e-trader
Any business that trades on the Internet
Extranet
An Intranet that can be partially accessed by authorized
outside users, enabling businesses to exchange information
over the Internet securely.
Facebook
A social networking site popular with teenagers. The term
has become synonymous with social networking just as
Google has become synonymous with search.
GMail
A term that is creeping in as a replacement for e-mail for
users who are using Google’s free e-mail service. GMail is
special because you have 5 GB (and continually increasing)
of storage space that is indexed by Google, making your email easily searchable. It does, however, display adverts
related to the mail you are reading – and so raises privacy
concerns. Gmail now includes the ability to read and work
with mail whilst offline using ‘Google Gears’.
Hits
Each file that is sent to a web browser by a web server.
Hotspot
A hotspot is a location that offers Internet access over a
wireless network through the use of a router connected to a
link to an ISP. Hotspots typically use Wi-Fi technology.
Typically found in airports, hotels, coffee shops, etc.
Hotspots have a limited range depending on the power of
the radio antenna used. Typically uses the 802.11 x wireless
standard
HTML (Hypertext Mark-up
The predominant mark up language for web pages. It is
Language)
written in the form of HTML elements consisting of "tags"
surrounded by angle brackets within the web page content.
It is the building blocks of all basic websites.
HTTP (Hypertext Transfer  A networking protocol for distributed, collaborative,
Protocol)
hypermedia information systems. HTTP is the foundation of
data communication for the World Wide Web.
Hyperlink
Links from a hypertext file to another location or file;
typically activated by clicking on a highlighted word or icon
at a particular location on the screen.
Hyperlink
A pointer that typically takes the form of highlighted text, or
a button, or a picture that points to related web pages.
Intranet
A private company network on which websites can only be
accessed by employees of the company.
ISP (Internet Service
A company that provides a fast, permanent connection for
Provider)
its customers to access the Internet for a fee.
14 | P a g e
Internet
Internet
Internet
Internet
Internet
Internet
Internet
Internet
Internet
Internet
Internet
Internet
Internet
Internet
Internet
Last updated: 15 Aug 2013
Macro
A single instruction that expands automatically into a set of
instructions to perform a particular task.
Mbps (Megabits per second) The measure of bandwidth (the total information flow over
a given time) on a telecommunications medium.
Moodle
Learning management system designed to facilitate online
learning. Free & OSS.
Online banking
Online banking (or Internet banking or E-banking) allows
customers of a financial institution to conduct financial
transactions on a secure website operated by the
institution, which can be a retail or virtual bank, credit
union or building society.
Podcast
Audio / Video files that are designed to be downloaded and
played on mobile devices such as an iPod. These are regular
episodes like radio programs or TV programs that you
download, synch to your device and watch / listen to as and
when you feel like it.
Shopping online
 Measure that companies provide to users to keep their
online shopping safe:

 Authentication: Users require an email address and
password to register and login in to the site.
 Digital certificate: indicates that all transactions and
information are secure, i.e. Norton secured.
 Privacy statement – indicates that the website has a
privacy policy and that are only supplying the necessary
information for the transaction.
 Secure Site: exists which explains the various security
measures. HTTPS.
 Secure Socket Layer SSL: shown by the padlock icon.
 Money back guarantee/Returns policy: all items carry a
100% money back guarantee and they have a returns
policy.
 Terms and conditions: to protect the company against
any legal matters, these are included on the website.
 About us: supplies all contact details of the company
showing that it is a valid company.
Skype
A company that provides free VOIP software for pure
internet telephony – and supplies VOIP – normal telephone
connectivity at a fee.
Social networking
Social networking is a web based technology that allows you
to communicate, share data and otherwise connect with
friends, family, and colleagues and even strangers online – it
also allows you to meet and co connect to people with
similar interests, backgrounds, activities or hobbies.
SPAM
Electronic equivalent of junk mail
Terrorism
Use of computers to exchange information and plan
strategies or attacks. It is very difficult to track/ trace this
kind of activity
Twitter
A microblog – entries are limited to 140 characters. You
‘follow’ someone and their ‘tweets’ (what they post) is
forwarded to you as e-mail or, in the USA, SMS. This means
you get immediate updates on their thoughts / activities as
they post them.
15 | P a g e
Internet
Internet
Internet
Internet
Internet
Internet
Internet
Internet
Internet
Internet
Internet
Last updated: 15 Aug 2013
VoIP (Voice over Internet
Protocol)
WAP (Wireless Application
Protocol)
Web 2.0
Wi-Max
Privacy Statement
3G (Third Generation)
A node
ADSL (Asynchronous Digital
Subscriber Line)
Area Networks
Attenuation
Bandwidth
Bluetooth
16 | P a g e
Technology that allows voice conversation to take place via
a network such as the Internet. Devices needed: camera,
microphone, speakers. Software: Google Talk, Skype
A technology that allows you to use the internet to carry
telephonic conversations. This bypasses the normal
telecommunications channels and so reduces the cost of
communication to the cost of your internet connectivity.
Companies supplying VOIP to conventional connectivity
include SKYPE, Vonage, etc.
An internet based protocol for transferring data to small
handheld devices.
Often called ‘the Social Web’. A movement away from static
pages to dynamically generated content, interactive
applications and collaborative content – wikis, social
networking and ‘cloud computing’.
An incremental improvement in wireless networking (Wi-Fi)
technology that allows high speed wireless connectivity over
ranges of 20 – 30 km. Uses the 802.16 wireless standards.
A statement that describes, often in legalese, what a
company / person / the owner of a web site will do with the
data it collects from you. This data may be collected using
cookies / online forms / e-mail, etc.
A cellular technology that describes the new wave of
wireless communications involving Internet access and data
delivery to mobile phones with moving colour images and
audio and sophisticated internet services.
Any computing device connected in a network, e.g. A PC, a
printer, a mainframe.
It is a permanent (fixed) digital connection which is split into
two channels, one for making normal phone calls and one
for connecting to the internet. Costs involved a monthly ISP
cost, and a fixed cost for the line rental. No cost for the
connection time to the Internet.
Faster download speed and slower upload speed. Good
coverage, best value for money, sustainable and fast.
A form of data communications technology that allows high
speed data transfer over conventional copper lines. The
technology uses a signal that can only be transmitted over
short distances (usually within 5 km of a compatible
exchange).
Networks arranged in ascending order of size: PAN, LAN,
WAN, GAN.
When the signal strength is lost over a long distance.
The total amount of data that can be carried from one point
to another in a given period of time.
Bluetooth connects with devices using radio signals
A short-range radio technology aimed at simplifying
communications among Internet devices and between
devices and the Internet. It also aims to simplify data
synchronization between Internet devices and other
computers. Bluetooth has a range of over 10 metres, not
affected by line-of-sight, not always secure due to
omnidirectional (every direction) nature.
Internet
Internet
Internet
Internet
Legal
Network
Network
Network
Network
Network
Network
Network
Last updated: 15 Aug 2013
Bounded
Bridge
Broadband
Cap/capped
Centralised processing
Coaxial cable
Crosstalk
Data Communication
Dedicated line
Dial-up
Distributed processing
Eavesdropping
EDGE (Enhanced Data rates
for GSM Evolution)
E-mail (Electronic Mail)
17 | P a g e
Media connected by means of wires, e.g.: co-axial, fibre
optics or twisted pair.
Like a repeater, a bridge also connects network segments
and increases the maximum size of the network. It
selectively determines the correct segment to which it
should pass signal.
Broadband is a high speed, high bandwidth connection to
the Internet that can transmit multiple signals
simultaneously.
Benefits of having a Broadband connection:
 Speed - the connection will be faster as broadband is the
fastest connection. Need a fast connection to download
pictures and video clips.
 Mobility – a wireless option such as 3G could be used
which provides you with a wider coverage availability.
 Downloads – you would be able to view pictures and
video clips.
A bandwidth cap, also known as a band cap, limits the
transfer of a specified amount of data over a period of
time. Internet service providers commonly apply a cap when
a channel intended to be shared by many users becomes
overloaded, or may be overloaded, by a few users.
A central computer is responsible for all the tasks –
originated with a powerful central mainframe and dumb
terminals (with no CPU / memory / storage) but can still be
found in systems such as the Windows Terminal Services
network and thin client computing.
Consists of a single copper wire surrounded by three layers.
Used for T.V aerial cables.
The magnetic fields of wires that are close to one another
can interfere with transmission and create crosstalk.
The electronic transfer of data from a sender to a receiver
via some form of media.
Provides a dedicated continuous connection between two
points, does not need the use of a modem, reliable and
costly, always available, examples include: Diginet, ADSL
Temporary connection available on a time-and-distance
charge, needs a modem to send and receive data, makes a
connection by dialling up a computer, cheap and accessible,
slow, unreliable, examples: ISDN
This is a processing method designed so that a task is
broken up into segments, the segments are sent off to
different computers that work on the segments and then
send the answer back to the co-ordinating / controlling
computer.
Because a cable is susceptible to EMI, it becomes possible
for someone to access your data without piercing your
cable.
A standard cellphone technology that allows improved data
transmission rates as a backward-compatible extension
of GSM. EDGE is considered a pre-3G radio technology.
Mail or messages that are transmitted electronically by
computers to people anywhere else in the world.
Network
Network
Network
Network
Network
Network
Network
Network
Network
Network
Network
Network
Network
Network
Last updated: 15 Aug 2013
EMI (Electromagnetic
interference)
Ethernet
Fibre optic cable
FTP (File Transfer Protocol)
GAN (Global Area Network)
Gateway
GPRS (General Packet Radio
Service)
GSM (Global System for
Mobile Communications)
HSDPA (High Speed
Downlink Packet Access)
HTML (Hyper Text Mark-up
Language)
HTTP (Hyper Text Transfer
Protocol)
Hypertext
Infrared
IP Address (Internet
Protocol Address)
IRC (Internet Relay Chat)
ISDN (Integrated Services
Digital Network)
LAN (Local Area Network)
18 | P a g e
A signal which interferes with normal transmission.
Network
A type of network technology for local area networks;
coaxial cable carries radio frequency signals between
computers at a rate of 10 megabits per second.
Consists of thin strands of glass surrounded by glass
cladding. Fibre uses light beams to transmit data, Fibre cable
is used for connecting different LANs. Immune to EMI and
eavesdropping and lightning.
Enables one to transfer files across the Internet.
Spread over the entire world, e.g. The Internet
Similar to a Router but a gateway translates the different
protocols of different networks instead of just connecting
them. Gateways sit between two networks and converts
requests from one into formats which the receiver can
understand.
A packet oriented mobile data service on
the 2G and 3G cellular communication system's global
system for mobile communications (GSM). GPRS provides
moderate-speed data transfer.
A standard set developed to describe protocols for second
generation (2G) digital cellular networks used by mobile
phones.
A 3G (third generation) mobile telephony communications
protocol which allows networks to have higher data transfer
speeds and capacity. Current HSDPA deployments support
down-link speeds of up to 42 Mbit/s.
The programming language to create web pages.
Network
The rules by which web pages are linked together and how
browsers communicate with web servers.
A document with highlighted words or pictures, which when
clicked on links to other information.
Infrared connects devices in a short range, devices need to
be line-of-sight and only one-to-one connections can be
made.
The address of the physical computer attached to the
Internet. The format of an IP address is a 32-bit numeric
address written as four numbers separated by periods. Each
number can be zero to 255. For example, 1.160.10.240
could be an IP address. Within an isolated network, you can
assign IP addresses at random as long as each one is unique.
However, connecting a private network to the Internet
requires using registered IP addresses (called Internet
addresses) to avoid duplicates.
A Chat through the Internet which allows people, anywhere
in the world, to join in live discussions.
A set of communications standards for
simultaneous digital transmission of voice, video, data, and
other network services over the traditional circuits of
the public switched telephone network.
Network in relatively small area, owned by one organisation
on one property, e.g. computers in an office building are
connected together to share files and printers.
Network
Network
Network
Network
Network
Network
Network
Network
Network
Network
Network
Network
Network
Network
Network
Last updated: 15 Aug 2013
Mailing Lists
MAN (Metropolitan Area
Network)
Mbits (Megabits) per second
Microwave
Modem
Netiquette
Network
Newsgroups
NIC (Network Interface
Card)
PAN (Personal Area
Network)
19 | P a g e
The process of setting up a LAN is simple because you own
or rent the building and you can install cables wherever you
need.
A number of e-mail addresses grouped together, in order
that you can address that “list” as a whole.
A data network designed for a town or city. In terms of
geographic breadth, MANs are larger than local-area
networks (LANs), but smaller than wide-area networks
(WANs). MANs are usually characterized by very high-speed
connections using fibre-optical cable or other digital media.
Measures the rate at which data is transferred over a
medium. Both Downlink and Uplink are measure in Mbits
per second. Downlink is the speed of the connection from
the ISP to the user. Uplink is the speed of connection from
the user to the ISP.
It consists of two directional antennas that face each other to
implement the communication of signals. The dishes are
separated by long distances and have to be in line of sight
facing each other.
Modem (from modulator-demodulator) is a device that
modulates an analogue carrier signal to encode digital
information, and also demodulates such a carrier signal to
decode the transmitted information. The goal is to produce
a signal that can be transmitted easily and decoded to
reproduce the original digital data.
The name given to the use of good manners when using the
Internet and respect for other users.
A collection of computing devices that are connected via
some form of medium.
Benefits of a network:
 Peripherals can be shared (instead of everyone having to
use flash drives to print, etc.)
 Data can be shared.
 Improved communication.
 Anti-virus and other security measures to protect the
data.
A collection of electronic messages arranged by interest
groups, and distributed and accessible over the Internet.
Converts data stored on the comp into a format necessary
to be transmitted via a medium.
The network of small, personal devices (printer, cellphone,
PDA, laptops, smartphones, headset, etc.) connected by
Bluetooth technology.
Requirements to set up a PAN:
 Hardware – wireless capabilities (Bluetooth) or physical
cables.
 Software – operating on laptop and smartphone that
allows connection via cable or via Bluetooth.
 Location – the computers must be located close
together, i.e. 10m in order to be connected to the
network.
Network
Network
Network
Network
Network
Network
Network
Network
Network
Network
Last updated: 15 Aug 2013
Repeater
Router
Satellite
Search engine
Server
Shaped
STP (Shielded Twisted Pair)
Switch
TCP/IP (Transmission
Control Protocol/Internet
Protocol)
The Internet
Topology
Unbounded
Uncapped
Unshaped
URL (Uniform Resource
Locator)
UTP (Unshielded Twisted
Pair)
20 | P a g e
Repeaters simply amplify and regenerate signals received
from one LAN cable and then transmits the upgraded signal
on another LAN cable.
A networking device used to link different networks
together. A switch links items within a LAN. A router joins
various LANs together.
Used to establish communication links in remote locations
or over long distances. Used by Telkom, Military and other
media organisations.
A software program that searches documents located on
the internet for key word or phrases entered by a person
looking for information.
A server is a system (software and suitable computer
hardware) that responds to requests across a computer
network to provide, or help to provide, a network service.
Servers can be run on a dedicated computer, which is also
often referred to as "the server", but many networked
computers are capable of hosting servers. In many cases, a
computer can provide several services and have several
servers running.
Data transfer is controlled by the ISP. Namely, certain
operations of your account are given priority over others,
e.g. e-mail is completed first before any file downloads OR
certain protocols are given preference.
Same as UTP except cable is shielded with foil to protect
from EMI.
In networks, a device that filters and forwards packets
between LAN segments. Regenerates and amplifies the
signal and performs an intelligent path selection as well as
network management.
An essential communications protocol which controls the
transmission of data across the Internet.
Network
A worldwide collection of computers or networks that are
linked all over the world using telephone lines, microwave
and satellite.
The physical layout of the computer network. (i.e. How the
nodes are physically connected to one another)
Star Topology – most commonly used with UTP, fast and
easy to set up, easy to add new users, if one node breaks
there is still access to the other nodes, uses a central switch
and is therefore more secure.
Media connected by means of a wireless connection, e.g.
Infrared, Bluetooth and Wi-Fi.
There is no data transfer limit, you only pay a single rental
amount each month.
Data transfer is not controlled by the ISP and is operated on
a first come first served basis FIFO OR all protocols are
treated in the same way and no protocol is given priority.
The unique address of every web site.
Network
A pair of wires twisted about each other forming a twisted
pair. Used for most star LANs.
Network
Network
Network
Network
Network
Network
Network
Network
Network
Network
Network
Network
Network
Network
Last updated: 15 Aug 2013
VPN (Virtual Private
Network)
A private network that uses the Internet to allow computers
to connect as though they are connected in a LAN.
Any TWO benefits:
 The VPN ensures privacy in terms of who can access
the data by using encryption and usernames and
passwords to log in.
 A VPN can be provided at a much lower cost by using a
shared infrastructure.
 Managers can access the company network when they
are on trips, at home, etc. always available.
 A VPN eliminates the need for expensive long-distance
leased lines as they require only a dedicated
connection to ISP. This is a much cheaper alternative as
it reduces long-distance telephone charges and support
costs.
Network spread over many provinces or countries, e.g. GAN
and an Enterprise WAN. An example: a country-wide
network of a bank. Creating a WAN is not as easy and you
cannot simply lay a cable across a city – you don’t own the
land and there are laws that govern this. To establish a WAN
means getting a 3rd party involved, e.g. Telkom, to supply
the connection.
WAN (Wide Area Network)
Network
Network
Benefits of setting up a WAN:
 Connect various offices, rangers, organisations and antipoaching units.
 To ensure that data is always up-to-date.
 To ensure that data is available to everyone, all the time.
 Communication via email, telephone, instant messaging,
chat rooms, video telephone calls and video
conferencing.
 Access can be restricted to confidential data by
allocating users specific rights and making use of
passwords.




Web Browser
Wi-Fi
21 | P a g e
Various WAN Connections:
Cable – e.g. Telkom connects most of the towns in the
country and undersea cables connecting continents.
Satellite – e.g. DSTV, Internet.
Microwave – e.g. transmit data and voice signals in built-up
areas.
Cellular phone network – surfing, phoning, texting, watching
videos, TV – high bandwidth needed for multimedia
applications such as video.
Software that allows you to view and explore Web pages on
the Internet, e.g. Internet Explorer, Netscape Navigator,
Google Chrome.
A popular technology that allows an electronic device to
exchange data wirelessly (using radio waves) over
a computer network, including high-speed
Internet connections. A device that can use Wi-Fi (such as a
personal computer, video game console,
Network
Network
Last updated: 15 Aug 2013
WLAN (Wireless LAN)
smartphone, tablet, or digital audio player) can connect to a
network resource such as the Internet via a wireless network
access point. Hotspot coverage can comprise an area as
small as a single room with walls that block radio waves or
as large as many square miles — this is achieved by using
multiple overlapping access points.
Links two or more devices using some wireless distribution
method, and usually providing a connection through an
access point to the wider internet. This gives users the
mobility to move around within a local coverage area and
still be connected to the network. Wireless LANs have
become popular in the home due to ease of installation, and
in commercial complexes offering wireless access to their
customers; often for free.
Network
Benefits of wireless:
 More flexible as not limited by cables.
 High-speed Internet access as well as high quality data,
video and music services offered using cellular phone
networks.
 A variety of different package options for users to
choose from depending on their particular needs.
 It is a permanent, ‘always on’ connection on the
Internet.
 Low cost – no cost for connection time, the costs are for
the amount of data uploaded and downloaded and are
included in the monthly costs.
 Signals can be sent through doors and walls so the
stations can be mobile.
 Easier to install equipment as no cabling is required.
 Access anywhere, anytime / wider accessibility or
coverage.
WWW (World Wide Web)
Adware
Anti-spyware
Anti-virus program
22 | P a g e
Disadvantages of wireless:
 If the user is in an area without 3G coverage, they will
encounter slower speeds or lose their connection.
 Can be expensive when downloading large amount of
information as you pay for the amount of data you
download.
 More difficult to configure / needs experienced network
technician.
 Potentially less secure.
 Signals cannot always be accessed.
(World wide web) A collection of multi-media, interactive
documents linked together and governed by the HTTP
Software that causes unwanted advertising to appear in
various programs
Programs designed to remove or block spyware, as well as
various user practices which reduce the chance of getting
spyware on a system.
Programs which scan the entire memory of a computer for
“signatures” of known viruses, and alert the user if any are
found. Anti-virus software must be kept up to date, e.g.
Norton Anti-Virus, McAfee, Dr Solomon’s
Network
Security
Security
Security
Last updated: 15 Aug 2013
AUP (Acceptable Use Policy)


Backup
Biometrics
Copyright
Cracker
Cyber stalking
Data Protection Act
Data Theft
Digital Signature
DOS (Denial of Service)
attacks
Encryption
EULA (End-user Licence
Agreement)
23 | P a g e
An agreement specifying the terms of use agreed to by the
user. Each employee could sign an AUP (Acceptable Use
Policy) so that they are aware of the acceptable use of
computer equipment and network resources.
Some items to include in an AUP:
 Restrict employees’ time on social networking sites.
 Employers could monitor or restrict use of the computer
for personal use.
 Playing computer games.
 Installing software not licensed to the organisation.
 Installing business software on a personal computer.
 Vandalism and theft of equipment.
 The size of file downloads and email attachments.
 Misuse of Internet facilities for downloading software,
private shopping, browsing instead of working or
accessing pornography.
 Employers could add disclaimers to all company email.
A utility to make copies of your data on to a medium such as
CD or tape in case of future loss of data. It is important to
keep backed up data off-site to prevent data getting lost
when computers are stolen or damaged in a fire.
The security option that authenticates someone’s identity
by verifying personal characteristics.
Software is developed and all rights belong to the
owner/developer.
Someone who breaks into a computer with an intention of
committing a crime.
People who are intruding in other peoples personal details
online.
This was brought 1984 in the UK. It provides a legal
framework and allows for the privacy of personal data.
The theft of passwords, code names, etc. to commit a crime
or even the theft of actual data for blackmailing purposes.
Preventing Data Theft: Never give out your password to
anyone or leave your computer logged on with easy access
to your data.
An electronic, rather than a hand-written signature that can
be used by someone to authenticate the identity of the
sender of the message.
Generally via a virus, overloads the website making it
unusable.
The process of transforming information (referred to
as plaintext) using an algorithm (called a cipher) to make it
unreadable to anyone except those possessing special
knowledge, usually referred to as a key. The result of the
process is information (in cryptography, referred to
as ciphertext). The reverse process, i.e., to make the
encrypted information readable again, is referred to
as decryption (i.e., to make it unencrypted).
In the proprietary software industry, an end-user license
agreement or software license agreement is
the contract between the licensor and purchaser,
establishing the purchaser's right to use the software.
Security
Security
Security
Security
Security
Security
Security
Security
Security
Security
Security
Security
Last updated: 15 Aug 2013
Extortion
Fingerprint of virus
Firewall
Fraud
Good password practice
Hacker
Hoax
Identity Theft
24 | P a g e
Companies are sometimes threatened with viruses and
hacker attacks such as DOS (Denial of Service). The company
may pay extortionists to prevent them from embarrassing
the company. Also, valuable information can also be stolen
electronically and then sold back to the company, at a high
price, to prevent the information getting into the wrong
hands.
The specific pattern of behaviour of the virus program.
(What the anti-virus program looks for)
Software designed to prevent unauthorised access to or
from a private network.
A firewall is an integrated collection of security measures
designed to prevent unauthorized electronic access to a
networked computer system. It is also a device or set of
devices configured to permit, deny, encrypt, decrypt, or
proxy all computer traffic between different security
domains based upon a set of rules and other criteria.
Using modern technology for the creation of false
documents, e.g. ID documents
 Passwords should be changed frequently
 Your identity number is not a good example of a secure
password
 Keep your password a secret
 Avoid using conventional words or regular words with
numbers tacked on the end
 Avoid personal information, i.e. your ID number is not
a good example of a secure password
 As a general rule the following character sets should all
be included in every password:
 uppercase letters such as A, B, C;
 lowercase letters such as a, b,c;
 numerals such as 1, 2, 3;
 special characters such as $, ?, &; and
 alt characters such as µ, £, Æ. (Cliff)
Somebody who breaks into computers but have no
intention of committing a crime.
A cybercrime where chain messages are used in committing
fraud. Usually an e-mail message that warns people about a
virus that does not exist. Usually is over-the-top, warning
people that the virus can do impossible things (like burning
out your hard drive or frying your RAM). Often contains
capitals, exclamation marks, bad spelling and grammar,
says it comes from several well-known companies (few of
which are likely to be anti-virus companies) and encourages
you to forward the message to all the people you know
before the world ends!
A form of stealing someone's identity in which someone
pretends to be someone else by assuming that person's
identity, typically in order to access resources or obtain
credit and other benefits in that person's name.
Preventing Identity Theft: Monitor your credit closely, keep
records of your financial data and transactions, install
Security
Security
Security
Security
Security
Security
Security
Security
Last updated: 15 Aug 2013
Keylogging
Logic bomb
Malware
Payload
Pharming
Phishing
Physical Security Measures
Piggybacking
PIN (Personal Identification
Number)
25 | P a g e
security software, use an updated Web browser, be wary of
e-mail attachments and links in both e-mail and instant
messages, store sensitive data securely, shred confidential
documents, protect your PIN, stay alert to the latest scams.
Software that records all the keystrokes (and possibly
mouse movements, clicks and screenshots of where the
mouse is when clicked) of your activity on a computer. This
data can be analysed to discover otherwise hidden
information such as passwords, back account details etc.
Keyloggers are often Trojans (programs that pretend to do
one thing and actually have hidden features such as the
keylogging code).
A virus which lies dormant until it is executed a certain
number of times, or on a certain date.
A category of software that is intended to damage the
computer, corrupt data and/or steal data/identities.
In computer security, payload refers to the part of
a computer virus which performs a malicious action.
A dishonest trick when fraudsters lure you to a look like
website with the express purpose of defrauding you.
A computer crime where criminals attempt to access your
confidential information, e.g. bank login and identity details
through an e-mail request in order to defraud you.
Identify if an e-mail is fraudulent:
 Requests the user to confirm and update their personal
details.
 The subject line is deceptive indicating the importance of
the email and that it deals with security issues.
 Requests the user to click on a link; this could be a
disguised hyperlink which might take you to a spoofed
website.
 The format of the email as well as accuracy (capital
letters) is not professional.
 The email is not signed by a company official.
 The email is not addressed to a specific person.
Any TWO physical security measures:
 Install a security camera
 Allow room key access only (accept lock room)
 Use security cables to ‘lock down’ equipment
 Security guards
 Tracking devices
 Alarm
 Biometric device
 Thumb print scanning
 Access card key
 Physical fire related walls and doors
The practice of establishing a wireless Internet
connection by using another subscriber's wireless Internet
access service without the subscriber's explicit permission or
knowledge.
A secret numeric password shared between a user and a
system that can be used to authenticate the user to the
system. PINs are most often used for automated teller
Security
Security
Security
Security
Security
Security
Security
Security
Security
Last updated: 15 Aug 2013
machines (ATMs) but are increasingly used at the point of
sale, for debit cards and credit cards.
The use of materials and sources without acknowledging the
author.
A form of online advertising on the World Wide
Web intended to attract web traffic or capture email
addresses. Pop-ups are generally new web browser
windows to display advertisements.
A specific software-based key for certain computer
programs which is also used to track the number of
installations of the product.
Extracting small amounts of money from financial
transactions, for one’s own gain.
False organisations that trick you into doing business with
them online, which means you, lose money.
The illegal copying or downloading of programs for
commercial or personal use.
Unsolicited e-mail messages.
The act of impersonating as a person or organisation,
usually be giving a false e-mail name or URL.
Software that gathers information about a person or
organization without their knowledge. On the Internet,
spyware is programming that is put in someone's computer
to secretly gather information about the user and relay it to
advertisers or other interested parties. Spyware can get in a
computer as a software virus or as the result of installing a
new program.
Plagiarism
Pop-ups
Product Key
Salami technique
Scams
Software Piracy
SPAM
Spoofing
Spyware
Trapdoor
Trojan horse
Validity of website
Virus
Web filter
26 | P a g e

Preventing Spyware: Use a firewall, update your software,
adjust web browser security settings, download and install
anti-spyware software, only download programs from
reputable websites.
Leaving a backdoor in a program for unauthorised access.
A program that pretends to be innocent, but carries out
harmful activities when activated.
Checking validity of a website:
 Cross reference the site – see which sites link to this site
and which sites they link to.
 Google the site name to see if it is a scam.
 Look through the entire website – if the form and
donations section is all that the site consists of then be
suspicious.
 Check the contact details of the site.
(3)
 Check the site for a digital certificate, e.g. Verisign –
secure payment.
A program that has been written with malicious intent to do
something unwanted or unexpected to one’s Computer,
AND it copies itself.
Software designed and optimized for controlling what
content is permitted to a reader, especially when it is used
to restrict material delivered over the Internet via
the Web, e-mail, or other means. Content-control software
determines what content will be available or perhaps more
often what content will be blocked.
Security
Security
Security
Security
Security
Security
Security
Security
Security
Security
Security
Security
Security
Security
Last updated: 15 Aug 2013
Worm
Zapping
A.I. (Artificial Intelligence)
Add/remove programs
Application
Attachment
Batch processing
BIOS (Basic Input Output
System)
Bitmap Graphics
C.B.T. (Computer Based
Training)
CAD (Computer Aided
Design)
Command-line OS
Configuration
D.T.P. (Desk Top Publishing)
Desktop
27 | P a g e
A self-replicating program that copies itself into memory
(usually through a network connection) and fills up memory
and disk space, often slowing down the computer
dramatically or having a detrimental effect on a computer.
Bypassing any security with the aid of an illegally acquired
software package.
Computers created with capabilities of human intelligence,
e.g. Voice recognition, Virtual doctor.
A utility program that is used to remove all parts of the
programs on your computer, including Registry entries and
shortcuts.
Application software is any tool that functions and is
operated by means of a computer, with the purpose of
supporting or improving the software user's work.
A computer file sent along with an e-mail message. One or
more files can be attached to any e-mail message, and be
sent along with it to the recipient. This is typically used as a
simple method to share documents and images. A paper clip
image is the standard image for an attachment in an email
client.
Precautions to take when opening attachments:
The attachment could contain a virus or other malware.
The attachment might have exceeded the maximum
allowed size.
The firewall may have blacklisted the website that is
referred to in the attachment.
The attachment might contain potentially dangerous files
such as exe files, etc.
When data is gathered in transaction files, and then
processed against the Master file “offline”; usually
overnight.
Sits on the ROM chip which is invoked to boot up the P.C.,
and controls communication between the O.S. and some of
the basic hardware devices, e.g. keyboard, hard drive.
A bitmap is one of many types of file formats for images
stored in a computerized form. The image is made up of a
collection of bits (pixels) that form the image. Example:
.bmp, .jpeg, .gif, .tiff
Any training that uses a computer and software as the main
point of instruction. Usually with screen instruction and
headphones, (Multimedia).
Application Software used in Art / Architecture/
engineering, etc.
“Older” operating system, such as DOS, which require the
user to type text-based instructions; no WIMP.
Specific arrangement your hardware components and
software settings (and programs) to meet your specific
requirements.
Page Layout (like Typesetting) for publications such as
newspapers, magazines and brochures, e.g. Microsoft
Publisher.
In graphical user interfaces, a desktop is the metaphor used
to portray file systems. Such a desktop consists of pictures,
Security
Security
Software
Software
Software
Software
Software
Software
Software
Software
Software
Software
Software
Software
Software
Last updated: 15 Aug 2013
Device Driver
Disk Cleanup
Disk Defragmenter (Defrag)
Disk Optimiser
Disk Recovery
Embedded Operating
System
FAQ (Frequently Asked
Questions)
FAT32
28 | P a g e
called icons that show cabinets, files, folders, and various
types of documents. You can arrange the icons on the
electronic desktop just as you can arrange real objects on a
real desktop -- moving them around, putting one on top of
another, reshuffling them, and throwing them away.
A program that facilitates communication between a
computer and a peripheral device, e.g. printer, mouse,
scanner, etc.
A computer maintenance utility included in Microsoft
Windows designed to free up disk space on a computer's
hard drive. The utility first searches and analyses the hard
drive for files that are no longer of any use, and then
removes the unnecessary files. There are a number of
different file categories that Disk Cleanup targets when
performing the initial disk analysis:
 Compression of old files
 Temporary Internet files
 Temporary Windows file
 Downloaded program files
 Recycle Bin
 Removal of unused applications or optional Windows
components
 Setup log files
 Off-line files
A housekeeping utility included in Microsoft Windows that
physically organises the contents of the disk to store the
pieces of each file close together and contiguously.
Defragmentation refers to the condition of a disk in which
files are divided into pieces scattered around the disk.
Fragmentation occurs naturally when you use a disk
frequently, creating, deleting, and modifying files. At some
point, the operating system needs to store parts of a file in
non-contiguous clusters. This is entirely invisible to users,
but it can slow down the speed at which data is accessed
because the disk drive must search through different parts
of the disk to put together a single file.
A utility program which scans the computer and optimises
the performance by making the disk more efficient. It uses a
variety of techniques including defragmenting the disk.
Software that makes it possible to retrieve lost files that
cannot be accessed by standard computer procedures.
Data loss can occur due to many reasons like accidental
formatting of a hard drive, sudden power spikes, virus
attacks, computer hardware malfunction, impairment of the
file system components, etc.
Software that resides on a ROM chip inside most electronic
consumer devices such as smartphones, media players,
PDA’s and tablets.
A common type of document found on a website that
contains a list of questions and answers.
A more recent version of the File Allocation Table which
uses space more efficiently.
Software
Software
Software
Software
Software
Software
Software
Software
Last updated: 15 Aug 2013
Formatting
Freeware
GIMP
GUI (Graphical User
Interface)
Hot Swappable
Kernel
Linux
Mobile Operating System
(Mobile OS)
Multi user /multi access
Multiprocessing
Multitasking
NTFS (NT File System)
OCR (Optical Character
Recognition)
Office Suite
29 | P a g e
The process of preparing a disk for reading and writing.
Formatting a disk removes all contents and wipes the disk
clean.
Software that can be downloaded and used without a
charge.
A free, open source image editor that provides advanced
features close to those of Photoshop.
A user-friendly environment which implements Windows,
icons, menus and Pointers (WIMP).
An extension of plug and play. A new device can be attached
to a computer whilst the computer is still running, without
powering down, setting up the device and rebooting.
The core of the Operating System which is loaded into RAM
at boot- up, and remains there.
A freely-distributable open source operating system that
runs on a number of hardware platforms. Linux has become
an extremely popular alternative to proprietary operating
systems.
The operating system that operates a smartphone, tablet,
PDA, or other digital mobile devices. Modern mobile
operating systems combine the features of a personal
computer operating system with touchscreen, cellular,
Bluetooth, Wi-Fi, GPS mobile navigation, camera, video
camera, speech recognition, voice recorder, music player,
Near field communication, personal digital assistant (PDA),
and other features.
Some examples include: iOS, Windows Mobile, Android
(Linux based), Symbian, OS X (iPhone – Unix Based), Palm OS
Many users accessing the same computer / files
simultaneously, e.g. Autobank, Mainframe environment.
When a computer is able to run more than one program at
the same time.
The ability to open more than one application at a time and
switch between them, e.g. In Windows you may have three
Word documents open, at the same time as an Excel
document, at the same time as an Internet site, etc.
One of the file systems for the Windows NT operating
system (Windows NT also supports the FAT file system).
NTFS has features to improve reliability, such as transaction
logs to help recover from disk failures. To control access to
files, you can set permissions for directories and/or
individual files. NTFS files are not accessible from other
operating systems such as DOS.
The mechanical or electronic conversion of
scanned images of handwritten, typewritten or printed text
into machine-encoded text. It is widely used as a form of
data entry from some sort of original paper data source,
whether documents, sales receipts, mail, or any number of
printed records. It is a common method of digitizing printed
texts so that they can be electronically searched, stored
more compactly and displayed on-line.
A package which includes a number of standalone programs
provides a similar user interface for all packages, easy to
move between applications, easy to transfer data between
Software
Software
Software
Software
Software
Software
Software
Software
Software
Software
Software
Software
Software
Software
Last updated: 15 Aug 2013
OpenOffice
Open-source Software
Operating System
applications, cheaper as bought as one – packages do not
have to be purchased separately.
Types of applications included: Word processing,
spreadsheet, presentations, e-mail, and database.
A free, open source alternative to commercial office suites.
Includes, word processor, spreadsheet, presentations and a
database. Compatible with most commercial packages.
Software for which the source code is available to the user.
The software is free to use, copy, modify or redistribute to
the community. Linux is an example.
The most important program that runs on a computer.
Every general-purpose computer must have an operating
system to run other programs. Operating systems perform
basic tasks, such as recognizing input from the keyboard,
sending output to the display screen, keeping track of files
and directories on the disk, and controlling peripheral
devices such as disk drives and printers.
Software
Software
Software
Any TWO functions:
 CPU Management: Manages the way that the CPU is fed
with data and instructions and controlling which
program gets to use the CPU and for how long
 Memory Management: Manage the allocation of
memory to programs to ensure that each application
has sufficient memory available.
 Storage Management: Controls the management of files
on storage devices and the transfer of data and
instructions from storage to memory and vice versa.
 Device Management - Manages and controls
input/output to and from peripherals OR controlling
peripherals.
 User Interface – Accepts and interprets commands and
instructions from the user OR makes it easier for the
user to communicate.
 Security Management – Ensures that unauthorised users
do not access the system.
 Error Handling – Prevents damage to hardware and
data.
 Hardware and Software Management – controls the
management of all hardware devices and installation
and removal of software.
Patch
30 | P a g e
A type of software program which fixes another software
flaw or vulnerability in a program.
Software
Last updated: 15 Aug 2013
PDF (Portable Document
Format)
Plug n Play
Plug-in
POS (Point of Sale)
POST (Power on Self Test)
Proprietary Software
Real Time Processing
Registry
Scandisk
Shareware
Software
SP3 (Service Pack 3)
31 | P a g e
A type of document format which is independent of the
application it was created in.
Advantages of saving in PDF format:
 Other computer users will not always have the
appropriate software to open/edit the documents you
send them; the software to read PDF files is free and
widely used.
 Compatible across various platforms, i.e. Windows,
Linux, MacOS.
 Secure, almost no chance of getting infected with
viruses.
 Securable, avoid people from modifying and
redistributing your work – read-only.
 Easy and quick to create when using the right software
from any source document/application.
 Software to view PDF Files is completely free.
 Compatible with modern portable readers.
 Compressed, therefore small in size. Multiple
documents can be merged into one single PDF file.
 PDF files can be digitally signed or password protect.
 Final stage ready for printing.
 PDF files can be viewed in your favourite web browser.
When a new hardware device attached to a computer can
be detected and configured automatically without requiring
a manual installation.
A set of software components that adds specific capabilities
to a larger software application.
The software used to manage tills in shops and
supermarkets. Usually linked to some form of stock control
software.
A routine called by BIOS to check that all hardware
components are OK according to the CMOS settings.
Privately owned and controlled software that is offered for
sale or licence and cannot be freely distributed. The
developer holds the source and the code generally cannot
be viewed or edited.
When access and updates are made against the “live”
Master file immediately.
A hierarchical table, which stores hardware and software
settings, user profile settings and network settings.
A Windows utility used to check your hard disk for errors
and correct problems that are found, especially lost clusters
and cross-linked files.
Shareware (also termed trialware or demoware)
is proprietary software that is provided to users on a very
limited basis and only for a certain limited trial basis and
legally to a license which restricts any commercial benefit,
use or exploitation of the software.
Programs written to control, support and operate the
computer itself (It enables everything on your computer to
work better) e.g. operating system, utilities, drivers etc.
Service Pack 3 shows which release/version of XP Pro must
be used, as later releases have upgraded features.
Software
Software
Software
Software
Software
Software
Software
Software
Software
Software
Software
Software
Last updated: 15 Aug 2013
Spooler
Symbian
Synchronising
System software
Utility Software
Vector Graphics
Virtual keyboard
Virtual Memory
Virtualisation
32 | P a g e
A program to “spool” (manage) printout sent to a printer. It
may have logic to give some users priority over other users,
keep BIG jobs back, etc.
An OS used in mobile devices such as smartphones. In
competition with other mobile OS’s such as Windows
Mobile, OS X (on the iPhone), Android (Linux based on the
GPhone) and Palm OS. Symbian is an open industry standard
(i.e. everyone can find out how it works and how to
program for it) but it is neither free nor open source.
When a cell phone is synchronised with a PC a list of
contacts and appointments on each device is updated to
reflect changes made on each of them, e.g. you add a new
contact on your phone and delete an old one on your PC.
When you synch the contact is deleted on the phone as well
and the new contact is added to the contacts on the pc.
Synching can take place through cable connections,
Bluetooth or using a web technology like apple’s ‘Mobile
Me’.
Programs written to operate and control the computer itself
(It enables everything on your computer to work better) e.g.
O/S, utilities, drivers etc.
A program that performs a very specific task, usually related
to managing system resources. Operating systems contain a
number of utilities for managing disk drives, printers, and
other devices.
Vector graphics consist of layers and shapes that can be
moved and changed, e.g. AutoShapes, WordArt.
A software component that allows a user to enter
characters. A virtual keyboard can usually be operated with
multiple input devices, which may include a touchscreen, an
actual keyboard and a computer mouse.
Use of hard drive space to swap out data when insufficient
RAM exists to hold all such data.
Software
Creating a ‘virtual’ (i.e. not real) computer (i.e. a full
simulation of the hardware) on your computer using
software. This allows all types of software that can work
with this hardware to be installed on the ‘virtual’ computer.
A virtual computer has the advantage of allowing the user to
work with different configurations on the same physical
machine, e.g. you can run different operating systems with
different software installed at the same time – or test out
different drivers / application software / utilities without
changing the configuration of your real system.
An example of usage: – let’s say you want to test Linux but
don’t want to remove your current set up and install Linux
on your computer, nor do you want to make a dual boot
system. Using Virtualisation software you create a virtual PC
Software
Software
Software
Software
Software
Software
Software
Software
Last updated: 15 Aug 2013
Wizard
Absolute cell reference
Conditional Formatting
COUNTIF
Data validation
Error messages
Formula
Function
Range
Relative cell reference
SUMIF
Text functions
Booting in safe mode
Boot-up process
Cannot open a file


33 | P a g e
and install Linux on that. You can then run Linux and test it
on the virtual PC without affecting your current setup at all.
A feature that guides a user through a process such as
creating a document.
The cell address in a formula is not changed when it is
copied.
Formatting of data on reports or computer programs those
changes based upon specific criteria. An example of
conditional formatting would include printing and displaying
negative quantities in red.
Counts the number of cells within a range that meet the
given criteria.
Control the accuracy of data being input into a database or
spreadsheet. Features used, i.e. input mask, validation rule,
drop-down boxes, changing the property size of a field.
#REF! – occurs when the value in a cell referred to in a
formula has been deleted.
####### - column is too narrow.
#DIV/0!
A statement written by the user to be calculated. Formulas
can be as simple or as complex as the user wants. A formula
can contain values, references to cells, defined names, and
functions. All formulas must start with the equals sign.
=1+2+3
A named and store procedure that performs a specific
operation and returns a value.
Functions are typed alongside brackets, where in the
arguments if any are listed in between. To use functions in a
formula, for example:
=NOW() returns the current date and time.
=SUM(A1:A3) *2 will multiply the sum by 2
MAX, MIN, MID, MEDIAN, MODE, VLOOKUP, IF
Two or more adjacent cells on a spreadsheet.
A cell address in a formula that changes when copied to
another cell.
Adds all numbers in a range of cells, based on given criteria.
UPPER, LOWER, CONCATENATE, LEFT, RIGHT, LEN, MID
Booting in safe mode is when Windows starts up and loads
very bare bones configuration, it does not load the drivers
for all the hardware on your computer but uses its own
stable and safe drivers for the minimum set of hardware to
allow the computer to function.
The instructions that display this information are stored on a
ROM. Since the ROM is a microchip (hardware) that
contains programs (software), it is referred to as firmware.
Results of hardware checks such as the drives that are
available, the operating logo and the amount of RAM
installed.
Possible cause:
File extension left out – not associated to a program
Could be trying to open a file with an older software
version.
Solution:
 Rename the file with the correct extension.
Software
Spreadsheet
Spreadsheet
Spreadsheet
Spreadsheet
Databases
Spreadsheet
Spreadsheet
Spreadsheet
Spreadsheet
Spreadsheet
Spreadsheet
Spreadsheet
Troubleshooting
Troubleshooting
Troubleshooting
Last updated: 15 Aug 2013
 Check that the correct software has been installed.
Faulty hardware
Files taking long to open
Monitor not displaying a
picture
Non- disk error
Non-responding application
Out of space on HDD
Power-saving Mode
Printer spooling
Printing
34 | P a g e
Possible cause:
The computer BIOS POST test has picked up a fault with the
HDD, RAM, keyboard, etc.
Solution:
The technician would have to check the motherboard and
all components to see which one is faulty. Hardware fault/
hardware repair.
Possible solution:
The simplest solution would be to reboot your computer.
Restarting your PC can help clear out temporary files that
build up on the hard disk.
OR
Perform a Disk Cleanup by selecting Start, All programs,
Accessories, System Tools and then click on Disk Cleanup.
OR
Defragmenting the hard drive so the files are grouped
together making access time faster.
Cause – solution:
Monitor might not be switched on – switch on monitor.
Power cable might be loose – re-connect.
Graphic card may be faulty – replace.
Troubleshooting
It is a message relating to the fact that the operating cannot
be found or a drive is Non- meaning the media is not
bootable. It could be very possible that pupils use CDs or
DVDs to save their work and they have left them I the disk
drive.
The program does not respond, too many programs running
at once, needs more RAM, power surges or her computer is
overheating.
Troubleshooting
Solution: Press <Ctrl><Alt><Delete> to bring up the
Windows Task Manager or select Task Manager on the
taskbar, select Task List, then under Applications, choose
the program that is not responding and end the task.
Downloaded too much music and photos.
Solution: Disk Cleanup Utility program to remove temporary
files and empty the Recycle Bin. Compress files that are not
used regularly.
The power options in the Control Panel have been set to
reduce the power consumption of devices and the
computer has gone on standby after a specified period of
inactivity.
This is when the process of printing is slower than the speed
of the notebooks/PC and a technique is used where
documents waiting to be printed are stored on a disk, in a
queue until the printer is ready to process them. Documents
waiting to be printed are temporarily stored on a disk and
are held in a queue until the printer is ready to print them –
this is referred to as printer spooling.
Printer not printing
Troubleshooting
Troubleshooting
Troubleshooting
Troubleshooting
Troubleshooting
Troubleshooting
Troubleshooting
Last updated: 15 Aug 2013
Possible causes:
 The wireless link has been broken and they are no longer
connected to the printer.
 No paper in the printer.
 Printer is jammed.
 Too many jobs in the queue.
Problem with speakers
ScanDisk
Bookmark
Charts
Footnote / Endnote
Form Letter
Hyperlink
Mail merge
Subscript
35 | P a g e
Solution:
 Check that the printer is on.
 Check that the connection from the computer is
working.
 Check that the printer has paper.
 Check for paper jams.
 Cancel any duplicate jobs
Possible causes:
 Speakers not connected into the correct socket.
 Volume is not muted.
 CD might be faulty.
Solution:
 Plug speakers into correct socket
 Unmute volute
 Try another CD
 Check the speaker settings
A windows utility used to check your hard disk for errors and
correct problems that are found. (especially lost clusters and
cross linked files)
Identifies a location or selection of text that you name and
identify for future reference, e.g. you might use a bookmark
to identify text that you want to revise at a later time.
Line chart: often used to visualize a trend in data over
intervals of time.
Bar chart: a chart with bars whose lengths are proportional
to quantities.
Pie chart: show and compare the cost percentages of items.
Both footnotes and endnotes are used in documents to give
a more detailed explanation of certain text, make comments
on certain statements, and refer to the source from which
certain facts were obtained or to supply the name of the
person who is quoted.
Footnote – inserted under specific text or at the end of the
page.
Endnotes – inserted at the end of the document or the end
of a section.
A standard letter created to be personally addressed and
distributed to a mailing list.
A link to another place in a document or to an external
website or document.
A document is merged with a list of names/addresses to
avoid having to type out letters out individually.
Text that appears in smaller script below the text line, e.g.
H2O.
Troubleshooting
Troubleshooting
Word
processing
Word
processing
Word
processing
Word
processing
Word
processing
Word
processing
Word
processing
Last updated: 15 Aug 2013
Superscript
Text that appears in smaller script above the text line, e.g. 23
Table of contents
An alphabetical list of terms and topics discussed in a
document, along with the pages they appear on.
Prepare heading by using built-in styles
The ready-prepared document layout.
Template
Track changes
Track changes
36 | P a g e
An editing command that is commonly used when you
create a document and make changes and want to keep
track of the changes that you made. It is also a useful tool
for collaborating on a document as it allows multiple users
to make revisions without losing the context of the original
document.
Changes made to a document are shown. Deletions are
shown as strike-through text and insertions are underlined.
Word
processing
Word
processing
Word
processing
Word
processing
Word
processing
Last updated: 15 Aug 2013
Download