ITGS Project
ITGS Project
Core
application areas
ethical issues
ethics
information technology
social and ethical considerations
social impacts
stakeholders
Strand 1
anonymity
authenticity
compatibility
cultural diversity
cultural impact
digital citizenship
economic impact
environmental impact
equality of access
ergonomic impact
globalization
health impact
integrity
intellectual property
legal impact
policies
political impact
privacy
protocols
psychological impact
reliability
security
standards
surveillance
the digital divide
unauthorised access
Strand 2
Business and employment
Education and training
Environment
Health
Home and leisure
Politics and Government
Strand 3
input
networking
output
processing
Page 1
Intro
storage
General terms
RSS feed
RSS reader
Page 2
Hardware
Page 3
Hardware
Page 4
Hardware
RAID
ROM
RAM
Random Access Memory
Read Only Memory
SATA
Secondary storage
secure deletion
solid state storage
TB
Terabyte
Universal Serial Bus
USB
volatile storage
YB
ZB
yottabyte
zettabyte
Misc ASCII
American Standard Code for Information
Convergence
failover system
Global Positioning System
GPS
RFID
Kensington lock
plain text
Radio Frequency Identification
radio tag
RFID reader
RFID tag
RTF
Rich Text Format
Unicode
UPS
uptime
Uninterruptible Power Supply
Voice over Internet Protocol
VoIP
Types of Computer desktop computer
Embedded systems
HTPC
Home Theatre PC
laptop
mainframe
netbook
PDA
Personal Digital Assistant
smartphones
supercomputers
Page 5
Hardware
Page 6
Hardware
Page 7
Hardware
A type of barcode.
See soft keyboard
Use of spoken commands to control a computer.
Use of software to convert spoken words into text.
Input device used to record video, often found in laptop computers.
Output device. Older type of monitor, now almost obsolete.
A printed paper copy of data.
Printer that works by spraying ink through nozzles at a sheet of paper.
Device that uses a projector for output and touch inputs, using a special pen.
High speed printer.
Output device. The newer type of monitor which is flat.
Resolution of an LCD display that produces the best display quality.
Information which is produced by a computer system.
Speed at which a printer produces output.
Output device which produces paper copies.
Output device for displaying content on large screens.
Output device for sound.
A single binary digit (a 1 or a 0). The smallest unit of storage inside a computer.
Optical secondary storage device capable of storing 16GB+.
Storage unit: 8 bits. Enough to store a single ASCII text character.
Optical secondary storage device capable of holding 650-700MB of data.
Solid state storage device usually used in digital cameras.
Exchanging data between a computer and a portable device such as a smart phone.
Securing deleting files from a disk, beyond recovery.
Optical secondary storage device capable of storing up to 8GB.
A modern type of connector for attaching external hard disks
See Exabyte
Storage unit: 1024 petabytes.
Portable storage device often used for backups.
Interface for attaching external hard disks and digital video cameras.
See solid state storage.
See Gigabyte.
Storage unit: 1024 megabytes.
Magnetic secondary storage device found in most desktop and laptop computers.
Interface for attaching internal hard disks.
Data or information that is entered into the computer.
See kilobyte.
Storage unit: 1024 bytes
Type of secondary storage that users magnets to read and store data. Examples include floppy disks and hard disks.
See megabyte.
Storage unit: 1024 kilobytes
Solid state secondary storage device, often used for digital cameras.
Input device used to control a cursor or pointer.
Storage which does not lose its contents when the power is removed.
Storage devices which use lasers to store and read data. Examples include CDs and DVDs.
See petabyte.
Storage unit: 1024 terabytes
Storage systems which are found inside the computer and are electronic. RAM and ROM are examples.
System where multiple hard disks contain duplicate data, to be used in the event of one failing.
System which will take over the role of a primary system if it fails.
Page 8
Hardware
Redundant Array of Inexpensive Disks. A way of having two (or more) hard disks in a computer and having the exact sam
See Read Only Memory.
See Random Access Memory.
Primary storage which is fast, relatively expensive, and volatile.
Primary storage whose contents are written at manufacture and cannot be altered later.
Interface for connecting storage devices like hard disks.
Storage systems which are connected externally to the computer's motherboard.
See disk wiping.
A type of secondary storage device that uses electronic circuits to read and store data. The advantage of this is that is ha
See terabyte
Storage unit: 1024 gigabytes
Common interface for connecting peripheral devices including mice, printers, and digital cameras.
Common interface for connecting peripheral devices including mice, printers, and digital cameras.
Storage which loses its contents when the power is removed.
See Yottabyte.
See Zettabyte
Storage unit: 1024 zettabyes
Storage unit: 1024 exabytes
See American Standard Code for Information Interchange.
Encoding system to store text, where one byte is used for each character. Compare Unicode.
Idea that one device performs the same functions as many separate devices.
See Redundant system.
System of satellites which can pinpoint a users location on the Earth.
See Global Positioning System
See Radio Frequency Identification.
Special lock for securing portable devices to immovable objects to prevent theft.
Text file which contains no formatting data
System of tags which contain data that can be read from a distance using radio waves.
Tags which broadcast their position over a large distance using radio waves.
See Radio Frequency Identification.
See Radio Frequency Identification.
See Rich Text Format.
Standard file format that can store documents that include formatting data.
Encoding system to store text, with support for multiple languages and alphabets, and thousands of characters. Compare
See Uninterruptible Power Supply.
Measure of how long a computer system has been operating without restarting.
Backup power system which powers a computer if the mains electricity fails.
System that lets users make telephone calls over the Internet.
See Voice over Internet Protocol.
Typical computer system with a separate screen and system unit.
Computer system hidden inside another device, such as a car engine management system.
Computer with multimedia capabilities designed specifically for watching television and films.
Computer with multimedia capabilities designed specifically for watching television and films.
Portable computers that come in many shapes and sizes.
High end computer system that achieves very high data throughput.
Lightweight laptop computer designed for portability.
See Personal Digital Assistant.
Mobile device bigger than a phone but smaller than a laptop. Probably has a keyboard or at least a stylus (pen) and a tou
Mobile phone with capabilities including Internet access and a camera.
Fastest computers available, capable of performing trillions of calculations per second.
Page 9
Hardware
Page 10
Hardware
om of cheques.
Page 11
Hardware
Page 12
Hardware
in a computer and having the exact same data written to each of them automatically. If one of the disks fails, the computer can switch to
data. The advantage of this is that is has no moving parts, making it faster and less likely to be damaged if dropped. Also called flash m
digital cameras.
digital cameras.
Page 13
Hardware
dsets or earphones.
Page 14
Hardware
e disks fails, the computer can switch to the other disk and continue running normally (since the second disk is an exact copy).
damaged if dropped. Also called flash memory. (Compare magnetic storage with optical storage and solid state storage)
Page 15
Hardware
is an exact copy).
Page 16
Software
accounting software
application software
application suite
assistant
audio software
automatic recalculation
backup
browser
Business Software Alliance
bug
closed source
cloud computing
command line interface
commercial software
compatibility
concurrent licence
copyright
cross-platform
database software
Defragmentation
desktop publishing software
device drivers
DTP
EULA
end user licence agreement
Federation Against Software Theft
firewall
fragmentation
free and open source software
freeware
frequently asked questions
Full backup
Graphical User Interface
graphics software
GUI
Incremental backup
mail merge
MDI
Menu Driven Interface
multi-user licence
multimedia software
open source
operating systems
platform
presentation software
product activation
productivity software
public domain
read me file
restore (a backup)
Page 17
Software
Page 18
Software
Page 19
Software
Page 20
Networks
Page 21
Networks
Page 22
Networks
Page 23
Networks
Page 24
Networks
Page 25
Security
access levels Settings that determine who can access an item and what they can do with it (read,
anti-virus Software to detect and remove viruses and other malware.
asymmetric key encryption Encryption system in which two keys are used: a public key used only to encrypt da
authentication Establishing a user's identity.
backdoor Method of bypassing security in a system, built in by the system designers.
biometric enrolment Process of registering a user for a biometric system by taking an initial sample.
biometric template Measurements taken from a biometric sample.
biometrics Use of fingerprints, retina scans, or other body features as an authentication mecha
botnet Group of zombie computers under the control of a criminal.
brute force attack Attempt to break a password by trying all possible combinations of letters, numbers
CAPTCHA “Scribble text” displayed as an image, which the user must type in to verify that they
Certificate Authority Organisation that issues digital certificates to individuals and companies.
ciphertext Result of encrypting plaintext.
Computer Misuse Act UK law governing criminal offences committed using a computer.
cracking Gaining illegal access to a computer system
DDoS Denial of service attack committed using dozens of computers, usually zombies on
denial of service attack Flooding a computer system with data so that it cannot respond to genuine users.
dictionary attack Attempt to break a password by trying all possible words.
digital signatures Technique used to authenticate remote users, such as online shopping businesses
Distributed Denial of Service attack Denial of service attack committed using dozens of computers, usually zombies on
DNS poisoning Technique used by criminals to alter DNS records and drive users to fake sites, to c
DoS Flooding a computer system with data so that it cannot respond to genuine users.
Drive-by download Program which automatically downloads when a user visits a web page, usually wit
encryption System of encoding plaintext so that it cannot be understood with access to an enc
encryption key Used to encrypt and decrypt data.
EV SSL Extended Validation SSL. Digital certificate validation technique used on the world
false negative When a system incorrectly rejects an action instead of accepting it.
false positive When a system incorrectly accepts an action instead of rejecting it.
full disk encryption System that encrypts all data saved to a hard disk automatically and transparently.
hacking Gaining illegal access to a computer system
home directory Directory that contains a users personal files.
https Protocol used to send web pages securely over the Internet.
identity theft Stealing personal data in order to impersonate a person.
key escrow Idea of having encryption keys stored by a third party company so the government
key logger Software or hardware which records all key strokes on a computer system.
key pair A public key and private key that work together in a public encryption system.
macro virus Virus that takes advantage of the macro programming languages built into some so
malware Generic name for malicious software
Multi-factor authentication Use of several authentication techniques together, such as passwords and security
one time password Password generated by a security token, which expires as soon as it is used.
packet sniffer Software or hardware used to collect data travelling over a network.
passphrase Word or phrase used to authenticate a user.
password Word or phrase used to authenticate a user.
pharming Technique used by criminals to alter DNS records and drive users to fake sites, to c
phishing Use of fake emails and web sites to trick users into revealing sensitive data.
physical security Locks, alarms, and other techniques used to securely a building or computer room.
plaintext Message before it is encrypted, or after it has been decrypted.
private key Key used for decryption in a public key encryption system.
public key Key used for encryption in a public key encryption system.
public key encryption Encryption system in which two keys are used: a public key used only to encrypt da
Page 26
Security
Page 27
Security
at they can do with it (read, write, delete). Applies to files, folders and databases among other things.
key used only to encrypt data, and a private key used only to decrypt it.
system designers.
aking an initial sample.
as an authentication mechanism.
key used only to encrypt data, and a private key used only to decrypt it.
Page 28
Security
thenticate a user.
er to send spam.
while letting genuine messages through.
s their key presses.
d is part of a botnet.
Page 29
Multimedia
Page 30
Multimedia
master page A template page which is used to include standard features (such as page num
megapixel Unit used to measure the resolution of digital cameras. Refers to 1 million pixel
MIDI Musical Instrument Digital Interface. System for communication between music
morphing Effect that transforms one image into another over a series of frames.
motion capture A system used to capture human movement into a computer by attaching sens
MOV Lossy file format for video.
MP3 Lossy file format for audio.
MP4 Lossy file format for video.
MPEG Lossy file format for video.
object oriented graphics Graphics which are stored as a series of mathematical shapes and properties t
ODT File format for documents, used by LibreOffice.
PDF Common file format for the exchange of documents, which appears on screen e
pixel Individual dots which make up bitmap graphics.
pixels per inch Number of pixels displayed in each inch of screen output.
plain text file File format that stores characters using ASCII or Unicode encoding.
PNG Lossless file format for images.
Portable Document Format Common file format for the exchange of documents, which appears on screen e
PPI Number of pixels displayed in each inch of screen output.
raster graphics Graphics composed of rectangular grids of pixels.
resolution Refers to the number of pixels in an image.
Rich Text Format File format for documents, which can store text and some basic formatting infor
rotating Image effect found in most graphics software.
RTF File format for documents, which can store text and some basic formatting infor
sample rate Number of samples taken each second when recording sound.
scaling Changing the size of an image.
selection tools Tools in graphics software for selecting only a subset of an image.
streaming media Video or audio data that is played while it is downloading.
SVG Standard file format for vector image data.
template A page which is used to include standard features (such as page numbers or a
text file File format that stores characters using ASCII or Unicode encoding.
TIF Lossless file format for images.
true colour Image with 24 bit colour depth.
TXT File format that stores characters using ASCII or Unicode encoding.
typography The proficient use of fonts, font sizes, and font properties such as leading and k
vector graphics Graphics which are stored as a series of mathematical shapes and properties t
video CODECs (coder-decoders) Software required to view certain compressed video and audio formats.
virtual actors Animated characters used in films, created entirely using computer graphics so
Vorbis Lossy file format for audio.
watermarking The process of adding an author name or logo into an image to identify its own
WAV Lossless file format for audio.
WMA Lossy file format for video.
WYSIWYG What You See Is What You Get. Refers to programs that present their output o
zip file Compressed file format for general data.
Page 31
Multimedia
e on every page.
Page 32
Multimedia
andard features (such as page numbers or a header) on each page of a document in a consistent manner.
al cameras. Refers to 1 million pixels.
m for communication between musical hardware and software applications.
er over a series of frames.
t into a computer by attaching sensors to an actor and tracking their location.
athematical shapes and properties that can be independently manipulated at any time.
screen output.
CII or Unicode encoding.
y a subset of an image.
downloading.
atures (such as page numbers or a header) on each page of a document in a consistent manner.
CII or Unicode encoding.
ogo into an image to identify its owner and prevent intellectual property theft.
programs that present their output onscreen exactly as it will appear when printed.
Page 33
Databases
Page 34
Databases
secondary use Using data for a purpose other than the one for which it was collected.
sensitive data Data such as medical records which, if shared, could cause serious negative impacts on
sorting Ordering records based on a field (e.g. alphabetically).
SQL Language for managing databases by typing commands.
Structured Query Language Language for managing databases by typing commands.
Tab Separated Values File format for transferring data, which stores fields and records in a plain text file, with f
tab-delimited text files File format for transferring data, which stores fields and records in a plain text file, with f
table In databases, a collection of records representing a type of item.
Trans-border data flow Transfer of data between countries.
TSV File format for transferring data, which stores fields and records in a plain text file, with f
validation Checks to ensure whether data is in the correct format.
verification Checking whether data is correct – i.e. is the value entered in a field the actual value?
web databases
Page 35
Databases
in a database.
in a database.
e stored in a field.
e stored in a field.
a field. For example, for the 'Gender' field, the values are limited to 'male' and 'female'
ase to a relational database.
arch purposes.
r at run-time.
cts such as identity theft.
cts such as identity theft.
dundant data.
es specific criteria
Page 36
Databases
it was collected.
ause serious negative impacts on the data subject.
d records in a plain text file, with fields separated by a tab character. See also CSV.
d records in a plain text file, with fields separated by a tab character. See also CSV.
d records in a plain text file, with fields separated by a tab character. See also CSV.
Page 37
Models&Sims
absolute cell reference In a spreadsheet, a cell reference which does not change when moved.
assumptions Often made during the construction of a computer model, as part of the simplification proce
car crash model Used to predict the results of car crashes.
cell format In spreadsheets, the properties of a cell such as its colour, font, and cell type.
cell range In spreadsheets, reference to a range of continuous cells.
cell reference In spreadsheets, a combination of row number and column letter to refer to a single cell (e.
centralized processing Single computer with multiple processors working on a task.
CFD Computational Fluid Dynamics. A technique used to model airflow in computer models.
climate model Computer model used to predict possible future climate change.
Computer model Mathematical representation of the real world using computer software.
Computer simulation Based on computer models, gives users experience of events such as flying a plane.
Decision Support System Use of models or expert systems to aid (business) decision making processes.
distributed processing Use of multiple separate computers working together on a common task.
feedback loop Comparing the results of a computer model to actual (real life) results, and using the differe
flight simulator Simulator hardware and software used to train pilots.
formula In spreadsheets, a combination of cell references and mathematical operations.
full motion platform Hardware device which can move in many directions to increase the realism of simulators.
function Built in features of spreadsheets for performing common calculations.
Global Climate Model Computer model used to predict possible future climate change.
goal seek Spreadsheet tool used to determine the required values to meet a certain goal.
grid computing Use of multiple separate computers working together on a common task.
high performance computing High speed computing using multiple processors
parallel processing High speed computing using multiple processors
prediction Output of a computer model.
relative cell reference In a spreadsheet, a cell reference which updates when moved.
simplification Difference between a computer model's representation of a process, and the real life proce
spreadsheet Application software for performing numerical calculations and analysis.
supercomputer Fastest computers available, capable of performing trillions of calculations per second.
variables Components of a computer model which can be altered to vary the output.
visualisation Graphical or animated output from a computer model or simulation.
What-if scenario Use of a computer model to test the results of different situations and scenarios.
Page 38
Models&Sims
when moved.
as part of the simplification process.
hematical operations.
rease the realism of simulators.
Page 39
Business-Traditional
acceptable use policy Policy that sets out what users are and are not allowed to do with IT systems.
chip and pin Systems designed to reduce credit card fraud by requiring the user to authenticate themselv
collaborative software Application software to let users work together on projects even if they are geographically re
deskilling Reduction in the skill needed to do a job, due to technology
EFT Transfer of money from one account to another using computer systems and networks.
Electronic Funds Transfer Transfer of money from one account to another using computer systems and networks.
email monitoring Technology to monitor emails sent and received, usually by employees.
employee monitoring Technology used to monitor the work of employees using a computer system.
extranet Content on a LAN which is available to authorised third parties.
filtering Process of preventing access to some resources, usually web pages.
follow-the-sun working System of moving working to different offices around the globe as the day progresses, endin
Internet monitoring Technology to monitor Internet data sent and received, usually by employees.
intranet Content on a LAN which is only available to members of an organisation.
key logger Software or hardware which records all key strokes on a computer system.
keystroke monitoring Software or hardware which records all key strokes on a computer system.
loyalty card Card used to identify repeat customers, to allow them to accumulate reward points, and to g
macro In application software, a set of actions which are recorded so they can be played back late
macro viruses Virus that takes advantage of the macro programming languages built into some software.
mail merge The process of automatically customising a standard letter with individual names and addre
online banking Use of the Internet to perform tasks such as bill payment, money transfers and other bankin
Point of Sale Checkout system in a shop, usually connected to a store database and EFT system.
POS Checkout system in a shop, usually connected to a store database and EFT system.
re-skilling When a de-skilled user retrains, often in a technology related discipline.
remote desktop Ability to connect to a computer, over a network, as though you were physically present at th
reward card Card used to identify repeat customers, to allow them to accumulate reward points, and to g
RFID System of tags which contain data that can be read from a distance using radio waves.
self checkout Supermarket technology that lets users scan and pay for their own goods without staff assis
smart shopping trolley Shopping trolley with RFID technology to offer enhanced functionality.
targeted advertising Use of data about customers to determine which adverts they are most likely to find useful.
telecommuting Working away from an organisation's main office or base, using portable computers.
teleworking Working away from an organisation's main office or base, using portable computers.
Page 40
Business-Traditional
with IT systems.
user to authenticate themselves at the point of sale.
en if they are geographically remote.
omputer system.
e as the day progresses, ending work in each location as the end of the day approaches, and moving it to a new office elsewhere where
y by employees.
puter system.
puter system.
mulate reward points, and to gather data about their shopping habits for marketing purposes
they can be played back later.
ges built into some software.
h individual names and addresses from a database.
ney transfers and other banking tasks.
base and EFT system.
base and EFT system.
Page 41
Business-Traditional
Page 42
Business-Online
Page 43
Business-Online
hyperlinks Area of a web page – text or an image – which when clicked takes the user to anothe
internal link HTML link which points to a different part of the same page.
Internet Service Provider Company that provides Internet access to homes and businesses.
ISP Company that provides Internet access to homes and businesses.
Java Programming language often used to create interactive web pages.
JavaScript Scripting language often used to create interactive web pages.
keyword density Frequently with which key words appear in a web page.
keyword prominence Locations within a web page that key words appear.
keyword spamming Overuse of key words in a web page in an attempt to increase search engine ranking
link farm Service that links many pages to each other in an attempt to increase search engine
location based service Web page which alters the information it displays based on the user's geographical lo
m-commerce The use of mobile phones to conduct online purchases.
meta tags HTML tags to add additional information about a web page and its content.
mobile commerce The use of mobile phones to conduct online purchases.
MySQL Database system often used by data driven web sites.
newsletter
online advertising
online reputation Methods used to measure the “trust” and “reliability” of people in an online network, e
payment gateway A trusted third party who is used to receive and process payments in an online transa
PHP Technology used to create dynamic web pages.
plugins Software added to web browsers to extend their functionality.
pop-ups A type of advertisement which opens a new browser window to display adverts.
ranking of sites Process performed by search engines to determine the order of results for a given se
referrer A small piece of information sent to sites you visit, telling the site which site you just c
relative link HTML link to a file, with no path specified.
screen reader Accessibility feature for users with eyesight problems, which reads text aloud.
scripting Simple programming that can be included in web pages to make them more interacti
Search Engine Optimisation Techniques used to increase a web page's search engine rankings.
secure online payment Essential for all online transactions, often achieved using SSL or TLS encryption.
SEO Techniques used to increase a web page's search engine rankings.
Silverlight Technology often used to create interactive web pages.
sitemap Overview of a web site and all the links and pages within it.
social media Networks such as Facebook, Google, and Twitter, which are often used for advertisin
spam Unwanted, bulk email.
sponsored links Links show by search engines because the link owners paid a fee.
SQL Language for managing databases by typing commands.
styles
stylesheet File which contains CSS information to format a web page.
tags (HTML) Keywords in HTML which are used to mark up a web page.
targeted advertising The use of data about an individual to determine the types of advertising which is mo
third party cookie Cookie left by a web site the user did not directly visit (usually by advert companies).
third party hosting Use of a separate, specialist company to store and manage a web site.
third party payment service See payment gateway.
title attribute HTML attribute that provides a text description of links.
Top Level Domain The final part of a domain name, such as .com .net or .sv
tracking number A number given to users when they order an item online, allowing them to see its pro
unique identification number Used by cookies to help recognise return visitors to web sites.
uploading To transfer data from a client to a server computer.
uptime Measure of how long a computer system has been operating without restarting.
viral advertising Advertising on social media networks which spreads rapidly from user to user.
Page 44
Business-Online
virtual world 3D environment in which character select an avatar and then explore. Sometimes us
W3C Organisation that manages standards on the world wide web.
web analytics Software to measure and display statistics about a web site's visitors, such as pages
Web Content Management System Software which allows management of a web site without web design skills. Content
web crawler Software which scans web pages looking for key words, so search engines can index
web hosting The process of housing or storing a web site, making it available to the public, and m
web server Computer which houses web pages and serves them to computers that request them
web spider Software which scans web pages looking for key words, so search engines can index
web traffic analysis Software to measure and display statistics about a web site's visitors, such as pages
WebCMS Software which allows management of a web site without web design skills. Content
World Wide Web Consortium Organisation that manages standards on the world wide web.
WYSIWYG What You See Is What You Get. Refers to programs that present their output onscre
XML A markup language used to describe data, storing the information as plain text files.
Page 45
Business-Online
gned by Microsoft.
gned by Microsoft.
gned by Microsoft.
gned by Microsoft.
ch as a business and their suppliers.
ir customers, for example, online shopping.
wing the current page name and the names of pages which led to it, in order.
rs the same way on all web browsers.
e considered spam by some users.
ch as a business and their suppliers.
ir customers, for example, online shopping.
h other, such as in online auction.
ion for web pages.
from data stored in a database. For example, when a user performs a search in a shop, all matching products are extracted from the da
as online shopping businesses.
from data stored in a database. For example, when a user performs a search in a shop, all matching products are extracted from the da
nd purchase items.
r later purchase.
e, and analyse large amounts of information about its products, its processes, and its customers.
Page 46
Business-Online
d businesses.
d businesses.
ve web pages.
ine, allowing them to see its progress from the retailer to their door.
Page 47
Business-Online
eb site's visitors, such as pages visited, durations of visits, and web browsers used.
hout web design skills. Content is stored in a database and published in different ways, such as on a web site, in a printed booklet, or in
ds, so search engines can index them.
it available to the public, and managing the servers on which it runs.
m to computers that request them.
ds, so search engines can index them.
eb site's visitors, such as pages visited, durations of visits, and web browsers used.
hout web design skills. Content is stored in a database and published in different ways, such as on a web site, in a printed booklet, or in
that present their output onscreen exactly as it will appear when printed.
e information as plain text files.
Page 48
Business-Online
hing products are extracted from the database and a web page is generated to display them.
hing products are extracted from the database and a web page is generated to display them.
Page 49
Business-Online
Page 50
Business-Transport
fleet management
fleet tracking
full body scanners
GPS
intelligent cars
package tracking
price comparison sites
real-time data collection
remote vehicle disabling
RFID
route planning
sensors
smart cars
Page 51
Business-Transport
Software to track and manage fleets of vehicles, including route planning and data analysis functions.
Software to display the location of vehicles, such as trucks or taxis.
Security system used at airports to produce a digital image of passengers 'without clothes'.
System of satellites that allows a user to determine their position on Earth using a special receiver.
Cars incorporating IT to improve driver safety and comfort.
Use of RFID and a web site to show customers the location of packages awaiting delivery.
Sites which aggregate price data from a variety of sources to offer customers the best deal.
Data logging systems which report data as soon as it is collected.
Ability to disable a vehicle over a computer network if it has been stolen
System of tags which contain data that can be read from a distance using radio waves.
Software to plan the optimum route between two points.
Input devices used to measure physical traits, such as sound, heat, or light.
Cars incorporating IT to improve driver safety and comfort.
Page 52
Education
1-1 programme
acceptable use policy
accessibility
anti-plagiarism software
asynchronous learning
black list
blended learning
Children's Internet Protection Act
CIPA
cyber-bullying
dictation software
e-book
e-book reader
e-learning
EDI
edutainment
Electronic Data Interchange
electronic textbooks
equality of access
false negative
false positive
flat classrooms
forums
intellectual property
interactive whiteboard
m-learning
motion controllers
multimedia
onscreen keyboard
open courseware
open textbooks
plagiarism
podcast
predictive text
profile privacy settings
projector
reference software
school information system
serious games
speech synthesis
synchronous learning
tele-learning
touch sensitive input
video conferencing
VLE
web 2.0
Virtual Learning Environment
Page 53
Education
Page 54
Education
se or a touch screen.
e or a keyboard.
Page 55
Education
Page 56
Environment
ADC
analog data
analog to digital converter
BAN
Basel Action Network
Basel Convention, The
blade servers
continuous data
CRT
data centres
data layers
data logging
digital data
digital footprint
digital divide
digitisation
discrete data
donation schemes
e-waste
electronic waste
Geographical Information System
geotagged
GIS
Global Positioning System
GPS
GPS receiver
laser imaging
LCD
LEDC
Less Economically Developed Country
Lidar
life cycle (hardware)
location based service
MEDC
More Economically Developed Country
planned obsolescence
power settings
radar
recycling
reduce
redundant systems
remote sensing
refurbish
reuse
RoHS
Reduction of Harmful Substances
sample precision
sample rate
sampling
sat nav
Page 57
Environment
satellite imaging
satellite navigation system
sensors
sonar
speed throttling
take-back scheme
virtual globe
virtual machines
virtualisation
visualisation
WEEE
Page 58
Environment
Device for sampling analog data and producing a digital sample of it.
Continuous data which can be measured, such as the temperature in the room.
Device for sampling analog data and producing a digital sample of it.
Environmental campaign group that works to reduce the problems caused by e-waste.
Environmental campaign group that works to reduce the problems caused by e-waste.
Environmental agreement regarding e-waste.
Server design which is modular, allowing systems to be rapidly expanded and reducing power consumption.
Analog data which can be measured, such as the temperature in the room.
Old, large TV style computer monitors.
Large warehouses of computers that host hundreds or thousands of gigabytes of data.
Layers of information added to a Geographical Information System.
Automatic recording of data using sensors.
Discrete data which can be counted.
An individual's effect on the environment due to e-waste.
The idea that money, language, education, or infrastructure creates a gap between those who have access to information
The process of converting analog data into digital computer data.
Discrete data which can be counted.
Schemes used to find additional uses for obsolete computer equipment to extend it's useful life.
Discarded electronic equipment that is either broken or obsolete.
Discarded electronic equipment that is either broken or obsolete.
A system which allows layers of data to be placed on map data to visualise and analyse it. For example, crime rate figures
Adding tags to data (such as an image) to identify the location in which it was created.
A system which allows layers of data to be placed on map data to visualise and analyse it. For example, crime rate figures
System of satellites that allows a user to determine their position on Earth using a special receiver.
System of satellites that allows a user to determine their position on Earth using a special receiver.
Part of the GPS system which calculates its distance from satellites in space.
Remote imaging method that users laser light, often used by satellites.
Newer style “flat screen” monitors.
Countries to which electronic waste is often shipped for unsafe recycling and disposal.
Countries to which electronic waste is often shipped for unsafe recycling and disposal.
Remote imaging method that users laser light, often used by satellites.
For computer hardware, the period of time from its manufacture, through its use, until its eventual disposal.
Any service (e.g. web page content) which varies according to the user's location.
Countries which are often a significant source of electronic waste.
Countries which are often a significant source of electronic waste.
Idea that IT equipment is designed to have a short life expectancy before failing or becoming obsolete.
Operating systems to affect the power consumption of a computer.
Remote imaging method used by satellites.
The process of reclaiming valuable elements from waste electronic equipment, often done unsafely in developing countrie
The 'R' concerned with preventing e-waste problems by producing less waste equipment and using fewer harmful chemica
System which will take over the role of a primary system if it fails.
Techniques used by satellites to image the Earth.
The 'R' concerned with finding additional uses for equipment which is obsolete but not broken.
The 'R' concerned with finding additional uses for equipment which is obsolete but not broken.
A law which limits the harmful chemicals that manufacturers are allowed to put into their electronic equipment.
A law which limits the harmful chemicals that manufacturers are allowed to put into their electronic equipment.
During digitisation, the number of bits used to represent each sample.
During digitisation, the number of samples taken per second.
The process of converting analog data into digital computer data.
Portable GPS receiver device often used in vehicles.
Page 59
Environment
The use of sensors on satellites to measure or record information, usually about the Earth.
Portable device that uses GPS to plot the user's position.
Input devices used to measure physical traits, such as sound, heat, or light.
Remote imaging method used by satellites.
Reducing a processor's clock speed to save power when not in use.
Scheme operated by IT manufacturers to accept customers' old hardware for recycling at its end of life.
A 3D software map of the Earth, usually with layers of information added, similar to a GIS.
A software implementation of a computer system, allowing one physical computer to run several “virtual computers”, each
The process of using several virtual machines running on one computer to replace several separate physical computers.
Producing graphs or animations based on computer data, to help understand and analyse it.
A European law which requires electronic equipment manufacturers to accept back their equipment for recycling at its end
Page 60
Environment
10
ic equipment.
ic equipment.
Page 61
Environment
“virtual computers”, each with their own independent operating system and application software.
rate physical computers.
Page 62
Environment
Page 63
Health
addiction
Carpel Tunnel Syndrome
centralised database
clinical decision support system
computer model
CTS
cybernetics
e-prescriptions
EDI
EHR
Electronic Data Interchange
Electronic Health Records
Electronic Medical Records
EMR
ergonomics
Human Genome Project
medical expert system
myoelectric control
neural control
opt-in
opt-out
Personal Health Record
PHR
prosthetics
remote monitoring
Repetitive Strain Injury
RSI
smart cards
store-and-forward telemedicine
telehealth
telemedicine
telesurgery
virtual reality
VPN
Page 64
Health
Compulsive use of a computer system that can lead to negative effects, including health problems. A growing problem!
A health problem causing pain in the wrist, often associated with overuse or incorrect of a computer system.
database in which all data in stored in one centralised location.
Expert system for medical diagnosis
Mathematical representation of the real world using computer software.
A health problem causing pain in the wrist, often associated with overuse or incorrect of a computer system.
Integration of IT into the human body.
Electronic prescriptions.
Process of transferring data between systems in a standard format that both can understand.
Computerised medical records, often stored on a centralised server.
Process of transferring data between systems in a standard format that both can understand.
Computerised medical records, often stored on a centralised server.
Computerised medical records, often stored on a centralised server.
Computerised medical records, often stored on a centralised server.
Meaning a system design for user comfort.
An online project designed to centrally store information about the human genome.
Expert system for medical diagnosis support.
Control of IT using electrical impulses from the body
Control of IT using electrical impulses from the brain
System in which users must explicitly decide to participate.
System in which users must explicitly decide not to participate.
Electronic health records which are stored on the patient's own computer system.
Electronic health records which are stored on the patient's own computer system.
Devices used to replace a user's arms or legs if they have been amputated. Increasing becoming computerised.
Use of IT to monitor the health of patients over a large distance.
Injury caused by overuse or incorrect use of a computer, which can affect the wrists, arms, back, or shoulders.
Injury caused by overuse or incorrect use of a computer, which can affect the wrists, arms, back, or shoulders.
Credit card sized card containing a microchip for data storage and processing.
Telemedicine using techniques such as email, which do not operate in real time.
Using IT to perform medical consultations when the doctor and patient are in geographically separate locations.
Using IT to perform medical consultations when the doctor and patient are in geographically separate locations.
Using IT to perform surgery on a patient in a geographically separate location from the doctor.
A virtual world which the user views using a special headset, and may participate in using specialist input devices.
Allows a secure private connection over a public network, using an encrypted 'tunnel'. For example, a remote computer ca
Page 65
Health
owing problem!
mote computer can securely connect to a LAN, as though it were physically connected.
Page 66
Home&Leisure
3D modelling Software often used in the digital restoration of historic sites or artefacts.
augmented reality Overlapping layers of computer data with images of the real world.
avatar Representation of a person in a virtual environment.
biometrics Use of fingerprints, retina scans, or other body features as an authenticatio
CAVE Form of virtual reality which projects images on the walls surrounding a use
Cave Automated Virtual Environment Form of virtual reality which projects images on the walls surrounding a use
citizen journalism News reporting by everyday citizens using mobile technology, rather than tr
copyright infringement Illegally copying or distributing copyrighted material.
digital restoration The process of using digital versions of historic works or places and softwa
Digital Rights Management Software which restricts the actions a user can perform with a file, such as
digital radio Upgraded version of radio signals which offers higher quality than analog te
digital television Upgraded version of television signals which offers higher quality than anal
digitisation The process of converting analog data into digital computer data.
DRM Software which restricts the actions a user can perform with a file, such as
e-book An electronic book, presented as a document on a computer or an e-book r
electronic ink Technology used in e-book readers to improve display quality.
Entertainment Software Rating Board Organisation that provides content ratings for computer games.
ESRB Organisation that provides content ratings for computer games.
ground penetrating radar Specialist imaging hardware used to detect and visualise objects buried und
HDTV Television images that have a resolution up to 1920 x 1080.
High Definition Television Television images that have a resolution up to 1920 x 1080.
home automation Home which uses technology to improve its efficiency, security, and comfor
Home Theatre PC Computer with multimedia capabilities designed specifically for watching tel
HTPC Computer with multimedia capabilities designed specifically for watching tel
IPTV Systems which allows television images and sound to be delivered over the
laser scanning Technique used to build 3D computer models of real world locations.
Massively Multiplayer Online Game Games played by connecting to a central server and interacting with other p
Massively Multiplayer Online Role Playing G Games played by connecting to a central server and interacting with other p
MMOG Games played by connecting to a central server and interacting with other p
MMORPG Games played by connecting to a central server and interacting with other p
Motion Picture Association of America Film industry group that works to reduce illegal copying of films.
MPAA Film industry group that works to reduce illegal copying of films.
news aggregator Software which fetches news headlines from a variety of sources for display
P2P Network in which all computers are equal and there are no centralised serv
Pan European Game Information Organisation that provides content ratings for computer games in Europe.
paywall System to prevent access to a web site's content unless the user pays a su
Peer-to-Peer Network in which all computers are equal and there are no centralised serv
PEGI Organisation that provides content ratings for computer games in Europe.
piracy Term for the illegal copying or downloading of copyrighted material.
Recording Industry Association of America Music industry group that works to reduce illegal copying of music.
RFID System of tags which contain data that can be read from a distance using r
RIAA Music industry group that works to reduce illegal copying of music.
smart home Home which uses technology to improve its efficiency, security, and comfor
smart meters Systems which measure a household's consumption of water or resources,
social news News sites which rank news stories based on user ratings.
stereolithography '3D printer' that can produce actual objects from computer models.
streaming media Video or audio data that is played while it is downloading.
Video On Demand Television and films which can be streamed at any time from the Internet, ra
virtual worlds 3D environment in which character select an avatar and then explore. Som
VOD Television and films which can be streamed at any time from the Internet, ra
Page 67
Home&Leisure
Page 68
Home&Leisure
273
Page 69
Politics&Government
ANPR Software which processes video camera data to read vehicle number plates
augmented reality Overlapping layers of computer data with images of the real world.
Automatic Number Plate Recognition Software which processes video camera data to read vehicle number plates
battlefield network Large scale network gathering information from soldiers, vehicles, and map
biometrics Use of fingerprints, retina scans, or other body features as an authentication
black boxes Closed system whose internal operation cannot be inspected.
black list List of banned web sites in a filtering system.
Children Internet Protection Act (CIPA) US Law requiring schools to filter Internet content to protect children.
content rating System whereby web site content is categorised so that filters can block it if
cyber-terrorism Using computer hacking techniques to commit acts of terrorism.
cyber-warfare Using computer hacking techniques to commit acts of war.
Denial of Service attack Flooding a computer system with data so that it cannot respond to genuine
Digital Millennium Copyright Act Law designed to improve copyright protection for media companies, and ma
Direct Recording Electronic Voting machines where users cast votes by touching a screen.
DMCA Law designed to improve copyright protection for media companies, and ma
DNA database A database, often national, that contains DNA samples taken from people a
DNS System for translating domain names into IP addresses.
DNS Poisoning Technique used by criminals to alter DNS records and drive users to fake s
DRE voting machine A type of electronic voting machine that allows the user to vote by selecting
drone An unmanned aerial vehicle often used by the military for surveillance opera
e-passport Passport with a microchip containing biometric features, and RFID technolo
e-petition An online petition that can be signed by people supporting a cause.
electronic voting Any use of IT to count or cast votes in an election.
false negative When a system incorrectly rejects an action instead of accepting it.
false positive When a system incorrectly accepts an action instead of rejecting it.
filter Software which blocks some Internet content, based on a series of rules or
firewall Software or hardware used to control data entering and leaving a network.
future warrior Information technology designed to improve a soldier's understanding of the
GPS System of satellites that allows a user to determine their position on Earth u
Internet voting Systems which allows users to vote over the Internet.
Internet Watch Foundation Organisation that works with British ISPs to block access to illegal content o
IP address Unique address assigned to every computer on a network.
IWF Organisation that works with British ISPs to block access to illegal content o
keyword filter Filter that blocks web pages containing specified key words.
micro-payments Online donations collected in small amounts, but which add up when contrib
mission creep When the use of an IT system extends beyond its original purpose.
mixed reality Combination of virtual reality and real life training.
online voting Casting votes over the Internet.
open government Use of IT to publish data about government operations, improving transpare
optical scanning electronic voting system Voting machines which count paper ballots cast by voters.
PNDRE Voting machines where users cast votes over a network like the Internet.
precision guided weapons Weapons that use IT to improve their accuracy or effectiveness.
Public Network Direct Recording Electronic Voting machines where users cast votes over a network like the Internet.
RFID System of tags which contain data that can be read from a distance using ra
simulation Based on computer models, gives users experience of events such as flying
smart weapons Weapons that use IT to improve their accuracy or effectiveness.
software verification The use of experts to examine the source code of a program to check that i
tactile feedback Output from a computer system in the form of force, movement, or resistanc
UAV An unmanned aerial vehicle often used by the military for surveillance opera
Unmanned Aerial Vehicle An unmanned aerial vehicle often used by the military for surveillance opera
Page 70
Politics&Government
URL Describes the location of an item, such as a web page, on the Internet.
virtual reality A virtual world which the user views using a special headset, and may parti
virtual reality headset Primary output device used by a virtual reality system.
Voter Verified Paper Audit Trails An electronic voting system that produces a paper receipt of the vote cast, a
VVPAT An electronic voting system that produces a paper receipt of the vote cast, a
weighted filter A filter which considers the words in a page as well as the context in which
white list List of allowed web sites in a filtering system.
wired soldiers Information technology designed to improve a soldier's understanding of the
Page 71
Politics&Government
data to read vehicle number plates and compare it to those stored in a database.
h images of the real world.
data to read vehicle number plates and compare it to those stored in a database.
on from soldiers, vehicles, and maps to provide an overall view of the battlefield.
r body features as an authentication mechanism.
cannot be inspected.
Page 72
Politics&Government
Page 73
Politics&Government
289
Page 74
IT Systems in Organizations
Development Personnel
information system (IS) managers
analyst
database administrator
development manager
network manager
programmer
support staff
Analysis Stage
business case
client
constraints
CP
Critical Path
data collection
end-user
feasibility study
functional requirements
Gantt chart
milestones
non-functional requirements
organisational IT policies
PERT chart
project goals
project management methodology
project management software
project manager
project plan
requirements specification
scope
SWOT
technical documentation
user documentation
Design Stage
attributes
cardinality
Data Flow Diagram
data structure
DFD
entities
entity relationship diagram
ERD
outputs
processes
prototype interface
relationships
system context diagram
user interface
Page 75
IT Systems in Organizations
Implementation Stage
alpha testing
bugs
Capability Maturity Model Integration
CMMI
Frequently Asked Questions
implementation
load testing
online lessons
prototypes
quality assurance methods
quality control processes
software testers
test plan
training
tutorial
user manual
Testing Stage
beta tester
beta testing
bug tracking system
handover
user acceptance testing
Installation Stage
changeover
delivery
deployment
direct changeover
installation
parallel running
phased changeover
Maintenance Stage
adaptive maintenance
corrective maintenance
incident escalation
Incident management system
incident tracking system
internal support
maintenance
perfective maintenance
phase out
preventative maintenance
regression testing
support
Page 76
IT Systems in Organizations
acceptance testing
agile development
PMBoK
PRINCE2
procurement
project initiation document
SSADM
user acceptance testing
waterfall development
Misc Terms
Custom / bespoke software
emulator
IDE
Integrated Development Environment
legacy system
off-the-shelf software
SDLC
source code
System development lifecycle
virtual machine
Page 77
IT Systems in Organizations
Person responsible for all IT purchases, deployments, and systems within an organisation.
In project development, person who documents the current system, finding its problems and areas for improvement
The person in an organisation who is responsible for setting up, maintaining, and monitoring the organisation's database(s
In project development, person who oversees programmers as they create the system specified in the design.
The person responsible for the installation, configuration, and monitoring of an organisation's network.
A person who writes computer programs by following a design document.
Staff who train users and help them with problems as they occur
Page 78
IT Systems in Organizations
Maintenance that changes software to make it work with a new software environment.
Maintenance that fixes bugs in software.
Moving a problem with an IT project to a higher level if it cannot be solved.
Used to keep track of problems and difficulties encountered in an IT system.
Used to keep track of problems and difficulties encountered in an IT system.
Support for an IT system provided within an organisation.
Alterations made to a system after it has been formally handed over.
Maintenance that changes software to incorporate new user requirements (or changed requirements).
Gradually removing an old IT system from use.
Maintenance that changes software to avoid possible future problems.
Testing to ensuring changes to an IT system did not break any previously working functionality.
Staff who help users with problems they encounter while using an IT system.
Page 79
IT Systems in Organizations
Testing performed by the client and users as part of the handover process.
Development method that focuses on creating small, working parts of a project at regular intervals.
Project Management Body of Knowledge. A project management methodology.
PRojects IN Controlled Environments 2. A project management methodology.
The act of acquiring the necessary items (software, hardware, staff) to develop an IT system.
Document used in PRINCE2 to describe the key features of an IT project.
Structured Systems Analysis and Design Method. A project management methodology.
Testing performed by the client and users as part of the handover process.
Development method that focuses on completing each stage of the SDLC for the entire project before moving onto the ne
Page 80
IT Systems in Organizations
309
ems and areas for improvement
onitoring the organisation's database(s).
em specified in the design.
nisation's network.
Page 81
IT Systems in Organizations
al world conditions.
be worked out.
ged requirements).
Page 82
IT Systems in Organizations
egular intervals.
Page 83
AI & Robotics
Artificial Intelligence
AI Creating a system that produces results comparable to human intelligence.
Artificial Intelligence Creating a system that produces results comparable to human intelligence.
Artificial Neural Network AI system that attempts to mimic the neurons and synapses in the human brain.
Boolean logic Logic in which clauses can have one of two states – such as yes or no, true or false.
brute force searching AI technique that considers all possible solutions, looking for the best.
CAPTCHA System designed to create text that is unreadable to a computer but understandable to a p
chaining Use of logical statements to come to a conclusion.
Chinese Room, the Thought experiment dealing with the idea of knowledge.
computational intelligence Approach that tries to create systems that think and learn in the same way humans do.
confidence interval Level of certainty in an answer a pattern recognition system provides.
expert system shell Software used to create expert systems.
expert systems Software designed to make the same decisions that a human expert would, in a given kno
feedback loop Use of previous answers (right or wrong) to improve the decision making process next tim
fuzzy logic Logic in which items can have multiple values. Used in AI.
fuzzy set theory System in which items can be partial or complete members of a set. Used in AI.
hand writing recognition System to recognise human writing and convert it to text.
heuristics General rules for performing a task, used to improve the perform of searching algorithms i
IF-THEN rule Rule used by the inference engine in an expert system to describe the relationship betwee
inference engine Part of an expert system which attempts to relate the users input with knowledge stored in
inference rule Rule used by the inference engine in an expert system to describe the relationship betwee
knowledge base Area of an expert system where all facts about the knowledge domain are stored.
knowledge domain Area of knowledge in which an expert system specialises.
knowledge engineer Programmer responsible for entering expert knowledge into an expert system.
knowledge representation Different techniques for representing concepts and their relationships inside a computer sy
logic Rule used by the inference engine in an expert system to describe the relationship betwee
machine learning Technique for making a computer produce better results by learning from past experience
machine translation Technique for automatically translating one human language into another.
natural language processing Techniques for processing human languages to enable a computer to understand their me
neural networks AI technique that tries to simulate the human brain, using neurons and synapses.
pattern recognition Computational Intelligence technique where computers are trained on examples and learn
Searching AI technique that considers all possible solutions, looking for the best.
set theory Mathematical theory used in some AI techniques.
speech recognition Computer system that can process spoken language and understand its meaning.
training data Example data used in a pattern recognition system.
Turing test Proposed test to see if a computer is intelligent or not.
user interface Part of an expert system that accepts users inputs and presents answers.
Robotics
android Robot designed to look like a human, with lifelike skin and other features.
autonomous Robot which operates without human intervention.
camera Common input device in robotics.
clamps Common output device in robotics.
claws Common output device in robotics.
computer vision Techniques to let computers and robots see and understand the world around them.
heat sensor Common input device in robotics.
humanoid Robot designed generally like a human – bipedal, upright, and arms, and a head.
humidity sensor Common input device in robotics.
infrared sensor Common input device in robotics.
lasers Common input device in robotics.
Page 84
AI & Robotics
Page 85
AI & Robotics
o human intelligence.
o human intelligence.
napses in the human brain.
such as yes or no, true or false.
king for the best.
a computer but understandable to a person, to reduce spam.
d presents answers.
Page 86
AI & Robotics
Page 87
CaseStudy 2012
ACID
Adobe Flash Player
Centralised database
Distributed database
Client-side software
Concurrency
Customer relationship
Plug-ins
Record locking
Smartphone
Tablet device
Atomicity
Consistency
Isolation
Durability
QR code
Mail merge
Unicode
CMS
Virtual Private Network
Comma Separated Valu
Page 88
CaseStudy 2012
Atomicity, Consistency, Isolation, Durability. Properties of a database that help guarantee data integrity.
A web browser plugin which allows a variety of multimedia and interactive content to be included in web pages.
A database in which all data is stored in a single central location.
A database in which data is stored on multiple computers in separate physical locations. Various techniques are used to s
In a web environment, refers to software that runs in the user's browser rather than on the web server.
Methods used to ensure multiple (concurrent) operations can be performed on a database without causing data integrity p
A computerised system for managing an organisation's customer, sales, and marketing information. This might also includ
Software added to web browsers to extend their functionality.
Technique used in databases to prevent a record being accessed by more than one user at a time. This prevents data int
Mobile phone with capabilities typically including Internet access and a camera.
Portable device, often with a touch screen.
Part of ACID. A way of ensuring that database transactions either happen in their entirety, or not at all. For example, a pay
Part of ACID. Ensures that data in a database is always in a consistent state – i.e. that it follows all data validation rules. (
Part of ACID. Ensures that one database transaction cannot unintentionally affect another. For example, two transactions
Part of ACID. Durability means that once a transaction has occurred, it must “stay occurred”, even if the power is lost or th
Quick Response Code. A type of 2D bar code that can store more data than a regular UPC bar code.
The process of automatically customising a standard letter with individual names and addresses from a database.
Encoding system to store text, with support for multiple languages and alphabets, and thousands of characters. Compare
Content Management System. Software which allows management of a web site without web design skills. Content is sto
Allows a secure private connection over a public network, using an encrypted 'tunnel'. For example, a remote computer ca
File format for transferring data, which stores fields and records in a plain text file, separated by commas. See also TSV (T
Page 89
CaseStudy 2012
or neither do.
d a WebCMS.
Page 90