0% found this document useful (0 votes)
8 views

IT Glossary Highlighted Vers.

Uploaded by

szar.pahayculay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

IT Glossary Highlighted Vers.

Uploaded by

szar.pahayculay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

GLOSSARY

Access Rights: The permissions and controls governing who has access to certain information or
systems, particularly relevant in IT and cyberspace.

AI and Expert Systems: is an umbrella term that encompasses numerous methods for building intelligent
computers

Antivirus: Programs designed to detect and delete any malware such as software viruses.

Application Security the processes, practices, and tools used to identify, repair and protect against
vulnerabilities in applications throughout the software development life cycle.

Artificial Intelligence Branch of computer science focused with making computer work and act like
humans

Assistive Media Software or hardware which aid people with less abilities in accessing computers

Augmented Reality a technology that superimposes a computer-generated image on a user’s view of


the real-world, thus providing a composite view.

Authentication: The process of determining whether someone or something is, in fact, who or
what it says it is.

Authorization: The process of giving someone permission to do or have something.

Cloud Computing The process of storing and accessing data and programs over the internet instead
of your computer’s hard drive.

Code of Ethics: A set of principles designed to guide decision-making and distinguish right from
wrong within a business or organization.

Communication act of transmitting messages and a process whereby information is exchanged


between individuals.

Computer
Programmer: Someone who writes new computer software using coding languages to
troubleshoot and improve software, including video game software.

Confidentiality
Privacy: The invasion of our privacy is now much simpler and potentially riskier than it was
before the invention of the computer. It can be employed symbolically to coerce,
trick, or steal from victims

Copyright: The exclusive legal right to reproduce, publish, sell, or distribute the content and
form of literary, musical, or artistic works.

Cybercrime: can be classified as an intellectual, white-collar offense. Individuals who engage


in such illicit activities typically employ complex methods to hack computer
systems

Data Control: refers to the ability to manage and secure data, ensuring that it is used responsibly
and ethically.
Database Administrator: A specialist who uses specialized software to organize and manage data,
diagnosing and solving complex IT issues related to data infrastructure.

DICT Spearheads the nation’s ICT use for economic growth and public service

E-commerce An IT application that benefits companies through profit and access to


markets on a large scale and benefits the consumer in terms of providing
services and goods.

E-government intended to manage transactions and public services to citizens in the


state in electronic form by using computers instead of using traditional
methods such as paper or moving from one department to another.

E-health provides specialist sites in various branches of medicine, providing


medical consultations without going to the doctor’s office and providing
information on various diseases.

E-learning providing electronic content to the learner on the most accessible routes
and using modern electronic media such as computers.

Electronic Surveillance: This one involves monitoring and recording people with technology, often
without their knowledge.

Email Security practice of protecting email accounts and communications from


unauthorized access, loss, or compromise.

Encryption Security a technique that transforms data into an unreadable format using a
mathematical algorithm and a cryptographic key.

Encryption: A way of scrambling data so that only authorized partes can understand
the information.

Firewall a type of network security where it inspects incoming and outgoing traffic
using a set of security rules to identify and block threats.

Fixed-line Network: Used for voice and data communications through a cable

Fraud and Misuse: A scheme by one individual, group, or organization that leads another to
part with valuables or give up a legal right

Hacking: Breach of digital systems and networks by unauthorized entry into a


computer system or account

Harmful Actions: Actions defined by computer ethics as damaging or causing adverse


consequences in the field of IT, including loss of data, property, and
undesirable impacts, often related to hacking and malware use.

ICT the use of computer-based information systems and communications


systems to process, transmit, and store data and information.
Identity Theft: This occurs when someone steals an individual's information or data to
commit a crime, an example of which is fraud.

Information: the knowledge obtained from reading, investigation, study or research,


can be in any form of text and media

Information Control: Encompass a wide array of processes, policies, and technologies


dedicated to overseeing, censoring, and safeguarding our private data.

IT Profession: A career or occupation in the field of Information Technology,


encompassing various roles and responsibilities related to technology and
computer systems.

IT Laws: regulations that govern the use, access, and dissemination of information
in the digital realm.

IT Profession: refers to a career or occupation in the field of IT

IT Technician: A professional who collaborates with support specialists to analyze and


diagnose computer issues and may provide training to users on new
programs or functions.

Liability: Something that a person or company owes, typically a sum of money,


which is settled over time through the transfer of economic benefits such
as money, goods, or services.

Local Area Network LAN: system where computers and other devices connect to each other in one
location.

Logging: Stores data of who has access to the data and how it was accessed.

Metropolitan Area Network MAN interconnection of several LANs throughout a city, town or
municipality

Mobile Applications: software applications created specifically for use on small, wireless
computing devices like smartphones and tablets.

Multifactor Authentication Code: an authentication method that requires the user to provide two
or more verification factors to gain access to a resource.

National Privacy Commission NPC: enforces these regulations and prescribes penalties for violations

Network Security: the protection of the underlying networking infrastructure from


unauthorized access, misuse, or theft.

Network: a set of devices that are connected and linked together through
communication links.

Patent: A legal protection that allows an inventor or assignee to prevent


others from creating, using, selling, or importing the patented
invention.
Personal Area Network PAN: smallest and simplest type of network where it connects devices
within the range of an individual and are no larger than about 10
meters.

Personal Privacy: The protection of personal spaces and the ability to control
access to one's own information.

Photoshop: a way of editing and manipulating images, retouching, adding


effects to normal images, commonly the best applications for
designing posters, magazine covers, to billboards that people
normally see around the city.

Piracy: The illegal act of creating unauthorized copies of software or


other digital content.

Quality Assurance Tester: Technicians or engineers who test software products to ensure
they meet industry standards and are free of issues, commonly
found in gaming and mobile application development.

RA 10173 Data Privacy Act of 2012: An act protecting individual personal information in information
and communications systems in the government and the private
sector. It regulates the protection of personal data and privacy
rights.

RA 10175 Cybercrime Prevention Act: enforces these regulations and prescribes penalties for violations

RA 11934 Subscriber Identity Module (SIM) Registration Act: It aims to prevent and deter criminal
activities involving mobile
communications while ensuring that
legitimate users can continue to enjoy
the benefits of mobile services

RA 4200 Anti Wire Tapping Act: an act to prohibit and penalize wire-
tapping and other related violations of
the privacy of communication, and for
other purpose

RA 8293 Intellectual Property Code of the Philippines: An act prescribing the intellectual
property code and establishing the
intellectual property office, providing for
its powers and functions, and for other
purposes. It governs intellectual
property rights in the Philippines and
provides legal protection and regulations
for various forms of intellectual
property.
RA 8484 Access Devices Regulation Act: an act regulating the issuance and use of access devices,
prohibiting fraudulent acts committed relative thereto,
providing penalties and for other purposes

RA 8792 E-Commerce Act of 2002: an act providing for the recognition and use of electronic
commercial and non-commercial transactions and
documents, penalties for unlawful use thereof, and for
other purposes

RA 9239 Optical Media Act: an act regulating optical media, reorganizing for this
purpose the videogram regulatory board, providing
penalties therefor, and for other purposes"

RA 9775 Anti-Child Pornography Act of 2009: an act defining the crime of child pornography,
prescribing penalties therefor and for other purposes

RA 9995 Anti-photo and Video Voyeurism Act: an act defining and penalizing the crime of photo and
video voyeurism, prescribing penalties therefor, and for
other purposes

Resource sharing: enable the sharing of programs, peripherals, and data


among all networked computers, regardless of their
physical locations

Robotics: Field of computer science and engineering concerned


with creating devices that can move and react to sensory
input

Sabotage: Refers to intentional harm done to a computer or


computer resource. The dissemination of nefarious and
destructive software that may damage a computer’s
hardware as well as its software is one of the most
common types of computer sabotage

Software Engineer: An expert who applies mathematics and computer


science knowledge to create and enhance software,
including enterprise applications, operating systems, and
network control systems.

Software Piracy: Infringing on a person's or organization's software


copyright. Obtaining codes, programs, and other
information without permission, making copies, and
using them for personal or commercial benefit are all
part of it

Spyware: A program that collects the user’s habits and transmits


that information to a third-party, all without user’s
consent.
Support Specialist: A professional responsible for reviewing and solving computer
network and hardware problems, often providing support in
various industries or at technology companies.

System Analyst: A professional who reviews design components and uses IT


knowledge to solve business problems, often assisting in
implementing proposed changes.

Technological convergence: the synergy of technological achievements to work on a goal or


task

Trade Secrets: Practices or processes of a company that are not generally known
outside the company and provide a competitive advantage.

Unauthorized Access: happens when an unauthorized person gains access to a website,


application, server, service, or other system by breaking into a
legitimate user account.

User’s intervention: refers to the actions and activities that individuals take within a
networked environment.

Virtual Private network VPN: creates a private network overlay across an existing public
network.

Virus: a form of malware, or harmful software, that spreads between


computers and corrupts software and data.

Web Developer: A professional who designs the appearance, navigation, and


content organization of websites using coding languages like
HTML, CSS, and JavaScript.

Social Media: Websites, application or online channel that enables web user to
create, discuss, modify and exchange user-generated content

Wired Network: refers to any physical medium connected through wires and
cables that provides high security with high bandwidth
provisioned for each user

Wireless Local Area Network: utilizes a wider distribution method to connect two or more
devices, which provides access points to a wider internet.

Wireless Network: Computer networks that are not connected by any cables; utilizes
radio waves to transmit signals

Wireless personal area network: Allows users to connect devices in a short amount of time,
generally within a person's reach.

You might also like