Beruflich Dokumente
Kultur Dokumente
from
www.itgstextbook.
com
1-Hardware
1-Hardware
1-Hardware page 3
Clock speed
CPU
Data throughput
Dual core
GHz
See gigahertz.
Gigahertz
Hardware
Megahertz
MHz
See megahertz.
Microprocessor
MIPS
Motherboard
Multi-core
Multiprocessing
Multitasking
Processor
Quad-core
Software
Speed throttling
Terahertz
See Terahertz
THz
1-Hardware page 4
1-Hardware
Concept keyboard
Digital cameras
Digitize
Dvorak keyboards
Game controllers
Joystick
Keyboards
Input device that lets the user enter text and numeric data.
Magnetic stripe
readers
Input device that reads the magnetic stripe on cards like ATM
cards and bank cards.
MICR
Microphone
Multi-touch
Multimedia keyboard
OCR
OMR
Optical Character
Recognition
Input device that reads printed text, scans it, and converts it to
text that can be edited in a word processor.
Optical Mark
Recognition
Scanner
Sensors
Soft keyboard
Stylus
1-Hardware page 5
Touch pad
Touch screen
Input device that lets the user touch areas of the display to
perform tasks.
Trackball
UPC
A type of barcode.
Virtual keyboard
Voice control
Voice recognition
Webcam
CRT monitor
Hard copy
Inkjet printer
Interactive whiteboard
Device that uses a projector for output and touch inputs, using
a special pen.
Laser printer
LCD screen
Native resolution
Output
Printers
Projectors
Speakers
1-Hardware page 6
1-Hardware
1-4 Storage
Bit
BluRay
Byte
CD-ROM
CompactFlash
Data synchronisation
Disk wiping
DVD
eSATA
EB
See Exabyte
Exabyte
Firewire
Flash memory/flash
drive
GB
See Gigabyte.
Gigabyte
Hard disk
IDE
Input
KB
See kilobyte.
Kilobyte
Magnetic storage
MB
See megabyte.
Megabyte
MMC
1-Hardware page 7
Mouse
Non-volatile storage
Storage which does not lose its contents when the power is
removed.
Optical storage
PB
See petabyte.
Petabyte
Primary storage
Storage systems which are found inside the computer and are
electronic. RAM and ROM are examples.
Redundant Array of
Inexpensive Disks
Redundant system
RAID
ROM
RAM
Random Access
Memory
SATA
Secondary storage
Secure deletion
TB
See terabyte
Terabyte
USB
Volatile storage
1-Hardware page 8
YB
See Yottabyte.
1-Hardware
ZB
See Zettabyte
Yottabyte
Zettabyte
1-5 Miscellaneous
ASCII
American Standard
Code for Information
Interchange
Convergence
Failover system
Global Positioning
System
GPS
RFID
Kensington lock
Plain text
Radio Frequency
Identification
Radio tag
RFID reader
RFID tag
RTF
Unicode
UPS
Uptime
1-Hardware page 9
Uninterruptible Power
Supply
System that lets users make telephone calls over the Internet.
VoIP
Desktop computer
Embedded systems
HTPC
Home Theatre PC
Laptop
Mainframe
Netbook
PDA
Personal Digital
Assistant
Smartphones
Supercomputers
1-7 Accessibility
Braille keyboard
Braille printer
Head wand
1-Hardware page 10
1-Hardware
Input switches
Screen magnification
Sticky keys
Text-to-speech
Braille keyboard
Bluetooth
IrDA
Notes
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
1-Hardware page 11
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
1-Hardware page 12
1-Hardware
...........................................................................................................................................
1-Hardware page 13
2-Software
2-Software page 14
2-Software
Software
Accounting software
Application software
Application suite
Assistant
See wizard.
Audio software
Automatic
recalculation
Backup
Browser
Business Software
Alliance
Bug
Closed source
Cloud computing
Command line
interface
Commercial software
Compatibility
Idea that two systems work together and can share hardware,
software, or data.
Concurrent licence
Copyright
Cross-platform
Database software
Defragmentation
Desktop publishing
software
Device drivers
2-Software page 15
DTP
EULA
Licence agreement for software that sets out the users rights
and responsibilities.
Federation Against
Software Theft
Firewall
Fragmentation
Freeware
Frequently asked
questions
Full backup
Graphical User
Interface
Graphics software
GUI
Incremental backup
Backup that copies only the changed data since the last
backup.
Mail merge
MDI
Multi-user licence
Multimedia software
Open source
Operating systems
Platform
Presentation software
Product activation
2-Software page 16
2-Software
Productivity software
Public domain
Read me file
Restore (a backup)
Serial number
Shareware
Single-user licence
Site licence
Source code
Spreadsheet software
Tutorials
User interface
Utility software
Voice controlled
interface
Web development
software
Web-based software
Wizard
Word processing
software
Notes
...........................................................................................................................................
2-Software page 17
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2-Software page 18
3-Networks
3-Networks
3-Networks page 19
Networks
3G
4G
Application server
Asynchronous
Data transfer method in which the sender and receiver are not
synchronised.
Audit trails
Authentication server
Authorised access
Backbone
Bandwidth
Blog
Bluetooth
bps
Cache
Client computer
Client-server
Database server
DHCP
Dialup
DNS
Domain names
Download
DSL / cable
3-Networks page 20
3-Networks
Email server
Ethernet
Fibre optic
File server
System for transferring files over the Internet, often used for
uploading web sites.
Firewall
FTP
System for transferring files over the Internet, often used for
uploading web sites.
Gateway
Gbps
Hardware address
Home network
Host
HTTP
HTTPS
Hub
Internet Protocol
Internet Service
Provider
IP address
ISP
Kbps
LAN
Log file
Login
3-Networks page 21
system.
MAC address
MAN
Mbps
Metropolitan Area
Network.
Microblog
MODEM
Narrowband
Network administrator
P2P
PAN
Peer to peer
Personal firewall
Port
Print server
Protocols
Proxy server
Push technology
Remote access
Router
RSS
SAN
Server
3-Networks page 22
Social bookmarking
Web site that lets users store and manage their favourite
links, and share them with others.
3-Networks
Social network
Web site that lets users create personal profile pages and
share them with friends.
Switch
Synchronous
Tagging
TCP/IP
Thin client
Top-level domain
Upload
URL
Virtual LAN
VLAN
VPN
WAN
Web 2.0
Web 3.0
Web server
WiFi
Wiki
WiMax
3-Networks page 23
Wireless hotspot
WLAN
WWW
Notes
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
3-Networks page 24
...........................................................................................................................................
3-Networks
...........................................................................................................................................
3-Networks page 25
4-Security
4-Security page 26
4-Security
Security
Access levels
Anti-virus
Asymmetric key
encryption
Authentication
Backdoor
Biometric enrolment
Biometric template
Biometrics
Botnet
CAPTCHA
Certificate Authority
Ciphertext
Cracking
DDoS
Denial of service
attack
Dictionary attack
Digital signatures
Distributed Denial of
Service attack
DNS poisoning
DoS
4-Security page 27
Drive-by download
Encryption
Encryption key
EV SSL
False negative
False positive
Hacking
Home directory
HTTPS
Identity theft
Key escrow
Key logger
Key pair
Macro virus
Malware
Multi-factor
authentication
Packet snifer
Passphrase
Password
Pharming
Phishing
Use of fake emails and web sites to trick users into revealing
sensitive data.
Physical security
Plaintext
4-Security page 28
Private key
4-Security
Public key
Root user
Rootkit
Security token
Security update
Smishing
Social engineering
Spam
Spam bot
Spam filters
Spyware
SSL
Symmetric key
encryption
System administrator
TLS
Transport Layer
Security
Trojan horse
Unauthorised access
Virus
Vishing
4-Security page 29
systems.
Vulnerability scanner
Web bug
WEP
Worm
WPA
WPA2
zombie
Notes
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
4-Security page 30
4-Security
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
4-Security page 31
...........................................................................................................................................
4-Security page 32
5-Multimedia
5-Multimedia
5-Multimedia page 33
Multimedia
AAC
Alignment
AVI
Bit depth
Bit rate
Bitmap graphics
Blue screen
BMP
Bufer
CAD
CGI
Citation
Cloning
Colour balance
Colour depth
Colour levels
Colour management
Colour profile
Colour synchronisation
Composite image
Compression
Computer Aided
Design
Computer Generated
Imagery
5-Multimedia page 34
5-Multimedia
Copyright
Creative Commons
Cropping
Desktop publishing
software
Digital efects
Digital Rights
Management
Digitisation
DOC
DPI
DRM
DTP
Fair use
Filters
FLAC
Flipping
Footer
GIF
GNU Free
Documentation
License
Green screen
Header
Image editor
Intellectual property
5-Multimedia page 35
JPG
Layer
Lossless compression
Lossy compression
Master page
Megapixel
MIDI
Morphing
Motion capture
MOV
MP3
MP4
MPEG
Object oriented
graphics
ODT
Pixel
PNG
Portable Document
Format
PPI
Raster graphics
5-Multimedia page 36
5-Multimedia
Resolution
File format for documents, which can store text and some
basic formatting information.
Rotating
RTF
File format for documents, which can store text and some
basic formatting information.
Sample rate
Scaling
Selection tools
Streaming media
SVG
Template
Text file
TIF
True colour
TXT
Typography
Vector graphics
Virtual actors
Vorbis
Watermarking
WAV
WMA
WYSIWYG
Zip file
5-Multimedia page 37
5-Multimedia page 38
5-Multimedia
Notes
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
5-Multimedia page 39
6-Databases
6-Databases page 40
6-Databases
Databases
Alternative key
Auditing
Boolean operators
Character check
Check digit
Comma Separated
Values
Composite key
Computer matching
Consistency check
CSV
Data integrity
Data matching
Data mining
Data redundancy
Data types
Data warehouses
Database Management
System
DBMS
Field
Field size
Foreign key
6-Databases page 41
Forms
Index
Input mask
Key field
Knowledge discovery
Length check
Lookup
Normalization
Online encyclopaedias
Opt-in
Opt-out
Parameter query
Personal data
Personally identifiable
data
Presence check
Primary key
Privacy policy
Queries
Range check
RDBMS
Record
Redundancy
Redundant data
Relational database
Searching
6-Databases page 42
specific criteria
6-Databases
Secondary key
Secondary use
Using data for a purpose other than the one for which it was
collected.
Sensitive data
Sorting
SQL
Structured Query
Language
Table
TSV
Validation
Verification
Web databases
Notes
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
6-Databases page 43
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
6-Databases page 44
7-Models &
Simulations
Assumptions
Cell format
Cell range
Cell reference
Centralized processing
CFD
Climate model
Computer model
Computer simulation
Decision Support
System
Distributed processing
Feedback loop
Flight simulator
Formula
Function
Goal seek
Grid computing
High performance
computing
7-Modles &
Simulations
Parallel processing
Prediction
Simplification
Spreadsheet
Supercomputer
Variables
Visualisation
What-if scenario
Notes
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
7-Models & Simulations page 47
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
8-Business (traditional)
8-Business
(traditional)
Business (traditional)
Policy that sets out what users are and are not allowed to do
with IT systems.
Collaborative software
Deskilling
EFT
Electronic Funds
Transfer
Email monitoring
Employee monitoring
Extranet
Filtering
Follow-the-sun working
Internet monitoring
Intranet
Key logger
Keystroke monitoring
Loyalty card
Macro
Macro viruses
Mail merge
Online banking
Point of Sale
8-Business (traditional)
Checkout system in a shop, usually connected to a store
POS
Re-skilling
Remote desktop
Reward card
RFID
Self checkout
Supermarket technology that lets users scan and pay for their
own goods without staff assistance.
Targeted advertising
Telecommuting
Teleworking
Notes
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
8-Business (traditional) page 51
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
8-Business (traditional) page 52
...........................................................................................................................................
8-Business (traditional)
Absolute link
Ad blockers
ALT attribute
Anchor
Apache
Applet
ASP
ASPX
B2B
B2C
Back-end
Banner ads
Bounce rate
Breadcrumb trails
Browser compatibility
Bulk email
Business-to-Business
Business-to-Consumer
C2C
Consumer-toConsumer
Conversion rate
Cookies
Small text file text by some web sites to recognise the user
when they return.
CPC
CSS
CTR
Data mining
Digital certificates
Direct payment
Do not track
Domain name
E-commerce
E-marketing
E-store
A name for a web page which lets the user browse and
purchase items.
Electronic shopping
cart
Enterprise information
system
External link
9-Business
System for transferring files over the Internet, often used
for
(on line)
uploading web sites.
Filtering
Flash
HTML
HTTPS
Hyperlinks
Internal link
Internet Service
Provider
ISP
Java
JavaScript
Keyword density
Keyword prominence
Keyword spamming
Link farm
M-commerce
Meta tags
Mobile commerce
MySQL
Newsletter
Online advertising
Online reputation
Payment gateway
PHP
Plugins
Pop-ups
Ranking of sites
Referrer
Relative link
Screen reader
Scripting
Search Engine
Optimisation
SEO
Silverlight
Sitemap
Overview of a web site and all the links and pages within it.
Social media
Spam
Sponsored links
SQL
Styles
Stylesheet
Tags (HTML)
Targeted advertising
Cookie left by a web site the user did not directly visit (usually
by advert companies).
Title attribute
Tracking number
Unique identification
number
Uploading
Uptime
Viral advertising
Virtual world
W3C
Web analytics
Web Content
Management System
Web crawler
Web hosting
Web server
Web spider
WebCMS
WYSIWYG
XML
Notes
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
10-Business (transportation)
10-Business
(transportation)
10 Business (transportation)
Fleet management
Fleet tracking
GPS
Intelligent cars
Package tracking
Real-time data
collection
Remote vehicle
disabling
RFID
Route planning
Sensors
Smart cars
Notes
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
10-Business (transportation) page 62
...........................................................................................................................................
10-Business (transportation)
11-Education
11-Education page 64
11-Education
11 Education
1-1 Programme
Policy that sets out what users are and are not allowed to do
with IT systems.
Accessibility
Anti-plagiarism
software
Asynchronous learning
Black list
Blended learning
Children's Internet
Protection Act
CIPA
Cyber-bullying
Dictation software
e-Book
e-Book reader
e-Learning
EDI
Edutainment
Electronic Data
Interchange
Electronic textbooks
Equality of access
False negative
False positive
11-Education page 65
Flat classrooms
Forums
Intellectual property
Interactive whiteboard
m-Learning
Motion controllers
Multimedia
Onscreen keyboard
Open courseware
Open textbooks
Plagiarism
Podcast
Predictive text
Projector
Reference software
School information
system
Serious games
Speech synthesis
Synchronous learning
Tele-learning
Video conferencing
VLE
11-Education page 66
11-Education
Web 2.0
Virtual Learning
Environment
Notes
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
11-Education page 67
...........................................................................................................................................
...........................................................................................................................................
11-Education page 68
12-Environment
12-Environment
12-Environment page 69
12 Environment
ADC
Analog data
Analog to digital
converter
BAN
Blade servers
Continuous data
CRT
Data centres
Data layers
Data logging
Digital data
Digital footprint
Digital divide
Digitisation
Discrete data
Donation schemes
e-Waste
Electronic waste
Geographical
Information System
Geotagged
12-Environment page 70
GIS
Global Positioning
System
GPS
GPS receiver
Laser imaging
LCD
LEDC
Less Economically
Developed Country
Lidar
MEDC
More Economically
Developed Country
Planned obsolescence
Power settings
Radar
Recycling
Reduce
Redundant systems
Remote sensing
Refurbish
Reuse
12-Environment page 71
RoHS
Reduction of Harmful
Substances
Sample precision
Sample rate
Sampling
SAT NAV
Satellite imaging
Satellite navigation
system
Sensors
Sonar
Speed throttling
Take-back scheme
Virtual globe
Virtual machines
Virtualisation
Visualisation
WEEE
Notes
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
12-Environment page 72
12-Environment
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
12-Environment page 73
13-Health
13-Health page 74
13-Health
13 Health
Addiction
Carpel Tunnel
Syndrome
Centralised database
Clinical decision
support system
Computer model
CTS
Cybernetics
e-Prescriptions
Electronic prescriptions.
EDI
HER
Electronic Data
Interchange
Electronic Health
Records
Electronic Medical
Records
EMR
Ergonomics
Human Genome
Project
Myoelectric control
Neural control
Opt-in
Opt-out
13-Health page 75
PHR
Prosthetics
Remote monitoring
RSI
Smart cards
Store-and-forward
telemedicine
Telehealth
Telemedicine
Telesurgery
Virtual reality
VPN
Notes
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
13-Health page 76
13-Health
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
13-Health page 77
...........................................................................................................................................
...........................................................................................................................................
13-Health page 78
3D modelling
Augmented reality
Avatar
Biometrics
CAVE
Cave Automated
Virtual Environment
Citizen journalism
Copyright infringement
Digital restoration
Digital Rights
Management
Digital radio
Digital television
Digitisation
DRM
e-Book
Electronic ink
Entertainment
Software Rating Board
ESRB
Ground penetrating
radar
HDTV
High Definition
Television
Home automation
& Leisure
Home which uses technology to improve its efficiency, 14-Home
security, and comfort, by automating many aspects.
Home Theatre PC
HTPC
IPTV
Laser scanning
Massively Multiplayer
Online Game
Massively Multiplayer
Online Role Playing
Game
MMOG
MMORPG
Motion Picture
Association of America
MPAA
News aggregator
P2P
Paywall
Peer-to-Peer
PEGI
Piracy
Recording Industry
Association of America
RFID
RIAA
Smart home
Smart meters
Social news
Stereolithography
Streaming media
Video On Demand
Virtual worlds
VOD
Notes
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
14-Home & Leisure page 82
15-Politics &
Government
ANPR
Augmented reality
Automatic Number
Plate Recognition
Battlefield network
Biometrics
Black boxes
Black list
Children Internet
Protection Act (CIPA)
Content rating
Cyber-terrorism
Cyber-warfare
Denial of Service
attack
Digital Millennium
Copyright Act
Direct Recording
Electronic
DMCA
DNA database
DNS
DNS Poisoning
Drone
e-Passport
e-Petition
Electronic voting
False negative
False positive
Filter
Firewall
Future warrior
GPS
Internet voting
Internet Watch
Foundation
IP address
IWF
Keyword filter
Micro-payments
Mission creep
Mixed reality
Online voting
Open government
Optical scanning
electronic voting
system
PNDRE
Precision guided
weapons
RFID
Simulation
Smart weapons
Software verification
Tactile feedback
UAV
Unmanned Aerial
Vehicle
URL
Virtual reality
VVPAT
Weighted filter
White list
Wired soldiers
Notes
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
15-Politics & Government page 87
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
16-IT Systems
in Organizations
Information system
(IS) managers
Analyst
Database
administrator
Development manager
Network manager
Programmer
Support staf
Staff who train users and help them with problems as they
occur
Business case
Client
Constraints
CP
Critical Path
Data collection
End-user
Feasibility study
Functional
requirements
Gantt chart
Milestones
Non-functional
requirements
16-IT
in Organizations
Conditions that a proposed IT system must meet,
such Systems
as
Organisational IT
policies
PERT chart
Project goals
Project management
methodology
Project management
software
Project manager
Project plan
Requirements
specification
Scope
SWOT
Technical
documentation
User documentation
Attributes
Cardinality
Data structure
DFD
Entities
Entity relationship
diagram
ERD
Outputs
Processes
Prototype interface
Relationships
System context
diagram
User interface
Alpha testing
Bugs
Capability Maturity
Model Integration
CMMI
Frequently Asked
Questions
Implementation
Load testing
Online lessons
Prototypes
Quality assurance
methods
Quality control
processes
Software testers
Test plan
in Organizations
List of all tests and test data that should be tried 16-IT
with a Systems
system.
Training
Tutorial
User manual
Beta tester
Beta testing
Handover
User acceptance
testing
Changeover
Delivery
Deployment
Direct changeover
Installation
Parallel running
Running the old system and the new system side by side.
Phased changeover
Adaptive maintenance
Corrective
maintenance
Incident escalation
Incident management
system
an IT system.
Incident tracking
system
Internal support
Maintenance
Perfective
maintenance
Phase out
Preventative
maintenance
Regression testing
Support
Acceptance testing
Agile development
PMBoK
PRINCE2
Procurement
Project initiation
document
SSADM
User acceptance
testing
Waterfall development
16- Miscellaneous
9
Custom / bespoke
software
Emulator
IDE
Integrated
Development
Environment
Legacy system
Of-the-shelf software
SDLC
Source code
System development
lifecycle
Virtual machine
Notes
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
16-IT Systems in Organizations page 96
...........................................................................................................................................
16-IT Systems in Organizations
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
16-IT Systems in Organizations page 97
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
AI
Artificial Intelligence
Artificial Neural
Network
Boolean logic
CAPTCHA
Chaining
Computational
intelligence
Confidence interval
Expert systems
Feedback loop
Fuzzy logic
Hand writing
recognition
Heuristics
IF-THEN rule
Inference engine
Inference rule
Knowledge base
Knowledge domain
Robotics
Area of knowledge in which an expert system specialises.17-AI &
Knowledge engineer
Knowledge
representation
Logic
Machine learning
Machine translation
Natural language
processing
Neural networks
Pattern recognition
Searching
Set theory
Speech recognition
Training data
Turing test
User interface
17- Robotics
2
Android
Autonomous
Camera
Clamps
Claws
Computer vision
Heat sensor
Humanoid
Humidity sensor
Infrared sensor
Lasers
Light sensor
Lights
Magnetism sensor
Motors
pH sensor
Pressure sensor
Proximity sensor
Radar
Relays
Robot
Robotic arm
Robotic fingers
Sensors
Sirens
Sound sensor
Speakers
Tracks
Wheels
Notes
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
17-AI & Robotics
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
18-ITGS (Intro)
18-ITGS
18- Core
1
Application areas
Ethical issues
Ethics
Information technology
Social impacts
Stakeholders
18- Strand 1
2
Anonymity
Authenticity
Compatibility
Cultural diversity
Cultural impact
Digital citizenship
Economic impact
Environmental impact
Equality of access
Ergonomic impact
Globalization
Health impact
Integrity
Intellectual property
Legal impact
Policies
Political impact
Privacy
Protocols
Psychological impact
Reliability
Security
Standards
Surveillance
Unauthorised access
Anonymity
Authenticity
18- Strand 2
3
Business and
employment
Environment
Health
Politics and
Government
18- Strand 3
4
Input
18-ITGS
Networking
Output
Processing
Storage
RSS feed
RSS reader
Notes
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
18-ITGS page 107
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................