Professional Documents
Culture Documents
Glossary
3D printer An output device that produces solid Analogue to digital converter (ADC) A device
3D models using a modified inkjet printer and used to convert analogue signals (usually from
resins to replace inks. sensors) into digital signals that can then be
understood and processed by a computer.
Abnormal data Data used to test a system. Data
that is of the wrong type (for example, text where Analysis (stage) The first stage in systems
it should be numeric) or is outside the accepted analysis to upgrade an existing system to a new
range. system.
Absolute reference Fixes a cell reference within ANPR Automatic number plate recognition makes
a spreadsheet so that when the formula is copied, use of optical character recognition (OCR) to
this cell reference never changes. recognise car number plates captured by a camera;
used in car parks and by the police.
Absolute value Fixes a value so that it cannot
change. For example, in a web page, a table width Anti-virus software Software that detects and
can be set to 300 points. This table will always removes or isolates computer viruses.
remain 300 points wide and will not change if the Applications software Software that provides
size of the browser window is changed. the services the user requires to solve a given task.
Access point (AP) /hot spot Used in wireless Archive The storage of information for a long
networks to allow access to the network at various period of time. Data is likely to be compressed.
points using wireless technology (for example, an
airport will have several access points, allowing Artificial intelligence (AI) Behaviour
near 100% coverage for users). demonstrated by machines that resembles the
intelligence displayed by humans or animals.
Active host Functioning software that malware
can affect by attaching itself to the code or by Ascender The part of a lower case letter (b, d,
altering the code to allow the malware to carry out f, h, k, l or t) that extends above the body of the
its attack. letter.
Active tag An RFID tag that has its own power Aspect ratio The proportions of an image (width
source. to height). In the case of a presentation the width
and height of the display, often either 4:3 or 16:9.
Actuator A transducer that takes signals from a
computer and converts them into some mechanical Attagging Embedding malicious code into QR
codes.
motion (for example, motors, pumps, valves).
Attribute This is used to provide additional
Add to SB gloqr code A matrix of dark and light
information about HTML elements. Attributes
squares that represent data. The pattern can be
follow the start tag and come in name/value pairs.
read and interpreted using a smartphone/tablet
For example, <table border="1"> specifies that the
camera and QR app.
table tag has an attribute called border, which has
Additive printing The method used by a 3D a value set to 1.
printer to build up objects layer by layer.
Audience notes Printed copies of the slides from
It is illegal to photocopy this page
Adware A type of malware that attempts to a presentation, which are given to the audience to
flood the end-user’s computer with unwanted take away and refer to after the presentation.
advertising.
Audio conferencing Meetings held between
Alphanumeric A field type in which any character people using audio (sound) equipment only.
is acceptable input – sometimes called text.
Augmented reality (AR) An experience in which
Analogue Physical data that is continuous and images, text and sound are overlaid on objects or
not discrete in nature; can have infinite number of places in the real world.
values.
Authentication The process of determining
Analogue sensor A device or apparatus that whether someone is who they claim to be; the most
measures information that is continuously changing
(analogue data).
Hodder & Stoughton Limited © David Watson and Graham Brown 2022 1
Glossary
common forms of authentication are user ids and Boolean Data that can have only two possible
passwords and biometrics. answers: true (1) or false (0).
Automatic teller machine (ATM) A machine used Bridge A device on a network that connects
by customers to access their bank accounts using a networks (lans) together that all use the same
card and PIN, usually to withdraw cash from their protocol.
account. Buffer/buffering A process that uses a memory
Autonomous vehicle A vehicle that is under area to store data temporarily; for example, when
microprocessor control and doesn’t require any printing a document or streaming media, the
human interaction in normal driving. data is held temporarily in a buffer until it can be
processed.
Backup Copy of a file made in case the original
data is corrupted or lost. CAD Software used to create drawings, for
example, to send to a 3D printer or to produce
Barcode An optical machine-readable
blueprints of a microprocessor design.
representation of data that uses thick and thin
lines to represent numbers. Card cloning This is the copying of data on a
credit or debit card and making a fake card using
Barcode reader An input device that can read/ the data stolen.
scan barcodes using laser or LED light.
Cascading stylesheets (.css) A stylesheet saved
Basic input/output system (BIOS) Software in CSS format with a .css file extension. This allows
instructions, stored in ROM, that tell a computer the stylesheet to be attached to each web page
what to do when it turns on. to define how to display the content layer of a
Behaviour layer One of the three layers in web web page, without the page needing to contain the
page development. The behaviour layer is used style tags. If a number of cascading stylesheets are
to do ‘an action’ (rather than just display or link used, the multiple style definitions will cascade
to other pages) and often uses script languages into one.
embedded within the HTML. There are many Category axis A name given to the chart axis in
different script languages but the most common for Microsoft Office that represents the category for
web development are JavaScript, PHP, Perl and CGI. each data point. It displays text values.
Bio ink Materials used by 3D printers when Cathode ray tube (CRT) monitor An older type
building biological material, such as human tissues. of computer monitor that has an electron beam
Biometrics A type of authentication based on a directed towards a screen coated in phosphors,
unique human characteristic, such as fingerprints, which glow when hit by the beam. Screens are
voice or face recognition. refreshed 25 times per second.
Blu-ray disc An optical disk with a very large CD-R/DVD-R An optical storage media that can
storage capacity; uses blue laser light to read and be recorded on only once.
write the data – the wavelength of blue laser light CD-RW/DVD-RW An optical storage media that
is much shorter than the wavelength of red laser can be written to many times.
light thus increasing Blu-ray’s storage capacity.
Cell A single square/box within a spreadsheet
Bluetooth An open wireless protocol over short into which only a single entry can be placed.
distances that allows devices to communicate using
radio waves instead of wires. Central processing unit (CPU) Central processing
It is illegal to photocopy this page
2
Cambridge IGCSE Information and Communication Technology Study and Revision Guide Second Edition
Glossary
Chip & PIN A technology used in debit and credit Content layer One of the three layers in web
cards for payment in, for example, stores and page development. The content layer is used to
restaurants, or for use with ATMs; the chip is read define the structure of the web page, sometimes
by a card reader machine, which compares it with using tables or frames. It contains the content of
the PIN typed in by the customer thus ensuring the the pages, including text or images and hyperlinks
transaction is secure. to other pages. The content layer is often written
in HTML or XHTML.
Clipboard A temporary storage area used by the
operating system to hold information that the user Contiguous data Data to be selected, usually in
cuts or copies, ready to be pasted at a later time. a spreadsheet, that is arranged in rows or columns
that are next to each other.
Cloud storage A method of data storage where
data is stored on offsite servers; the physical Control and measurement Software which takes
storage may be on hundreds of servers in many data from sensors which allows a process to be
locations. constantly monitored of controlled.
CODEC A program that encodes data and decodes Cookie A small file sent to a user’s computer
data; it is often used for sound and video files, via their web browser when they visit websites; a
where the data is encoded for storage and decoded cookie stores information about the user that is
for playback – CODEC can stand for Coder-Decoder accessed each time they visit the website.
or Compression-Decompression.
Copy To take a highlighted object and place a
Column All the cells in one vertical line in a copy of it into the clipboard, leaving the original
spreadsheet. object the same.
Comma separate values (.csv) A file format Copyright Legislation in almost all countries
(.csv) used to hold tabular data, for example, from that is used to discourage the illegal use of text,
a spreadsheet or database table. It stores the data images, software or music.
as a text-based file using commas (or semi-colons
Crop Trim part of an image to remove unwanted
in some locations) to separate the data items.
areas. Cropping may change the aspect ratio but
Command line interface (CLI) User communicates will not distort the image.
with a computer by typing in commands that have to
CSS A language used for the presentation layer in
be in an exact format to work.
web development. This language is used to define
Compiler Software that translates high level how elements of a web page appear in the web
language code into machine code which can be run browser. CSS elements can be embedded within HTML
on a computer. or attached to a web page as a cascading stylesheet.
Computer-aided learning CAL is an educational Currency The unit of money used in a country,
strategy devised to teach a particular subject by for example, Egyptian pounds, Kenyan shillings or
the use of computer technology; CAL is designed Indian or Pakistani rupees.
to enhance traditional teaching methods (using
Cut To take a highlighted object and place it
computers) rather than replace them.
into the clipboard, removing it from its original
Computer vision The ability of a computer to location.
sense and react to visual inputs.
Cyberbullying Using computer technology to
Computer-aided design (CAD) Software used send messages that are intimidating or threatening
It is illegal to photocopy this page
Hodder & Stoughton Limited © David Watson and Graham Brown 2022 3
Glossary
Data capture form A printed or digital form used operating system; usually connected through a USB
to collect information that is to be stored on a port.
computer.
Dialogue-based user interface Type of interface
Data entry form A screen-based form used to where user ‘talks’ to a computer; a microphone
input data into a system. picks up key words and the computer carries out
specific functions.
Data flow diagram (DFD) A diagram used by a
systems analyst to understand the inputs, outputs, Digital camera A camera that does not use
processing and storage requirements of a system. film to record photographs. Light is picked up by
sensors and the resulting image is stored on a
Data packet A small amount of data sent over a
solid-state memory in the camera.
network; it is made up of a header, footer and data
load. Digital certificate A method used to
authenticate a website, often using SSL
Data protection act Legislation that gives
protocols; provided the digital certificate can be
individuals rights regarding the storage and
authenticated, this means that any communication
processing of their personal data.
or data exchange between browser and website is
Data redundancy The situation where the same secure.
data is stored on several storage devices, or multiple
Digital data Data written in binary (1s and 0s –
times on the same database, at the same time.
called bits); the data is discrete and can only have
Data transfer rate Once the correct location on specific values.
the storage device has been located, the speed at
Digital to analogue converter (DAC) A device
which data can be read or written.
used to convert digital signals into analogue
Data types Category of data either as numerical, signals (so the computer can control another
text, date/time or alphanumeric. device, such as pump, motor, etc.).
Database Software that allows organisation, Direct changeover The immediate changeover
manipulation and analysis of data stored in tables; from an old system to a new system; this is often
can allow queries. done overnight where the whole of the old system
Date and time A field type within Microsoft is replaced by a new system in one go.
Access that is used to store dates and times. Disconnected physical token An external
Decimal A data type used within numeric fields device that isn’t connected to a computer that is
in Microsoft Access to store the data in decimal used to authenticate a user by way of two-factor
format. authentication.
Decryption key An algorithm that can decrypt Dongle A type of pen drive/memory stick that
data (cypher text turned back into plain text). acts as a security device when using software, in
order to reduce the risk of software piracy.
Descender The part of a lowercase letter (g, j, p,
q or y) that falls below the baseline of the letter. Dot matrix printer An older type of printer that
strikes a head made of pins against a ribbon.
Design (stage) The second stage in the
systems analysis life cycle; this involves data/file Driving wheel An input device, often used for
structures, input/output formats and validation car racing games.
routines. Dual layering A method of using two recording
It is illegal to photocopy this page
Destructive interference A process that takes Ebook A book stored in electronic format.
place when reflecting lasers from the surface of Echo cancellation software Software used to
optical storage media; used to detect pits and detect and remove echoes which are common
lands. during video conferencing.
Device driver Software that enables one or EFT Electronic funds transfer is a system of
more hardware devices to communicate with the transferring money from one bank account to
another without any money physically changing
4
Cambridge IGCSE Information and Communication Technology Study and Revision Guide Second Edition
Glossary
hands; it is often used at supermarket checkouts Firewall Software or hardware between computer
when credit/debit card transactions are being and external network that protects the computer
made. from incoming network traffic by checking it meets
certain criteria.
EFTPOS EFT point-of-sale terminal is used to carry
out and electronic funds transfer. Flat-file database A database structure using a
single two-dimensional table.
Electronic point of sale terminal (EPOS) A
terminal used to carry out an electronic funds Footer The area at the bottom of a document
transfer. between the bottom of the page and the bottom
margin.
Electronic token App used to authenticate a user
by using two-factor authentication. Foreign key A field in a table with a relational
database that is linked by a relationship to a
Email An electronic method of sending
primary key field in another table.
documents and other items, such as photos, from
one computer to another via the internet. Format painter A tool used in many packages to
copy the formatting from one part of a document
Encryption The scrambling or encoding of and apply it to another.
data in order to make the data unreadable to an
unauthorised user. Formula A set of instructions used to perform a
calculation in a spreadsheet. A formula can include
Encryption key An algorithm that can encrypt cell references, numbers, mathematical symbols
data (plain text turned into cypher text). and, in some cases, predefined functions.
Evaluation (stage) A stage in systems analysis Function A pre-set formula with a name (which is
that involves reviewing the effectiveness of a reserved word) placed in a spreadsheet cell.
the new system and advising on any necessary
changes. Gateway The name given to a firewall if it is
hardware.
Expert system A system that attempts to
reproduce the ability of human experts in carrying Generic file type File types that can be opened
out complex tasks such as medical diagnosis, in appropriate software on most platforms.
engineering diagnostics or route scheduling. Gesture-based interface Type of interface
Explanation system Part of an expert system where a user moves their hand, fingers, feet
that explains to the user the reasoning behind its (etc.) to carry out a function; sensors pick up the
conclusions and recommendations. movement.
Extended reality A general term that includes GIS Geographic information system is a computer
augmented reality and virtual reality. system that combines maps with data; GIS systems
can become very complex depending on the
Extreme data Data that is on the boundaries of different types, and amount, of data used.
acceptable data; for example, if people’s ages can
be between 18 and 65, then both 18 and 65 are GPS Global positioning satellite (GPS) system
extreme data. is a computer-based system used to determine
the exact location of a vehicle using a number
False positive The incorrect identification of of satellites positioned above the Earth; each
a program as a security threat by anti-malware satellite transmits it position and exact time so
software. that a device in the vehicle can calculate its exact
It is illegal to photocopy this page
Hodder & Stoughton Limited © David Watson and Graham Brown 2022 5
Glossary
Graphical user interface (GUI) Uses icons which Hypertext Markup Language: (HTML) A text-
are selected using a pointing device (e.g. mouse) based language used to create markup, so that a
or finger (if touchscreen used). web browser will be able to display information.
Graphics card Internal circuit board that allows Icon Small picture or symbol used on a screen to
graphic data to be sent to a video display. represent an app; once selected, the app can be
launched.
Gutter The inner margin of the leaves of a bound
book. If a book is open, the gutter is the area of Image processing Analysing visual inputs
adjacent inner margins. to understand what the image might mean or
represent.
Hanging paragraph The first line of a paragraph
is aligned to a margin and all other lines are Indented paragraph The first line of a paragraph
indented (left hanging from the first line). is indented from a margin and all other lines are
aligned to the margin.
Hard disk drive (HDD) A computer’s main
memory where applications software, documents Inference engine The problem-solving part of an
and data files are stored on a magnetic material. expert system that examines the knowledge base
using a form of reasoning, with the aim of finding
Hardware Physical components that make up a
a solution to a given problem.
typical computer system; these components can be
internal or external to the computer. Inference rules Rules used by the inference
engine within an expert system.
Head The section of HTML in a web page that
contains page titles (visible in the browser tab but Infrared The far end of the visible
not on the page), styles (for example, the links electromagnetic spectrum.
to external stylesheets) and the metadata (for
Inkjet printer A type of printer which uses
example, the tags used by search engines).
inkjets to produce low-volume, high-quality
Header The area at the top of a document printing.
between the top of the page and the top margin.
Integer A whole number with no decimal places
Heuristic checking Checking software for (for example, 18 or 107).
behaviour that could indicate the presence of a
Internet banking Performing banking operations
virus.
online or using a smartphone/tablet app; allows
Hologram A photographic image that is 3D and the transfer of money between accounts, paying
appears to have depth. Holograms are often used bills, and so on.
on credit cards or software supplied on DVD as an
Internet protocol (IP) address A numerical
additional proof of being a genuine copy.
identification and logical address that is given
Holographic image (hologram) A photographic to a device when it joins the internet; it uses the
image that is 3D and appears to have depth; internet protocol to allow communication between
holograms are often used on smart cards and on devices on the internet.
original software as an additional security method
Interviews Asking people questions face-to-
and proof of authenticity.
face as part of the fact-finding stage in systems
Https Hypertext transfer protocol secure; set of analysis.
rules that must be obeyed when transferring web
Joint photographic expert group (.jpg/.jpeg) A
pages over the internet using SSL encryption.
It is illegal to photocopy this page
6
Cambridge IGCSE Information and Communication Technology Study and Revision Guide Second Edition
Glossary
activities and storing the keystrokes in a small file; magnetic signatures which allows data to be stored
it is designed to monitor and capture web browsing and read.
and other activities and capture personal data.
Malware Malicious software that is harmful to a
Knowledge base Part of an expert system computer, such as spyware or a virus.
— a type of database that allows the complex
Media access control (MAC) address A hardware
storage and retrieval function of a computerised
address that uniquely identifies each device
knowledge-based management system; it consists
connected to a network.
of objects and attributes.
Metatag A HTML tag inserted in the head section
Label Text placed in a spreadsheet cell, often
to define the character set, name and/or contents
denoting a heading or name associated with a
of a web page. This can include keywords which
value.
can be used by a search engine. The contents of a
Laptop A portable computer where all the metatag are not displayed on the web page.
components are integrated into a single ‘box’ which
Microprocessor A single integrated circuit that
contains keyboard, backing store and all other
is the basis of most PCs and is in many household
components.
devices. It has essentially the same function as a
Laser printer A type of printer that uses laser central processing unit.
technology to produce high-volume, high-quality
Modelling A programmed simulation of a
output on paper.
situation or process that allows data to be
Latency The time lag in a system, for example, changed in order to examine the effects on other
the time it takes to find data on a hard disk, which data; financial modelling is often done using
depends on the time taken for the disk to rotate spreadsheets.
around to its read/write head.
Modular (design) Software development where
Layer Allows other objects (or parts of an image) the code is broken down into separate sections
to be placed in front of or behind other layers. (modules) that can be developed, tested and
checked independently.
Legend A box that identifies the patterns or
colours that show different data series in a chart. Motherboard Printed circuit board that acts as
a ‘hub’ which all internal computer components
Lidar (Light Detection and Ranging) A system
connect to.
that uses lasers to build up a 3D image of its
surroundings. Mouse A type of pointing device that controls
a pointer on screen, allowing the user to make
Light pen An input device used to draw on screen
selections by clicking a button.
or select items on screen – currently light pens
only work with cathode ray tube monitors. MP4 A file format (multimedia container) used for
storing video files. It is also used to store audio
Linker Software that takes a number of object
(the soundtrack to the video) and other data such
files and combines them into a single program (e.g.
as subtitles and still images.
combines modules).
MP3 MPEG-1 audio layer 3; a compressed file
Live data Data input to test a new system
format used for storing music; typically, the size of
produces expected results; the live data has been
an MP3 music file is 90% less than a conventional
used before in the old system and has known
music file used on a CD.
outcomes.
It is illegal to photocopy this page
Hodder & Stoughton Limited © David Watson and Graham Brown 2022 7
Glossary
in their formulae rather than remembering the cell Optical character recognition/reader (OCR) A
references for the cells in this range. system that takes scanned text and converts it into
computer-readable form so it can be used in a word
Nested functions One spreadsheet function is
processor and other applications software.
used within another function in a cell.
Optical mark recognition/reader (OMR) A
Network interface card (NIC) Hardware that
system that can read marks written in pen or
allows a device to connect to a network, e.g. the
pencil on a paper; used to read answers on
internet.
questionnaires, multiple-choice exam papers and
Newsletter A short, printed or digital document voting papers, etc.
used to communicate information.
Optical media These are optically-active disks
NFC Near field communication (NFC) is a sub-set that include CDs, DVDs, Blu-ray discs and DVD-RAM;
of radio frequency identification (RFID) in which the disks are coated in a light sensitive dye or light
the devices have to be very close to each other to sensitive metal alloy that can be written to or read
broadcast and receive signals. from using laser light.
Non-contiguous data Data to be selected, Optical storage device A storage device that
usually in a spreadsheet, that is arranged in rows uses laser light to read and write data stored on
or columns that are not next to each other. optically-active disks (also see optical media).
Normal data Data that is within an acceptable Ordered list A list of objects within a web page
range and should be accepted by a new system. that are in numerical order.
Number A value entered in numerical format, for Orphan The first line of a paragraph that appears
example, ‘5’ is a number, whereas ‘five’ represents a at the bottom of the page, with the rest of the
number but is in text format. paragraph appearing on the next page.
Numeric Data that consists of numbers: real, Out clearing The first stage when a bank
integer or fixed decimal. processes a cheque.
Numeric keypad A type of keyboard that usually Parallel running This is where two systems are
consists of digits and simple arithmetic operators. run side by side (using the same inputs) to check
Observation Part of the fact-finding stage in they both produce the same results.
systems analysis, that involves watching people Passive tag An RFID tag that uses power from
doing their tasks. the reader to drive the circuitry in the tag.
OCR Optical character recognition is a system Paste To take a copy of an object from the
that takes scanned text and converts it into clipboard and place it in a new location.
computer-readable format so it can be used in a
Pen drive/memory stick A small storage device
word processor and other applications software
that makes use of solid-state technology to store
(such as ANPR).
data; it connects to the computer through a USB
OMR Optical mark recognition is a system that port.
can read marks written in pen or pencil on a paper
Personal data Any data concerning a living
printed from a precise template; used to read
person that can be used to identify the person,
questionnaires, multiple-choice exam questions,
either by itself or in conjunction with other
and so on.
information.
It is illegal to photocopy this page
8
Cambridge IGCSE Information and Communication Technology Study and Revision Guide Second Edition
Glossary
part introduced, and so on, until the old system is Portable media player A separate device used
fully replaced. to play music or videos; they use solid-state
technology.
Phishing A fraudulent operation involving
the use of emails; the creator sends out a Poster A printed or digital visual method of
legitimate-looking email hoping to gather personal communicating information.
information — once the user clicks on a link in the
Presentation layer One of the three layers in
email, the browser is directed to a fake website.
web page development. The presentation layer is
Phone conference A meeting held between more used to define how a web page will look to the
than two people using telephones. viewer. It dictates the colour schemes, themes and
styles seen when a web page is displayed and is
Physical safety A state in which measures have
usually written in CSS.
been taken to remove or significantly reduce the
risk of physical harm, such as injury or loss of life. Presenter notes Printed or electronic copies of
the slides from a presentation, with additional
Physical token A device used to authenticate a
notes to be read from (or used as prompts) by the
user by using two-factor authentication.
person delivering the presentation. These notes are
Piezoelectric The conversion of mechanical not usually given to the audience.
movement to electricity (and the other way round).
Primary key (field) A single field within a
Pilot running With this method, the old and new relational database table that contains unique data
systems are run side by side for a time before the (no two records can have the same primary key); a
new system takes over altogether. primary key field cannot be part of a blank record.
Piracy Illegal copying of copyright material. Printlets 3D printed medicines (printed tablets).
Pits and lands The lowest point (pit) and highest Product key A unique reference number that is
point (land) on the surface of an optically active entered to enable software to work. It protects
disk. against software piracy.
Pixel One dot or square on the screen. It is the QR code A matrix of dark and light squares that
smallest item that can appear on a screen. The are used to represent data; the pattern can be read
number of pixels displayed on the screen depends by a smartphone/tablet camera and interpreted
upon the screen resolution. using a QR app.
Plaintext The original data/information before it Quarantine Isolation of a file or program
goes through an encryption algorithm. identified by anti-virus software as being infected
Plotter (graph) An output device that produces by a virus, before being deleted.
very large and very accurate printed copies on Query A request for information from a database.
paper and other media (often used with CAD
Questionnaires A form with a series of questions
software).
used to enable data gathering; the answers to the
Point An absolute measure of size used for text questions are normally filled in on the form itself.
in website authoring.
Radio frequency identification (RFID) A
Pointing device Device used to navigate method of communication between a tag and a
a graphical user interface, such as a mouse, reader.
trackerball or joystick.
It is illegal to photocopy this page
Hodder & Stoughton Limited © David Watson and Graham Brown 2022 9
Glossary
Record A collection of fields containing within the document, so allowing some formatting
information about one data subject or one object to be passed from one applications package to
within a database. another.
Reflection Flip an image (usually either Robot/robotics The science of developing
horizontally or vertically). devices (robots) that are programmed to act
independently to carry out tasks often used in
Relational database A database structure
industrial applications.
where data items are linked together using
relational tables. It maintains a set of separate, Roshal archive (.rar) A file format for a
related files (tables), but combines data elements container (like a zip file) that can hold other files
from the files for queries and reports when and folders. Its name comes from Roshal Archive
required. and was developed by a Russian software engineer
called Eugene Roshal.
Relative reference The automatic adjustment of
a cell reference within a formula when it is copied Rotation Turn an image (usually either clockwise
to another location in a spreadsheet. or anti-clockwise through a specified number of
degrees).
Relative value A value that changes depending
on other factors. For example, in a web page Router Device on networks that forward data
a table width can be set to 50%. This table is packets between networks; they essentially
always 50% of the window/frame width, so its size perform traffic direction functions.
will change if the size of the browser window is Row All the cells in one horizontal line in a
changed. spreadsheet.
Remote control An input device that allows the Rules base In an expert system, a set of rules
user to control another device from a distance. It that an inference engine uses, together with the
is most frequently used with home entertainment data or facts in the knowledge base, to reason
systems. through a problem.
Repetitive strain injury (RSI) Pain felt in the Sans-serif A font style in which the ends of
muscles, nerves and tendons caused by a repetitive characters do not have small strokes called serifs,
action (for example, repeated clicking of a mouse such as Arial.
button over a period of time).
Satellite navigation This is a term used to
Report (access) The formatted and organised describe GPS when used in a car.
presentation of data from a database.
Scanner A device that converts information on
Report (generic) A document that provides paper into an electronic format that can then be
information. stored in a computer.
Report layout The format of printed output from Screen layout The format of onscreen output
a computer following processing. from a computer following processing.
Requirements specification An element of Screen recorder A type of key logging software
the analysis stage of the systems life cycle; it that works by capturing screen images at random
is a list of the required features of a system, intervals, sending the information back to its
including general user requirements and specific creator.
requirements.
Screenshot An image of the screen taken at a
It is illegal to photocopy this page
Resampling The process of changing the image particular moment in time. There are software
quality in bitmap graphics. Downsampling reduces packages that will obtain screenshot (sometimes
the number of pixels used and increases file called screen grab) evidence for you. The easiest
transfer speed; upsampling increases the number of way is to press the <Print Screen> (sometimes
pixels used. labelled <Prt Scr>) button on the keyboard to place
RFID Radio frequency identification is a wireless what is currently on the screen in the clipboard.
method of communication between a tag and a This can then be pasted into a document as
reader (tags can be passive or active). evidence of your work.
10
Cambridge IGCSE Information and Communication Technology Study and Revision Guide Second Edition
Glossary
Secure sockets layer A network protocol that Smishing Fake SMS messages designed to trick
uses encryption to allow online transactions users into giving away personal information or
(denoted by https in the browser window). installing malware on their device.
Sensitive data Any data that is protected against SMS/text messaging A text message sent over a
unwarranted disclosure that can cause harm, such telephone network.
as ethnicity, gender, genetic data and so on.
Software Programs that control the computer
Sensor Input device which automatically gathers system and process data.
information from the real world.
Solid-state drive (SSD) Backing store that uses
Serif A font style in which the ends of characters solid state technology (sometimes referred to as a
have small strokes called serifs, such as Times New flash drive).
Roman.
Solid-state technology A type of storage media
Sheet All the cells in one 2-dimensional grid that uses microchip technology to store data rather
within a spreadsheet workbook. than magnetic or optical technology.
Shimmer An illegal data capture device, used on Sound card Internal circuit board that provides
an ATM, to copy data from the magnetic stripe and the computer with the ability to produce sound.
chip on a smart card.
Speaker/loudspeaker Device used to convert
Shoulder surfing A form of data theft in which electrical signals into sound.
criminals steal personal information from a victim
Spell check A process where the software
when they are carrying out financial transactions.
identifies words which are not held within its
SIM card (Subscriber identity module) card; a dictionary.
small card (containing a microchip) that allows
Spread-spectrum frequency hopping A method
a mobile device to connect to the mobile phone
of communication between devices by switching
cellular network.
rapidly and randomly from one frequency to
Simulation The process of imitating something another, so it is almost impossible for someone
using a computer system; the software uses to eavesdrop or jam the signal; spread-spectrum
mathematical formulae or models to simulate a technology works over a distance of 30 to 50
real-life system or environment. metres.
Simulator A machine that simulates an Spread-spectrum technology A wideband radio
environment for the purpose of training or for frequency used in wlans, with a range of about 30
research. to 50 metres.
Skimmer An illegal data capture device, used on Spreadsheet Software that organises and
an ATM, to copy data on the magnetic stripe of a manipulates numerical data stored in rows
credit or debit card and thus create a fake card. and columns; can produce graphs, do ‘what if’
scenarios.
Smart card A card containing a chip
(microprocessor) that allows contactless payments. Spreadsheet model A spreadsheet that is used to
investigate different outcomes by changing one or
Smart motorway A motorway that is monitored
more variables within it.
and controlled by a central computer system.
Spyware Software on a computer with malicious
Smart television A television that can access the
It is illegal to photocopy this page
Hodder & Stoughton Limited © David Watson and Graham Brown 2022 11
Glossary
12
Cambridge IGCSE Information and Communication Technology Study and Revision Guide Second Edition
Glossary
Transponder A device that receives a radio signal Video conferencing Audio and visual
and then automatically re-transmits a signal with a communication between groups of people
different frequency. indifferent geographical locations via the internet
or other WAN; it makes use of special hardware
Trojan horse A program disguised as legitimate-
(such as webcams, microphones and speakers)
looking software (e.g. anti-virus program) but
and software (such as CODEC or echo-cancellation
containing embedded malicious coding; they
software).
replace all or part of the legitimate software with
the intent on causing damage to files/data. Virtual online stores A shop where goods or
services are bought online.
Two-factor authentication A form of verification
that requires two methods of authentication to Virtual reality Type of extended reality where
verify who a user is; after entering their password, the user is fully immersed into a virtual world by
the user is required to carry out a second step, way of a headset; communication with the real
such as entering an 8-digit one-time PIN sent to world is not possible.
their mobile phone.
Virus A small program that replicate itself over
Uniform resource locator (URL) The unique and over again on a user’s computer; it can transfer
address of any document found on the internet. from computer to computer modifying or deleting
Typically, the address is divided into parts: the data/files on an infected computer; viruses require
protocol (commonly HTTP), the name of the an active host to operate.
computer (for example, www.cie.org.uk) and
Vishing A variation of phishing that uses a
sometimes the directory on the computer where
voicemail message to try to trick the user into
the document file name can be found.
calling the telephone number contained in the
Unordered list A list of objects within a web message, with the aim of obtaining personal data.
page that are prefixed with bullet points.
Voip (Voice over internet protocol) is the use
Unsubscribe The option to stop receiving emails of the internet to send voice data in the form of
from an organisation; clicking on the unsubscribe digital data packets using internet protocols.
link removes you from their mailing list.
Web browser Software that displays a web page.
User documentation Documentation that is
Web conference/webinar/webcast An online
provided to the user of an ICT system to enable
presentation or lecture, often with some level
them to use the new system effectively.
of interaction, such as posting questions for the
Utility Software designed to do a specific task presenter; can also be used as a form of electronic
to maintain and control computer resources; e.g. conferencing by a number of people in several
antivirus, disk repair, security. different locations where video conferencing
wouldn’t work effectively.
Validation A process used in software such as
databases and spreadsheets to check that the data Web page A single page of information displayed
entered satisfies certain criteria; for example, in a format that can be viewed on a web browser.
length check and data type checks.
Web server The name given to both the hardware
Value A number placed in a spreadsheet cell. and software required for the hosting of websites.
Value axis A name given to the chart axis in Web-authoring package Software used for
Microsoft Office that displays numerical values. creating web pages.
It is illegal to photocopy this page
Verification A process used to check the Website A collection of interrelated web pages
accuracy of data entry or that data has not been that relate to one topic or organisation and are
corrupted during transmission, often using double usually accessible via the internet.
entry or visual verification.
White space An area of a document that contains
Version control A file naming convention used to no text or images and only the blank white colour
manage files edited by multiple users, where each of the paper is visible. Documents normally have
saved version of a file is given a managed naming white space between the margin settings and the
convention, often identifying sequential version edges of the page.
numbers and sometimes authors’ initials.
Wide area network (WAN) A network of devices
and computers connected together over a large
Hodder & Stoughton Limited © David Watson and Graham Brown 2022 13
Glossary
geographical area (e.g. a whole country); they Word processor Software that allows the user to
make use of the existing telecommunications create, edit and format documents.
infrastructure (e.g. telephone lines and satellites).
Worm A type of stand-alone virus that can
Widow The last line of a paragraph that appears replicate itself; unlike a virus, worms don’t need an
at the top of a page, with the rest of the paragraph active host to cause damage and can remain inside
appearing on the previous page. applications spreading throughout a network.
WiFi A system that allows connection to a X-axis The horizontal axis (for a system of
network or single electronic device using wireless coordinates).
connectivity.
Y-axis The vertical axis (for a system of
WIMP A form of graphical user interface in which coordinates).
a mouse is used to control a cursor and icons are
Zero login A method of authentication that relies
selected to open/run windows. on biometrics and behavioural patterns of humans
Wireless LAN (WLAN) A local area network with to uniquely recognise a user without the need for
no wires, other than the wires that connect the passwords.
WLAN access points together; a WLAN uses either Zip (.zip) A file format for a container used to
spread-spectrum technology or infrared signals to reduce the number of bytes needed to save a file,
enable devices to communicate with each other. either to save storage space or to reduce
Wireless personal area network (WPAN) A small transmission time.
communications network, usually created for use by
just one person using Bluetooth technology.
It is illegal to photocopy this page
14
Cambridge IGCSE Information and Communication Technology Study and Revision Guide Second Edition