You are on page 1of 14

Glossary

Glossary
3D printer  An output device that produces solid Analogue to digital converter (ADC) A device
3D models using a modified inkjet printer and used to convert analogue signals (usually from
resins to replace inks. sensors) into digital signals that can then be
understood and processed by a computer.
Abnormal data  Data used to test a system. Data
that is of the wrong type (for example, text where Analysis (stage) The first stage in systems
it should be numeric) or is outside the accepted analysis to upgrade an existing system to a new
range. system.
Absolute reference  Fixes a cell reference within ANPR Automatic number plate recognition makes
a spreadsheet so that when the formula is copied, use of optical character recognition (OCR) to
this cell reference never changes. recognise car number plates captured by a camera;
used in car parks and by the police.
Absolute value  Fixes a value so that it cannot
change. For example, in a web page, a table width Anti-virus software Software that detects and
can be set to 300 points. This table will always removes or isolates computer viruses.
remain 300 points wide and will not change if the Applications software Software that provides
size of the browser window is changed. the services the user requires to solve a given task.
Access point (AP) /hot spot  Used in wireless Archive The storage of information for a long
networks to allow access to the network at various period of time. Data is likely to be compressed.
points using wireless technology (for example, an
airport will have several access points, allowing Artificial intelligence (AI) Behaviour
near 100% coverage for users). demonstrated by machines that resembles the
intelligence displayed by humans or animals.
Active host  Functioning software that malware
can affect by attaching itself to the code or by Ascender The part of a lower case letter (b, d,
altering the code to allow the malware to carry out f, h, k, l or t) that extends above the body of the
its attack. letter.

Active tag  An RFID tag that has its own power Aspect ratio The proportions of an image (width
source. to height). In the case of a presentation the width
and height of the display, often either 4:3 or 16:9.
Actuator  A transducer that takes signals from a
computer and converts them into some mechanical Attagging Embedding malicious code into QR
codes.
motion (for example, motors, pumps, valves).
Attribute This is used to provide additional
Add to SB gloqr code  A matrix of dark and light
information about HTML elements. Attributes
squares that represent data. The pattern can be
follow the start tag and come in name/value pairs.
read and interpreted using a smartphone/tablet
For example, <table border="1"> specifies that the
camera and QR app.
table tag has an attribute called border, which has
Additive printing  The method used by a 3D a value set to 1.
printer to build up objects layer by layer.
Audience notes Printed copies of the slides from
It is illegal to photocopy this page

Adware  A type of malware that attempts to a presentation, which are given to the audience to
flood the end-user’s computer with unwanted take away and refer to after the presentation.
advertising.
Audio conferencing Meetings held between
Alphanumeric  A field type in which any character people using audio (sound) equipment only.
is acceptable input – sometimes called text.
Augmented reality (AR) An experience in which
Analogue  Physical data that is continuous and images, text and sound are overlaid on objects or
not discrete in nature; can have infinite number of places in the real world.
values.
Authentication The process of determining
Analogue sensor  A device or apparatus that whether someone is who they claim to be; the most
measures information that is continuously changing
(analogue data).
Hodder & Stoughton Limited © David Watson and Graham Brown 2022 1
Glossary

common forms of authentication are user ids and Boolean Data that can have only two possible
passwords and biometrics. answers: true (1) or false (0).
Automatic teller machine (ATM)  A machine used Bridge A device on a network that connects
by customers to access their bank accounts using a networks (lans) together that all use the same
card and PIN, usually to withdraw cash from their protocol.
account. Buffer/buffering A process that uses a memory
Autonomous vehicle  A vehicle that is under area to store data temporarily; for example, when
microprocessor control and doesn’t require any printing a document or streaming media, the
human interaction in normal driving. data is held temporarily in a buffer until it can be
processed.
Backup  Copy of a file made in case the original
data is corrupted or lost. CAD Software used to create drawings, for
example, to send to a 3D printer or to produce
Barcode  An optical machine-readable
blueprints of a microprocessor design.
representation of data that uses thick and thin
lines to represent numbers. Card cloning This is the copying of data on a
credit or debit card and making a fake card using
Barcode reader  An input device that can read/ the data stolen.
scan barcodes using laser or LED light.
Cascading stylesheets (.css) A stylesheet saved
Basic input/output system (BIOS) Software in CSS format with a .css file extension. This allows
instructions, stored in ROM, that tell a computer the stylesheet to be attached to each web page
what to do when it turns on. to define how to display the content layer of a
Behaviour layer  One of the three layers in web web page, without the page needing to contain the
page development. The behaviour layer is used style tags. If a number of cascading stylesheets are
to do ‘an action’ (rather than just display or link used, the multiple style definitions will cascade
to other pages) and often uses script languages into one.
embedded within the HTML. There are many Category axis A name given to the chart axis in
different script languages but the most common for Microsoft Office that represents the category for
web development are JavaScript, PHP, Perl and CGI. each data point. It displays text values.
Bio ink  Materials used by 3D printers when Cathode ray tube (CRT) monitor An older type
building biological material, such as human tissues. of computer monitor that has an electron beam
Biometrics  A type of authentication based on a directed towards a screen coated in phosphors,
unique human characteristic, such as fingerprints, which glow when hit by the beam. Screens are
voice or face recognition. refreshed 25 times per second.
Blu-ray disc  An optical disk with a very large CD-R/DVD-R An optical storage media that can
storage capacity; uses blue laser light to read and be recorded on only once.
write the data – the wavelength of blue laser light CD-RW/DVD-RW An optical storage media that
is much shorter than the wavelength of red laser can be written to many times.
light thus increasing Blu-ray’s storage capacity.
Cell A single square/box within a spreadsheet
Bluetooth  An open wireless protocol over short into which only a single entry can be placed.
distances that allows devices to communicate using
radio waves instead of wires. Central processing unit (CPU) Central processing
It is illegal to photocopy this page

unit; allows execution of instructions from


Body  The section of HTML in a web page that software.
contains the contents (such as text and images) of
the page and the tags that describe the content, Changeover A stage in systems analysis
where the new system is introduced by one of
hyperlinks and structure (such as tables used to lay
four methods: direct, parallel, pilot or phased
out the page).
changeover (also known as implementation stage).
Body text  The main text in a document.
Check digit An extra digit added to a number
Bookmark  A reference within a web page (often (the right-most digit) that is used to check for
created using the id attribute) that can be linked errors during the entering or reading of a number;
to using a hyperlink. for example, when scanning in a barcode.

2
Cambridge IGCSE Information and Communication Technology Study and Revision Guide Second Edition
Glossary

Chip & PIN  A technology used in debit and credit Content layer  One of the three layers in web
cards for payment in, for example, stores and page development. The content layer is used to
restaurants, or for use with ATMs; the chip is read define the structure of the web page, sometimes
by a card reader machine, which compares it with using tables or frames. It contains the content of
the PIN typed in by the customer thus ensuring the the pages, including text or images and hyperlinks
transaction is secure. to other pages. The content layer is often written
in HTML or XHTML.
Clipboard  A temporary storage area used by the
operating system to hold information that the user Contiguous data  Data to be selected, usually in
cuts or copies, ready to be pasted at a later time. a spreadsheet, that is arranged in rows or columns
that are next to each other.
Cloud storage  A method of data storage where
data is stored on offsite servers; the physical Control and measurement  Software which takes
storage may be on hundreds of servers in many data from sensors which allows a process to be
locations. constantly monitored of controlled.
CODEC  A program that encodes data and decodes Cookie  A small file sent to a user’s computer
data; it is often used for sound and video files, via their web browser when they visit websites; a
where the data is encoded for storage and decoded cookie stores information about the user that is
for playback – CODEC can stand for Coder-Decoder accessed each time they visit the website.
or Compression-Decompression.
Copy  To take a highlighted object and place a
Column  All the cells in one vertical line in a copy of it into the clipboard, leaving the original
spreadsheet. object the same.
Comma separate values (.csv)  A file format Copyright  Legislation in almost all countries
(.csv) used to hold tabular data, for example, from that is used to discourage the illegal use of text,
a spreadsheet or database table. It stores the data images, software or music.
as a text-based file using commas (or semi-colons
Crop  Trim part of an image to remove unwanted
in some locations) to separate the data items.
areas. Cropping may change the aspect ratio but
Command line interface (CLI)  User communicates will not distort the image.
with a computer by typing in commands that have to
CSS  A language used for the presentation layer in
be in an exact format to work.
web development. This language is used to define
Compiler  Software that translates high level how elements of a web page appear in the web
language code into machine code which can be run browser. CSS elements can be embedded within HTML
on a computer. or attached to a web page as a cascading stylesheet.
Computer-aided learning  CAL is an educational Currency  The unit of money used in a country,
strategy devised to teach a particular subject by for example, Egyptian pounds, Kenyan shillings or
the use of computer technology; CAL is designed Indian or Pakistani rupees.
to enhance traditional teaching methods (using
Cut  To take a highlighted object and place it
computers) rather than replace them.
into the clipboard, removing it from its original
Computer vision  The ability of a computer to location.
sense and react to visual inputs.
Cyberbullying  Using computer technology to
Computer-aided design (CAD)  Software used send messages that are intimidating or threatening
It is illegal to photocopy this page

in the creation, manipulation and modification of in their nature.


drawings and designs (e.g. used by an architect).
Cybercriminal  A criminal involved in crime aimed
Connected physical token  An external device at users of computer devices and the internet;
that is connected to a computer that is used crime can involve theft of money, identity theft,
to authenticate the user by way of two-factor damaging computer systems, and so on.
authentication.
Cyphertext/script  Encrypted data/information.
Contactless card  A method of credit or debit card
Data access time  The amount of time it takes
payment that doesn’t require the need to key in a
for a specific data item to be found on a storage
PIN; they use an embedded chip and antenna to
device.
communicate with an RFID reader.

Hodder & Stoughton Limited © David Watson and Graham Brown 2022 3
Glossary

Data capture form  A printed or digital form used operating system; usually connected through a USB
to collect information that is to be stored on a port.
computer.
Dialogue-based user interface  Type of interface
Data entry form  A screen-based form used to where user ‘talks’ to a computer; a microphone
input data into a system. picks up key words and the computer carries out
specific functions.
Data flow diagram (DFD)  A diagram used by a
systems analyst to understand the inputs, outputs, Digital camera  A camera that does not use
processing and storage requirements of a system. film to record photographs. Light is picked up by
sensors and the resulting image is stored on a
Data packet  A small amount of data sent over a
solid-state memory in the camera.
network; it is made up of a header, footer and data
load. Digital certificate  A method used to
authenticate a website, often using SSL
Data protection act  Legislation that gives
protocols; provided the digital certificate can be
individuals rights regarding the storage and
authenticated, this means that any communication
processing of their personal data.
or data exchange between browser and website is
Data redundancy  The situation where the same secure.
data is stored on several storage devices, or multiple
Digital data  Data written in binary (1s and 0s –
times on the same database, at the same time.
called bits); the data is discrete and can only have
Data transfer rate  Once the correct location on specific values.
the storage device has been located, the speed at
Digital to analogue converter (DAC)  A device
which data can be read or written.
used to convert digital signals into analogue
Data types  Category of data either as numerical, signals (so the computer can control another
text, date/time or alphanumeric. device, such as pump, motor, etc.).
Database  Software that allows organisation, Direct changeover  The immediate changeover
manipulation and analysis of data stored in tables; from an old system to a new system; this is often
can allow queries. done overnight where the whole of the old system
Date and time  A field type within Microsoft is replaced by a new system in one go.
Access that is used to store dates and times. Disconnected physical token  An external
Decimal   A data type used within numeric fields device that isn’t connected to a computer that is
in Microsoft Access to store the data in decimal used to authenticate a user by way of two-factor
format. authentication.

Decryption key  An algorithm that can decrypt Dongle  A type of pen drive/memory stick that
data (cypher text turned back into plain text). acts as a security device when using software, in
order to reduce the risk of software piracy.
Descender  The part of a lowercase letter (g, j, p,
q or y) that falls below the baseline of the letter. Dot matrix printer  An older type of printer that
strikes a head made of pins against a ribbon.
Design (stage)  The second stage in the
systems analysis life cycle; this involves data/file Driving wheel  An input device, often used for
structures, input/output formats and validation car racing games.
routines. Dual layering  A method of using two recording
It is illegal to photocopy this page

Desktop computer  A type of computer made up surfaces in a polycarbonate sandwich; used


of separate components which makes it almost on DVDs and Blu-ray discs to increase storage
impossible to move once assembled. capacity.

Destructive interference  A process that takes Ebook  A book stored in electronic format.
place when reflecting lasers from the surface of Echo cancellation software  Software used to
optical storage media; used to detect pits and detect and remove echoes which are common
lands. during video conferencing.
Device driver  Software that enables one or EFT  Electronic funds transfer is a system of
more hardware devices to communicate with the transferring money from one bank account to
another without any money physically changing

4
Cambridge IGCSE Information and Communication Technology Study and Revision Guide Second Edition
Glossary

hands; it is often used at supermarket checkouts Firewall Software or hardware between computer
when credit/debit card transactions are being and external network that protects the computer
made. from incoming network traffic by checking it meets
certain criteria.
EFTPOS  EFT point-of-sale terminal is used to carry
out and electronic funds transfer. Flat-file database A database structure using a
single two-dimensional table.
Electronic point of sale terminal (EPOS) A
terminal used to carry out an electronic funds Footer The area at the bottom of a document
transfer. between the bottom of the page and the bottom
margin.
Electronic token  App used to authenticate a user
by using two-factor authentication. Foreign key A field in a table with a relational
database that is linked by a relationship to a
Email  An electronic method of sending
primary key field in another table.
documents and other items, such as photos, from
one computer to another via the internet. Format painter A tool used in many packages to
copy the formatting from one part of a document
Encryption  The scrambling or encoding of and apply it to another.
data in order to make the data unreadable to an
unauthorised user. Formula A set of instructions used to perform a
calculation in a spreadsheet. A formula can include
Encryption key  An algorithm that can encrypt cell references, numbers, mathematical symbols
data (plain text turned into cypher text). and, in some cases, predefined functions.
Evaluation (stage)  A stage in systems analysis Function A pre-set formula with a name (which is
that involves reviewing the effectiveness of a reserved word) placed in a spreadsheet cell.
the new system and advising on any necessary
changes. Gateway The name given to a firewall if it is
hardware.
Expert system  A system that attempts to
reproduce the ability of human experts in carrying Generic file type File types that can be opened
out complex tasks such as medical diagnosis, in appropriate software on most platforms.
engineering diagnostics or route scheduling. Gesture-based interface Type of interface
Explanation system  Part of an expert system where a user moves their hand, fingers, feet
that explains to the user the reasoning behind its (etc.) to carry out a function; sensors pick up the
conclusions and recommendations. movement.

Extended reality  A general term that includes GIS Geographic information system is a computer
augmented reality and virtual reality. system that combines maps with data; GIS systems
can become very complex depending on the
Extreme data  Data that is on the boundaries of different types, and amount, of data used.
acceptable data; for example, if people’s ages can
be between 18 and 65, then both 18 and 65 are GPS Global positioning satellite (GPS) system
extreme data. is a computer-based system used to determine
the exact location of a vehicle using a number
False positive  The incorrect identification of of satellites positioned above the Earth; each
a program as a security threat by anti-malware satellite transmits it position and exact time so
software. that a device in the vehicle can calculate its exact
It is illegal to photocopy this page

Field  A place used to hold a single data item position.


within a database. Grammar check A process where the software
File (database)  A logically organised collection identifies language which does not follow the
of records. The records are usually organised accepted or expected rules.
so that they can be stored together within a Graphics interchange format (.gif) A format
database. used to save still or moving images. This is an
File compression  A technique for reducing the efficient method of storing images using a smaller
storage space occupied by a large file. file size, particularly where there are large areas of
solid colour. It is widely used in web pages.

Hodder & Stoughton Limited © David Watson and Graham Brown 2022 5
Glossary

Graphical user interface (GUI)  Uses icons which Hypertext Markup Language: (HTML)  A text-
are selected using a pointing device (e.g. mouse) based language used to create markup, so that a
or finger (if touchscreen used). web browser will be able to display information.
Graphics card  Internal circuit board that allows Icon  Small picture or symbol used on a screen to
graphic data to be sent to a video display. represent an app; once selected, the app can be
launched.
Gutter  The inner margin of the leaves of a bound
book. If a book is open, the gutter is the area of Image processing   Analysing visual inputs
adjacent inner margins. to understand what the image might mean or
represent.
Hanging paragraph  The first line of a paragraph
is aligned to a margin and all other lines are Indented paragraph  The first line of a paragraph
indented (left hanging from the first line). is indented from a margin and all other lines are
aligned to the margin.
Hard disk drive (HDD)  A computer’s main
memory where applications software, documents Inference engine  The problem-solving part of an
and data files are stored on a magnetic material. expert system that examines the knowledge base
using a form of reasoning, with the aim of finding
Hardware  Physical components that make up a
a solution to a given problem.
typical computer system; these components can be
internal or external to the computer. Inference rules  Rules used by the inference
engine within an expert system.
Head  The section of HTML in a web page that
contains page titles (visible in the browser tab but Infrared  The far end of the visible
not on the page), styles (for example, the links electromagnetic spectrum.
to external stylesheets) and the metadata (for
Inkjet printer  A type of printer which uses
example, the tags used by search engines).
inkjets to produce low-volume, high-quality
Header  The area at the top of a document printing.
between the top of the page and the top margin.
Integer  A whole number with no decimal places
Heuristic checking  Checking software for (for example, 18 or 107).
behaviour that could indicate the presence of a
Internet banking  Performing banking operations
virus.
online or using a smartphone/tablet app; allows
Hologram  A photographic image that is 3D and the transfer of money between accounts, paying
appears to have depth. Holograms are often used bills, and so on.
on credit cards or software supplied on DVD as an
Internet protocol (IP) address  A numerical
additional proof of being a genuine copy.
identification and logical address that is given
Holographic image (hologram)  A photographic to a device when it joins the internet; it uses the
image that is 3D and appears to have depth; internet protocol to allow communication between
holograms are often used on smart cards and on devices on the internet.
original software as an additional security method
Interviews  Asking people questions face-to-
and proof of authenticity.
face as part of the fact-finding stage in systems
Https  Hypertext transfer protocol secure; set of analysis.
rules that must be obeyed when transferring web
Joint photographic expert group (.jpg/.jpeg) A
pages over the internet using SSL encryption.
It is illegal to photocopy this page

format used to save still images, originally names


Hub  A device that can have a number of other by the joint photographic expert group. This is an
devices or computers connected to it to form a efficient method of storing images using a smaller
network; it cannot direct received data packets to file size and is widely used in web pages.
individual devices and instead sends all data to all
Joystick  A device that consists of a stick that is
devices connected to the network.
moved about to control a pointer on a screen and
Hyperlink  A link that allows a user to navigate has buttons to make selections.
between web pages/websites. It is often shown as
Key logger  A form of spyware that gathers
blue underlined text or as a small pointing finger.
information by monitoring a user’s keyboard

6
Cambridge IGCSE Information and Communication Technology Study and Revision Guide Second Edition
Glossary

activities and storing the keystrokes in a small file; magnetic signatures which allows data to be stored
it is designed to monitor and capture web browsing and read.
and other activities and capture personal data.
Malware  Malicious software that is harmful to a
Knowledge base  Part of an expert system computer, such as spyware or a virus.
— a type of database that allows the complex
Media access control (MAC) address  A hardware
storage and retrieval function of a computerised
address that uniquely identifies each device
knowledge-based management system; it consists
connected to a network.
of objects and attributes.
Metatag  A HTML tag inserted in the head section
Label  Text placed in a spreadsheet cell, often
to define the character set, name and/or contents
denoting a heading or name associated with a
of a web page. This can include keywords which
value.
can be used by a search engine. The contents of a
Laptop  A portable computer where all the metatag are not displayed on the web page.
components are integrated into a single ‘box’ which
Microprocessor  A single integrated circuit that
contains keyboard, backing store and all other
is the basis of most PCs and is in many household
components.
devices. It has essentially the same function as a
Laser printer  A type of printer that uses laser central processing unit.
technology to produce high-volume, high-quality
Modelling  A programmed simulation of a
output on paper.
situation or process that allows data to be
Latency  The time lag in a system, for example, changed in order to examine the effects on other
the time it takes to find data on a hard disk, which data; financial modelling is often done using
depends on the time taken for the disk to rotate spreadsheets.
around to its read/write head.
Modular (design)  Software development where
Layer  Allows other objects (or parts of an image) the code is broken down into separate sections
to be placed in front of or behind other layers. (modules) that can be developed, tested and
checked independently.
Legend  A box that identifies the patterns or
colours that show different data series in a chart. Motherboard  Printed circuit board that acts as
a ‘hub’ which all internal computer components
Lidar (Light Detection and Ranging)  A system
connect to.
that uses lasers to build up a 3D image of its
surroundings. Mouse   A type of pointing device that controls
a pointer on screen, allowing the user to make
Light pen  An input device used to draw on screen
selections by clicking a button.
or select items on screen – currently light pens
only work with cathode ray tube monitors. MP4  A file format (multimedia container) used for
storing video files. It is also used to store audio
Linker  Software that takes a number of object
(the soundtrack to the video) and other data such
files and combines them into a single program (e.g.
as subtitles and still images.
combines modules).
MP3  MPEG-1 audio layer 3; a compressed file
Live data  Data input to test a new system
format used for storing music; typically, the size of
produces expected results; the live data has been
an MP3 music file is 90% less than a conventional
used before in the old system and has known
music file used on a CD.
outcomes.
It is illegal to photocopy this page

Multimedia projector  An output device


Local area network (LAN)  A network created
that receives signals from computers (or other
by a number of computers and devices connected
electronic devices), magnifies the image and
together usually covering a small geographical area
projects it onto a large screen.
(e.g. one building).
Named cell  A cell that is given a more
Magnetic stripe  A brown-coloured magnetic
meaningful name by the user than its usual cell
stripe, often found on the back of credit and debit
reference.
cards, which holds information such as account
number, sort code, expiry date and start date. Named range  A group or block of cells in a
spreadsheet that have been given a single name by
Magnetic tape (drive)  A data storage device
the user. This allows the user to enter this name
that uses magnetic tape; 1s and 0s have different

Hodder & Stoughton Limited © David Watson and Graham Brown 2022 7
Glossary

in their formulae rather than remembering the cell Optical character recognition/reader (OCR) A
references for the cells in this range. system that takes scanned text and converts it into
computer-readable form so it can be used in a word
Nested functions  One spreadsheet function is
processor and other applications software.
used within another function in a cell.
Optical mark recognition/reader (OMR) A
Network interface card (NIC)  Hardware that
system that can read marks written in pen or
allows a device to connect to a network, e.g. the
pencil on a paper; used to read answers on
internet.
questionnaires, multiple-choice exam papers and
Newsletter  A short, printed or digital document voting papers, etc.
used to communicate information.
Optical media  These are optically-active disks
NFC  Near field communication (NFC) is a sub-set that include CDs, DVDs, Blu-ray discs and DVD-RAM;
of radio frequency identification (RFID) in which the disks are coated in a light sensitive dye or light
the devices have to be very close to each other to sensitive metal alloy that can be written to or read
broadcast and receive signals. from using laser light.
Non-contiguous data  Data to be selected, Optical storage device  A storage device that
usually in a spreadsheet, that is arranged in rows uses laser light to read and write data stored on
or columns that are not next to each other. optically-active disks (also see optical media).
Normal data  Data that is within an acceptable Ordered list  A list of objects within a web page
range and should be accepted by a new system. that are in numerical order.
Number  A value entered in numerical format, for Orphan  The first line of a paragraph that appears
example, ‘5’ is a number, whereas ‘five’ represents a at the bottom of the page, with the rest of the
number but is in text format. paragraph appearing on the next page.
Numeric  Data that consists of numbers: real, Out clearing  The first stage when a bank
integer or fixed decimal. processes a cheque.
Numeric keypad  A type of keyboard that usually Parallel running  This is where two systems are
consists of digits and simple arithmetic operators. run side by side (using the same inputs) to check
Observation  Part of the fact-finding stage in they both produce the same results.
systems analysis, that involves watching people Passive tag  An RFID tag that uses power from
doing their tasks. the reader to drive the circuitry in the tag.
OCR  Optical character recognition is a system Paste   To take a copy of an object from the
that takes scanned text and converts it into clipboard and place it in a new location.
computer-readable format so it can be used in a
Pen drive/memory stick  A small storage device
word processor and other applications software
that makes use of solid-state technology to store
(such as ANPR).
data; it connects to the computer through a USB
OMR  Optical mark recognition is a system that port.
can read marks written in pen or pencil on a paper
Personal data  Any data concerning a living
printed from a precise template; used to read
person that can be used to identify the person,
questionnaires, multiple-choice exam questions,
either by itself or in conjunction with other
and so on.
information.
It is illegal to photocopy this page

On demand  The streaming of music or movies


Pharming  A scam in which malicious code is
whenever (or wherever) the user wants to listen to
installed on a computer’s hard disk/SSD or web
or watch them.
server; the code has the ability to misdirect a
Online shopping  Online shopping using the user’s browser to fraudulent websites without the
internet to purchase goods. user’s knowledge.
Operating system (OS)  Software running in the Phased implementation  With this method, only
background that manages all the basic functions part of the new system is introduced and, only
such as input/output, error handling, load/run when it proves to work satisfactorily, is the next
programs.

8
Cambridge IGCSE Information and Communication Technology Study and Revision Guide Second Edition
Glossary

part introduced, and so on, until the old system is Portable media player  A separate device used
fully replaced. to play music or videos; they use solid-state
technology.
Phishing  A fraudulent operation involving
the use of emails; the creator sends out a Poster  A printed or digital visual method of
legitimate-looking email hoping to gather personal communicating information.
information — once the user clicks on a link in the
Presentation layer  One of the three layers in
email, the browser is directed to a fake website.
web page development. The presentation layer is
Phone conference  A meeting held between more used to define how a web page will look to the
than two people using telephones. viewer. It dictates the colour schemes, themes and
styles seen when a web page is displayed and is
Physical safety  A state in which measures have
usually written in CSS.
been taken to remove or significantly reduce the
risk of physical harm, such as injury or loss of life. Presenter notes  Printed or electronic copies of
the slides from a presentation, with additional
Physical token  A device used to authenticate a
notes to be read from (or used as prompts) by the
user by using two-factor authentication.
person delivering the presentation. These notes are
Piezoelectric  The conversion of mechanical not usually given to the audience.
movement to electricity (and the other way round).
Primary key (field)  A single field within a
Pilot running  With this method, the old and new relational database table that contains unique data
systems are run side by side for a time before the (no two records can have the same primary key); a
new system takes over altogether. primary key field cannot be part of a blank record.
Piracy  Illegal copying of copyright material. Printlets  3D printed medicines (printed tablets).
Pits and lands  The lowest point (pit) and highest Product key  A unique reference number that is
point (land) on the surface of an optically active entered to enable software to work. It protects
disk. against software piracy.
Pixel  One dot or square on the screen. It is the QR code  A matrix of dark and light squares that
smallest item that can appear on a screen. The are used to represent data; the pattern can be read
number of pixels displayed on the screen depends by a smartphone/tablet camera and interpreted
upon the screen resolution. using a QR app.
Plaintext  The original data/information before it Quarantine  Isolation of a file or program
goes through an encryption algorithm. identified by anti-virus software as being infected
Plotter (graph)  An output device that produces by a virus, before being deleted.
very large and very accurate printed copies on Query  A request for information from a database.
paper and other media (often used with CAD
Questionnaires  A form with a series of questions
software).
used to enable data gathering; the answers to the
Point   An absolute measure of size used for text questions are normally filled in on the form itself.
in website authoring.
Radio frequency identification (RFID) A
Pointing device  Device used to navigate method of communication between a tag and a
a graphical user interface, such as a mouse, reader.
trackerball or joystick.
It is illegal to photocopy this page

Random access memory (RAM)  Internal memory


Portable document format (.pdf)  A method chip that is volatile in nature.
of allowing documents to be read/used on most
Range  A group or block of cells spreadsheet that
computers. The pages look just as they would when
have been selected or highlighted.
they are printed but can contain clickable links
and buttons, form fields, video and audio. You can Ransomware  Malware that encrypts data on a
protect a PDF document to stop others editing it. user’s computer and ‘holds the data hostage’ until a
ransom is paid.
Portable HDD  A removable version of a hard disk
drive which connects to the computer via the USB Read-only memory (ROM)  Internal memory chip
port. that is non-volatile in nature.

Hodder & Stoughton Limited © David Watson and Graham Brown 2022 9
Glossary

Record  A collection of fields containing within the document, so allowing some formatting
information about one data subject or one object to be passed from one applications package to
within a database. another.
Reflection  Flip an image (usually either Robot/robotics The science of developing
horizontally or vertically). devices (robots) that are programmed to act
independently to carry out tasks often used in
Relational database   A database structure
industrial applications.
where data items are linked together using
relational tables. It maintains a set of separate, Roshal archive (.rar) A file format for a
related files (tables), but combines data elements container (like a zip file) that can hold other files
from the files for queries and reports when and folders. Its name comes from Roshal Archive
required. and was developed by a Russian software engineer
called Eugene Roshal.
Relative reference  The automatic adjustment of
a cell reference within a formula when it is copied Rotation Turn an image (usually either clockwise
to another location in a spreadsheet. or anti-clockwise through a specified number of
degrees).
Relative value  A value that changes depending
on other factors. For example, in a web page Router Device on networks that forward data
a table width can be set to 50%. This table is packets between networks; they essentially
always 50% of the window/frame width, so its size perform traffic direction functions.
will change if the size of the browser window is Row All the cells in one horizontal line in a
changed. spreadsheet.
Remote control  An input device that allows the Rules base In an expert system, a set of rules
user to control another device from a distance. It that an inference engine uses, together with the
is most frequently used with home entertainment data or facts in the knowledge base, to reason
systems. through a problem.
Repetitive strain injury (RSI)  Pain felt in the Sans-serif A font style in which the ends of
muscles, nerves and tendons caused by a repetitive characters do not have small strokes called serifs,
action (for example, repeated clicking of a mouse such as Arial.
button over a period of time).
Satellite navigation This is a term used to
Report (access)  The formatted and organised describe GPS when used in a car.
presentation of data from a database.
Scanner A device that converts information on
Report (generic)  A document that provides paper into an electronic format that can then be
information. stored in a computer.
Report layout  The format of printed output from Screen layout The format of onscreen output
a computer following processing. from a computer following processing.
Requirements specification  An element of Screen recorder A type of key logging software
the analysis stage of the systems life cycle; it that works by capturing screen images at random
is a list of the required features of a system, intervals, sending the information back to its
including general user requirements and specific creator.
requirements.
Screenshot An image of the screen taken at a
It is illegal to photocopy this page

Resampling  The process of changing the image particular moment in time. There are software
quality in bitmap graphics. Downsampling reduces packages that will obtain screenshot (sometimes
the number of pixels used and increases file called screen grab) evidence for you. The easiest
transfer speed; upsampling increases the number of way is to press the <Print Screen> (sometimes
pixels used. labelled <Prt Scr>) button on the keyboard to place
RFID  Radio frequency identification is a wireless what is currently on the screen in the clipboard.
method of communication between a tag and a This can then be pasted into a document as
reader (tags can be passive or active). evidence of your work.

Rich text format (.rtf)  A file format (.rtf) used


for text-based files that saves the formatting

10
Cambridge IGCSE Information and Communication Technology Study and Revision Guide Second Edition
Glossary

Secure sockets layer  A network protocol that Smishing  Fake SMS messages designed to trick
uses encryption to allow online transactions users into giving away personal information or
(denoted by https in the browser window). installing malware on their device.
Sensitive data  Any data that is protected against SMS/text messaging  A text message sent over a
unwarranted disclosure that can cause harm, such telephone network.
as ethnicity, gender, genetic data and so on.
Software  Programs that control the computer
Sensor  Input device which automatically gathers system and process data.
information from the real world.
Solid-state drive (SSD)  Backing store that uses
Serif  A font style in which the ends of characters solid state technology (sometimes referred to as a
have small strokes called serifs, such as Times New flash drive).
Roman.
Solid-state technology  A type of storage media
Sheet  All the cells in one 2-dimensional grid that uses microchip technology to store data rather
within a spreadsheet workbook. than magnetic or optical technology.
Shimmer  An illegal data capture device, used on Sound card  Internal circuit board that provides
an ATM, to copy data from the magnetic stripe and the computer with the ability to produce sound.
chip on a smart card.
Speaker/loudspeaker  Device used to convert
Shoulder surfing  A form of data theft in which electrical signals into sound.
criminals steal personal information from a victim
Spell check  A process where the software
when they are carrying out financial transactions.
identifies words which are not held within its
SIM card  (Subscriber identity module) card; a dictionary.
small card (containing a microchip) that allows
Spread-spectrum frequency hopping  A method
a mobile device to connect to the mobile phone
of communication between devices by switching
cellular network.
rapidly and randomly from one frequency to
Simulation  The process of imitating something another, so it is almost impossible for someone
using a computer system; the software uses to eavesdrop or jam the signal; spread-spectrum
mathematical formulae or models to simulate a technology works over a distance of 30 to 50
real-life system or environment. metres.
Simulator  A machine that simulates an Spread-spectrum technology  A wideband radio
environment for the purpose of training or for frequency used in wlans, with a range of about 30
research. to 50 metres.
Skimmer  An illegal data capture device, used on Spreadsheet  Software that organises and
an ATM, to copy data on the magnetic stripe of a manipulates numerical data stored in rows
credit or debit card and thus create a fake card. and columns; can produce graphs, do ‘what if’
scenarios.
Smart card  A card containing a chip
(microprocessor) that allows contactless payments. Spreadsheet model  A spreadsheet that is used to
investigate different outcomes by changing one or
Smart motorway  A motorway that is monitored
more variables within it.
and controlled by a central computer system.
Spyware  Software on a computer with malicious
Smart television  A television that can access the
It is illegal to photocopy this page

intent that allows cybercriminals to access the


internet to allow the streaming of programmes.
computer and control its functions or send back
Smart TV  A television that can access the key information to the creator of the spyware.
internet, allowing streaming of online services.
SSD endurance  The total number of read/write
Smartphone  A small computer which fits into cycles that an SSD device can undergo before it
the pocket; makes use of either the cellular fails or corrupts data.
network or WiFi; contains an integrated camera;
SSL certificate  A small data file that uses SSL to
uses downloaded apps to carry out a number of
encrypt the connection between a website and a
functions such as make phone calls and texting.
web browser.

Hodder & Stoughton Limited © David Watson and Graham Brown 2022 11
Glossary

Storage device  Refers to the hardware used to Technical documentation Documentation


read/write data from/to the storage media (for designed to allow any systems analyst or
example, a hard disk drive, CD/DVD/Blu-ray reader/ programmer to understand the technical aspects of
writer and solid-state reader/writer. a new system and help them make improvements or
maintain the new system.
Storage media  Refers to the physical device that
stores the electronic data. For example, magnetic Test design  This covers how a system should be
media refers to the actual magnetic disks, optical tested.
media refers to the CD/DVD/Blu-ray discs and solid-
Test plan  This is a list of testing requirements
state media refers to the transistor circuitry.
designed to ensure that the software works as per
Streaming  Accessing and playing media content specification.
directly from the internet, without the need to
Test strategy  This is an outline that describes
download and store the media files first.
the testing approach used when developing new
Subscript  Characters that sit below the baseline software.
in a piece of text and usually have a reduced point
Testing  Data input into a computer to see
size, for example, the number 2 in H2O.
whether the software responds correctly to this
Superscript  Characters that sit above the data.
baseline in a piece of text and usually have a
Text (.txt)  A file format (.txt) used for text-
reduced point size, for example, the number 2 in 7
based files that contain an unformatted ASCII file,
m2.
although there are file format variations depending
Switch  A device that can have a number of other on the operating system. Text files can be opened
devices or computers connected to it to form a in any word processor.
network; it is able to direct received data packets
Text editor  Software that allows the user to type
to the targeted device only (using MAC addresses)
and edit plain text. It contains few or no features
thus reducing network traffic
that allow for formatting documents.
System software  Software that provides a
Text wrapping  A software function that defines
platform on which all other software on a computer
how text is positioned around, in front of or behind
can run. System software includes compilers,
images or other objects.
linkers, device drivers, operating systems and
utilities. Thermal bubble  A technology used in inkjet
printers, in which tiny resistors create localised
Systems analyst  An individual who is responsible
heat that makes the ink vaporise and form a tiny
for ensuring that the stages of the systems life
bubble. As the bubble expands, some of the ink is
cycle are carried out.
ejected from the print head onto paper.
Systems life cycle  The stages in the creation or
Tokenisation  A method used by mobile phone
modification of a new information system.
manufacturers to improve the security of credit/
Table  A two-dimensional grid of data organised debit card transactions carried out using the phone
in rows and columns within a database. Each row rather than the card itself; it allows users to set up
of the table contains a record. Each column in a ‘mobile wallet’.
the table represents a field and each cell in that
Tokens  A series of randomly generated numbers
column has the same (pre-defined) data type.
used by a ‘mobile wallet’ instead of real credit/
It is illegal to photocopy this page

Tablet /phablet  Similar to a smartphone except debit card details.


much larger in size; very often the carrying case
Touch screen  An input device that allows the
contains a full-size keyboard which gives them a
user to choose from options on the screen by
similar function to a laptop computer.
pressing the option on the screen with a finger.
Tag  A command used in HTML to instruct a web
Touchpad  A type of pointing device used on
browser how to display text, images or other
laptops.
objects. The tags are not displayed with the web
page. Some tags are used with attributes. Trackerball  A device similar to a mouse designed
for users with limited hand or wrist movement.
Tag (RFID)  A small chip and antenna used to
The device is controlled by rotating a ball with the
store information that can be read remotely by an
hand.
RFID reader.

12
Cambridge IGCSE Information and Communication Technology Study and Revision Guide Second Edition
Glossary

Transponder  A device that receives a radio signal Video conferencing  Audio and visual
and then automatically re-transmits a signal with a communication between groups of people
different frequency. indifferent geographical locations via the internet
or other WAN; it makes use of special hardware
Trojan horse  A program disguised as legitimate-
(such as webcams, microphones and speakers)
looking software (e.g. anti-virus program) but
and software (such as CODEC or echo-cancellation
containing embedded malicious coding; they
software).
replace all or part of the legitimate software with
the intent on causing damage to files/data. Virtual online stores  A shop where goods or
services are bought online.
Two-factor authentication  A form of verification
that requires two methods of authentication to Virtual reality  Type of extended reality where
verify who a user is; after entering their password, the user is fully immersed into a virtual world by
the user is required to carry out a second step, way of a headset; communication with the real
such as entering an 8-digit one-time PIN sent to world is not possible.
their mobile phone.
Virus  A small program that replicate itself over
Uniform resource locator (URL)  The unique and over again on a user’s computer; it can transfer
address of any document found on the internet. from computer to computer modifying or deleting
Typically, the address is divided into parts: the data/files on an infected computer; viruses require
protocol (commonly HTTP), the name of the an active host to operate.
computer (for example, www.cie.org.uk) and
Vishing  A variation of phishing that uses a
sometimes the directory on the computer where
voicemail message to try to trick the user into
the document file name can be found.
calling the telephone number contained in the
Unordered list  A list of objects within a web message, with the aim of obtaining personal data.
page that are prefixed with bullet points.
Voip  (Voice over internet protocol) is the use
Unsubscribe  The option to stop receiving emails of the internet to send voice data in the form of
from an organisation; clicking on the unsubscribe digital data packets using internet protocols.
link removes you from their mailing list.
Web browser   Software that displays a web page.
User documentation  Documentation that is
Web conference/webinar/webcast  An online
provided to the user of an ICT system to enable
presentation or lecture, often with some level
them to use the new system effectively.
of interaction, such as posting questions for the
Utility  Software designed to do a specific task presenter; can also be used as a form of electronic
to maintain and control computer resources; e.g. conferencing by a number of people in several
antivirus, disk repair, security. different locations where video conferencing
wouldn’t work effectively.
Validation  A process used in software such as
databases and spreadsheets to check that the data Web page  A single page of information displayed
entered satisfies certain criteria; for example, in a format that can be viewed on a web browser.
length check and data type checks.
Web server  The name given to both the hardware
Value  A number placed in a spreadsheet cell. and software required for the hosting of websites.
Value axis  A name given to the chart axis in Web-authoring package  Software used for
Microsoft Office that displays numerical values. creating web pages.
It is illegal to photocopy this page

Verification  A process used to check the Website  A collection of interrelated web pages
accuracy of data entry or that data has not been that relate to one topic or organisation and are
corrupted during transmission, often using double usually accessible via the internet.
entry or visual verification.
White space  An area of a document that contains
Version control  A file naming convention used to no text or images and only the blank white colour
manage files edited by multiple users, where each of the paper is visible. Documents normally have
saved version of a file is given a managed naming white space between the margin settings and the
convention, often identifying sequential version edges of the page.
numbers and sometimes authors’ initials.
Wide area network (WAN)  A network of devices
and computers connected together over a large

Hodder & Stoughton Limited © David Watson and Graham Brown 2022 13
Glossary

geographical area (e.g. a whole country); they Word processor  Software that allows the user to
make use of the existing telecommunications create, edit and format documents.
infrastructure (e.g. telephone lines and satellites).
Worm  A type of stand-alone virus that can
Widow  The last line of a paragraph that appears replicate itself; unlike a virus, worms don’t need an
at the top of a page, with the rest of the paragraph active host to cause damage and can remain inside
appearing on the previous page. applications spreading throughout a network.
WiFi  A system that allows connection to a X-axis  The horizontal axis (for a system of
network or single electronic device using wireless coordinates).
connectivity.
Y-axis  The vertical axis (for a system of
WIMP  A form of graphical user interface in which coordinates).
a mouse is used to control a cursor and icons are
Zero login A method of authentication that relies
selected to open/run windows. on biometrics and behavioural patterns of humans
Wireless LAN (WLAN)  A local area network with to uniquely recognise a user without the need for
no wires, other than the wires that connect the passwords.
WLAN access points together; a WLAN uses either Zip (.zip) A file format for a container used to
spread-spectrum technology or infrared signals to reduce the number of bytes needed to save a file,
enable devices to communicate with each other. either to save storage space or to reduce
Wireless personal area network (WPAN)  A small transmission time.
communications network, usually created for use by
just one person using Bluetooth technology.
It is illegal to photocopy this page

14
Cambridge IGCSE Information and Communication Technology Study and Revision Guide Second Edition

You might also like