Difference between revisions of "ITGS Vocabulary Key Terms"
From WLCS
| Line 6: | Line 6: | ||
''Social & Ethical Issues'' | ''Social & Ethical Issues'' | ||
* reliability | * reliability | ||
| − | integrity | + | * integrity |
| − | security | + | * security |
| − | privacy | + | * privacy |
| − | anonymity | + | * anonymity |
| − | authenticity | + | * authenticity |
| − | intellectual property | + | * intellectual property |
| − | equality of access | + | * equality of access |
| − | control | + | * control |
| − | globalization | + | * globalization |
| − | cultural diversity | + | * cultural diversity |
| − | policies | + | * policies |
| − | standards | + | * standards |
| − | people and machines | + | * people and machines |
''Hardware'' | ''Hardware'' | ||
| − | data | + | * data |
| − | information | + | * information |
| − | input devices | + | * input devices |
| − | output devices | + | * output devices |
| − | processing | + | * processing |
| − | storage | + | * storage |
| − | memory | + | * memory |
| − | MHz | + | * MHz |
| − | dpi | + | * dpi |
| − | bit | + | * bit |
| − | KB | + | * KB |
| − | MB | + | * MB |
| − | GB | + | * GB |
| − | TB | + | * TB |
| − | ASCII | + | * ASCII |
| − | compatibility | + | * compatibility |
| − | OCR | + | * OCR |
| − | OMR | + | * OMR |
| − | bar code | + | * bar code |
| − | baud | + | * baud |
| − | + | * encryption/decryption | |
| − | encryption/decryption | + | * virus |
| − | virus | + | * Trojan horse |
| − | Trojan horse | + | * worm |
| − | worm | + | * platform |
| − | + | * peripheral | |
| − | platform | ||
| − | peripheral | ||
''Networks'' | ''Networks'' | ||
| − | LAN | + | * LAN |
| − | WAN | + | * WAN |
| − | client | + | * client |
| − | server | + | * server |
| − | Ethernet | + | * Ethernet |
| − | access | + | * access |
| − | access permissions | + | * access permissions |
| − | login | + | * login |
| − | password | + | * password |
| − | firewall | + | * firewall |
| − | sysadmin | + | * sysadmin |
| − | UPS | + | * UPS |
| − | EDI | + | * EDI |
Revision as of 11:16, 16 January 2009
Objectives:
- You must be able explain in your own words the following key terms.
- You should also be able to give an example of each term, as well as when and where each term is used.
Key terms: Social & Ethical Issues
- reliability
- integrity
- security
- privacy
- anonymity
- authenticity
- intellectual property
- equality of access
- control
- globalization
- cultural diversity
- policies
- standards
- people and machines
Hardware
- data
- information
- input devices
- output devices
- processing
- storage
- memory
- MHz
- dpi
- bit
- KB
- MB
- GB
- TB
- ASCII
- compatibility
- OCR
- OMR
- bar code
- baud
- encryption/decryption
- virus
- Trojan horse
- worm
- platform
- peripheral
Networks
- LAN
- WAN
- client
- server
- Ethernet
- access
- access permissions
- login
- password
- firewall
- sysadmin
- UPS
- EDI