Difference between revisions of "ITGS Vocabulary Key Terms"

From WLCS
(New page: ==== Objectives: ==== * You must be able explain in your own words the following key terms. * You should also be able to give an example of when and where the term is used. '''Key terms:'...)
 
Line 1: Line 1:
==== Objectives: ====
+
'''Objectives:'''
* You must be able explain in your own words the following key terms.
+
* You must be able '''explain in your own words''' the following key terms.
* You should also be able to give an example of when and where the term is used.
+
* You should also be able to give an '''example''' of each term, as well as '''when''' and '''where''' each term is used.
  
 
'''Key terms:'''
 
'''Key terms:'''
 +
''Social & Ethical Issues''
 
* reliability
 
* reliability
 
integrity
 
integrity
 
security
 
security
privacy and anonymity
+
privacy
 +
anonymity
 
authenticity
 
authenticity
 +
intellectual property
 +
equality of access
 +
control
 +
globalization
 +
cultural diversity
 +
policies
 +
standards
 +
people and machines
 +
 +
''Hardware''
 +
data
 +
information
 +
input devices
 +
output devices
 +
processing
 +
storage
 +
memory
 +
MHz
 +
dpi
 +
bit
 +
KB
 +
MB
 +
GB
 +
TB
 +
ASCII
 +
compatibility
 +
OCR
 +
OMR
 +
bar code
 +
baud
 +
verification and validation
 +
encryption/decryption
 +
virus
 +
Trojan horse
 +
worm
 +
logic bomb
 +
platform
 +
peripheral
 +
 +
''Networks''
 +
LAN
 +
WAN
 +
client
 +
server
 +
Ethernet
 +
access
 +
access permissions
 +
login
 +
password
 +
firewall
 +
sysadmin
 +
UPS
 +
EDI

Revision as of 12:14, 16 January 2009

Objectives:

  • You must be able explain in your own words the following key terms.
  • You should also be able to give an example of each term, as well as when and where each term is used.

Key terms: Social & Ethical Issues

  • reliability

integrity security privacy anonymity authenticity intellectual property equality of access control globalization cultural diversity policies standards people and machines

Hardware data information input devices output devices processing storage memory MHz dpi bit KB MB GB TB ASCII compatibility OCR OMR bar code baud verification and validation encryption/decryption virus Trojan horse worm logic bomb platform peripheral

Networks LAN WAN client server Ethernet access access permissions login password firewall sysadmin UPS EDI