Difference between revisions of "ITGS Vocabulary Key Terms"
From WLCS
(New page: ==== Objectives: ==== * You must be able explain in your own words the following key terms. * You should also be able to give an example of when and where the term is used. '''Key terms:'...) |
|||
Line 1: | Line 1: | ||
− | + | '''Objectives:''' | |
− | * You must be able explain in your own words the following key terms. | + | * You must be able '''explain in your own words''' the following key terms. |
− | * You should also be able to give an example of when and where | + | * You should also be able to give an '''example''' of each term, as well as '''when''' and '''where''' each term is used. |
'''Key terms:''' | '''Key terms:''' | ||
+ | ''Social & Ethical Issues'' | ||
* reliability | * reliability | ||
integrity | integrity | ||
security | security | ||
− | privacy | + | privacy |
+ | anonymity | ||
authenticity | authenticity | ||
+ | intellectual property | ||
+ | equality of access | ||
+ | control | ||
+ | globalization | ||
+ | cultural diversity | ||
+ | policies | ||
+ | standards | ||
+ | people and machines | ||
+ | |||
+ | ''Hardware'' | ||
+ | data | ||
+ | information | ||
+ | input devices | ||
+ | output devices | ||
+ | processing | ||
+ | storage | ||
+ | memory | ||
+ | MHz | ||
+ | dpi | ||
+ | bit | ||
+ | KB | ||
+ | MB | ||
+ | GB | ||
+ | TB | ||
+ | ASCII | ||
+ | compatibility | ||
+ | OCR | ||
+ | OMR | ||
+ | bar code | ||
+ | baud | ||
+ | verification and validation | ||
+ | encryption/decryption | ||
+ | virus | ||
+ | Trojan horse | ||
+ | worm | ||
+ | logic bomb | ||
+ | platform | ||
+ | peripheral | ||
+ | |||
+ | ''Networks'' | ||
+ | LAN | ||
+ | WAN | ||
+ | client | ||
+ | server | ||
+ | Ethernet | ||
+ | access | ||
+ | access permissions | ||
+ | login | ||
+ | password | ||
+ | firewall | ||
+ | sysadmin | ||
+ | UPS | ||
+ | EDI |
Revision as of 12:14, 16 January 2009
Objectives:
- You must be able explain in your own words the following key terms.
- You should also be able to give an example of each term, as well as when and where each term is used.
Key terms: Social & Ethical Issues
- reliability
integrity security privacy anonymity authenticity intellectual property equality of access control globalization cultural diversity policies standards people and machines
Hardware data information input devices output devices processing storage memory MHz dpi bit KB MB GB TB ASCII compatibility OCR OMR bar code baud verification and validation encryption/decryption virus Trojan horse worm logic bomb platform peripheral
Networks LAN WAN client server Ethernet access access permissions login password firewall sysadmin UPS EDI