Difference between revisions of "ITGS Vocabulary Key Terms"
From WLCS
Line 6: | Line 6: | ||
''Social & Ethical Issues'' | ''Social & Ethical Issues'' | ||
* reliability | * reliability | ||
− | integrity | + | * integrity |
− | security | + | * security |
− | privacy | + | * privacy |
− | anonymity | + | * anonymity |
− | authenticity | + | * authenticity |
− | intellectual property | + | * intellectual property |
− | equality of access | + | * equality of access |
− | control | + | * control |
− | globalization | + | * globalization |
− | cultural diversity | + | * cultural diversity |
− | policies | + | * policies |
− | standards | + | * standards |
− | people and machines | + | * people and machines |
''Hardware'' | ''Hardware'' | ||
− | data | + | * data |
− | information | + | * information |
− | input devices | + | * input devices |
− | output devices | + | * output devices |
− | processing | + | * processing |
− | storage | + | * storage |
− | memory | + | * memory |
− | MHz | + | * MHz |
− | dpi | + | * dpi |
− | bit | + | * bit |
− | KB | + | * KB |
− | MB | + | * MB |
− | GB | + | * GB |
− | TB | + | * TB |
− | ASCII | + | * ASCII |
− | compatibility | + | * compatibility |
− | OCR | + | * OCR |
− | OMR | + | * OMR |
− | bar code | + | * bar code |
− | baud | + | * baud |
− | + | * encryption/decryption | |
− | encryption/decryption | + | * virus |
− | virus | + | * Trojan horse |
− | Trojan horse | + | * worm |
− | worm | + | * platform |
− | + | * peripheral | |
− | platform | ||
− | peripheral | ||
''Networks'' | ''Networks'' | ||
− | LAN | + | * LAN |
− | WAN | + | * WAN |
− | client | + | * client |
− | server | + | * server |
− | Ethernet | + | * Ethernet |
− | access | + | * access |
− | access permissions | + | * access permissions |
− | login | + | * login |
− | password | + | * password |
− | firewall | + | * firewall |
− | sysadmin | + | * sysadmin |
− | UPS | + | * UPS |
− | EDI | + | * EDI |
Revision as of 12:16, 16 January 2009
Objectives:
- You must be able explain in your own words the following key terms.
- You should also be able to give an example of each term, as well as when and where each term is used.
Key terms: Social & Ethical Issues
- reliability
- integrity
- security
- privacy
- anonymity
- authenticity
- intellectual property
- equality of access
- control
- globalization
- cultural diversity
- policies
- standards
- people and machines
Hardware
- data
- information
- input devices
- output devices
- processing
- storage
- memory
- MHz
- dpi
- bit
- KB
- MB
- GB
- TB
- ASCII
- compatibility
- OCR
- OMR
- bar code
- baud
- encryption/decryption
- virus
- Trojan horse
- worm
- platform
- peripheral
Networks
- LAN
- WAN
- client
- server
- Ethernet
- access
- access permissions
- login
- password
- firewall
- sysadmin
- UPS
- EDI