GCSE ICT Keywords (N-Z)

123456789101112131415161718192021222324
Across
  1. 6. A web feed format used for content which is frequently updated e.g. news in a standard format so it can be added to a variety of websites.
  2. 8. Based on truth or reason. It is important to judge whether information found online is valid because it could be biased or untruthful.
  3. 9. Sharing files among groups of people who are logged on to a file-sharing network.
  4. 10. Working from home but staying in touch with others with the help of technology.
  5. 11. A set of rules used by computers to communicate with each other across a network.
  6. 12. Software that can be installed on your computer without your knowledge which collects information about your logins and passwords and sends details to another computer on the internet.
  7. 13. one type of flash memory card which store up to 2 GB of data. Secure Digital High Capacity (SDHC) cards are another type of flash memory card and they are ideal for video cameras because they can store up to 32 GB of data.
  8. 14. An online system for education with areas for homework classes teacher and pupil space etc.
  9. 15. Meeting the needs of the present without compromising the needs of future generations.
  10. 17. Content is sent in compressed form over the Internet and displayed by the viewer in real time. When streaming video a web user does not have to wait to download a file to play it. Instead the media is sent in a continuous stream of data and is played as it arrives on a special player.
  11. 18. A type of website that encourages collaboration by allowing users to add edit and remove content.
  12. 21. A method of encrypting data to provide security for communications over networks such as the Internet. TLS (Transport Layer Security) is a later version of SSL.
  13. 22. a form of internet fraud that aims to steal valuable information such as credit card details usernames and passwords.
  14. 23. A program that appears legitimate but which performs some harmful activity when it is run. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy programs or data on the hard disk drive.
  15. 24. To search usually when talking about a database.
Down
  1. 1. A marketing strategy that encourages people to pass on a marketing message to their friends. It uses interesting and entertaining content that people will want to share.
  2. 2. The ongoing expenses of operating a business e.g. rent and salaries.
  3. 3. External devices connected to a computer e.g. printer or mouse.
  4. 4. Data which is gathered as part of a user’s online activity. When buying something online this could include information about the product bought but also personal details from the buyer such as address and payment details.
  5. 5. Damage caused to the muscles tendons ligaments nerves or joints usually because of repeating the same action such as repetitively clicking a mouse or typing on a keyboard.
  6. 7. Transfer a file from your computer to a central computer e.g. your ISP.
  7. 11. Copying someone else’s work and presenting it as your own.
  8. 14. A program designed to cause other programs on a computer to malfunction or stop working altogether.
  9. 15. A phone offering advanced features e.g. the ability to send emails and surf the internet.
  10. 16. Allows the wireless exchange of data between two devices by touching them together or holding them very close to each other.
  11. 18. It is similar to Bluetooth in that it is used to exchange data wirelessly but the signals can travel greater distances.
  12. 19. The protection of personal data.
  13. 20. This technology is used to make telephone calls via the Internet usually at a cheaper cost.