IGCSE+Dictionary

http://mrfearnleyict.wikispaces.com/IGCSE+ICT+DICTIONARY Check this link for mor detail on some of the topics []

IGCSE ICT Dictionary


 * Abnormal data** data that is unacceptable and that should be rejected by a validation check. For example, entering text into a numeric field or data which is outside the range specified.
 * Absolute reference** a reference to a cell used in a formula where, when the formula is copied to a new address, the cell address does not change.
 * Access rights** restrictions to a user’s access to only those files they need in order to perform their job.
 * Actuator** a device which takes control signals from a computer and converts them into movement, e.g. to turn a valve on/off or to open/close a window.
 * Address book** the names and email addresses of all the people to whom you are likely to send email stored as a file.
 * Alphanumeric data** sometimes called text and it includes letters, digits and punctuation marks.
 * Analogue** a continuously changing quantity that needs to be converted to digital values before it can be processed by a computer.
 * Analogue-to-digital converter (ADC)** a device that changes continuously changing quantities (such as temperature) into digital quantities.
 * Anti-virus software** software that is used to detect and destroy computer viruses.
 * Application software** software designed to do a particular job such as word-processing or database software.
 * Aspect ratio** the ratio of the width of an image to its height.
 * Attachment** a file which is attached to an email which the recipient can open and view the contents provided they have suitable software to open the file.
 * Backing storage** storage which is not classed as ROM or RAM. It is used to hold programs and data. Backing storage devices include magnetic hard drives, optical drives (CD or DVD), flash/pen drives, etc.
 * Backup file** copy of a file which is used in the event of the original file being corrupted (damaged).
 * Backup** keeping copies of software and data so that the data can be recovered should there be corruption or loss of some or all of the ICT system.
 * Bandwidth** a measure of the amount of data that can be transferred per second over the Internet or other network.
 * Bar code** a series of dark and light lines of differing thickness which are used to represent a number which is usually written below the bar code. Can be read by an scanner to input the number accurately.
 * Batch processing** type of processing where all the inputs needed are collected over a period of time and then batched together, inputted and processed in one go. For example, questionnaires from a survey are collected over a few weeks and then batched together and processed in one go.
 * bcc (blind carbon copy)** this is useful when you want to send an email to one person and others but you do not want the others to see each other’s email addresses.
 * Biometric** a property of the human body such as fingerprints or pattern on the retina which can be used to identify a person and allow them access to a computer system.
 * BIOS (basic input/output system)** stored in ROM and holds instructions used to ‘boot’ (i.e. start) the computer when first switched on.
 * Bit** a binary digit 0 or 1.
 * Blog** a web site that allows comments to be posted usually in reverse chronological order.
 * Blogger** a person who maintains a blog.
 * Bluetooth** a method used to transfer data over short distances from fixed and mobile devices wirelessly. The range of Bluetooth depends on the power of the signal and can be typically from 5m to 100m.
 * Blu-ray** optical disk that has a much higher storage capacity than a DVD. Blu-ray disks have capacities of 25 Gb, 50 Gb, and 100 Gb. These high capacity Blu-ray disks are used to store high definition video. They are used for storing films/movies with a 25 Gb Blu-ray disk being able to store 2 hours of HDTV or 13 hours of standard definition TV. It is possible to play back video on a Blu-ray disk whilst simultaneously recording HD video.
 * Bookmarks** storage area where the URL (i.e. the web address) of a web site can be stored so that it can be accessed later using a link.
 * Boolean data** data that can only exist in two states. For example True/False.
 * Bridge** a hardware device used to connect two local area networks to each other. The purpose of a bridge is to decide whether a message needs to be transferred between the two networks or just confined to one of them. This reduces network traffic.
 * Browser (also called web browser)** software program you use to access the Internet. Microsoft Internet Explorer is an example of a web browser.
 * Bullet point** a block or paragraph of text that has a symbol placed in front to make the section of text stand out.
 * Bus topology** type of network topology where all the computers are connected to a common shared cable called the bus.
 * CAD (computer-aided design) software** software used to produce technical drawings, plans, designs, maps, etc.
 * cc (carbon copy)** used when you want to send an email to one person but you also want others to see the email you are sending. To do this you enter the email address of the main person you are sending it to and in the box marked cc you enter all the email addresses, separated by commas, of all the people you wish to receive a copy.
 * CD R (compact disk recordable)** optical storage where data is stored as an optical pattern. The user can record their data onto the disk once only.
 * CD ROM (compact disk read only memory)** optical storage where data is stored as an optical pattern. Once data has been written onto CD ROM it cannot be erased. It is mainly used for the distribution of software.
 * CD RW (compact disk read-write)**  optical storage that allows data to be stored on the disk over and over again just like a hard disk. This is needed if the data stored on the disk needs to be updated. You can treat a CD RW like a hard drive but the transfer rate is less and the time taken to locate a file is greater. The media is not as robust as a hard drive.
 * Cell** an area on a spreadsheet produced by the intersection of a column and a row in which data can be placed.
 * Changeover** the process by which an older ICT system is replaced with a newer one.
 * Character** any symbol (letter, number, punctuation mark, etc.) that you can type from the keyboard.
 * Check digit** a decimal number (or alphanumeric character) added to a number for the purpose of detecting the sorts of errors humans normally make on data entry.
 * Chip and PIN** chip readers are the devices into which you place a credit/debit card to read the data which is encrypted in the chip on the card. The PIN pad is the small numeric keypad where the personal identification number (PIN) is entered and the holder of the card can be verified as the true owner of the card.
 * Clipboard** temporary storage area used for copying or cutting data to and then pasting it somewhere else.
 * Cloud computing** Internet-based computing where programs and data are stored on the Internet rather than on the user’s own computer.
 * Command line interface** type of user interface where a user has to type instructions in a certain format to accomplish a task.
 * Compression** storing data in a format that requires less space. A compressed file takes less time to be transferred across a network.
 * Computer Misuse Act** the Act which makes illegal a number of activities such as deliberately planting viruses, hacking, using ICT equipment for frauds, etc.
 * Content** the actual text, images, etc.
 * Control system** system used to control a process automatically by making use of data from sensors as the input to the system.
 * Copyright, Designs and Patents Act** an Act making it a criminal offence to copy or steal software or use the software in a way that is not allowed according to the software licence.
 * CPU (central processing unit)** the computer’s brain. It interprets and executes the commands given to it by the hardware and software.
 * Cropping** only using part of an image.
 * CSV (comma separated variables)** a way of holding data in a file so that it can be transferred into databases or spreadsheets.
 * Data** raw facts and figures, e.g. readings from sensors, survey facts, etc.
 * Database** a series of files stored in a computer which can be accessed in different ways.
 * Data capture** term for the various methods by which data can be entered into the computer so that it can be processed.
 * Data logger** a device which collects readings from one or more sensors. The time interval between each reading can be varied (called the logging rate) and the total time over which the data is logged (called the logging period) can also be varied.
 * Data logging** the process of using an ICT system to collect data from sensors at a certain rate over a certain period of time. Remote weather stations use data logging.
 * Data Protection Act** an Act that restricts the way personal information is stored and processed on a computer.
 * Data redundancy** where the same data is stored more than once in a table or where the same data is stored in more than one table.
 * Data type check** validation check to ensure the data being entered is the same type as the data type specified for the field.
 * Digital camera** a camera that takes a picture and stores it digitally so that it can be transferred to and processed by a computer or other device.
 * Digital signature** a way of ensuring that an email or document sent electronically is authentic. It can be used to detect a forged document.
 * Digital-to-analogue converter (DAC)** a device that changes digital quantities into analogue ones.
 * Direct/random access** data is accessed immediately from the storage media. This is the method used with storage media such as magnetic hard disks and optical media such as CD and DVD.
 * Dot matrix printer** a printer which uses numerous tiny dots to make up each printed character. It works by hitting tiny pins against an inked ribbon to make the dots on the page, so this makes this printer noisy.
 * Double entry of data** two people use the same data source to enter the details into the ICT system and only if the two sets of data are identical, will they be accepted for processing. It is a method of verification.
 * Download** to copy files from a distant computer to the one you are working on.
 * Drag and drop** allows you to select objects (icons, folders, files, etc.) and drag them so that you can perform certain operations on them such as drag to the recycle bin to discard, add a file to a folder, copy files to a folder and so on.
 * DVD R (DVD recordable)** a type of optical storage. DVD R allows data to be stored on a DVD only once.
 * DVD ROM (digital versatile disk read only memory)** DVD ROM is optical storage and offers much higher storage capacity compared to CD. It is used for the distribution of movies where you can only read the data off the disk. A DVD ROM drive can also be used for reading data off a CD. DVD is mainly used for the distribution of films and multimedia encyclopaedias.
 * EFTPOS (electronic funds transfer at point of sale)** where electronic funds transfer takes place at a point of sale terminal. This means that money is transferred from the bank or credit card company to the store when you pay for goods at a store.
 * Encryption** the process of scrambling files before they are sent over a network to protect them from hackers. Also the process of scrambling files stored on a computer/storage device so that if the computer/storage device is stolen, the files cannot be read. Only the person who has a special key can see the information in its original form.
 * EPOS (electronic point of sale)** a computerized till which can be used for stock control.
 * Ergonomics** an applied science concerned with designing and arranging things people use so that the people and things interact most efficiently and safely.
 * Evaluation** the act of reviewing what has been achieved, how it was achieved and how well the solution works.
 * Expert system** an ICT system that mimics the decision-making ability of a human expert.
 * Extreme data** is data on the borderline of what the system will accept. For example, if a range check specifies that a number from 16 to 21 inclusive is entered, the extreme data would be 16 and 21.
 * Favourites** storage area where the URL (i.e. the web address) of a web site can be stored so that it can be accessed later using a link.
 * Fax** a machine capable of sending and receiving text and pictures along telephone lines.
 * Field** a space in an information handling system/database used for inputting data. For instance, you could have fields for surname, date of birth, etc.
 * File** a collection of related data.
 * File attachment (sometimes called an attachment)** a file that is attached to an email and can be sent to another person or a group of people.
 * File compression** taking files and using special software to reduce their size before sending them over the Internet or to reduce their size so that they take up less space on the storage media.
 * Firewall** a piece of software, hardware or both that is able to protect a network from hackers.
 * Flash/pen drives** portable storage media which offer cheap and large storage capacities and are an ideal media for photographs, music and other data files. They consist of printed circuit boards enclosed in a plastic case.
 * Flat file** method used for storage of data in a database where all the data is held in a single table.
 * Font** a set of letters and characters in a particular design.
 * Footer** text placed at the bottom of a document.
 * Format checks** checks performed on codes to make sure that they conform to the correct combinations of characters.
 * Gateway** the device/software that translates between two different kinds of computer networks (e.g. between a WAN and a LAN).
 * GIF (Graphics Interchange Format)** file type used for images. Images in this format are reduced to a maximum of 256 colours. Images in this format are compressed so this means that they load quickly. Used for simple line diagrams or clip art.
 * GIGO (garbage in garbage out)** means that if you put rubbish into the computer then you get rubbish out.
 * GPS (Global Positioning System)** system which uses the signals from several satellites to obtain the exact position of any object (e.g. aircraft, ship, car, etc.) on the Earth’s surface. Many cars are equipped with satellite navigation systems which use GPS so that the driver can locate their position on a map on a small screen inside the car.
 * Graphics tablet** an input device which consists of shapes and commands on a tablet which can be selected by the user by touching. Using a graphics tablet, means that more space is left on the screen for a plan or diagram.
 * Graph plotter** output device which draws by moving a pen. Useful for scale drawings and is used mainly with CAD packages.
 * GUI (graphical user interface)** interface that allows users to communicate with the computer using icons and pull-down menus.
 * Hackers** people who try (succeed) to break into a computer/computer network illegally.
 * Hacking** process of trying to break into a secure computer system.
 * Hard copy** printed output from a computer which may be taken away and studied.
 * Hardware** the physical components of a computer system.
 * Header** text placed at the top of a document.
 * Hot spot** an image or piece of text used as a link. When you click on the image or text, you are taken to another part of the same page, a different page or a different site, or it may open a new file or a new window.
 * Hub** a hub contains multiple ports (i.e. connection points). When a packet of data arrives at one port, it is copied to the other ports so that all network devices of the LAN can see all packets. Every device on the network will receive the packet of data, which it will inspect to see if it is relevant or not.
 * Hyperlink** a feature of a web site that allows a user to jump to another web page, to jump to part of the same web page or to send an email message.
 * Hypertext Mark-Up Language (HTML)** a computer programming language used to create documents on the World Wide Web. You use it to specify the structure and layout of a web document.
 * Identity theft** using your banking/credit card/personal details in order to commit fraud.
 * Inference engine** one of three parts of an expert system. It is a rules base and is the part of the expert system that does the reasoning by manipulating and using the knowledge in the knowledge base.
 * Information** Data + Meaning = Information. For example 12/03/11 is data. Only when we understand it is the ‘date for the exam’ and it is in dd/mm/yy do we have the information that the exam date is 12th March 2011. So date needs ‘field name’ and ‘format’ to become information.
 * Inkjet printer** printer that works by spraying ink through nozzles onto the paper.
 * Input device** the hardware device used to feed the input data into an ICT system such as a keyboard or a scanner.
 * Instant messaging (IM)** a method of two people using real time text to conduct a conversation using the Internet.
 * Integer** a whole number which can be positive, negative or zero.
 * Interactive** where there is a constant dialogue between the user and the computer.
 * Internet** a huge group of networks joined together. The largest network in the world.
 * Internet service provider (ISP)** a company that provides users with an Internet connection.
 * Intranet** a private network used with an organization that makes uses of Internet technology used for sharing internal information.
 * IP (Internet Protocol) address** a number which uniquely indentifies the physical computer linked to the Internet.
 * Joystick** input device used instead of the cursor keys or mouse as a way of producing movement on the screen.
 * JPEG** a file format used for still images which uses millions of colours and compression which makes it an ideal file format for photographic images on web pages.
 * K** Kilobyte or 1024 bytes. Often abbreviated as Kb. A measure of the storage capacity of disks and memory.
 * Key field** this is a field that is unique for a particular record in a database.
 * Knowledge base** one of three parts of an expert system. A huge organized set of knowledge about a particular subject. It contains facts and also judgemental knowledge, which gives it the ability to make a good guess, like a human expert.
 * LAN (local area network)** a network of computers on one site.
 * Landscape** page orientation where the width is greater than the height.
 * Laser printer** printer which uses a laser beam to form characters on the paper.
 * Length check** validation check to make sure that the data being entered has the correct number of characters in it.
 * Light pen** input device used to draw directly on a computer screen or used to make selections on the screen.
 * Login** accessing an ICT system usually by entering a user-ID/username or a password.
 * Magnetic stripe** stripe on a plastic card where data is encoded in a magnetic pattern on the stripe and can be read by swiping the card using a magnetic stripe reader.
 * Magnetic stripe reader** hardware device that reads the data contained in magnetic stripes such as those on the back of credit cards.
 * Mail merge** combining a list of names and addresses with a standard letter so that a series of letters is produced with each letter being addressed to a different person.
 * Main internal memory** memory which is either ROM (read only memory) or RAM (random access memory).
 * Master slides (also called slide masters)** used to help ensure consistency from slide to slide in a presentation. They are also used to place objects and set styles on each slide. Using master slides you can format titles, backgrounds, colour schemes, dates, slide numbers, etc.
 * Megabyte (Mb)** a unit of file or memory size that is 1024 kilobytes.
 * Megapixel** one million pixels (i.e. dots of light).
 * Memory cards** thin cards you see in digital cameras used to store photographs and can be used for other data.
 * Memory stick/flash drive/pen drive** solid state memory used for backup and is usually connected to the computer using a USB port.
 * Microprocessor** the brain of the computer consisting of millions of tiny circuits on a silicon chip. It processes the input data to produce information.
 * MIDI (musical instrument digital interface)** used mainly to communicate between electronic keyboards, synthesizers and computers. MIDI files are compressed and the files are quite small.
 * Monitor** another name for a VDU or computer screen.
 * MP3** music file format that uses compression to reduce the file size considerably which is why the MP3 file format is popular with portable music players such as iPods and mobile phones.
 * Multifunction devices** hardware which brings together the functions of several devices. For example, by combining PDA and mobile phone technology you can have phones capable of browsing the Internet.
 * Multimedia** making use of many media such as text, image, sound, animation and video.
 * Multimedia projector** output device used to project the screen display from a computer onto a much larger screen that can be viewed by a large audience.
 * Network** a group of ICT devices (computers, printers, scanners, etc.) which are able to communicate with each other.
 * Networking software** systems software which allows computers connected together to function as a network.
 * Normal data** data that is acceptable for processing and will pass the validation checks.
 * OCR (optical character recognition)** a combination of software and a scanner which is able to read characters into the computer.
 * OMR (optical mark reader/recognition)** reader that detects marks on a piece of paper. Shaded areas are detected and the computer can understand the information contained in them.
 * Online processing** the system is automatically updated when a change (called a transaction) is made. This means that the system always contains up-to-date information. Online processing is used with booking systems to ensure seats are not double booked.
 * Online shopping** is shopping over the Internet, as opposed to using traditional methods such as buying goods or services from shops or trading using the telephone.
 * Operating system software** software that controls the hardware of a computer and used to run the applications software. Operating systems control the handling of input, output, interrupts, etc.
 * Optical character recognition (OCR)** input method using a scanner as the input device along with special software which looks at the shape of each character so that it can be recognized separately.
 * Optical disk** a plastic disk used for removable storage includes CD and DVD.
 * Optical mark recognition (OMR)** the process of reading marks (usually shaded boxes) made on a specially prepared document. The marks are read using an optical mark reader.
 * Output** the results from processing data.
 * Password** a series of characters chosen by the user that are used to check the identity of the user when they require access to an ICT system.
 * PDA (personal digital assistant)** a small hand-held computer.
 * Personal data** data about a living identifiable person which is specific to that person.
 * Pharming** malicious programming code is stored on a computer. Any users who try to access a web site which has been stored on the computer will be re-directed automatically by the malicious code to a bogus web site and not the web site they wanted. The fake or bogus web site is often used to obtain passwords or banking details so that these can be used fraudulently.
 * Phishing** fraudulently trying to get people to reveal usernames, passwords, credit card details, account numbers, etc., by pretending they are from a bank, building society, or credit card company, etc. Emails are sent asking recipients to reveal their details.
 * PIN (personal identification number)** secret number that needs to be keyed in to gain access to an ATM or to pay for goods/services using a credit/debit card.
 * Piracy** the process of illegally copying software.
 * Pixel** a single point in a graphics element or the smallest dot of light that can appear on a computer screen.
 * Plotter** a device which draws by moving a pen, and is useful for printing scale drawings, designs and maps.
 * Podcast** a digital radio broadcast created using a microphone, computer and audio editing software. The resulting file is saved in MP3 format and then uploaded onto an Internet server. It can then be downloaded using a facility called RSS onto an MP3 player for storing and then listening.
 * Point** a length which is 1/72 inch. Font size is measured in points. For example, font size of 12pts means 12/72=1/6 inch which is the height the characters will be.
 * Portrait** page orientation where the height is greater than the width.
 * Presence checks** validation checks used to ensure that data has been entered into a field.
 * Print preview** feature that comes with most software used to produce documents. It allows users to view the page or pages of a document to see exactly how they will be printed. If necessary, the documents can be corrected. Print preview saves paper and ink.
 * Process** any operation that transfers data into information.
 * Processing** performing something on the input data such as performing calculations, making decisions or arranging the data into a meaningful order.
 * Processor** often called the CPU and is the brain of the computer consisting of millions of tiny circuits on a silicon chip. It processes the input data to produce information.
 * Program** the set of step-by-step instructions that tell the computer hardware what to do.
 * Proof-reading** carefully reading what has been typed in and comparing it with what is on the data source (order forms, application forms, invoices, etc.) for any errors or just reading what has been typed in to check that it makes sense and contains no errors.
 * Proxy-server** a server which can be hardware or software that takes requests from users for access to other servers and either forwards them onto the other servers or denies access to the servers.
 * Query** a request for specific information from a database.
 * RAM (random access memory)** type of main internal memory on a chip which is temporary/volatile because it loses its contents when the power is removed. It is used to hold the operating system and the software currently in use and the files being currently worked on. The contents of RAM are constantly changing.
 * Range check** data validation technique which checks that the data input to a computer is within a certain range.
 * Read only** a user can only read the contents of the file. They cannot alter or delete the data.
 * Read/write** a user can read the data held in the file and can alter the data.
 * Real-time** a real-time system accepts data and processes it immediately. The results have a direct effect on the next set of available data.
 * Real-time processing** type of processing where data received by the system is processed immediately without any delay and is used mainly for control systems, e.g. autopilot systems in aircraft.
 * Record** the information about an item or person. A row in a table.
 * Relational database** a database where the data is held in two or more tables with relationships (links) established between them. The software is used to set up and hold the data as well as to extract and manipulate the stored data.
 * Relative reference** when a cell is used in a formula and the formula is copied to a new address, the cell address changes to take account of the formula’s new position.
 * Report** the output from a database in which the results are presented in a way that is controlled by the user.
 * Resolution** the sharpness or clarity of an image.
 * ROM (read only memory)** type of internal memory on a chip which is permanent/non-volatile and cannot have its contents changed by the user. It is used to hold the boot routines used to start the computer when the power is switched on.
 * Router** hardware device which is able to make the decision about the path that an individual packet of data should take so that it arrives in the shortest possible time. It is used to enable several computers to share the same connection to the Internet.
 * RSI (repetitive strain injury)** a painful muscular condition caused by repeatedly using certain muscles in the same way.
 * rtf (rich text format)** file format that saves text with a limited amount of formatting. Rich text format files use the file extension ‘.rtf’.
 * Sans serif** a set of typefaces or fonts that do not use the small lines at the end of characters which are called serifs.
 * Scanner** input device that can be used to capture an image and is useful for digitizing old non-digital photographs, paper documents or pictures in books.
 * Screenshot** copy of what is seen on a computer screen. It can be obtained by pressing the Prt Scr button when a copy of the screen will be placed in the clipboard. The copy of the screen can then be pasted.
 * Search engine** program which searches for required information on the Internet.
 * Secondary memory** storage other than ROM or RAM and is non-volatile which means it holds its contents when the power is removed. It is used to hold software/files not being used.
 * Sensors** devices which measure physical quantities such as temperature, pressure, humidity, etc.
 * Serial/sequential access** data is accessed from the storage media by starting at the beginning of the media until the required data is found. It is the type of access used with magnetic tape and it is a very slow form of access when looking for particular data on a tape.
 * Serif** a small decorative line added to the basic form of a character (letter, number, punctuation mark, etc.).
 * Social networking site** a web site used to communicate with friends, family and to make new friends and contacts.
 * Software** the actual programs consisting of instructions that allow the hardware to do a useful job.
 * Software licence** document (digital or paper) which sets out the terms by which the software can be used. It will refer to the number of computers on which it can be run simultaneously.
 * Solid state backing storage** the smallest form of memory and is used as removable storage. Because there are no moving parts and no removable media to damage, this type of storage is very robust. The data stored on solid state backing storage is rewritable and does not need electricity to keep the data. Solid state backing storage includes memory sticks/pen drives and flash memory cards.
 * Spam** unsolicited bulk email (i.e., email from people you do not know, sent to everyone in the hope that a small percentage may purchase the goods or services on offer).
 * Spellchecker** program usually found with a word-processor and most packages which make use of text which checks the spelling in a document and suggests correctly spelt words.
 * Spyware** software that is put onto a computer without the owner’s knowledge and consent with the purpose of monitoring the user’s use of the Internet. For example, it can invade their privacy or monitor keystrokes, so it can be used to record usernames and passwords. This information can then be used to commit fraud.
 * Stand-alone computer** if a computer is used on its own without any connection (wireless or wired) to a network (including the Internet), then it is a stand-alone computer.
 * Storage media** the collective name for the different types of storage materials such as DVD, magnetic hard disk, solid state memory card, etc.
 * Style sheet** a document which sets out fonts and font sizes for headings and subheadings, etc., in a document. Changes to a heading need only made in the style sheet and all the changes to headings in the document will be made automatically.
 * Swipe card** plastic card containing data stored in a magnetic stripe on the card.
 * Switch** a device that is able to inspect packets of data so that they are forwarded appropriately to the correct computer. Because a switch only sends a packet of data to the computer it is intended for, it reduces the amount of data on the network, thus speeding the network up.
 * Tags** special markers used in HTML to tell the computer what to do with the text. A tag is needed at the start and end of the block of text to which the tag applies.
 * Tape** magnetic media used to store data.
 * Templates** electronic files which hold standardized document layouts.
 * Terabyte (Tb)** a unit of file or memory size that is 1024 gigabytes.
 * Thesaurus** software which suggests words with similar meanings to the word highlighted in a document.
 * TFT (thin film transistor)** a thin screen used in laptops/notebooks or in desktops where desk space is limited.
 * Topology** the way a particular network is arranged. Examples include ring, star, tree and bus.
 * Touchscreen** a special type of screen that is sensitive to touch. A selection is made from a menu on the screen by touching part of it.
 * Tracker ball** an input device which is rather like an upside down mouse and is ideal for children or disabled people who find it hard to move a mouse.
 * Transaction** a piece of business, e.g. an order, purchase, return, delivery, transfer of money, etc.
 * Transcription error** error made when typing data in using a document as the source of the data.
 * Transposition error** error made when characters are swapped around so they are in the wrong order.
 * Tree topology** a combination of two network topologies combined together, e.g. a series of star networks are connected onto a bus.
 * txt** text files just contain text without any formatting. Text files use the file extension ‘.txt’.
 * Update** the process of changing information in a file that has become out of date.
 * URL (Uniform Resource Locator)** a web address.
 * USB (Universal Serial Bus)** a socket which is used to connect devices to the computer such as web cams, flash drives, portable hard disks, etc.
 * User** a person who uses a computer.
 * User interface** the user interface uses an interactive screen (which can be a touchscreen) to present questions and information to the operator and also receives answers from the operator. Can also be one of the three parts of an expert system.
 * User log** a record of the successful and failed logins and also the resources used by those users who have access to network resources.
 * Username or User-ID** a name or number that is used to identify a certain user of the network or system.
 * Validation checks** checks a developer of a solution sets/creates, using the software, in order to restrict the data that a user can enter so as to reduce errors.
 * Verification** checking that the data being entered into the ICT system perfectly matches the source of the data.
 * Videoconferencing** ICT system that allows virtual face-to-face meetings to be conducted without the participants being in the same room or even the same geographical area.
 * Virus** a program that copies itself automatically and can cause damage to data or cause the computer to run slowly.
 * Voice recognition** the ability of a computer to ‘understand’ spoken words by comparing them with stored data.
 * WAN (wide area network)** a network where the terminals/computers are remote from each other and telecommunications are used to communicate between them.
 * Web cam** a digital video camera that is used to capture moving images and is connected to the Internet so the video can be seen by others remotely. They are often included as part of the screen in computers or bought separately and connected to a USB port.
 * Web logs (blogs)** blogs are web sites that are created by an individual with information about events in their life, videos, photographs, etc.
 * Web page** a document that can be accessed using browser software.
 * Web site** a collection of interconnected web pages relating to a topic or organization.
 * Wi-Fi** a trademark for the certification of products that meet certain standards for transmitting data over wireless networks.
 * WIMP (Windows Icons Menus Pointing devices)** the graphical user interface (GUI) way of using a computer rather than typing in commands at the command line.
 * WLAN** A local area network (LAN) where some or all of the links are wireless, making use instead of infra-red or microwaves as a carrier for the data rather than wires.
 * World Wide Web (WWW)** the way of accessing the information on all the networked computers which make up the Internet. WWW makes use of web pages and web browsers to store and access the information.