Glossary of Terms
- Acceptable Use Policy (AUP)
-
A document that outlines the rules for the use of a company's computers and networks.
- Accuracy
-
The ability of a computer to perform calculations with 100% accuracy, which is critical for financial tasks
- Antivirus Programs
-
Software that detects and removes viruses and other malware.
- Application (app)
-
A set of instructions that tells a computer how to perform a specific task. The word “app” is more common for software on smartphones and modern computers.
- Application Aoftware
-
A program designed for a user to perform a specific task, like writing a document or browsing the internet.
- Artificial Intelligence (AI)
-
A broad field of computer science focused on creating machines and software that can perform tasks requiring human intelligence, such as learning, problem-solving, and understanding language.
- Authentication
-
The process of verifying a user's identity to ensure they are who they claim to be.
- Automation
-
The use of technology to perform tasks with reduced human assistance.
- Backup
-
A copy of files made for safety in case the originals are lost or damaged.
- Bandwidth
-
The measure of how much data can be transferred over a connection in a specific amount of time, usually measured in Mbps.
- Big Data
-
Extremely large and complex data sets that can be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behaviour and interactions.
- Biometrics
-
The use of a unique personal characteristic, like a fingerprint or facial scan, for identification.
- Bit
-
The smallest unit of data in a computer, represented as either ON (1) or OFF (0).
- Blockchain
-
A secure, decentralized, and distributed digital ledger technology that records transactions in a way that is highly resistant to modification.
- Bluetooth
-
A short-range wireless technology for connecting personal devices together over a range of about 10 meters.
- Browser
-
The software application used to access and view webpages on the World Wide Web (e.g., Google Chrome, Safari).
- Byte
-
A unit of digital information that consists of 8 bits. A group of 8 bits is called a byte, which can represent a single character.
- Central Processing Unit, or CPU
-
Figure 3.4: A Mobile User Interface. The screen of a smartphone provides a clear example of a modern Graphical User Interface (GUI). The grid of small pictures, or icons, allows the user to launch applications with a simple touch.
(Image generated with AI assistance.) - Client
-
A computer or device that requests information from a server.
- Cloud Backup
-
An internet service for storing data on remote servers as backup.
- Cloud Computing
-
The delivery of on-demand computing services—including servers, storage, databases, and software—over the internet from a cloud provider.
- Cloud Storage
-
A service that stores your data on internet servers, allowing you to access it from any device with an internet connection.
- Computer
-
An electronic device that operates under the control of instructions to process raw items and produce a useful result. It processes data based on a set of instructions.
- Continuous Learning
-
The ongoing, voluntary, and self-motivated pursuit of knowledge for either personal or professional reasons.
- Cryptocurrency
-
A digital or virtual currency that uses cryptography for security, with Bitcoin being the most well-known example.
- Cybercrime
-
An illegal act involving a computer.
- Cybersecurity
-
The practice of protecting computers, networks, and data from attack, damage, or unauthorized access.
- Data
-
The raw details you provide to the computer. They are raw, unprocessed facts and figures.
- Data Analytics
-
The process of examining large data sets to find trends, draw conclusions, and make informed decisions.
- Decision-making
-
The process of using computer-analyzed information to make smarter business choices.
- Desktop Computer
-
A computer designed to stay in one location, which is often more powerful and easier to upgrade than portable models.
- Digital Divide
-
The gap between people who have ready access to computers and the internet, and those who do not.
- Digital Security Risks
-
Any event or action that could cause loss or damage to a computer system or its data
- Digital Skills Gap
-
The difference between the digital skills that employers need and the skills that the current workforce possesses.
- Display
-
The most common output device, which visually presents text, graphics, and video on a screen.
- Domain Name System (DNS)
-
The internet's phonebook, which translates human-readable domain names (like google.com) into computer-readable IP addresses.
- E-waste
-
Discarded electronic equipment, such as old computers, smartphones, and printers.
- Embedded Computer
-
A special-purpose computer that functions as one component within a larger product, such as a rice cooker or a car's braking system.
- Encryption
-
The process of converting readable data (plaintext) into an unreadable, scrambled code (ciphertext) to protect it.
- Enterprise user
-
An employee who works for a large organisation on a managed company network, often using specialized, custom-built software.
- Ergonomics
-
The science of designing a workspace and its equipment to be safe, comfortable, and efficient for human use.
- Executes
-
To carry out the instructions of a computer program.
- File
-
A named collection of stored data, which can be thought of as a single digital item.
- File Manager
-
A utility that helps users manage their files and folders.
- Firewall
-
Hardware or software that acts as a security guard to protect a network from unauthorized access.
- Folder
-
A digital container used to organise files.
- fragmentation
-
The state of a file being stored in separate, non-contiguous parts on a disk.
- Gigabyte
-
A unit of data measurement approximately equal to 1 billion bytes.
- Green Computing
-
The practice of using computing resources in a more environmentally responsible and sustainable way.
- Hard Disk Drive (HDD)
-
A traditional storage device that uses magnetism and spinning platters to store data permanently.
- Hardware
-
The physical, touchable parts of a computer system.
- Headset
-
A device that combines headphones (output) and a microphone (input) into a single unit, commonly used for online calls.
- Home user
-
A person who uses a computer for personal activities at home, such as managing personal life, entertainment, and learning.
- Hotspot
-
A physical location where you can get wireless internet access. A mobile hotspot uses a smartphone's data connection.
- HTTPS
-
A protocol that indicates a secure and encrypted connection to a website, often shown by a padlock icon in the browser.
- Information
-
The final, organized result that the computer shows you. It is processed data that is meaningful and useful.
- Input
-
The act of providing data and instructions to the computer.
- Input Device
-
Any piece of hardware used to enter data and instructions into a computer, such as a keyboard or mouse.
- Instructions
-
A set of specific rules a computer follows to perform any task.
- Internet
-
The massive, worldwide collection of interconnected computer networks that share information.
- Internet of Things (IoT)
-
A vast network of physical devices (not just computers) that are embedded with sensors and connected to the internet, allowing them to collect and share data.
- Internet Service Provider (ISP)
-
A business that provides access to the internet (e.g., TM Unifi, Maxis).
- IP Address
-
A unique number that identifies each computer or device connected to the internet.
- IPOS
-
The four-step cycle of Input, Process, Output, and Storage.
- Keyboard
-
The most common input device, used for typing text, numbers, and symbols.
- Kilobyte
-
A unit of data measurement approximately equal to 1,000 bytes.
- Laptop
-
A portable, all-in-one computer that combines the screen, keyboard, and internal parts into a single unit for mobility.
- Malware
-
Short for "malicious software," it is any software intentionally designed to cause damage to a computer or steal data.
- Megabyte
-
A unit of data measurement approximately equal to 1 million bytes.
- Memory Card
-
A small, flat storage card that uses flash memory, commonly used in portable devices like digital cameras and smartphones.
- Microphone
-
An input device that captures sound waves and converts them into a digital format.
- Mobile App
-
A native application designed specifically to be installed and run on a mobile device like a smartphone or tablet.
- Mobile user
-
A professional who works while on the move, relying on portable devices like smartphones and tablets to stay connected and productive.
- Mouse
-
The most common pointing device for desktop computers, used to control the cursor on the screen.
- Multitasking
-
The ability of an operating system to run multiple applications at the same time, sharing the computer's resources among them.
- Native App
-
A program that is installed directly onto a specific computer or mobile device.
- Netiquette
-
The code of acceptable and polite behavior for online communication.
- Network
-
A collection of computers and devices connected together, which allows them to share resources.
- NFC (Near Field Communication)
-
A very short-range wireless technology (4 cm or less) that powers "tap-to-pay" systems.
- Open-Source Software
-
Software where the source code is made available for free, allowing anyone to view, modify, and share it.
- Operating System
-
The main system software that manages all the computer's hardware and software resources.
- Operating System (OS)
-
The main system software that manages a computer's hardware and software resources.
- Output
-
The result that a computer shows after processing data.
- Output Device
-
Any hardware component that presents the processed information from a computer to a user, such as a monitor or printer.
- Phishing
-
A common cyberattack where hackers send fake emails, pretending to be from a legitimate company, to trick people into revealing personal information or downloading malware.
- Port
-
A connection point or interface on a computer where you can connect an external device.
- Power user
-
A user who requires a high-performance computer for demanding and specialized tasks, such as 3D modelling or scientific calculations.
- Printer
-
An output device that produces a physical copy ("hard copy") of text and graphics.
- Process
-
The action of the computer taking raw data and following instructions to work on it.
- Program
-
A set of instructions that tells the hardware what to do. It is also known as software.
- Programming Language
-
A formal language used to write instructions for a computer.
- Random Access Memory (RAM)
-
The computer's high-speed, temporary, and volatile workspace that holds data and instructions the CPU is actively using.
- Random Access Memory, or RAM
-
Temporary storage for data and programs that are currently in use. It is volatile.
- Ransomware
-
A type of malware that encrypts a user's files and demands a ransom payment to unlock them.
- Reach
-
The ability of a business to connect with customers and partners globally through the internet.
- Resolution
-
The number of individual dots, or pixels, used to create the image on a screen, which determines the sharpness and clarity.
- Restore
-
The process of copying files from a backup back to their original location.
- Retail Software
-
Mass-produced software that is available for purchase in a store or online.
- Scanner
-
An input device that converts printed material, such as text and pictures, into a digital format.
- Server
-
A powerful computer that provides services to other computers over a network.
- Software
-
A set of instructions (a program) that tells the hardware what to do.
- Software Developers
-
A group of people who write computer programs.
- Software Development Life Cycle (SDLC)
-
A structured process that professionals follow for planning, creating, testing, and maintaining software.
- Software License
-
A legal agreement that defines how a piece of software can be used and distributed.
- Software Piracy
-
The illegal and unauthorized copying, distribution, or use of copyrighted software
- Software Update
-
A new version of a program that can fix errors, improve security, and add new features.
- SOHO User
-
An individual who runs a business from home or a small office, using a computer as their primary tool for earning an income.
- Solid-State Drive (SSD)
-
A modern and fast storage device that stores data on flash memory chips and has no moving parts.
- Speed
-
The ability of a computer to process millions of instructions every second, which translates into business efficiency and better customer service.
- Spyware
-
Software that secretly collects information about a user's activities.
- Storage
-
The act of saving data or information for future use.
- Surge Protector
-
A device that protects computer equipment against electrical power spikes.
- System Software
-
The set of programs that operates and controls the computer's hardware and provides a platform for applications to run.
- Tablet
-
A highly portable mobile computer with a large touch screen as its main feature.
- Terabyte
-
A unit of data measurement approximately equal to 1 trillion bytes.
- Trojan Horse
-
Destructive software that is disguised as a legitimate, useful program.
- Two-Step Verification
-
A security method that requires two different forms of identification to log in.
- Uninterruptible Power Supply (UPS)
-
A device that contains a battery and provides temporary power during a blackout, allowing for a safe shutdown.
- URL (Uniform Resource Locator)
-
A webpage's unique address.
- USB Flash Drive
-
A small, ultra-portable storage device that plugs into a USB port, also known as a thumb drive or pendrive.
- Use
-
Anyone who interacts with a computer or mobile device.
- User Interface
-
The visual part of a program or device that a user interacts with.
- User Interface (UI)
-
The visual part of an operating system or software that a user interacts with, including the desktop, icons, and menus.
- Utility
-
A program that performs a specific task related to managing or maintaining a computer.
- Utility Program
-
A type of system software that performs a specific maintenance task to help manage, protect, or improve the computer.
- Virtual Private Network (VPN)
-
A service that provides a secure, encrypted connection over a public network like the internet.
- Virus
-
A malicious program that attaches itself to a file to spread.
- VoIP (Voice over IP)
-
A technology that allows you to make voice calls over the internet instead of a traditional phone line.
- Web App
-
An application that runs on a remote server and is accessed through a web browser, so nothing needs to be installed on the user's computer.
- Webcam
-
A small digital video camera used to capture video for online meetings, classes, or video calls.
- Wi-Fi
-
A wireless technology that uses radio signals to provide high-speed internet and network connections over a large area.
- World Wide Web
-
A system of public, interlinked documents and other web resources that are accessed via the internet.
- Worm
-
A malicious program that can copy itself to spread across a network without human interaction.