Download presentation
Presentation is loading. Please wait.
Published byAileen Penelope Gaines Modified over 8 years ago
1
Animation The rapid display of a sequence of images of 2-D or 3-D artwork/model positions, in order to create an illusion of movement
2
Application Computer software designed to help a user perform specific tasks
3
Attachment One or more computer files sent along with an email message
4
Back-up Copy A copy of data which may be used to restore the original after deletion or corruption. It also allows the user to return to a version of work
5
Bitmap Image A type of image file format used to store digital images
6
Clone A hardware or software system that is designed to exactly mimic another
7
Computer Program A sequence of instructions written to perform a specified task with a computer
8
Digital Footprint A trail left by a user's interactions in a digital environment (including their use of TV, mobile phone, internet and www, mobile web and other devices and sensors)
9
Encryption The transforming of information, using an algorithm (a cipher), in order to make it unreadable to anyone except those possessing special knowledge (a key )
10
ePortfolio A collection of electronic evidence assembled and managed by a user, usually on the Web
11
Firewall A hardware or software barrier designed to prevent unauthorised, or unwanted, communications between computer networks or hosts
12
Formula A calculation to be performed on one or more variables e.g. =A1 + A2
13
Function A subroutine, or portion of code within a larger program, which performs a specific task
14
Goal Seek The ability to calculate backwards to obtain an input that would result in a given output
15
Grooming Befriending a young person, in preparing them to accept inappropriate behaviour
16
Hardware Devices installed into, or peripheral to, a computer case in order to create a PC
17
Hotspot A Wi-Fi access point or area OR a graphical hyperlink which allows the user to jump to another web page/document
18
Hyperlink A reference to a document that the reader can directly jump to
19
The Internet A global system of interconnecting computer networks
20
Malware A variety of hostile, intrusive, or annoying software or program code
21
Network A collection of interconnected computers and devices to enable communications (thus sharing resources and information)
22
Strong Password A string of letters, numbers and characters used for authentication e.g. 4mp!3f0rtH
23
Phishing A way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy user in an electronic communication
24
Pixel The smallest unit of a picture that can be represented or controlled
25
Podcast A series of digital media files (audio/video) that are released episodically and often downloaded through the web
26
Scam An unsolicited message, claiming the prospect of a bargain or something for nothing
27
Sensor A device which measures a physical analogue quantity and converts it into a digital signal suitable for being read by a computer
28
Software A collection of computer programs, and related data, that provide the instructions telling a computer what to do and how to do it
29
Transition A form of animation, similar to custom animation, which determines how one slide changes into the next one
30
2G, 3G, 4G Second, third and fourth- generation wireless telephone technology
31
Variable A name associated with a value which may change
32
Vector Graphic An image stored as points, lines, curves, shapes or polygons as opposed to bitmap images
33
Wiki A website that allows the creation and editing of any number of interlinked web pages
34
Wireless Broadband A technology which provides high-speed wireless Internet access or computer networking access over a wide area
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.