Level 8 Level 10
Level 9

Useful Keywords B


18 words 0 ignored

Ready to learn       Ready to review

Ignore words

Check the boxes below to ignore/unignore words, then click save at the bottom. Ignored words will never appear in any learning session.

All None

Ignore?
Future proofing
Anticipating future developments when you buy something in the hope that it will not go out of date quickly. Future proofing can be expensive, as buying something top of the range will cost more than if you wait a short while.
Hacker
Someone who gains unauthorised access to a computer in order to obtain data stored on it.
Hot desking
Sharing desks or workstations between workers, as a way of saving space and resources.
Information overload
Having so much information available that the user feels overwhelmed and is unable to take any of it in, possibly leading to stress.
Legend
A key that explains the patterns or colours that represent the different data series or categories in a chart.
Malware
Software that is designed to cause problems for users.
Multimedia
A combination of different content types such as text, audio, still images, animation and video.
Multitask
To perform more than one task at the same time.
Overheads
The ongoing expenses of operating a business, e.g. rent, fuel bills, salaries.
Personalised learning
Learning that is tailored towards the individual to allow them to make progress.
Phishing
A form of Internet fraud that aims to steal valuable information such as credit card details, usernames and passwords.
Pixelation
An effect caused by displaying a bitmap or a section of a bitmap at such a large size that individual pixels (small single-coloured squares that the image is made of) are visible to the eye.
Plagiarism
Copying someone else's work and presenting it as your own.
Primary source
Information or data that you have collected yourself.
Real Time
The actual time during which something takes place, without noticeable delays.
Relational database
A database that uses more than one table. Tables are linked together by common data items, such as ID number, known as keys.
Repetitive strain injury (RSI)
Damage caused to the muscles, tendons, ligaments, nerves or joints, usually because of repeating the same action.
Secondary source
Information or data that has been produced by someone else.