Distributed Computing is the technique of using the unused power of networked computers.
Information Overload is caused by the excessive quantity of information available today.
A digital footprint is a trail of data created while using the Internet both intentionally and unintentionally.
Passive Digital footprint - this is your unintentional online data trail.
Active Digital Footprint - includes data intentionally submitted online.
Crowdfunding uses the Internet to raise money for a project by raising small amounts of money from many people. These projects include: start-ups, charities, and political campaigns.
A virtual community is an online group of individuals who share their interests and opinions through the use of the internet
Examples of Virtual Community include backing a political party, sharing experiences online or supporting a sports team.
Software theft means that unauthorised or illegal copying, sharing or usage of copyright-protected software programs.
Stealing wireless bandwidth is connecting to the Internet through a wireless Internet router which does not belong to you or you do not have permission to use.
Multi-step Verification is when there is more than one stage involved in ensuring a user is authentic to improve a system's security.
There are 3 reasons why we use computers and computing devices in our modern world. They are Efficiency; accuracy and reliability
An entry-level computer is one that is the cheapest in the particular range and they have fairly low hardware specifications.
The different categories of users include: Personal Users; SOHO users; Power users and Mobile users.
The term Convergence refers to the trend where seperate technologies and functions in the past are combined into one single device that has all or some of the funtionality of each of the seperate devices.
A BUG and a VIRUS are different. A BUG is a programming mistake made by a computer program. A VIRUS is a program that is designed to damage or destroy data on a computer system.
Clickjacking occurs when users are tricked into clicking on an item on a web page which acts as a concealed link.
A Database Report presents a summary of data from a database.
Eavesdropping is the unauthorized real-time interception of private communication
Cryptocurrencies are Digital Tokens. They are a type of Digital Currency that allows people to make payments directly to each other through an online system.
A Blockchain is a decentralised, distributed and public digital ledger to create trust. It has a
Podcast is Audio ONLY BUT a Vodcast includes Video
Authentication means to verify the identity of a user before granting access to a network or computer device.
A Digital Footprint refers to the trail of data you leave behind when you use the Internet. It can be used to track your activities.