Attachments
|
A file that is commonly sent with a message, such as an email.
|
Avatar
|
A computer generated character that represents an online user.
|
Bluetooth®
|
A wireless technology that allows two devices to exchange data within close proximity
|
Chat
|
Distinct from email and online forums, messages are usually short and exchanges occur in real-time similar a conversation
|
Cloud storage
|
A more accessible but less secure model of digital storage whereby files, or versions of files, are stored on more than one server and accessible across multiple devices often through a cloud storage provider
|
Digital devices
|
Physical devices or tools, for example: mobile phone, smart phone, personal computer, laptop computer, tablet PC, scanning equipment, digital interface (to operate equipment).
|
Digital footprint
|
A digital footprint is the information or trail of data that a person creates from their online activity. It is made up of websites visited, emails and information on online services. It also includes activity on social media, tweets and blogs. A digital footprint is permanent, even if some information or activity is deleted.
|
Digital literacy
|
Digital literacy is the ability to define, access, manage, integrate, communicate, evaluate and create information safely and appropriately through digital technologies and networked devices for participation in personal, economic and social life. (UNESCO 2018). The skills needed include the ability to search and navigate, create, communicate and collaborate, think critically, analyse information, and remain safe using a variety of digital technologies. Digital literacy skills exist on a continuum with varying degrees of competency depending on the context and on the level required in different situations.
|
Digital peripherals
|
An external device that provides input and output for the computer.
Input examples: keyboard, mouse, joystick
Output examples: monitor, printer, loudspeakers, headphones
Input and output examples: hard drives, modems
|
Digital risk protection
|
Digital risk protection focuses on protecting organizational reputation, customer experience and revenue. Digital risk protection tools, products and services are designed to rapidly detect digital threats and respond to events to minimize organizational disruption and any financial losses. Digital risk protection reduces risks that emerge from digital transformation, protecting against the unwanted exposure of a company's data, brand, and attack surface and providing actionable insight on threats from the open, deep, and dark web.
|
Digital system
|
Digital system refers to features such as hardware, software and networks and their use. There may be several different components that make up one system, e.g. a computer has a central processing unit, hard disk, keyboard, mouse, screen, etc.
|
EFTPOS
|
Electronic Funds Transfer at Point Of Sale is a digital payment system for goods or services based on the use of payment enabled devices or cards.
|
e-Commerce
|
Commercial transactions conducted electronically using the Internet.
|
Emoji
|
Deriving from the Japanese words絵 + 文字, ‘e + moji,’ ‘picture + character,’ emojis are ideograms and faces used as digital messages.
|
Ethernet cable
|
A cable that connects wired devices to the internet and for sharing data.
|
GIF
|
Graphic Interchange Format, pronounced both ‘jif’ and with a hard ‘G’ as in Graphic, is a digital format for both animated and static images.
|
GPS
|
Global Positioning System provides your location on the earth or in the air where there is line of sight to at least four satellites.
|
HDMI
|
High Definition Media Interface is a connector of varying shapes and sizes for delivering high quality video and audio between devices.
|
IP address
|
Internet Protocol address is a numerical address for a device connected to a network that uses the internet to communicate.
|
Link
|
An abbreviation of hyperlink, is a clickable text or object that lets you jump directly to something on the internet
|
Mobile hotspot
|
A mobile phone or hardware that shares a wireless access point with another device for it to have access to mobile data
|
MMS
|
MMS is a method of sending text messages that include multimedia content using a mobile device, e.g. text with a photo, text with a video.
|
Netiquette
|
Refers to standards of good behaviour in online communication such as email, social media, online chats, forums, social networking sites.
|
Permissions
|
Granting an application or program a range of access from to data, from such as contacts to hardware, such as a camera
|
Phishing
|
Phishing is the malicious practice of attempting to trick individuals or businesses to provide personal information e.g. logins, bank or credit card details. It is often done through email.
|
Ping
|
A connection’s reaction time of a device sending a request and is measured in milliseconds.
|
QR Codes
|
A quick response code is a black and white squared pattern within a square that can be read by a mobile camera to decode an internet link, for example.
|
RCA connectors
|
Analog connectors, usually yellow for video and red and white for audio, that transfer audiovisual signals between devices.
|
Software/application
|
Software is a general term for computer data, while an application (app) is a kind of software used for a certain task. Applications are often operating system specific, while software is not necessarily so. Applications usually need user interaction to function while this is not necessarily the case with software.
|
Software Packages
|
Software packages are resources or files that are bundled together as a collection of software.
|
SMS
|
Short Message Service is a digital text message. This is different to an MMS or Multimedia Messaging Service that includes attachments, such as photos or video.
|
Sync
|
An A derivative of synchronize, harmonizing data across devices.
|
Tablet
|
A tablet, or tablet PC, is a portable computer that uses a touchscreen.
|
Time-out
|
A setting or application that hides or restricts access to apps.
|
Transactions
|
Transactions include commercial transactions; refer to e-commerce, a communicative transaction; a digital message (SMS or MMS) or a document transaction (.pdf), unless otherwise specified.
|
Wi-Fi
|
Wi-Fi is a networking technology that allow a digital device to connect to the Internet wirelessly or to communicate with another device wirelessly within a limited distance.
|