Resource Page | Glossary
GeoTech Publishing House
Educational Glossary | Mathematics | Language | Science | Technology |
Educational Technology Glossary
Glossary Technology Terms (Commonly Used)
Acceptable/Responsible Use Policy (AUP/RUP): Stipulation of students' school or organization’s official policy about the use of the Internet or computer networks.
Algorithm: A technological use as a problem-solving operation for calculation.
Alphanumeric: A Technique of creating a strong password using both the alphabets and numbers.
Analytics: refers to the systematic computational analysis of data or statistics.
Information resulting from the systematic analysis of data or statistics.
Artificial Intelligence: refers to the simulation of human intelligence processes by machines,
AI programming focuses on three cognitive aspects, such as learning, reasoning, and self-correction. It also includes Expert systems, voice recognition, machine vision, and natural language processing (NLP).
Authentic Problem: A genuine, real or original
problem to be solved.
Automation: Technology, machinery completing tasks with no or unlimited human intervention. Scheduling, alerts and reminders are examples of software applications installation used.
Blogging: A writer sharing thoughts, ideas of a content to be relevant online.
Cloud: Refers to accessibility through a network of technology engaging tasks; Google Cloud, Chrome, Microsoft Cloud, because of the transparency, privacy policy is not exercised.
Cloud computing: refers to software and services hosted on remote servers, rather than on local servers, machines, or endpoints.
Data accessibility via the internet of which may be iCloud, Google Cloud, OneDrive and Dropbox; specifically stored for sharing within designated users.
Collaboration: A term used to convey two or more for the same purpose or team; joining together.
Cookie: Codes or data usage to reveal, to track users' patterns and preferences by a web server.
Creative Commons: Refers in part to copyright law; as with an authorization by a licensed user or designated to facilitate and encourage more versatility and flexibility.
Cryptography is considered best practices in cybersecurity. It is a field focused on the processes, technologies, and approaches used to secure information as it moves from one party to another. Cryptography protects information—such as emails and files—from being read by people outside the sender and recipient. encryption and decryption are two cryptography techniques that scramble and unscramble code according to a cipher, rendering information unreadable to outside parties.
Cybersecurity: Security measures from unauthorized access to technology equipment, devices or network; securely managing and protecting the confidentiality, integrity, and availability of devices, environments, assets, and data from bad actors.
Cybersecurity Framework: is an organized, formalized set of processes, tools, policies, procedures, best practices, and requirements designed toolkits for incidents, antivirus software is used to detect, alert, block, and remove these kinds of malicious programs, such as viruses, ransomware, and more.
Cyber Resiliency is the ability of an IT system to remain operational and provide services in the event of unexpected disruptions, outages, or other unforeseen circumstances. It is the capacity for a system to recover from a disruption quickly and effectively and return to normal functionality.
Cyber Threat Intelligence (CTI) is the process of collecting, analyzing, and integrating information about existing or potential threats to an organization’s digital infrastructure.
Design Process: In educational technology, it requires the color, layout, fonts, format, editing; in part, printing based on the software solutions.
Decryption is the process by which organizations make data readable after it has been encrypted. Decryption is only possible with access to the cipher originally used to scramble the data.
Digital Footprint: Data on cyberspace by a person that exists on the Internet; or networked identity adopted or claimed in, organization or electronic device.
Digital Portfolio: A compiled or selection of electronic activities, tasks managed by a user; also known as electronic portfolio.
Digital Stories: Stories that are accessible in portals or learning management platforms or via online.
Digital Tools: Technological equipment use, install with database and processing.
Domain Name System (DNS) the internet provider uses for network location; a known pc/windows data processor.
Ebook: An electronic version of a published book that can be accessed by technology equipment for reading.
Encryption: is the coding of data to an unrecognizable conversion, unauthorized, unreadable electronic data; to protect data from unauthorized parties. Organizations encrypt data with a secret code that dictates how the data is scrambled, also called a cipher. Data can only be decrypted—or unscrambled and made readable again—with that cipher.
Firewall technology is one of the earliest tools created to fend off cyber attackers and is a fundamental security control. A firewall creates a barrier between an endpoint (such as a laptop) or network and the outside world by restricting access in or out of the network.
Hybrid Cloud. A mixed cloud based on public cloud and private cloud.
Infographic: An illustrative data in the form of charts, diagrams.
Internet of Things: Sensoring, processing and
interconnection via the internet for accessibility to send and receive data.
Learning Management System (LMS): An application learning solution or cloud-based system, to allow online users to access curriculum instruction by institutions and instructors. Management of the program is met to be interactive and integrated systems.
Makerspace: A designated space for students to gather to create, explore, discover technology using tools and materials.
Malware: refers to malicious software that attackers use with the intention of harm, exploitation, theft, and other damaging activities. It is ransomware, spyware, and viruses, worms, trojans, keyloggers, zombie programs, software-based attack tools and
Microcontroller: A hardware integrated circuit to perform one task and one specific application; such as, a processor, memory and input/output peripherals on a single chip.
Multimedia: Commonly used in education to integrate or create interactive responses; normally to motivate or stimulate engagement not limited to sound, colors, text, PowerPoint presentation.
Network: A shared accessibility to internet or computer usage, by a user and an observed (controlled) provider.
The National Institute for Standards and Technology (NIST), includes continuous monitoring as part of a six-step risk management framework.
Phishing is a form of social engineering when bad actors send emails or other message types with malicious links or harmful content to an organization’s users.
Podcast: A digital media file that is shared or stored as data retrieval, portable ipod player or via the URL address of a web page.
Pop-ups: Typically, the user of the primary web browser may be distracted by a secondary web browser window of unwanted advertising, which opens outside of the primary web browser window.
Ransomware is a form of malware that infects an organization’s devices and/or systems and locks legitimate users out of their accounts.
Smart Building often refers to access, control and support by means of programming, coding and automation. As in Smart City, automation may gather data as programed.
Social Media: Social interaction via online, applications by users not limited to (e.g., Facebook, Twitter, LinkedIn, Google+, Instagram, Pinterest, Snapchat, Tumblr and
Reddit).
Virtual Field Trip: Typically a visual exploration via the web-based, PowerPoint presentation,
Viral: A viral in the form of an email blast sends out a message, advertising, a reminder to take action.
Virus: A damaging programming code inserted, transmitted by email, in many forms, when opened, may erase data or cause damage to your hard disk. Some viruses may affect people in your list of contacts.
Digital Content Creator: under Reconstruction: Media 🔗 GTPH Book 📙 Club | 🔗 Facebook |
| 🔗 YouTube | GTPH Galery |
| Phone 📱 | 📧 eMail |
| 🔗 GeoTech Publishing House Sponsorship Page |
Language Development
Quick 🔎 | Scope of writing quality | Applications and usage of these writing elements:
Grammar | Preposition | Nouns | Pronouns | Verb | Adverb |
Mechanics | Spelling | Punctuation | Capitalization
Style | Word | Sentence |
Relevance | Content-Based |
Organization | Structure |
Development | Ideas | Examples | Support |
Cohesion | Transition phases |
Coherent | Transition between ideas
Clarify |
Persuasive | Convincingness
COPYRIGHT © 2014 – 2017 GeoTech Publishing House. ALL RIGHTS RESERVED.
GeoTech Publishing House
📱 | 516 688-4330
Web 🔗: GeoTech Publishing House
Publication Type: Journal Articles
Reports - Evaluative
Education Level: N/A
Audience: Teachers; Policymakers
Language: English
Sponsored: Educare For Exceptional Children, LLC
Authoring Institution: GeoTech University RC-NY
Comments
Post a Comment