Resource Page | Glossary

                   GeoTech Publishing House

Educational Glossary | Mathematics | Language | Science | Technology | 

            Educational Technology Glossary
Glossary  Technology Terms (Commonly Used)

Acceptable/Responsible Use Policy (AUP/RUP): Stipulation of students' school or organization’s official policy about the use of the Internet or computer networks. 

Algorithm: A technological use as a problem-solving operation for calculation.

Alphanumeric: A Technique of creating a strong password using both the alphabets and numbers. 

Analytics: refers to the systematic computational analysis of data or statistics.
Information resulting from the systematic analysis of data or statistics.

Artificial Intelligence: refers to the simulation of human intelligence processes by machines, 
AI programming focuses on three cognitive aspects, such as learning, reasoning, and self-correction. It also includes Expert systems, voice recognition, machine vision, and natural language processing (NLP).

Authentic Problem: A genuine, real or original 
problem to be solved. 

Automation: Technology, machinery completing tasks with no or unlimited human intervention. Scheduling, alerts and reminders are examples of software applications installation used.

Blogging: A writer sharing thoughts, ideas of a content to be relevant online.

Cloud: Refers to accessibility through a network of technology engaging tasks; Google Cloud, Chrome, Microsoft Cloud, because of the transparency, privacy policy is not exercised. 

Cloud computing: refers to software and services hosted on remote servers, rather than on local servers, machines, or endpoints.
Data accessibility via the internet of which may be iCloud, Google Cloud, OneDrive and Dropbox; specifically stored for sharing within designated users.

Collaboration: A term used to convey two or more for the same purpose or team; joining together. 

Cookie: Codes or data usage to reveal, to track users' patterns and preferences by a web server.

Creative Commons: Refers in part to copyright law; as with an authorization by a licensed user or designated to facilitate and encourage more versatility and flexibility.

Cryptography is considered best practices in cybersecurity. It is a field focused on the processes, technologies, and approaches used to secure information as it moves from one party to another. Cryptography protects information—such as emails and files—from being read by people outside the sender and recipient. encryption and decryption are two cryptography techniques that scramble and unscramble code according to a cipher, rendering information unreadable to outside parties. 

Cybersecurity: Security measures from unauthorized access to technology equipment, devices or network; securely managing and protecting the confidentiality, integrity, and availability of devices, environments, assets, and data from bad actors.

Cybersecurity Framework: is an organized, formalized set of processes, tools, policies, procedures, best practices, and requirements designed toolkits for incidents, antivirus software is used to detect, alert, block, and remove these kinds of malicious programs, such as viruses, ransomware, and more. 

Cyber Resiliency is the ability of an IT system to remain operational and provide services in the event of unexpected disruptions, outages, or other unforeseen circumstances. It is the capacity for a system to recover from a disruption quickly and effectively and return to normal functionality.

Cyber Threat Intelligence (CTI) is the process of collecting, analyzing, and integrating information about existing or potential threats to an organization’s digital infrastructure. 

Design Process: In educational technology, it requires the color, layout, fonts, format, editing; in part, printing based on the software solutions.

Decryption is the process by which organizations make data readable after it has been encrypted. Decryption is only possible with access to the cipher originally used to scramble the data.

Digital Footprint: Data on cyberspace by a person that exists on the Internet; or networked identity adopted or claimed in, organization or electronic device.

Digital Portfolio: A compiled or selection of electronic activities, tasks managed by a user; also known as electronic portfolio.

Digital Stories: Stories that are accessible in portals or learning management platforms or via online.  

Digital Tools: Technological equipment use, install with database and processing.

Domain Name System (DNS) the internet provider uses for network location; a known pc/windows data processor. 

Ebook: An electronic version of a published book that can be accessed by technology equipment for reading. 

Encryption: is the coding of data to an unrecognizable conversion, unauthorized, unreadable electronic data; to protect data from unauthorized parties. Organizations encrypt data with a secret code that dictates how the data is scrambled, also called a cipher. Data can only be decrypted—or unscrambled and made readable again—with that cipher.

Firewall technology is one of the earliest tools created to fend off cyber attackers and is a fundamental security control. A firewall creates a barrier between an endpoint (such as a laptop) or network and the outside world by restricting access in or out of the network.

Hybrid Cloud. A mixed cloud based on public cloud and private cloud.

Infographic: An illustrative data in the form of charts, diagrams. 

Internet of Things: Sensoring, processing and 
interconnection via the internet for accessibility to send and receive data.

Learning Management System (LMS): An application learning solution or cloud-based system, to allow online users to access curriculum instruction by institutions and instructors. Management of the program is met to be interactive and integrated systems. 

Makerspace: A designated space for students to gather to create, explore, discover technology using tools and materials.

Malware: refers to malicious software that attackers use with the intention of harm, exploitation, theft, and other damaging activities. It is ransomware, spyware, and viruses, worms, trojans, keyloggers, zombie programs, software-based attack tools and

Microcontroller: A hardware integrated circuit to perform one task and one specific application; such as, a processor, memory and input/output peripherals on a single chip.

Multimedia: Commonly used in education to integrate or create interactive responses; normally to motivate or stimulate engagement not limited to sound, colors, text, PowerPoint presentation. 

Network: A shared accessibility to internet or computer usage, by a user and an observed (controlled) provider. 

The National Institute for Standards and Technology (NIST), includes continuous monitoring as part of a six-step risk management framework. 

Phishing is a form of social engineering when bad actors send emails or other message types with malicious links or harmful content to an organization’s users. 

Podcast: A digital media file that is shared or stored as data retrieval, portable ipod player or via the URL address of a web page.

Pop-ups: Typically, the user of the primary web browser may be distracted by a secondary web browser window of unwanted advertising, which opens outside of the primary web browser window. 

Ransomware is a form of malware that infects an organization’s devices and/or systems and locks legitimate users out of their accounts.

Smart Building often refers to access, control and support by means of programming, coding and automation. As in Smart City, automation may gather data as programed.

Social Media: Social interaction via online, applications by users not limited to (e.g., Facebook, Twitter, LinkedIn, Google+, Instagram, Pinterest, Snapchat, Tumblr and 
Reddit).

Virtual Field Trip: Typically a visual exploration via the web-based, PowerPoint presentation,  

Viral: A viral in the form of an email blast sends out a message, advertising, a reminder to take action. 

Virus: A damaging programming code inserted, transmitted by email, in many forms, when opened, may erase data or cause damage to your hard disk. Some viruses may affect people in your list of contacts.

Digital Content Creator: under Reconstruction: Media 🔗 GTPH Book 📙 Club | 🔗 Facebook |
 | 🔗 YouTube | GTPH Galery |
| Phone 📱 | 📧 eMail | 
| 🔗 GeoTech Publishing House Sponsorship Page |      

Language Development 

Quick 🔎 | Scope of writing  quality | Applications and usage of these writing elements: 

Grammar | Preposition | Nouns | Pronouns | Verb | Adverb | 

Mechanics | Spelling | Punctuation | Capitalization 

Style |  Word | Sentence  | 

Relevance | Content-Based |

Organization | Structure |

Development | Ideas | Examples | Support |

Cohesion | Transition phases | 

Coherent | Transition between ideas 

Clarify

Persuasive | Convincingness 

COPYRIGHT © 2014 – 2017 GeoTech Publishing House. ALL RIGHTS RESERVED.

GeoTech Publishing House
Publication Type: Journal Articles 
Reports - Evaluative
Education Level: N/A
Audience: Teachers; Policymakers
Language: English
Sponsored: Educare For Exceptional Children, LLC 
Authoring Institution: GeoTech University RC-NY

Comments

Popular posts from this blog

EFECLLC Media Services

Latest

Educare for Exceptional Children, LLC | Home |About | Services | Contact |