Analytics | Data generated by user engagement with content and assessment that can provide insight and guidance for intervention if required. |
Anti-virus software | Software that detects and removes or isolates computer viruses |
Cascading stylesheets (.css) | A stylesheet saved in CSS format with a .css file extension. This allows the stylesheet to be attached to each web page to define how to display the content layer of a web page, without the page needing to contain the style tags. If a number of cascading stylesheets are used, the multiple style definitions will cascade into one |
Comma separate values (.csv) | A file format (.csv) used to hold tabular data, for example, from a spreadsheet or database table. It stores the data as a text-based file using commas (or semi-colons in some locations) to separate the data items |
Computer-aided design (CAD) | Software used in the creation, manipulation and modification of drawings and designs (e.g. used by an architect) |
Creative Commons | Creative Commons licenses give everyone from individual creators to large institutions a standardized way to grant the public permission to use their creative work under copyright law. A Creative
Commons (CC) license is one of |
Cybercriminal | A criminal involved in crime aimed at users of computer devices and the internet; crime can involve theft of money, identity theft, damaging computer systems, and so on |
Decryption key | An algorithm that can decrypt data (cypher text turned back into plain text) |
Encryption | In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information |
Encryption key | An algorithm that can encrypt data (plain text turned into cypher text) |
Extortion | The act of getting something, especially money, by force or threats |
Graphics interchange format (.gif) | A format used to save still or moving images. This is an efficient method of storing images using a smaller file size, particularly where there are large areas of solid colour. It is widely used in web pages |
Joint photographic expert group (.jpg/.jpeg) | A format used to save still images, originally names by the joint photographic expert group. This is an efficient method of storing images using a smaller file size and is widely used in web pages |
Key logger | A form of spyware that gathers information by monitoring a user’s keyboard magnetic signatures which allows data to be stored and read |
MP3 | MPEG-1 audio layer 3; a compressed file format used for storing music; typically, the size of an MP3 music file is 90% less than a conventional music file used on a CD |
MP4 | A file format (multimedia container) used for storing video files. It is also used to store audio (the soundtrack to the video) and other data such as subtitles and still images |
Phishing | A fraudulent operation involving the use of emails; the creator sends out a legitimate-looking email hoping to gather personal information — once the user clicks on a link in the email, the browser is directed to a fake website |
Ransomware | Malware that encrypts data on a user’s computer and ‘holds the data hostage’ until a ransom is paid |
Rich text format (.rtf) | A file format (.rtf) used for text-based files that saves the formatting within the document, so allowing some formatting to be passed from one applications package to another |
Sextortion | A form of blackmail. It involves threatening to publish sexual information, photos or videos about someone. This may be to extort money or to force the victim to do something against their will |
Spreadsheet | Software that organises and manipulates numerical data stored in rows and columns; can produce graphs, do ‘what if’ scenarios |
Text (.txt) | A file format (.txt) used for textbased files that contain an unformatted ASCII file, although there are file format variations depending on the operating system. Text files can be opened in any word processor |
Text editor | Software that allows the user to type and edit plain text. It contains few or no features that allow for formatting documents |
Two factor authentication | A form of verification that requires two methods of authentication to verify who a user is; after entering their password, the user is required to carry out a second step, such as entering an 8-digit one-time PIN sent to their mobile phone |
Virus | A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. If this replication succeeds, the affected areas are then said to be “infected” with a computer virus, a metaphor derived from biological viruses |
Zip (.zip) | A file format for a container used to reduce the number of bytes needed to save a file, either to save storage space or to reduce transmission time |