Third and Fourth Level Glossary

Analytics Data generated by user engagement with content and assessment that can provide insight and guidance for intervention if required.
Anti-virus software Software that detects and removes or isolates computer viruses
Cascading stylesheets (.css) A stylesheet saved in CSS format with a .css file extension. This allows the stylesheet to be attached to each web page to define how to display the content layer of a web page, without the page needing to contain the style tags. If a number of cascading stylesheets are used, the multiple style definitions will cascade into one
Comma separate values (.csv) A file format (.csv) used to hold tabular data, for example, from a spreadsheet or database table. It stores the data as a text-based file using commas (or semi-colons in some locations) to separate the data items
Computer-aided design (CAD) Software used in the creation, manipulation and modification of drawings and designs (e.g. used by an architect)
Creative Commons Creative Commons licenses give everyone from individual creators to large institutions a standardized way to grant the public permission to use their creative work under copyright law. A Creative

Commons (CC) license is one of
several public copyright licenses that enable the free distribution of an otherwise copyrighted “work”. A CC license is used when an author wants to give other people the right to share, use, and build upon a work that the author has created

Cybercriminal A criminal involved in crime aimed at users of computer devices and the internet; crime can involve theft of money, identity theft, damaging computer systems, and so on
Decryption key An algorithm that can decrypt data (cypher text turned back into plain text)
Encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information
Encryption key An algorithm that can encrypt data (plain text turned into cypher text)
Extortion The act of getting something, especially money, by force or threats
Graphics interchange format (.gif) A format used to save still or moving images. This is an efficient method of storing images using a smaller file size, particularly where there are large areas of solid colour. It is widely used in web pages
Joint photographic expert group (.jpg/.jpeg) A format used to save still images, originally names by the joint photographic expert group. This is an efficient method of storing images using a smaller file size and is widely used in web pages
Key logger A form of spyware that gathers information by monitoring a user’s keyboard magnetic signatures which allows data to be stored and read
MP3 MPEG-1 audio layer 3; a compressed file format used for storing music; typically, the size of an MP3 music file is 90% less than a conventional music file used on a CD
MP4 A file format (multimedia container) used for storing video files. It is also used to store audio (the soundtrack to the video) and other data such as subtitles and still images
Phishing A fraudulent operation involving the use of emails; the creator sends out a legitimate-looking email hoping to gather personal information — once the user clicks on a link in the email, the browser is directed to a fake website
Ransomware Malware that encrypts data on a user’s computer and ‘holds the data hostage’ until a ransom is paid
Rich text format (.rtf) A file format (.rtf) used for text-based files that saves the formatting within the document, so allowing some formatting to be passed from one applications package to another
Sextortion A form of blackmail. It involves threatening to publish sexual information, photos or videos about someone. This may be to extort money or to force the victim to do something against their will
Spreadsheet Software that organises and manipulates numerical data stored in rows and columns; can produce graphs, do ‘what if’ scenarios
Text (.txt) A file format (.txt) used for textbased files that contain an unformatted ASCII file, although there are file format variations depending on the operating system. Text files can be opened in any word processor
Text editor Software that allows the user to type and edit plain text. It contains few or no features that allow for formatting documents
Two factor authentication A form of verification that requires two methods of authentication to verify who a user is; after entering their password, the user is required to carry out a second step, such as entering an 8-digit one-time PIN sent to their mobile phone
Virus A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. If this replication succeeds, the affected areas are then said to be “infected” with a computer virus, a metaphor derived from biological viruses
Zip (.zip) A file format for a container used to reduce the number of bytes needed to save a file, either to save storage space or to reduce transmission time
Report a Glow concern
Cookie policy  Privacy policy

Glow Blogs uses cookies to enhance your experience on our service. By using this service or closing this message you consent to our use of those cookies. Please read our Cookie Policy.