Glossary
Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL
5 |
---|
5 DsA system for dealing with information overload. The 5 Ds stand for: Discard, Deal with it, Determine future action, Direct/Distribute it, Deposit it (i.e. file it). | |
A |
---|
AppAbbreviation of ‘applications’, usually meaning programs that run on a computer or mobile device. | |
B |
---|
BrowserShort for web browser, it is a programme used to navigate the World Wide Web by connecting to a web server, allowing the user to locate, access and display web content. | |
C |
---|
CANA framework developed by The Open University for evaluating information. The letters CAN stand for Credibility, Agenda, Need. | |
Citizen scienceCitizen science is scientific research carried out – either wholly or in part – by amateur (non-professional) scientists. | |
Cloud storageA public or semi-public space online where data can be stored and accessed from anywhere. | |
CopyrightCopyright is an Intellectual property right (IPR) protected in statute in the Myanmar under the Copyright Law (2019). Other countries have their own legal systems for protection of copyright works. The law of copyright prevents the unauthorised copying of original literary, dramatic, musical and artistic content (often referred to as ‘works’) in any medium and in any territory. Such content would include software (programs and underlying code), novels, poems, plays, films, musical works and sound recordings, drawings, paintings, photographs and sculptures. Copyright in Myanmar protects economic rights until and 50 years after the author’s death, 50 years after publication or creation of an audio-visual or cinematographic work, and 25 years after creation of applied artwork. Copyright comes into forces as soon as a work is created. | |
CortanaA virtual intelligent personal assistant created by Microsoft for Windows devices. Cortana can be set up to work on your PC (personal computer) and phone, enabling you to keep track of information and events wherever you are. | |
Creative CommonsCreative Commons is a type of licence which offers a quick and easy way to protect your own rights when sharing material online. Creative Commons licences, set out in easy to understand language and symbols, provide a means for establishing specific rights without the need to contact the copyright owner. | |
CrowdsourcingCrowdsourcing is when individuals or organisations obtain goods and services – including ideas and finances – from a large group of participants. It typically involves using the internet to attract and divide work between participants to achieve the end result. | |
CybercrimeCybercrime
is any criminal activity carried out specifically on computers or through the
Internet. | |
D |
---|
DataFacts and statistics collected together for reference or analysis. In an online context, data refers to information stored and transmitted electronically for others to see. | |
Digital footprintA digital
footprint is the permanent collection of data about you that is available
online. | |
Digital identityYour digital identity is the way you present yourself online. | |
Digital well-beingDigital well-being is all about feeling comfortable, safe and confident when you are using technology in an online environment. It is about feeling in control in a digital world, maintaining positive relationships with others online and avoiding unwanted behaviour such as cyberbullying. | |
DropboxA personal cloud storage service often used for
file sharing and collaboration. | |
DuckDuckGoA search engine that does not track your online activity and therefore protects your privacy. | |
E |
---|
EmojiA method of conveying emotional tone and intention, either online or in text messages, using characters or small images. It began by using simple punctuation, e.g. the classic ‘smiley’ :-) but has evolved to include many different formats of small pictures, often called ‘emoticon’. | |
EmoticonA method of conveying emotional tone and intention, either online or in text messages, using characters or small images. It began by using simple punctuation, e.g. the classic ‘smiley’ :-) but has evolved to include many different formats of small pictures, often called ‘emoji’. | |
F |
---|
Facebook is a popular free social networking website, used by millions of people around the world. | |
Fair DealingFair Dealing is a ‘defence’ under copyright law. It means that, while there is provision to use content without permission, this use can be challenged by rights owners if they do not agree with the interpretation of Fair Dealing. Exemptions under Fair Dealing are: • criticism, review, and more recently, parody • news reporting • personal study and non-commercial research • education (personal study and other limited provision). The exemption for education allows students and academic researchers to access and copy the work of others (as they wish) as long as that original work is properly credited, and the use is fair. Note: use of a whole work (for example, a book) may not be fair under this provision. Students and researchers use reference lists and bibliographies to credit the contributions of others in the development of their own ideas. | |
FilteringFiltering is a mental process involving skim-reading, evaluation and quick judgements about what to do next. In search engines and websites, there is often a ‘Filter’ tool, which allows you to make your search more specific in order to narrow the results. | |
FirewallA firewall is part of a computer system or network
which is designed to block unauthorised access. | |
FlickrA social media site for sharing photographs and videos. It is one of the biggest sources of photography on the internet. Some content can be downloaded by anyone under Creative Commons copyright licences. | |
H |
---|
HackingHacking is the gaining of unauthorised access to data in a system or computer. | |
HoaxA hoax is a dishonest or fraudulent scheme, usually with the aim of taking money from the victim. Examples include a person pretending to sell items which they never deliver or taking money for a service they will not provide. Another word for a hoax is scam. | |
I |
---|
Information ageThe
‘information age’ started around the 1970s. It refers to a time when large
amounts of information is available to all through computer technology. | |
Information overloadInformation overload is when you are exposed to too much information or data. | |
L |
---|
A social networking site designed specifically for the business community, which enables registered members to connect and create networks with others they know and trust professionally. | |
M |
---|
MalwareMalware is software that is specifically designed to disrupt, damage, or gain unauthorised access to a computer system. | |
O |
---|
Online capmpaignsUsing electronic communication technologies such as social media to engage in activism, advocacy, marketing, and online petitions, especially by citizen movements. An example of an online campaigning site is change.org. | |
P |
---|
Personal assistantIn the context of life online, a personal assistant is a kind of virtual secretary who will do tasks for you such as scheduling appointments, organising travel arrangements, or just waking you up in the morning. | |
PicasaAn online image organiser and viewer for organising and editing digital photos, which has an integrated photo sharing website. | |
PlagiarismPlagiarism is the use of another person’s material without credit. | |
PodcastA
podcast is a digital audio file available on the Internet. Podcasts can be
listened to online or downloaded to a computer or portable media player. | |
PROMPTA framework developed by The Open University for evaluating information. The letter PROMPT stand for Presentation, Relevance, Objectivity, Method, Provenance and Timeliness. | |
R |
---|
RemixRemixing means taking existing material and reworking
it for your own purposes. | |
Right to be forgottenThe right to have information about you on the web removed from search engines so that it no longer comes up in search results. | |
S |
---|
ScamA scam is a dishonest or fraudulent scheme, usually with the aim of taking money from the victim. Examples include a person pretending to sell items which they never deliver or taking money for a service they will not provide. Another word for a scam is a hoax. | |
ScanningScanning involves looking quickly down the page to locate relevant words, phrases or images that you are interested in. This will help you to decide whether you should read further and how useful the website or document might be. | |
ScreencastsScreencasts are video recordings or transmissions of data displayed on the screen of a computer or mobile device, typically with accompanying audio. | |
Search engineA search
engine is a programme that enables users to find information on the World Wide
Web. | |
Search operatorsPunctuation or characters that you can use in a search engine query to narrow or widen the focus of your search. | |
SelfieA selfie is a self-portrait in the format of a digital photograph, most commonly taken with a camera or mobile phone held at arm’s length. Posting selfies is a popular pastime with users of social networking sites like Facebook and Instagram. | |
SiriA built-in ‘personal assistant’ computer programme on Apple devices (iPhones, iPads and iPods) that enables users to speak voice commands in order to operate the mobile device and its apps. | |
SkimmingSkimming a text involves getting an indication of the scope of the information, looking at the first sentence of each paragraph to see what it’s about and noting the key points in any summaries. | |
Social MediaThe blanket term for online sites and applications which allow a large number of users to interact and share information digitally, for example social networking sites like Facebook or Twitter or media sharing sites such as YouTube. | |
Social networkingIn this context, the use of internet-based social media sites and
applications to connect with friends, family, colleague and other personal
contacts. | |
SyncOr synchronise - link all your computers and mobile devices together so that you can easily access your information from anywhere. | |
SynchroniseOr sync – link all your computers and mobile
devices together so that you can easily access your information from anywhere. | |
T |
---|
TabletTablets are mobile computing devices which are operated by a touchscreen and have become a very popular format of personal computing in the last few years. For example, iPads and Microsoft Surface. | |
TagsTags are keywords which you can add to your resources in order to make them easier to find at a later date. | |
TaskscapeA term invented for this course, to describe the sorts of everyday tasks that make up our lives, ranging from the daily and the mundane to the less frequent but still important things we need to get done. | |
ToolA digital programme or app that enables you to carry out a particular function. | |
Two-factor authenticationTwo-factor authentication is where the user is required to enter two pieces of information before they can log in to a website or piece of software. It is called different things by different websites; for example, Facebook calls it ‘login approvals’. | |
V |
---|
ViralTo ‘go viral’ describes the way a piece of online content can quickly be seen and shared across the world by a large number of people via the internet. | |
VirusA computer virus is a form of malicious software, usually with the aim of corrupting the computer system, or stealing or destroying data. | |
W |
---|
WikipediaWikipedia
is a free encyclopaedia, written collaboratively by the people who use it,
using a website called Wiki which can be easily edited by anyone. | |
Wolphram AlphaA specialist search engine for finding data. | |
Y |
---|
YouTubeA free video sharing site where anybody can watch online videos, and also upload videos they have created themselves. | |
For further information, take a look at our frequently asked questions which may give you the support you need.
If you have any concerns about anything on this site please get in contact with us here.