*Packet
Computer data sent over a network is called a packet. The amount of data sent over a network is small and this data comes to the computer in the form of many small packets. The address of its origin,destination and the information that connects it to the related packets is what constitutes a packet.
*Password
A hidden series of characters that makes it possible for a user to gain access to a file,computer or a program. Usually passwords are made up of several characters,which may include letters,numbers,and most symbols leaving out spaces. Passwords ensure that the computer is not accessed without permission.
*Proxy Server
A server that all the computers in large businesses,organizations and universities are connected to before they gain access to information on the Internet. Using a proxy server the Internet speed is improved.
*Protocol
A common set of rules and instructions which a computer follows while communicating with each other is termed as Protocol. Many different types of protocols exist because of the many methods which computers use to communicate.
*Portal
This term is used to refer to a website or a service that provides a broad spectrum of services and resources. E-mails,forums,search engines and on-line shopping malls fall under this category.
*Post Office Protocol(POP3)
A method of delivering e-mails,which is simple and standardized is called POP3. E-mails are received by the POP3 mail server whose task it is to filter them into the appropriate user folders. Messages are downloaded from the mail server to the user's hard disk whenever a user connects to the mail server to check his mail.
Computer data sent over a network is called a packet. The amount of data sent over a network is small and this data comes to the computer in the form of many small packets. The address of its origin,destination and the information that connects it to the related packets is what constitutes a packet.
*Password
A hidden series of characters that makes it possible for a user to gain access to a file,computer or a program. Usually passwords are made up of several characters,which may include letters,numbers,and most symbols leaving out spaces. Passwords ensure that the computer is not accessed without permission.
*Proxy Server
A server that all the computers in large businesses,organizations and universities are connected to before they gain access to information on the Internet. Using a proxy server the Internet speed is improved.
*Protocol
A common set of rules and instructions which a computer follows while communicating with each other is termed as Protocol. Many different types of protocols exist because of the many methods which computers use to communicate.
*Portal
This term is used to refer to a website or a service that provides a broad spectrum of services and resources. E-mails,forums,search engines and on-line shopping malls fall under this category.
*Post Office Protocol(POP3)
A method of delivering e-mails,which is simple and standardized is called POP3. E-mails are received by the POP3 mail server whose task it is to filter them into the appropriate user folders. Messages are downloaded from the mail server to the user's hard disk whenever a user connects to the mail server to check his mail.
*Page: The transfer of data, a logical block of memory, from virtual memory to physical memory, or from physical memory to virtual memory.
*Page Table Entry: Also known as PTE . A 32 bit entry into the paging file table, the entry is valid and the page is present in physical memory. The entry defines the mapping of virtual memory to Physical memory.
*Path: A file path contains the location of the file. C:\Windows\System is the path for the file name C:\Windows\System\Azt16.drv. A valid path must contain the drive letter, a full colon and backslash, the directory and a backslash, any sub directories and a backslash, and the file name and extension.
*Phishing: A site that falsely claims to be a legitimate enterprise in an attempt to scam the user into surrendering personal information, for the purpose of identity thief. Maybe via email or a link from another site.
*Queue
A number of jobs that are in sequence,waiting to be processed is what makes up a queue. New jobs are added to the already existing queue and are processed in the order in which they were sent.
*QuickTime
Quicktime was developed by Apple Inc. It is a multimedia framework,which can handle various forms of digital video,media clips,sound, text and a whole range of interactive panoramic images. It is available for operating systems like Microsoft Windows,Classic Mac OS and Mac OS X.
A number of jobs that are in sequence,waiting to be processed is what makes up a queue. New jobs are added to the already existing queue and are processed in the order in which they were sent.
*QuickTime
Quicktime was developed by Apple Inc. It is a multimedia framework,which can handle various forms of digital video,media clips,sound, text and a whole range of interactive panoramic images. It is available for operating systems like Microsoft Windows,Classic Mac OS and Mac OS X.
*RAM: Random Access Memory is temporary memory that your computer uses to store information. Text copied to the "clipboard" is stored in RAM until it is replaced by new information or the computer is turned off.
*Slip Stream: A fix, enhancement, or upgrade made to software without creating a new version number to identify the changes. Commonly done by replacing some files but not all.
*Stacks: Reserved memory that programs use for processing. An error message "stack overflow" is because there is not enough space in memory available to handle the calls being made to Windows.
*TCP/IP: Transmission Control Protocol / Internet Protocol - The protocol that computers use to communicate over the Internet. This protocol is common to all operating systems, so it can be used by Windows to communicate with Unix and all others for local networking as well.
*Trojan: A computer program which carries within itself a means to allow the program's creator access to the system using it. A Trojan normally will not do any damage by itself.
*Tape Drive
An essential element of a computer system,a tape drive can be used to store a large amount of information on magnetic tape cartridges. They can be used for daily back-up of information.
*Task Bar
The horizontal bar located at the bottom of the screen is called a task bar. Apart from the Start button and the time,the task bar houses the programs which are open.
*Transmission Control Protocol/Internet Protocol(TCP/IP)
Developed by the U.S military,the TCP/IP was used to enable communication between different types of computers and networks. The former is connection-oriented and provides communication that is dependable and the latter provides packet routing.
*Telnet
This term is used to refer to a text-based program which is used to directly connect and interact with a remote host or a server.
*Template
Templates are formats which have already been designed. If required the text and graphics can be customized according to one's own needs.
*Terabyte(TB)
A terabyte is a unit of measurement which is equivalent to 1000 gigabytes.
*Terminal
A device which enable a user to be connected to a computer is called a terminal. Usually,a terminal consists of a monitor and a keyboard. Terminals are usually of three kinds:Intelligent, smart and dumb terminal.
*Text Editor
Text editor is a program which can be used to input, update,delete,write or store information on the computer. Programs,data or textual material are some of the kinds of information.
*Token
An essential element of a computer system,a tape drive can be used to store a large amount of information on magnetic tape cartridges. They can be used for daily back-up of information.
*Task Bar
The horizontal bar located at the bottom of the screen is called a task bar. Apart from the Start button and the time,the task bar houses the programs which are open.
*Transmission Control Protocol/Internet Protocol(TCP/IP)
Developed by the U.S military,the TCP/IP was used to enable communication between different types of computers and networks. The former is connection-oriented and provides communication that is dependable and the latter provides packet routing.
*Telnet
This term is used to refer to a text-based program which is used to directly connect and interact with a remote host or a server.
*Template
Templates are formats which have already been designed. If required the text and graphics can be customized according to one's own needs.
*Terabyte(TB)
A terabyte is a unit of measurement which is equivalent to 1000 gigabytes.
*Terminal
A device which enable a user to be connected to a computer is called a terminal. Usually,a terminal consists of a monitor and a keyboard. Terminals are usually of three kinds:Intelligent, smart and dumb terminal.
*Text Editor
Text editor is a program which can be used to input, update,delete,write or store information on the computer. Programs,data or textual material are some of the kinds of information.
*Token
- In networking,a series of bits found on a token-ring network,is called a token. It is used to send information to other computers.
- A single element which is found in a programming language is called a token.
- When we take into account security systems,token would refer to a small card with an ID code used to log into a network.
A row,column or block of onscreen buttons or images is what a toolbar is. When a button or an image is clicked on a toolbar,certain functions on the program are activated.
*Tooltip
When the mouse pointer is moved over a button on the toolbar,the name and description about it appear in a rectangular box,this is called tooltip.
*Trojan Horse
A trojan horse refers to a program that looks genuine,but performs some wrong activity when it is run. The only difference that exists between trojan horses and viruses is that,the former do not replicate themselves.
*Typeface
A set of characters like letters, numbers, punctuation marks and symbols of the same design make up a typeface. Typefaces are vector-based, because of this, they can be scaled very large and still appear sharp.
*Unified Modeling Language(UML)
UML is a programming language used for visualizing, specifying and documenting the artifacts of software systems. UML uses blueprints to simplify the complex designing process.
*Unix
Unix is an operating system which was created in the Bell Labs in 1960's. It only gained popularity with the consumers in the 1990's. Unix, is still considered the most common operating system for web servers.
*Upload
To upload is to send a file from a local computer to another remote computer.
*Uniform Resource Locator(URL)
URL is an address that indicates where a file is located on the Internet.
*Universal Serial Bus(USB)
The most common type of computer port used is the USB. Basically, USB is a protocol which is used when there is a data transfer taking place from one digital device to another.
*Username
A string of characters that is unique to a person and is used for identification while attempting to gain access to the Internet or any restricted website.
*Utility
Software programs that perform tasks which are very specific and are usually related to managing system resources are called utility programs. Some of these programs help ensure that the computer is free from unwanted software, while other utility programs add functionality like desktop customization.
*Vector Graphic
Vector images are made up of paths. A line,a square, a triangle, or a curvy shape are what constitute a path. Using these paths, simple and complex diagrams can be created.
*Video Graphics Array(VGA)
Originally developed in 1987 by IBM, the VGA is the standard monitor interface used in most personal computers.
*Video Card
A card that possess the necessary circuits to create video signals that can be processed by the computer display.
*Virtual Memory
Memory that is created when the RAM is full is called virtual memory. This is done by using the hard disk space of the computer.
*Virtual Reality
An environment created artificially using computer hardware and software. In a virtual world, sound effects are also used along with visuals.
*Virus
Viruses are tiny programs which are capable of causing harm to files and programs on the same network. Viruses are able to duplicate themselves, attach themselves to other programs and even travel across networks.
*Voice Over Internet Protocol(VoIP)
A combination of hardware and software with the help of which people can use the Internet to transmit telephone calls. In this case, the voice data is sent using packets. Making calls this way is much cheaper as the user only pays for Internet access.
*Virtual Private Network(VPN)
A network that is connected to the Internet and uses encryption to bring into order all data that is sent through the Internet making the entire network Virtually private, this is called VPN.
*Virtual Reality Modeling Language(VRML)
This term is used to refer to a 3D navigation specification using which interactive 3D websites can be created. Virtual tours through malls and other buildings as also models of cars can be viewed using VRML.
Vector images are made up of paths. A line,a square, a triangle, or a curvy shape are what constitute a path. Using these paths, simple and complex diagrams can be created.
*Video Graphics Array(VGA)
Originally developed in 1987 by IBM, the VGA is the standard monitor interface used in most personal computers.
*Video Card
A card that possess the necessary circuits to create video signals that can be processed by the computer display.
*Virtual Memory
Memory that is created when the RAM is full is called virtual memory. This is done by using the hard disk space of the computer.
*Virtual Reality
An environment created artificially using computer hardware and software. In a virtual world, sound effects are also used along with visuals.
*Virus
Viruses are tiny programs which are capable of causing harm to files and programs on the same network. Viruses are able to duplicate themselves, attach themselves to other programs and even travel across networks.
*Voice Over Internet Protocol(VoIP)
A combination of hardware and software with the help of which people can use the Internet to transmit telephone calls. In this case, the voice data is sent using packets. Making calls this way is much cheaper as the user only pays for Internet access.
*Virtual Private Network(VPN)
A network that is connected to the Internet and uses encryption to bring into order all data that is sent through the Internet making the entire network Virtually private, this is called VPN.
*Virtual Reality Modeling Language(VRML)
This term is used to refer to a 3D navigation specification using which interactive 3D websites can be created. Virtual tours through malls and other buildings as also models of cars can be viewed using VRML.
*Virus: A program that when loaded infects, alters or destroys other programs. Some virus programs cause major trouble and some are nothing more than annoying pranks.
*Worm: A computer program, which replicates itself and is self-propagating. Worms, as opposed to viruses, are meant to spawn in network environments. Worms usually are designed to slow down a network or even crash it. See also: Trojan Horse, Virus.
Computer networks that are connected together over long distances using telephone lines, fiber-optic cables or satellite links are called WAN's
*Web Host
This term is used to refer to a service which a company provides to Internet users with online systems which are used for storing information,images,video or any other content using the web, web hosts also provide Internet connectivity. A small fee is usually charged for the using this service.
*Web Page
A web page is used to refer to a document or file which is written in HTML and stored on the web server. This document can be viewed over the Internet with the help of a Web browser.
*Website
Web pages, images,sound,video and other files make up a website. A website can be retrieved using a browser.
*Windows
Windows is an operating system with a graphical user interface.
*Windows Sockets(Winsock)
Winsock is an application Programming Interface which is used for developing Windows programs. These programs can communicate using the TCP/IP protocol.
*Workstation
This term is used to refer to a computer that has been set up to perform a set of tasks. Photo editing, audio recording, or video production are a few of those tasks. These workstations are connected together which make it possible for files and other information to be sent from one computer to another.
*World Wide Web(WWW)
Researchers at CERN in Switzerland created the concept of the WWW. The www is a collection of online documents which are stored in servers around the world. These servers are connected to the Internet, using a web browser these documents can accessed over the Internet.
*Extensible Hypertext Markup Language(XHTML)
This term is used to refer to a Markup language which is written XML.
*Extensible Markup Language(XML)
XML is a language that is used to define documents. This is done using a standard format which can be read by any application that is compatible with XML.
*Extensible Stylesheet Language Transformation(XSLT)
XSML is a language which is used to change XML or XSL documents into HTML using a set of well defined rules. This change makes it suitable for a browser to display.
*Yobibyte
Yobibyte is a unit of measurement which is equal to 2 to the 80th power. 1,208,925,819,614,629,174,706,176 bytes or 1,024 zebibytes make up a yobibyte.
*Yottabyte
The largest unit of measurement used for computer data is the yottabyte, it consists of 1,024 zettabytes.
*Zebibyte
A unit of data storage which equals to 2 to the 70th power is called a zebibyte. It is equal to 1,024 exbibytes.
*Zettabyte
Zettabyte is a name derived from Zeta which stands for the last letter of the Greek alphabet. A unit of used to measure data storage, a zetabyte is equal to 1,024 exabytes.
*Zip
This term is used for a file format which is used to compress or zip files. This is done in order to reduce storage space and time taken to transfer a file.
*8.3 format: Long file names are not 8.3. The 8 means up to 8 characters for the file name and 3 means up to 3 characters for the file extension. A long file name is reduced to the first 6 characters (no spaces) and the "~" plus a number (Pro Name File.exe = Pronam~1.exe). The number is determined by the first 6 characters. If you have two files with the first 6 matching then the second file created in that folder will be a 2. It will not change back to a 1 if the first file is deleted.
A router is a device that forwards data packets between computer networks, creating an overlay internetwork. A router is connected to two or more data lines from different networks. When a data packet comes in one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey. Routers perform the "traffic directing" functions on the Internet. A data packet is typically forwarded from one router to another through the networks that constitute the internetwork until it reaches its destination node
ReplyDelete