TERM | MEANING |
Absolute Address | Exact data memory location |
ActiveX | Tools to link applications
to the web |
Adware
| Software
supported by advertisements |
Analog | Data represented by a continuous signal or information |
Applet | A Java program embedded in web page |
Archie |
A
program to find files on FTP servers |
Avatar | A character representing an internet user |
Backbone | Network mainline carrying data to smaller lines
|
Bandwidth
| Amount
of data sent through network |
Bit | Smallest piece of information, that is, either 1 or 0 |
Bluetooth | A short range wireless technology to connect electronic
devices |
Boot
| To
start a computer |
Byte
| Sequence
of information bits, which equals 8 bits |
Cache | Technically classifying, it stores recently visited web addresses, web pages in hard
disk/RAM/near processor, depending on cache types, for fast retrieval |
Captcha | Response test that shows if the user is human or not
|
Centronics
| 36
pin parallel interface standard |
Computer | A machine that computes and is programmable |
Cookie | It is an internet term where the web server sent
data records your activities on websites. Some websites record & remember information like your username and password,
so you don’t have to type them again. |
Crop | Removing part of an image or photo
|
Cyber Bullying
| Harassing
or threatening the young via cyberspace |
Cyber Squatter | Someone registering a domain name (without web pages) to sell it |
Default |
When
a user does not specify a setting, a preset value is used |
Degauss | Removing magnetism from a device |
Digital | Data represented in a series of zeros and ones |
DirectX |
Mostly
used in video games, it is a set of commands |
Domain | Network and computers connected to internet |
Domain Name | Website name |
Driver | A file that aids
computer to connect with the hardware device |
Dual-Core | A CPU that has 2 processors in a chip |
Embed | Adding something from one document to another
|
Emoticons
| Text
based faces/objects |
Encryption
| Conversion
of data into unreadable state |
Ethernet | A networking connection that uses coaxial cables |
Exabyte | Unit of data storage
equalling to 2 to 60th power bytes |
Fiber Optic | Transmits information faster than copper wire |
File Sharing | Way of giving same
file to many users by one server |
Firewire | High speed interface for connecting digital/electronic players to computers
|
Firmware
| Software
programmed into hardware |
Flash Drive | Data storage device with less units |
Gigabyte (GB) | Equals 1024 megabytes |
Gigahertz |
Measurement
for computer processing speed. 1 gigahertz =1000 megahertz |
Gnutella | Internet file sharing network |
Golden Master | Final version of software program sent to make
retail copies |
Hacker
| A
sly person who gains illegal access to other people’s computers |
Hard Copy | A document that is printed |
Hardware | Internal and external
physical parts of a computer system |
Heat Sink | A metal alloy that absorbs heat from the processor |
Host | A network computer
that acts as a server to other computers |
Icon | A tiny display representing files and folders |
Infrared | Red light invisible to naked eye and used in some
wireless devices |
Integrated
Circuit |
A semiconductor chip |
Internet | A super highway network that connects smaller networks |
Intranet | Internal network
within an organisation |
IP Address | It is internet protocol numbers ranging from 0 to 255 and separated by 3 dots.
It is assigned to a computer connected to internet by Internet Service Provider (ISP). |
Iteration | Program process repetition |
JavaScript | A scripting language
developed by Sun Microsystems |
Joystick | A device consisting of base and stick used in video games |
Jumper | Metal bridge to
close electrical circuit |
Kerberos | Used to give secure network authentication |
Kernel | The foundation layer of an operating system |
Keygen |
Key
generator that automatically generates a registration or serial # |
Keylogger | Keystrokes recording program that could be used
by a hacker to find out passwords |
Kibibyte (KiB) | Exact units of 1024 bytes |
Kilobyte (KB) | Estimated 1000 bytes or 1024 bytes depending on
the content in use. Hence, kilobyte has ambiguous units. |
LAN | Local area network that covers a small area |
Leaf | A file in hard disk |
Limewire | A free software
that allows network users to share files |
Linkedin | Business social networking site |
Linux | Operating system developed by Linus Torvalds. It is a popular
OS for hosting web servers. |
Macro | A command/script in form of a key or symbol |
Mainframe | Big powerful computer processing mammoth volume
at high speed |
Malware
| Programs
like virus & Trojan intended to damage computers |
Media | Data storage hardware like DVD, CD, HD |
Meta Tag | Tool to store details
like keywords & contents of a web page |
Memory Stick | Sony’s flash memory cards |
Name Server | Web domain is referred to IP address by name server
|
Nanosecond
| A
billionth of a second |
Network
| A
system of connected computers that send and receive data |
Node | Anything connected to a network |
Null Value | Something that has no value in programming
|
Offline
| State
of computer devices that are neither turned on nor connected |
Online | State of computer devices that are turned on and connected |
Operating System(OS) |
The
significant program that runs the computer hardware |
Oracle | Database management program developed by Oracle Corporation |
Overclock | Technique to run
a microprocessor faster than intended |
Packet | Amount of data sent from source to destination |
Path | Address of file
|
Peer to Peer (P2P)
| Connected
workstations sharing files without a central server |
Peripheral | Any device attached to computer externally |
Phishing (i.e. Password harvesting fishing) |
Attempting
to garner personal information via emails that seem genuine from banking and popular websites |
Primary Key | A value that mainly
identifies a record in a table |
Quad-Core | CPU having 4 separate processors in a chip |
Query | Request of a database in computer |
Queue | Series of tasks
waiting to be done by programs |
QWERTY | Denotes standard keyboard because Q,W,E,R,T,Y keys are side by side in the upper
left row |
Random
Access Memory (RAM) | Memory cells that make up memory module. Data is always loaded from hard disk to RAM
since it is faster to read from it. The best method to make your computer work faster is to increase its RAM.
|
Raw
Data | Data
that is not processed |
Read-only
Memory (ROM) |
Memory storing hardware information that is not lost when power is turned off |
Real Time | The moment, data
is received, it is processed |
Reboot | To restart |
Registry | Database storing set up, software and hardware configuration information in
Windows OS |
Router
| A
device connecting one local area network to another |
Script | A series of commands performed by a program |
Serial Port | Interface or connection to peripherals
|
Server |
Mainframe
computer that serves other attached computers |
Shadowing | Method of using high speed RAM to make computer to work faster |
Simplex |
Circuit
that can either transmit or receive |
Software | A code or program that is read by computer |
Spam | Unnecessary emails |
Static | Non interactive
web page |
System
| Comprehensive
inclusion of hardware, software & firmware items |
Terabyte (TB) | One trillion bytes |
Terminal | An internet computer screen |
Throughout | Data amount processed
in a given time |
Topology
| Physical
and logical set up of a network |
Trojan | Dangerous virus loaded deceptively through a host program |
Undo | A command to cancel
previous action |
Universal
Resource Locator (URL) | Another term for internet address |
Universal Serial Bus (USB) | Computer port that is faster
|
Unix |
Web
server operating system developed by AT & T |
Upload | To transfer files from local computer to web server/network |
Virtual Memory | Memory generated
by hard disk sectors when RAM is full |
Virtual Reality | Computer created illusion of reality |
Virus | A code or program
designed to replicate and damage computers |
Wave | Microsoft’s waveform sound format |
Weblog | A personal journal or blog on the web |
Workstation |
Any
computer attached to internet |
X2 | Technology to send higher data rates on old phone system |
XMS(Extended Memory Specification)
| Procedure
for using extended memory & area of disk operating system (DOS) |
Y2K | Year 2000; the predicted Millennium Bug that flopped
|
Yottabyte (YB)
| Largest
data storage unit, i.e. 1,000,000,000,000,000,000,000,000 bytes |
Zero Day Exploit | Computer security loophole issue & attack
on it are known on same day. Zero day left to release patch to fix it. |
Zettabyte (ZB) | 1,000, 000, 000, 000, 000, 000, 000 bytes
|
Zipping
| Compressing
files to save space |
Zune
| Digital
music entertainment developed by Microsoft |