0% found this document useful (0 votes)
191 views261 pages

Computing Fundamentals All in Source by Jayson C. Lucena Version 2.0 PDF

Uploaded by

Catherine Duque
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
191 views261 pages

Computing Fundamentals All in Source by Jayson C. Lucena Version 2.0 PDF

Uploaded by

Catherine Duque
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 261

COMPUTING

FUNDAMENTALS
ALL IN SOURCE
BY JAYSON C.
LUCENA

JAYSON C.LUCENA
CREATOR
Quiz 1

It is the tangible parts of the computer that you can touch.


-Hardware

These locations are numbered, and the sequence number of a location is called?
-Address

A computer is built to carry out instructions that are written in a very simple type
of language called?
-Machine Language

It is a device inside your computer that follows a program instruction.


-CPU

It is known as a complex system consisting of many different components.


-Computer

Stanford Research Institute brought about ERMA, Electronic Recording Machine


Accounting project, which dealt with the automation of the process of bookkeeping
in banking.
-True

During Third Generation semiconductors decreased the speed and efficiency of the
computer.
-False
It is the year where the evolution of computer started.
-1930

Abacist is the term called for the user of an abacus who slides the beads of the
abacus by hand.
-True

It is the year when John V. Atanasoff devised the first digital electronic computer.
-1937

The year when Intel produced large scale integration circuits.


-1972

It is the year when the general electric corporation delivered its ERMA computing
system to the Bank of America in California.
-1959

ERMA (Electronic Recording Machine-Academy), was a pioneering computer


development project run at SRI under contract Bank of Africa in order to automate
banking bookkeeping.
-False

A computer's main memory is also known as ?


-RAM

A Vacuum tube is a device used to amplify, switch, otherwise modify, or create an


electrical signal by controlling the movement of electrons in a low-pressure space.
-True

Semiconductors are used in almost all electronic equipment in use today and have
revolutionized the world of electronics.
-False

It is simply a list of unambiguous instructions meant to be followed mechanically


by a computer.
-Programs

This is also known as intangible parts of a computer.


-Software

ENVAC was a turning-complete, digital computer capable of being reprogrammed


to solve a full range of computing problem.
-False

Punchcard or Hollerith card, is a piece of stiff paper that contains non digital
information represented by the presence or absence of holes in none predefined
positions.
-False

In First Generation computer in this generation were not expensive and bulky.
They used machine language for computing and could solve problem at a time.
Computers during this phase cannot support multitasking task.
-False
The abacus, also called a counting mechanism, is a calculating tool used primarily
in parts of Asia for performing arithmetic processes.
-True

It is the year when the development of Arpanet began with the financial backing of
the department of defense.
-1969

It is the year when Atanasoff and Berry came up with ABC prototype.
-1939

It a number is made up of just two possible digits, zero and one.


-Binary

The Z3 consisted of separate units, such as a punch tape reader, control unit,
floating-point arithmeticc unit, and input/output devices.
-True

The Abacus known as early computing tool which logarithm is invented by John
Clipper and the invention of slide rule by William Oughtred.
-False

It is the year when DEC launched the first minicomputer called the PDP-8.
-1968

It is the year when Z3 of Konrad Zuse's was a notable achievement in the evolution
of computers.
-1941

It is the year that the history of computers dates back to the invention of a
mechanical adding machine.
-1642

Computer system under fifth generation are going to be based on principles of


Artificial Intelligence and Natural Language recognition.
-True

The United States (U.S) Army's Ballistic Research Laboratory came up with the
Electronic Numerical Integrator and Calculator (ENIAC) in the year?
-1946

This is consists of a sequence of locations.


-Main Memory

Quiz 2

Decimal number system is using based 10


-True

The given binary number: 110110 if converted to octal is equal to?


66

The given decimal number: 75 if converted to octal is equal to?


113

8 raised to 2 is equal to 64
-True

The decimal value of 11 is equal to B in hexadecimal


-True

The conversion of 87 hexadecimal to binary is 11100001.


-False

The given binary number: 10110 if converted to decimal is equal to?


-22

A number system with eight possible values.


-Octal

It is a set of numbers with one or more operations.


- number system

A series of eight bit.


-byte

The given binary number: 011011111 if converted to octal is equal to?


-337
The conversion of 76 octal to hexadecimal is E3.
-False

It is represented by 0's and 1's.


-binary system

It is the fundamental system of a computer based system.


-binary numeral system

The conversion of 175 decimal to hexadecimal is AF.


-True

The given binary number: 1100 if converted to decimal is equal to?


-12

LSB is also known as?


-Least Significant Bit

The conversion of 53 hexadecimal to binary is 1100101.


-False

A number system with fifteen possible values.


-hexadecimal
The given decimal number: 55 if converted to octal is equal to?
-67
The conversion of 71 octal to binary is 111001.
-True

It is called as a bit.
-binary digit

The given decimal number: 15 if converted to binary is equal to?


-1111

The conversion of 67 decimal to hexadecimal is 43.


-True

The given decimal number: 26 if converted to binary is equal to?


-11010

The conversion of 87 hexadecimal to decimal is 135.


-True

The given binary number: 1101111 if converted to hexadecimal is equal to?


-6F

The given binary number: 110110111 if converted to hexadecimal is equal to?


-1B7
A number system with a ten possible values.
-decimal

The conversion of 54 octal to hexadecimal is C2.


-False

The conversion of 53 octal to binary is 101011.


-True

2 raised to 0 is equal to 1
-True

As binary system uses the power of?


-2

The conversion of 27 octal to decimal is 23.


-True

2 raised to 4 is equal to 8
-False

PRELIMS

The term processing is procedure where processor that transforms raw data into
useful information.
-True

It collects and stores data on sales numbers market research, logistics, linguistics,
or other behaviors
- Data Analyst

One of the limitation of computer is it do not think for you.


-True

An application that is used in presenting business proposals to clients or sales


reports in the office.
-Presentation

It is a software that allow users to produce near type-set-quality copy of newsletter,


advertisements, and other publishing jobs.
-Desktop publishing

Output devices accept data and instructions from the user or from another
computer
-False

These are tools used by application developers to develop applications.


-Programming language

It is the is the first general purpose electronic computer.


-ENIAC
A value may be unethical when it has an inadequate moral basis or causes
recognizable harm
-False

This is well-known organization for computing professionals


-ACM

It allows a computer to read PDFs.


-PDF Reader

This enables the collection, monitoring, and exchange of personal information


quickly, inexpensively
-Technology

These people are usually knowledgeable in using scripting languages such as


HTML and CSS.
-Web Developer

It is also known as "electron tube" in North America, "thermionic valve", or


"valve" in Britain
-Vacuum tube

It permits users to create and maintain several files and extract in an easy
convenient manner.
-Database

It is a first machine capable of accepting binary and floating numbers.


-Z-machine

Breaches of computer security cause harm.


-True

This means negative consequences, especially when those consequences are


significant and unjust
-Harm

It work with a company's computer network, using information technology to


make network systems for all employees to use
- Network Engineer

Part of that stewardship requires establishing policies for fair system access,
including for those who may have been excluded
-True

This principle discuss that computing professionals should not misrepresent an


organization's policies or procedures, and should not speak on behalf of an
organization unless authorized to do so.
-Be Honest and Trustworthy

It is someone who develops applications for computers.


-Application Developer

It is called to the person who uses an abacus.


-Abacist
A way of minimizing computer viruses and threats
-Anti-viruses

It collects and stores data on sales numbers market research, logistics, linguistics,
or other behaviors.
-Data Analyst

The four parts of computer is composed of hardware, software, people and data
-True

Leaders should consider the personal and professional development, accessibility


requirements, physical safety, psychological well-being, and human dignity of all
workers
-True

People—including users, customers, colleagues, and others affected directly or


indirectly—should always be the central concern in computing
-True

They bring technical expertise to ensure the quality and accuracy of that data, then
process, design and present it in ways to help people
-Data Analyst
One of the capability of computer is to perform logical operations
-True

The same with web developer but more focus on websites


-Web Developer ata
-Application Developer (wrong)

The CPU is a rigid rectangular card containing the circuitry that connects the
processor to the other hardware
-False

This principle, which concerns the quality of life of all people, affirms an
obligation of computing professionals, both individually and collectively, to use
their skills for the benefit of society, its members, and the environment
surrounding them.
-Contribute to Society and to Human Well-being, Acknowledging that all People
are Stakeholders in Computing

It is a software that allows users to enter, store, manipulate and print text.
-Word processing

It is an essential component of trustworthiness


-Honesty

A way of minimizing the use of paper in ACM


-PDF Readers

It is a software that permits users to work with numbers formatted in lines and
columns normally used for accounting jobs.
-Electronic spreadsheet
Individuals and organizations do not have the right to restrict access to their
systems
-False

A person who basically writes programming languages.


-Application Developer

A storage of all the important data and information of a company


-Database

The future of computing depends on both technical and ethical excellence


-True

It is either be a formal designation or arise informally from influence over others


-Leadership

Spreadsheet applications contain a lot of features that can help the ICT
professionals
-True
Pertaining to local, regional, national, and international laws and regulations that
professional worker must know
-code of ethics (wrong)
-policies siguro

Popular presentation software include MS PowerPoint, Keynote, and Impress.


-True
Input devices return processed data to the user or to another computer system.
-False

It is represented by a piece of paper that may contain digital information


represented by a hole in a predefined position
-Punch card

Computing professionals should not share technical knowledge with the public,
foster awareness of computing, and encourage understanding of computing.
-False

A computer can also be used for medicine


-True

WAN is also known as _______________.


-Wide Area Network

The client alone may decide to pursue the assignment with the professional after
additional time to acquire the necessary competencies
-False

An application that is used to sending messages or files electronically.


-email

When appropriate standards of care do not exist, computing professionals do not


have a duty to ensure they are developed
-False

An application such as Pages, and Writer are just some of the application used by
an ICT professional when creating documents.
-Word Processing

Two types of memory are CDROM and ROM


-False
A PDF or Portable Document Format is a file format that provides an electronic
image of text or text and graphics that looks like a printed document and can be
viewed, printed, and electronically transmitted.
-True

LAN is also known as _______________.


-Local Area Network

The more processor the computer has, the more it can do, and the faster it can
perform a certain task
-False

Leaders should not thoroughly investigate viable alternatives to removing support


for a legacy system
-False

Quiz 3!
Templates are designed documents that are blank except for preset margins, fonts,
paragraphs formats, headings, rulers, graphics, header, footers.
-False

This refers to the characteristics of the letters, symbols, and punctuation marks in
your document.
-Font

This is used to measure the font in points


- Type Size

This display the information related to the position in the documents, the page
count, and the status of keyboard keys.
- Status bar

The blinking insertion point is also known as?


-Cursor

It is an application that provides extensive tools for creating all kinds of text-based
documents.
-Word Processing Software

Which short-cut key is used to find the word organizational within the word file?
- CTRL + F

It display the list of commands and options


-Menu Bar
Document are also useful in arranging images
-False

You cannot embed sounds file in your document in much the same way that you
embed a graphic file.
-False

The amount of space between each line of the text in a paragraph.


-Line Spacing

It is a contiguous group of characters, words, lines, sentences or paragraphs in your


document that you mark for editing.
-Block

This is where we view the document


-Document Area / Document Window

When you text reaches the right edge of the screen it automatically moves the
insertion point to the next line. This feature is called word wrap.
-True

When you select text, it changes the color-becoming highlighted


-True

These are the white borders around the edge of the page. Every document has top,
bottom, left, and right margins.
- Margin

Changing an existing document is called editing the document.


-True

This determine how close each line of the paragraph comes to the margins
-Indent

Document dimension is also determined by the orientation of the paper.


-True

The process of formatting a document includes controlling the appearance of text,


the layout of text on the page, and the use of pictures and other graphic element.
-True

To deselect selected block of text click the mouse anywhere on the screen or press
any arrow key.
-True

Rows are effective formats for certain types of document.


-False

This show the position of text, tabs, margins, indents and other elements on the
page.
-Ruler
Refers to the orientation of the lines of a paragraph with respect to the margins.
-Alignment

This is a line that is drawn on one or more side of paragraph


-Border

This let the user scroll through a document that is too large to fit inside the
document area.
-scroll bar

It is known as not limited as text


-Word Processor

One single sentence is known as a paragraph.


-False
Under the INSERT menu bar, which toolbar you can find the shape tool?

Paragraph are line of text that run along the top and bottom of every page.
-False
It display the button of frequently used commands
-Toolbars

In which menu bar you can find the FONT setting in Microsoft word?
-Home

Long documents generally include header and footer or both.


-True

It is consists of pattern or color that is displayed as a background of the text in a


paragraph.
-Shading

This is used to control the appearance of the character.


-Type style

A documents are set up to fit 8 1/2 by 11 inch paper, a standard known as letter
size paper.
-True
Which formatting toolbar is used to change the line spacing of the selected
text/paragraph?

-
Under the INSERT menu bar, which toolbar you can find the text box?

-
Which formatting toolbar is used to change the text color to blue?

Which formatting toolbar is used to change the text/paragraph alignment to justify?

-
Which formatting toolbar is used to change the upper case into lower case.

Which formatting tool is used to highlight the texts?

Which formatting toolbar is used to add color to the shape?


Quiz 4

What is the new value if cell A3 is deleted


360

It is a software tool for entering, calculating, manipulating and analyzing sets of


numbers.
-Spreadsheet program

Spreadsheet programs have limited formats specifically for numbers.


-False

You can manually edit any part of a formula or a function, simply by selecting its
cell and making you changes in the formula bar.
-True

You can add new sheets to a workbook file or delete worksheets you no longer
need.
-True

This is any number you enter or number that results from a computation.
-Value

This tells you specific information about the worksheet.


-Status Bar
These are the values (often called cell reference) that the function uses in its
operation.
-Arguments
Which formatting toolbar is used to add a background color to a cell.

Which menu bar can you find the Charts?


-Insert

Spreadsheet software has no ability to generate charts based on numeric data


-False

The combination of the column letter and row number.


-Cell Address

This is used to perform specialized calculations automatically


-Function

This can be formatted in various ways


-Values and dates
This is the process of using spreadsheet to test how alternative scenarios affect
numeric results.
-Analysis

What is the cell address of number 55?


-A4

This help the user make data easier to understand.


-Charts

The intersection of row and column is known as?


-Cell

You can easily change one part of formula or a cell that it refers to see how that
changed affect the rest of the worksheets.
-True

Spreadsheets have a limited range of uses-form family budgets to corporate


earnings statements.
-False

Numbers cannot be shown with or without commas, decimal points.


-False

You add arguments within the parentheses of the functions.


-True
All spreadsheet allow you to do simple analysis.
-True

This find values for one or more cells that make the results of a formula equal to a
value you specify.
-Goal seeking

Which formatting toolbar is used merge the 1st column to the second column?

Which formatting toolbar is used a conditional formatting in excel file?


These are necessary part of most worksheets
-Dates
Which formatting toolbar is used change the alignment of the text to vertical,
horizontal etc.

A more sophisticated type of analysis is a table that automatically calculates the


results based on any number of assumptions.
-True
You cannot create a special effect by adding graphics, such as clip art, to your
worksheets.
-False

This counts many values are in a range of cells. Many functions are complex.
-COUNT
You can insert or delete rows and column
-True

This is also known as another data-analysis tool


-Sorting
Which formatting toolbar is used center the text along the cell?

Which formatting toolbar is used to add color to a selected column?

It is easier to perform calculations on the results even if not sorted.


-False

Like a word processors, a spreadsheet programs are extremely accommodating


when you want to make the desired changes.
-True
Spreadsheets do not offer a choice of fonts and type style, shadowed borders and
more.
-False

What is the formula in getting the value 450?


=SUM(A1:A5)

Worksheet can be collected into groups called?


-Workbook

A text entered in a worksheet is also known as?


-Label
This is known to be useful in analyzing data.
-Spreadsheet

MIDTERM
To navigate the worksheet, you need to understand its system of ______?
-Cell address

You cannot automate the presentation by setting a display time for each slide
-False

It is a special resizable boxes for text and graphical elements


-Special text boxes and frames
Each slide should focus on one unique topic and have no more than three to five
bullets points.
-True

This matches each word in a document against a built in dictionary containing


standard spelling.
-Spell Checker

What is the default layout of the slide when you insert/add a new slide?
-Title and Content

This can display slide to large audience


-From a Digital Projector

This bar tell the specific information about the worksheet.


-Status bar

It is easier and faster to work with one of the presentation programs many ______?
-Slide template

Spreadsheets can work with whole numbers, decimals, negative numbers, currency,
and other types of values, including scientific notation.
-True

Adding animation enables you to create a wide range of moods for your
presentation, therefore, it is important to choose colors carefully.
-False
It is a pre-designed document that already has coordinating fonts, a layout, and a
background.
-Presentation template

Images quality may suffer even if a PC-to-TV converter is used.


-True

You can move from one slide to the next slide by clicking the mouse button or by
pressing home button key.
-False

Regardless of the method you use to project your slides, navigating a slide show is
not a simple process.
-False

This is used for working with text


-Word Processor

These are small boxes (usually white or black in color) that you can drag to resize
the frame.
-Handles

The amount of space between each paragraph


-Paragraph Spacing
Formatting text in a presentation programs is not the same with formatting in word
processor.
-False

A textbox cannot hold multiple paragraphs, the paragraphs themselves are usually
quite short.
-False
Presentation programs have a built-in timing feature that you can use to determine
how long your slides are going to be on the screen
-True

Animations, sounds effects, and hyperlinks are cool, but they get annoying quickly.
-True

A special effect that causes slide to blend together when you switch from one slide
to the next.
-Transition

Presentation programs provide many of the features found in word processor (for
working with text), spreadsheet (for creating charts), and paint program (for
creating and editing simple graphics).
-True

This is an important tool for anyone who must present information to a group.
-Presentation Software
Presentation programs are used to produce slides- single screen images that contain
a combination of text, numbers, and graphics (such as charts, clip arts and
graphics), often on a colorful background.
-True

These are other common data analysis tools found in spreadsheets.


-Goal seeking and Sorting

Which short cut key is use to show the slide show in presentation mode?
-F5

Which animation type “Blinds” belongs to?


-Entrance effects

Is a predefined formula provided by the spreadsheet program.


-Functions

Work like spell checker, but they inspect you document for grammatical problems
-Grammar Checker

This can connect your computer to a standard television and view the PCs video
output on the television monitor.
-On a Television Screen.

This compare each sentence to a set of standard grammatical rules, notifies you if it
finds a potential problems, and providing grammatical correct options.
-Grammar Checker
Slides can be simple or sophisticated.
-True

This changes color as it moves from one part of the slide to another.
-Gradient fill

Which type of view where it allows the user to add a note?


-Note pages

Which formatting toolbar is use to change the color of the text?

-
This help you make sense of a worksheet contents.
-Labels

The text is formatted automatically, but you can easily reformat the text later, using
many of the same formatting options that are available in word processors.
-True
To add text to a textbox, simply click in the box at the place where you want to
insert text, and then type your text.
-True

This help you find errors in your spelling and grammar; they also may have tools
to help you find just the right word or avoid overusing certain words.
-Language tools

To insert clip art or another type of graphic in a slide, you can select an image from
your software collections of graphics or import an image file, such as scanned
photograph or clip art.
-True

This can include different types of text, charts, tables and graphics.
- Slide

This is used to make text pop up or crawl onto the screen, or to make your slides
"build" themselves by adding individual pieces of text that appear as you introduce
them to the audience.
-Transition (wrong)
-Animation(correct)
This is a pre-designed documents that are blank except for preset margins, fonts,
paragraphs formats, headings, rulers, graphics, header, footers.
-Template

A presentation program can contain a single slide or hundreds.


-True

This is a process of organizing the slides so that the information flows logically.
-Outlining

Paragraph in slide is usually in the form of tiles, headings, and lists.


-False

You cannot use the programs drawing tools to draw on a slide while it is being
displayed.
-False

Presentation programs do not have a built n paint tools also enable you to draw
simple graphics and add them to your slides.
-False

Which animation type “Scribble” belongs to?


-Path Animation
Which formatting tool is used to highlight the texts?

This is like a printed one-a source of alternatives words.


-Thesaurus

If your topic is interesting, and your presentation is crisp, your audience is more
likely to respond.
-True

This is used for creating and editing simple graphics.


-Paint Program
Rulers separate different elements and help hold the viewer attention or individual
parts of the slide.
-False

The active cell is indicated by a ______?


-Cell pointer

It is the process of combining a form letter with the contents of database


-Mail Merge

Which menu bar is used to change the design of the slide?


-Design

This provides powerful design tools that make it easy to anyone to outline, create,
edit, arrange and display complex slides presentations.
-Presentation program

Most presentation programs do not allow the user to save a set of slides as a group
in one file.
-False

This can be used to set up rows and columns of information in a document


-Table

Presentation software is an important tool for anyone who must present


information to a group.
-True
Which formatting VIEW is used to change the layout of the slides to Note pages?

Enable you to organize your slides content as you create them


- Outlining

This is used for creating charts.


-Spreadsheet

A set of noted added in the slide


-Annotation

The intersection of a column and row is called a _____?


-Cell

What type of layout is the first slide belongs to?


-Title Slide
You can create slides from scratch starting with _____?
-Blank slide
This can use cell references to use data in other cells.
Formula

This calculate numbers based on values or formulas in other cells.


-Formula

This can display your slides at the proper resolution and in large enough format for
a sizable audience to view comfortably.
-On a Large Format Monitor

Which formatting tool is used to change the paragraph type to numbering?

This is used to produce slides-single screen images that contain a combination of


text, numbers, and graphics (such as charts, clip arts and graphics), often on a
colorful background.
-Presentation Program

This display a definition of the selected word and a list of possible replacement.
-Thesaurus
A document area in spreadsheet is known as?
-Worksheet
This is useful in arranging images (such as clip art or photographs) on a page and
for arranging images and text in interesting ways.
-Table

These are used to perform calculations in the worksheets. Formulas can use cell
references to use data in other cells.
-Formula
2 out of 2 points

What bit pattern (base 2) does the follwing hexadecimal pattern represent

E1A

Selected Answer:

1110 0001 1010

Answers: 0110 0001 1011

0101 0001 1011

1110 0001 1010

0111 0010 11001

 Question 2

2 out of 2 points

Convert the following base 10 notation to its equivalent binary form

28
Selected Answer:

11100

Answers: 11001

11100

11011

11011

 Question 3

2 out of 2 points

Which of the following best describes the NOR operation?

Selected Answer:

An OR followed by a NOT

Answers: An XOR followed by a NOT

An OR followed by a NOT

A NOT followed by an OR

An AND followed by a NOT

 Question 4

2 out of 2 points

Use hexadecimal notation to represent the following bit pattern


01001001

Selected Answer:

49

Answers: 39

48

38

49

Response Feedback: q5 p 26

 Question 5

2 out of 2 points

What is the result of the following addition in binary notation

1011.01

+ 11.11

Selected Answer:

1111.00

Answers: 1110.00

1111.01

1111.00

1011.00

 Question 6
2 out of 2 points

Convert the following base 10 value into binary representation

4 3/4

Selected Answer:

100.11

Answers: 100.10

100.01

100.11

none of the above

 Question 7

2 out of 2 points

Convert the following binary representation to its equivalent base 10 notation

10.11

Selected Answer:

none of the above

Answers: 3 1/4

3 1/2

3 1/8

none of the above

 Question 8

2 out of 2 points
Which of the following bit patterns represents the value -9 in two's complement notation

Selected Answer:

1111 0111

Answers: 0001 1010

1111 0111

1000 1001

1111 1011

 Question 9

2 out of 2 points

Convert the following binary representation to its equivalent base 10 notation

10011

Selected Answer:

19

Answers: 17

18

16

19

 Question 10

2 out of 2 points
How many bits would be in memory of a computer with 2K of memory ?

Selected Answer:

16384

Answers: 65536

32768

16384

none of these

 Question 1
2 out of 2 points

Which of the following is not a role of a typical operating system?

Selected Answer:
Assist the computer user in the task of processing digital photographs

Answers: Control the allocation of the machine’s resources


Control access to the machine
Maintain records regarding files stored in mass storage

Assist the computer user in the task of processing digital photographs

 Question 2
2 out of 2 points

Which of the following would be a concern of the file manager in a multi-user computer system that would
not be a concern in a single-user system?

Selected Answer:
Maintain records regarding the ownership of files
Answers: Maintain records regarding the location of files

Maintain records regarding the ownership of files

Maintain records regarding the size of files

None of the above


 Question 3
2 out of 2 points

Which of the following statements is true?

Selected
Answer: neither A nor B
Answers: A Allowing several processes to share time in a multiprogramming
system is less efficient than executing each of them to completion one
after the other.

B The use of passwords provides an impenetrable safeguard

Both A and B

neither A nor B
 Question 4
2 out of 2 points

Multitasking in a computer with only one CPU is accomplished by a technique called

Selected Answer:
Multiprogramming
Answers: Bootstrapping
Batch processing

Multiprogramming
None of the above
 Question 5
2 out of 2 points
Which of the following components of an operating system handles the details associated with particular
peripheral equipment?

Selected Answer:
Device drivers
Answers:
Device drivers

File manager

Memory manager
None of the above
 Question 6
2 out of 2 points

Which of the following is a task that is not performed by the kernel of an operating system?

Selected Answer:
Communicate with the user

Answers:
Communicate with the user

Schedule processes

Allocate resources
Avoid deadlock
 Question 7
2 out of 2 points

Execution of an operating system is initiated by a program called :

Selected Answer:
Boot loader
Answers: Window manager
Scheduler

Boot loader
None of the above
 Question 8
2 out of 2 points

A section of a program that should be executed by at most one process at a time is called a
Selected Answer:
Critical region
Answers: Utility

Critical region
Privileged instruction

None of the above

 Question 9
2 out of 2 points

Which of the following components of an operating system maintains the directory system?

Selected Answer:
File manager
Answers: Device drivers

File manager
Memory manager
None of the above
 Question 10
2 out of 2 points

Which of the following would not require real-time processing?

Selected Answer:
Forecasting world-wide trend for the next five year period

Answers: Typing a document with a word processor


Navigation of an aircraft

Forecasting world-wide trend for the next five year period

Maintaining a airline reservation system

 Question 1
2 out of 2 points

Which of the following is not a role of a typical operating system?

Selected Answer:
Assist the computer user in the task of processing digital photographs

Answers: Control the allocation of the machine’s resources


Control access to the machine
Maintain records regarding files stored in mass storage

Assist the computer user in the task of processing digital photographs

 Question 2
2 out of 2 points

Which of the following would be a concern of the file manager in a multi-user computer system that would
not be a concern in a single-user system?

Selected Answer:
Maintain records regarding the ownership of files

Answers: Maintain records regarding the location of files

Maintain records regarding the ownership of files

Maintain records regarding the size of files

None of the above


 Question 3
2 out of 2 points
Which of the following statements is true?

Selected
Answer: neither A nor B
Answers: A Allowing several processes to share time in a multiprogramming
system is less efficient than executing each of them to completion one
after the other.

B The use of passwords provides an impenetrable safeguard

Both A and B

neither A nor B
 Question 4
2 out of 2 points

Multitasking in a computer with only one CPU is accomplished by a technique called

Selected Answer:
Multiprogramming
Answers: Bootstrapping
Batch processing

Multiprogramming
None of the above
 Question 5
2 out of 2 points

Which of the following components of an operating system handles the details associated with particular
peripheral equipment?

Selected Answer:
Device drivers
Answers:
Device drivers

File manager
Memory manager
None of the above
 Question 6
2 out of 2 points

Which of the following is a task that is not performed by the kernel of an operating system?

Selected Answer:
Communicate with the user

Answers:
Communicate with the user

Schedule processes

Allocate resources
Avoid deadlock
 Question 7
2 out of 2 points

Execution of an operating system is initiated by a program called :

Selected Answer:
Boot loader
Answers: Window manager

Scheduler

Boot loader
None of the above
 Question 8
2 out of 2 points

A section of a program that should be executed by at most one process at a time is called a
Selected Answer:
Critical region
Answers: Utility

Critical region
Privileged instruction

None of the above

 Question 9
2 out of 2 points

Which of the following components of an operating system maintains the directory system?

Selected Answer:
File manager
Answers: Device drivers

File manager
Memory manager
None of the above
 Question 10
2 out of 2 points

Which of the following would not require real-time processing?

Selected Answer:
Forecasting world-wide trend for the next five year period

Answers: Typing a document with a word processor

Navigation of an aircraft

Forecasting world-wide trend for the next five year period

Maintaining a airline reservation system


 Question 1
2 out of 2 points

In which of the following locations is information most readily available for manipulation by the CPU?

Selected Answer:
General-purpose registers
Answers: Cache memory
Main memory
Mass storage

General-purpose registers
 Question 2
2 out of 2 points

Write the answer to the following logic problem.


10101010
OR 11110000

Selected Answer:
11111010
Answers:
11111010
11011011
01011010
11011010
 Question 3
2 out of 2 points

An ARM based processor is an example of what kind of computer architecture?

Selected Answer:
RISC
Answers: DSL
CISC

RISC
Pentium
 Question 4
2 out of 2 points

Which of the following is not a form of parallel processing?


Selected Answer:
SISD
Answers:
SISD
MIMD
SIMD
All are examples of parallel processing
 Question 5
2 out of 2 points

Write the answer to the following logic problem.

10101010
XOR 11110000

Selected Answer:
01011010
Answers: 01011110

01011010
11011010
01001010
 Question 6
2 out of 2 points

Which of the following instructions falls in the category of data transfer instructions?

Selected Answer:
LOAD
Answers:
LOAD
AND
ROTATE
JUMP
 Question 7
2 out of 2 points

Which of the following is not an activity performed entirely within a CPU?


Selected Answer:
Fetch instructions
Answers:
Fetch instructions
Perform Boolean operations
Perform arithmetic operations
Move data between registers
 Question 8
2 out of 2 points

Which of the following is not contained in a CPU?

Selected Answer:
Memory cell
Answers: Instruction register
Program counter
General-purpose register

Memory cell
 Question 9
2 out of 2 points

What is the answer to the following logic problem.


10101010
AND 11110000

Selected Answer:
1010 0000
Answers:
1010 0000
1110 0001

1001 0000
1101 0010
 Question 10
2 out of 2 points
Which of the following instructions does not fall in the category of arithmetic/logic instructions?
Selected Answer:
JUMP
Answers: ROTATE
ADD
OR

JUMP
 Question 11
2 out of 2 points

When comparing computer machines, clock speed rather than a benchmark, is a more reliable
indicator of speed
Selected Answer: Disagree
Answers: Agree
Disagree

 Question 1
2 out of 2 points

Which of the following is not a role of a typical operating system?

Selected Answer:
Assist the computer user in the task of processing digital photographs

Answers: Control the allocation of the machine’s resources


Control access to the machine
Maintain records regarding files stored in mass storage

Assist the computer user in the task of processing digital photographs

 Question 2
2 out of 2 points

Which of the following would be a concern of the file manager in a multi-user computer system that would
not be a concern in a single-user system?

Selected Answer:
Maintain records regarding the ownership of files

Answers: Maintain records regarding the location of files

Maintain records regarding the ownership of files

Maintain records regarding the size of files

None of the above


 Question 3
2 out of 2 points

Which of the following statements is true?

Selected
Answer: neither A nor B
Answers: A Allowing several processes to share time in a multiprogramming
system is less efficient than executing each of them to completion one
after the other.

B The use of passwords provides an impenetrable safeguard

Both A and B

neither A nor B
 Question 4
2 out of 2 points

Multitasking in a computer with only one CPU is accomplished by a technique called

Selected Answer:
Multiprogramming
Answers: Bootstrapping
Batch processing

Multiprogramming
None of the above
 Question 5
2 out of 2 points

Which of the following components of an operating system handles the details associated with particular
peripheral equipment?

Selected Answer:
Device drivers
Answers:
Device drivers

File manager

Memory manager
None of the above
 Question 6
2 out of 2 points

Which of the following is a task that is not performed by the kernel of an operating system?

Selected Answer:
Communicate with the user

Answers:
Communicate with the user

Schedule processes

Allocate resources
Avoid deadlock
 Question 7
2 out of 2 points

Execution of an operating system is initiated by a program called :

Selected Answer:
Boot loader
Answers: Window manager

Scheduler

Boot loader
None of the above
 Question 8
2 out of 2 points

A section of a program that should be executed by at most one process at a time is called a
Selected Answer:
Critical region
Answers: Utility

Critical region
Privileged instruction

None of the above

 Question 9
2 out of 2 points

Which of the following components of an operating system maintains the directory system?

Selected Answer:
File manager
Answers: Device drivers

File manager
Memory manager
None of the above
 Question 10
2 out of 2 points

Which of the following would not require real-time processing?

Selected Answer:
Forecasting world-wide trend for the next five year period
Answers: Typing a document with a word processor

Navigation of an aircraft

Forecasting world-wide trend for the next five year period

Maintaining a airline reservation system

 Question 1
2 out of 2 points

Which of the following is not a role of a typical operating system?

Selected Answer:
Assist the computer user in the task of processing digital photographs

Answers: Control the allocation of the machine’s resources


Control access to the machine
Maintain records regarding files stored in mass storage

Assist the computer user in the task of processing digital photographs

 Question 2
2 out of 2 points

Which of the following would be a concern of the file manager in a multi-user computer system that would
not be a concern in a single-user system?

Selected Answer:
Maintain records regarding the ownership of files

Answers: Maintain records regarding the location of files

Maintain records regarding the ownership of files

Maintain records regarding the size of files


None of the above
 Question 3
2 out of 2 points

Which of the following statements is true?

Selected
Answer: neither A nor B
Answers: A Allowing several processes to share time in a multiprogramming
system is less efficient than executing each of them to completion one
after the other.

B The use of passwords provides an impenetrable safeguard

Both A and B

neither A nor B
 Question 4
2 out of 2 points

Multitasking in a computer with only one CPU is accomplished by a technique called

Selected Answer:
Multiprogramming
Answers: Bootstrapping
Batch processing

Multiprogramming
None of the above
 Question 5
2 out of 2 points

Which of the following components of an operating system handles the details associated with particular
peripheral equipment?

Selected Answer:
Device drivers
Answers:
Device drivers
File manager

Memory manager
None of the above
 Question 6
2 out of 2 points

Which of the following is a task that is not performed by the kernel of an operating system?

Selected Answer:
Communicate with the user

Answers:
Communicate with the user

Schedule processes

Allocate resources
Avoid deadlock
 Question 7
2 out of 2 points

Execution of an operating system is initiated by a program called :

Selected Answer:
Boot loader
Answers: Window manager

Scheduler

Boot loader
None of the above
 Question 8
2 out of 2 points
A section of a program that should be executed by at most one process at a time is called a
Selected Answer:
Critical region
Answers: Utility

Critical region
Privileged instruction

None of the above

 Question 9
2 out of 2 points

Which of the following components of an operating system maintains the directory system?

Selected Answer:
File manager
Answers: Device drivers

File manager
Memory manager
None of the above
 Question 10
2 out of 2 points

Which of the following would not require real-time processing?

Selected Answer:
Forecasting world-wide trend for the next five year period

Answers: Typing a document with a word processor

Navigation of an aircraft

Forecasting world-wide trend for the next five year period

Maintaining a airline reservation system


Quiz Review – Computing Fundamentals
Binary Data: A data unit with only two possible states: 0 or 1, up or down, on or off, etc…
Low-Level vs High-Level Programming
Low level code is closer to the language the machine understands (binary code). Higher level
languages are more abstract and
human-readable. In general, more can be accomplished with fewer lines of high-level code.
Machine Code: The code that is actually executed by the CPU. All 0s and 1s, but sometimes
represented as a series of letters and
numbers.
Human-Readable Code: Code that can be naturally read by humans. Looks more like English.
Microchip Transistor: Basically, a microscopic electronic switch that is the building block of
modern computers.
HTML: Hypertext Markup Language. Used to create webpages.
CSS: Cascading Style Sheets. Used to style webpages.
Motherboard: The central component of a computing system, which allows communication
between other electronic components
of the system.
CPU: Central Processing Unit. The “brain” of the computer. Performs calculations.
RAM: Random-Access Memory. The computer’s working memory. Running program data is
stored here.
GPU: Graphics Processor Unit. A computer processor which is specialized to accelerate the
creation of images to output to a display.
Sound Card: Manages input and output of audio signals to and from a computer.
PSU: Power Supply Unit. Distributes power to all of the computer’s different components.
Hard Drive: A data storage device. The computer’s “permanent” memory.
HDD vs SSD
Hard Disk Drives use a spinning metal disk, which Solid State Drives have no moving parts, and
store data on integrated circuits.
The 3-2-1 Rule
Have 3 copies of data that you care about, in 2 different mediums, 1 of which is in a remote
location.

Program information does not consist of


Select one:
a. Data
b. text files
c. Instructions
Which of these statements about primary memory is not true?
Select one:
a. Primary memory is also volatile
b. RAM is a primary memory
c. Primary memory transfers information at lower speed than hard
disks
d. Primary memory holds the information accessed by the CPU.
Which of these definitions are true about an instruction of a program?
Select one:
a. Each program instruction consists of an operation and operands
b. The addresses are either address names or ROM addresses only
c. Operation code of an instruction was depended on the specific
CPU.
d. Each program instruction consists of an arithmetic expression only.
C language is
Select one or more:
a. Case-sensitive language
b. a perfect language
c. Safe language
d. a powerful language
e. an English-like language
f. a simple language
(1) One byte consists of 4 nibbles.
(2) One nibble consists of 2 consecutive bits
The statement (1) is ...., (2) is .....
Select one:
a. false, false
b. true, true
c. true, false
d. false, true

 11th dimension - The 11th dimension is a characteristic of space-time that has been
proposed as a possible answer to questions that arise in superstring theory.

 2001 - Midnight UTC on January 1, 2001 marked the beginning of the third millennium
on the Western world's Gregorian calendar.

 3-tier application architecture - A 3-tier application architecture is a modular client-


server architecture that consists of a presentation tier, an application tier and a data tier.

 42 (h2g2, meaning of life, The Hitchhiker's Guide to the Galaxy) - In Douglas Adams'
"The Hitchhiker's Guide to the Galaxy," 42 is the number from which all meaning ("the
meaning of life, the universe, and everything") can be derived.

 99.999 (Five nines or Five 9s) - In computers, 99.

 A-weighted decibels (dBA, or dBa, or dB(a)) - A-weighted decibels, abbreviated dBA,


or dBa, or dB(a), are an expression of the relative loudness of sounds in air as perceived by
the human ear.
 abandonware - Abandonware is computer software (such as an operating system, word
processor, interactive game, or audio file) that is no longer marketed or distributed by the
company that created it, but is obtainable from some other source.

 absolute truth - In general, absolute truth is whatever is always valid, regardless of


parameters or context.

 access method - In computing, an access method is a program or a hardware mechanism


that moves data between the computer and an outlying device such as a hard disk (or other
form of storage) or a display terminal.

 accumulator - An accumulator is a register for short-term, intermediate storage of


arithmetic and logic data in a computer's CPU (central processing unit).

 acronym - An acronym (pronounced AK-ruh-nihm, from Greek acro- in the sense of


extreme or tip and onyma or name) is an abbreviation of several words in such a way that the
abbreviation itself forms a word.

 Ada Lovelace (Augusta Ada King) - Augusta Ada King, Countess of Lovelace, was an
English mathematician who is credited with being the first computer programmer.

 adaptive enterprise (or adaptive organization) - An adaptive enterprise (or adaptive


organization) is a corporation, institution, or agency in which the business demand and the IT
(information technology) supply are matched and synchronized at all times.

 address bar - The address bar is the familiar text field at the top of a web browser’s
graphical user interface (GUI) that displays the name or the URL (uniform resource locator)
of the current web page.

 address space - Address space is the amount of memory allocated for all possible
addresses for a computational entity, such as a device, a file, a server, or a networked
computer.

 addressability - Addressability is the capacity for an entity to be targeted and found.

 affective computing (emotion AI) - Affective computing, also known as AC or emotion


AI, is an area of study within cognitive computing and artificial intelligence that is concerned
with gathering data from faces, voices and body language to measure human emotion.
 agentless - Agentless, in computing, refers to operations where no service, daemon or
process (AKA an agent) needs to run in the background on the machine the action is being
performed on.

 agnostic - Agnostic, in an information technology (IT) context, refers to something that


is generalized so that it is interoperable among various systems.

 AIBO (Artificial Intelligence roBOt) - AIBO (pronounced eye-bow) is an entertainment


robot designed by Sony.

 algorithm - An algorithm (pronounced AL-go-rith-um) is a procedure or formula for


solving a problem, based on conducting a sequence of specified actions.

 alphanumeric (alphameric) - Alphanumeric, also referred to as alphameric, is a term


that encompasses all of the letters and numerals in a given language set.

 AltaVista - AltaVista is an Internet search engine.

 anacronym - An anacronym is an acronym or an abbreviation so old or familiar that no


one remembers what its letters stand for, such as BASIC or COBOL.

 analog computing - Analog computing is a term used by Paul Saffo of the Institute for
the Future in Palo Alto, California, to describe silicon-based microsensors that sense and
react to external (natural) stimuli in something that approximates the rhythm of reality rather
than the "artificial" binary behavior of digital computing.

 Analytical Engine - The Analytical Engine was, or would have been, the world's first
general-purpose computer.

 angstrom (angstrom unit) - The angstrom, also known as the angstrom unit, is a
measure of displacement equal to 0.

 anisotropic filtering (AF) - Anisotropic filtering (AF) is a feature of some video cards
that sharpens the details of the fading-away part of a 3D object that recedes into the distance.

 anode - An anode is the electrode in a polarized electrical device through which current
flows in from an outside circuit.
 anthropomorphism - Anthropomorphism (from the Greek anthrôpos, for human, and
morphé, for shape) is the tendency for people to think of other animals or inanimate objects
as having human-like characteristics.

 Antikythera mechanism (2000-year-old computer) - The Antikythera mechanism is an


analog computer that was used by the Greeks more than 2000 years ago to locate and predict
the positions of celestial objects.

 antimatter - Antimatter is any substance that, when combined with an equal amount of
matter, results in the complete and direct conversion of all substance to energy.

 any key - The phrase "any key," which frequently appears in the direction to computer
users to "Press any key," is reportedly a source of confusion to many.

 app - App is an abbreviated form of the word "application.

 Apple - Apple is a prominent hardware and software company best known for its series
of personal computers, the iPod and its innovative marketing strategies for its products.

 application program interface (API) - An application program interface (API) is code


that allows two software programs to communicate with each other.

 approximate equality - Approximate equality is a concept used primarily in physics and


engineering, and also occasionally in mathematics.

 arachniography - An arachniography (pronounced uh-RAK-nee-AH-gruf-ee) is a


bibliography of Web pages.

 Archie - Archie is a program that allows you to search the files of all the Internet FTP
servers that offer anonymous FTP.

 architecture - In information technology, especially computers and more recently


networks, architecture is a term applied to both the process and the outcome of thinking out
and specifying the overall structure, logical components, and the logical interrelationships of
a computer, its operating system, a network, or other conception.
 arithmetic mean - The arithmetic mean, also called the average or average value, is the
quantity obtained by summing two or more numbers or variables and then dividing by the
number of numbers or variables.

 artificial neural network (ANN) - In information technology (IT), a neural network is a


system of hardware and/or software patterned after the operation of neurons in the human
brain.

 artificial superintelligence (ASI) - Artificial superintelligence (ASI) is software-based


intellectual powers that surpass human ability across almost all conceivable categories and
fields of endeavor.

 Asimov's Three Laws of Robotics - Science-fiction author Isaac Asimov is often given
credit for being the first person to use the term robotics in a short story composed in the
1940s.

 ASN.1 (Abstract Syntax Notation One) - ASN.1 (Abstract Syntax Notation One) is a
standard way to describe a message (a unit of application data) that can be sent or received in
a network.

 aspect ratio - Aspect ratio is an image projection attribute that describes the proportional
relationship between the width of an image and its height.

 assembly line - An assembly line is a manufacturing process in which interchangeable


parts are assembled as they are passed in a direct line from workstation to workstation until a
final product is produced.

 assistive technology (adaptive technology) - Assistive technology is a set of devices


intended to help people who have disabilities.

 asymmetric communications - In telecommunications, the term asymmetric (also


asymmetrical or non-symmetrical) refers to any system in which the data speed or quantity
differs in one direction as compared with the other direction, averaged over time.

 Asynchronous - In general, asynchronous -- pronounced ay-SIHN-kro-nuhs, from Greek


asyn-, meaning "not with," and chronos, meaning "time" -- is an adjective describing objects
or events that are not coordinated in time.
 attosecond - An attosecond is one quintillionth (10 -18) of a second and is a term used in
photon research.

 audio noise - In audio, noise is generally any unpleasant sound and, more technically,
any unwanted sound that is unintentionally added to a desired sound.

 audit trail - In accounting, an audit trail is the sequence of paperwork that validates or
invalidates accounting entries.

 augmented intelligence - Augmented intelligence is an alternative conceptualization of


artificial intelligence that focuses on AI's assistive role, emphasizing the fact that it is
designed to supplement human intelligence rather than replace it.

 automagically - Automagically is a term used when the user either doesn't want to go
into the technical details of something or doesn't know the details but does know what the
end result has to be.

 autonomic computing - Autonomic computing is a self-managing computing model


named after, and patterned on, the human body's autonomic nervous system.

 AVI file (Audio Video Interleaved file) - An AVI (Audio Video Interleaved) file is a
sound and motion picture file that conforms to the Microsoft Windows Resource Interchange
File Format (RIFF) specification.

 azimuth and elevation - Azimuth and elevation are angles used to define the apparent
position of an object in the sky, relative to a specific observation point.

 backslash - The backslash ( \ ) is a typographic and/or keyboard mark that is widely used
in programming languages and other computing contexts.

 backup storage device - A data storage device for backup makes copies of data actively
in use.

 balanced scorecard - The balanced scorecard is a management system aimed at


translating an organization's strategic goals into a set of performance objectives that, in turn,
are measured, monitored and changed if necessary to ensure that the organization's strategic
goals are met.
 bar code (or barcode) - A bar code (often seen as a single word, barcode) is the small
image of lines (bars) and spaces that is affixed to retail store items, identification cards, and
postal mail to identify a particular product number, person, or location.

 barcode data (point-of-sale data, POS data) - Barcode data (sometimes called point-of-
sale data) is information from barcodes that is automatically gathered as a consumer's
purchases are put through a check-out.

 bare metal restore - In disaster recovery, a bare metal restore is the process of
reformatting a computer from scratch after a catastrophic failure.

 baseband - Describes a telecommunication system in which information is carried in


digital form on a single unmultiplexed signal channel on the transmission medium.

 Bayesian logic - Named for Thomas Bayes, an English clergyman and mathematician,
Bayesian logic is a branch of logic applied to decision making and inferential statistics that
deals with probability inference: using the knowledge of prior events to predict future events.

 benchmark - A benchmark is a point of reference by which something can be measured.

 bespoke - Bespoke (pronounced bee-SPOHK) is a term used in the United Kingdom and
elsewhere for an individually- or custom-made product or service.

 BetterWhois - BetterWhois, named after the original whois, lets you look up registration
information from all Internet domain name registrars at the same time.

 binary - Binary describes a numbering scheme in which there are only two possible
values for each digit: 0 and 1.

 binary search (dichotomizing search) - A binary search, also called a dichotomizing


search, is a digital scheme for locating a specific object in a large set.

 binary tree - A binary tree is a method of placing and locating files (called records or
keys) in a database, especially when all the data is known to be in random access memory
(RAM).

 binary-safe function - A binary-safe function is a function or operation that can be


performed on a binary file without modifying the contents of the file.
 biochip - A biochip is a collection of miniaturized test sites (microarrays) arranged on a
solid substrate that permits many tests to be performed at the same time in order to achieve
higher throughput and speed.

 bioinformatics - Bioinformatics is the science of developing computer databases and


algorithms for the purpose of speeding up and enhancing biological research.

 biotechnology (biotech) - Biotechnology is the use of biological processes, organisms,


or systems to manufacture products intended to improve the quality of human life.

 bit (binary digit) - A bit (short for binary digit) is the smallest unit of data in a computer.

 bit map - A bit map (often spelled "bitmap") defines a display space and the color for
each pixelor "bit" in the display space.

 bit padding - Bit padding is the addition of one or more extra bits to a transmission or
storage unit to make it conform to a standard size.

 bitwise - Bitwise operations manipulate data at the bit level rather than with bytes or
larger units of data, as is more common.

 black box (black box testing) - Black box testing assesses a system solely from the
outside, without the operator or tester knowing what is happening within the system to
generate responses to test actions.

 black hole - The term "black hole" is sometimes used to refer to an imaginary place
where objects, files, or funds go when they get lost for no apparent reason.

 bloviate - To bloviate (pronounced BLOW-vee-ayt) is to speak or write overexpansively


or with undue grandiosity.

 blue screen of death (BSOD) - The blue screen of death (BSOD), is the informal name
given by users to the Windows general protection fault (GPF) error.

 boot - To boot (as a verb; also "to boot up") a computer is to load an operating system
into the computer's main memory or random access memory (RAM).
 boot sector - A boot sector is a specially assigned section of a storage drive containing
the files required to start the operating system (OS) and other bootable programs such as
antivirus programs, drive partitioning software, backup tools and diagnostic disks.

 Bootstrap - Bootstrap is a free and open source front-end development framework for
the creation of websites and web apps.

 bottleneck - A bottleneck is a stage in a process that causes the entire process to slow
down or stop.

 boustrophedon - Boustrophedon (from Greek for ox-turning) is writing that proceeds in


one direction in one line (such as from left to right) and then in the reverse direction in the
next line (such as from right to left).

 brain dump - A brain dump (sometimes spelled braindump, or brain-dump) is a


complete transfer of accessible knowledge about a particular subject from your brain to some
other storage medium, such as paper or your computer's hard drive.

 brain-computer interface (BCI) - Brain-computer interface (BCI) is a collaboration


between a brain and a device that enables signals from the brain to direct some external
activity, such as control of a cursor or a prosthetic limb.

 brand - A brand is a product, service, or concept that is publicly distinguished from other
products, services, or concepts so that it can be easily communicated and usually marketed.

 brick server - A brick server is a compact computer server module without a chassis that
can come in various processor, RAM, I/O, and storage configurations and is designed to fit
into rack locations similar to those for blade servers.

 broadband - In general, broadband refers to telecommunication in which a wide band of


frequencies is available to transmit information.

 broadcast - In general, to broadcast (verb) is to cast or throw forth something in all


directions at the same time.

 broker - A broker is someone or something that acts as an intermediary third party,


managing transactions between two other entities.
 bubble help - In a computer user interface, bubble help is text information that is
displayed in a small balloon or box when a computer user moves the mouse cursor over a
selected user interface element, such as the iconic items in a task bar.

 buffer - A buffer is a data area shared by hardware devices or program processes that
operate at different speeds or with different sets of priorities.

 burn - Burn is a colloquial term meaning to write content to a CD, DVD, or other
recordable disc.

 burn rate - In venture investing and new company development, the burn rate is the rate
at which a new company is spending its capital while waiting for profitable operation.

 burst - Burst is a term used in a number of information technology contexts to mean a


specific amount of data sent or received in one intermittent operation.

 burst SRAM (SynchBurst SRAM) - Burst SRAM is used as the external L1 and L2
memory for the Pentium microprocessor chipset.

 business impact analysis (BIA) - Business impact analysis (BIA) is a systematic process
to determine and evaluate the potential effects of an interruption to critical business
operations as a result of a disaster, accident or emergency.

 business process - A business process is an activity or set of activities that can


accomplish a specific organizational goal.

 business process outsourcing (BPO) - Business process outsourcing, or BPO, is a


business practice in which one organization hires another company to perform a process task
that the hiring organization requires for its own business to operate successfully.

 business process reengineering (BPR) - Business process reengineering (BPR) is an


approach to change management in which the related tasks required to obtain a specific
business outcome are radically redesigned.

 business service provider (BSP) - A business service provider (BSP) is a company that
rents third-party software application packages to their customers.
 butterfly effect - The butterfly effect is the notion that a small initial factor may have a
part in determining greater and unpredictable changes in large, complex systems.

 BYOT (bring your own technology) - Bring your own technology (BYOT) is a policy
that allows employees or students to use their own personal electronic devices at work or
scho.

 byte - In most computer systems, a byte is a unit of data that is eight binary digits long.

 bytecode - Bytecode is computer object code that is processed by a program, usually


referred to as a virtual machine, rather than by the "real" computer machine, the hardware
processor.

 cache (computing) - A cache -- pronounced CASH -- is hardware or software that is


used to store something, usually data, temporarily in a computing environment.

 cache memory - Cache memory, also called CPU memory, is high-speed static random
access memory (SRAM) that a computer microprocessor can access more quickly than it can
access regular random access memory (RAM).

 caching - Caching (pronounced “cashing”) is the process of storing data in a cache.

 calculator - A calculator is a device that performs arithmetic operations on numbers.

 calibration - In information technology and other fields, calibration is the setting or


correcting of a measuring device or base level, usually by adjusting it to match or conform to
a dependably known and unvarying measure.

 calm technology - In computing, calm technology aims to reduce the "excitement" of


information overload by letting the user select what information is at the center of their
attention and what information is peripheral.

 campus - In telecommunications, a campus is a physically contiguous association of


locations such as several adjacent office buildings.

 canonical - In programming, canonical means "according to the rules.


 capacity planning - In information technology, capacity planning is the science and art
of estimating the space, computer hardware, software and connection infrastructure resources
that will be needed over some future period of time.

 cardinality - The term cardinality refers to the number of cardinal (basic) members in a
set.

 Cartesian coordinates (rectangular coordinates) - Cartesian coordinates, also called


rectangular coordinates, provide a method of rendering graphs and indicating the positions of
points on a two-dimensional (2D) surface or in three-dimensional (3D) space.

 catalog - In computing, a catalog is a directory of information about data sets, files, or a


database.

 cathode - A cathode is the metallic electrode through which current flows out in a
polarized electrical device.

 cellspace - According to writer David S.

 cellular automaton (CA) - A cellular automaton (CA) is a collection of cells arranged in


a grid, such that each cell changes state as a function of time according to a defined set of
rules that includes the states of neighboring cells.

 certification - In information technology as in other fields such as teaching, accounting,


and acupuncture, certification is a formal process of making certain that an individual is
qualified in terms of particular knowledge or skills.

 change management - Change management is a systematic approach to dealing with the


transition or transformation of an organization's goals, processes or technologies.

 chaos theory - Chaos theory is the study of nonlinear dynamics, in which seemingly
random events are actually predictable from simple deterministic equations.

 character - In information technology, a character is a printable symbol having phonetic


or pictographic meaning and usually forming part of a word of text, depicting a numeral, or
expressing grammatical punctuation.
 Charles Babbage - If John von Neumann is the father of modern computing, then the
English mathematician and inventor Charles Babbage can be considered its grandfather.

 cheat sheet - A cheat sheet is a piece of paper with information written down on it that an
unethical person might create if they weren't prepared for a test.

 check digit (checksum character) - A check digit, also known as a checksum character,
is the number located on the far right side of a bar code.

 checksum - A checksum is a value that represents the number of bits in a transmission


message and is used by IT professionals to detect high-level errors within data transmissions.

 CIO (Chief Information Officer) - A chief information officer (CIO) is the corporate
executive in charge of information technology (IT) strategy and implementation.

 ciphertext - Ciphertext is encrypted text.

 citation style guides - A number of generally recognized authorities and organizations


offer guidance about how to cite sources when writing an academic or journalistic paper.

 classical computing - Classical computing is the typical type of binary data processing in
traditional types of processors including x86, ARM and other bit based computer systems.

 Claude Shannon - Claude Elwood Shannon, a mathematician born in Gaylord, Michigan


(U.

 clean electricity - Clean electricity is electrical power that is free from voltage spikes and
drops.

 clean install - A clean install is a software installation in which any previous version is
removed.

 clean room - A clean room (or cleanroom) is an enclosed space in which airborne
particulates, contaminants, and pollutants are kept within strict limits.

 click - In Web advertising, a click is an instance of a user pressing down (clicking) on a


mouse button in an ad space.
 client - A client is the requesting program or user in a client/server relationship.

 client-server model (client-server architecture) - Client-server is a relationship in


which one program (the client) requests a service or resource from another program (the
server).

 clipboard - A clipboard is a temporary storage area for data that the user wants to copy
from one place to another.

 clock cycle - In a computer, the clock cycle is the time between two adjacent pulses of
the oscillator that sets the tempo of the computer processor.

 clock speed - In a computer, clock speed refers to the number of pulses per second
generated by an oscillator that sets the tempo for the processor.

 Clonezilla - Clonezilla is a free open source disk cloning application based on Debian.

 closed captions - Closed captions are a text version of the spoken part of a television,
movie, or computer presentation.

 CMOS (complementary metal-oxide semiconductor) - CMOS (complementary metal-


oxide semiconductor) is the semiconductor technology used in the transistors that are
manufactured into most of today's computer microchips.

 CMYK (cyan, magenta, yellow, key) - CMYK is a scheme for combining primary
pigments.

 co-branding - Co-branding is the practice of using multiple brand names together on a


single product or service.

 code review - Code review is a phase in the computer program development process in
which the authors of code, peer reviewers, and perhaps quality assurance reviewers get
together to review code, line by line.

 codebase (code base) - A codebase (sometimes spelled as two words, code base) is the
complete body of source code for a given software program or application.
 coefficient - In a mathematical equation, a coefficient is a constant by which a variable is
multiplied.

 cold backup (offline backup) - Cold backups are ideal for disaster recovery because
they protect important data.

 cold buffer - In data processing, a cold buffer is a buffer (segment of computer memory
reserved for temporary data storage) that hasn't been used or accessed recently.

 cold fusion - Not to be confused with ColdFusion, a software product, cold fusion is a
hypothetical process in which hydrogen fusion supposedly occurs at room temperature.

 cold/warm/hot server - In the backup and recovery of a computer server, a cold server is
a backup server whose purpose is solely to be there in case the main server is lost.

 collaborative robot (cobot) - A collaborative robot, also known as a cobot, is a robot


that is capable of learning multiple tasks so it can assist human beings.

 combinatorial logic - Combinatorial logic is a concept in which two or more input states
define one or more output states, where the resulting state or states are related by defined
rules that are independent of previous states.

 community computing - Community computing is a resource-sharing model in which


users are provided with free or low-cost computer and Internet access.

 community technology center (CTC) - A community technology center (CTC) is a


facility that provides free or low-cost computer access, and sometimes training, to people
lacking the resources to have a computer in their home.

 compaction - In a data center, compaction is the reduction or consolidation of hardware


to make better use of physical floor space.

 complex system - A complex system is an arrangement of a great number of related but


various elements with intricate interconnections.

 compound - In chemistry, a compound is a substance that results from a combination of


two or more different chemical elements, in such a way that the atoms of the different
elements are held together by chemical bonds that are difficult to break.
 compute-intensive - Compute-intensive is a term that applies to any computer
application that demands a lot of computation, such as meteorology programs and other
scientific applications.

 computer - A computer is a device that accepts information (in the form


of digitalized data) and manipulates it for some result based on a program, software, or
sequence of instructions on how the data is to be processed.

 computer forensics (cyber forensics) - Computer forensics is the application of


investigation and analysis techniques to gather and preserve evidence from a particular
computing device in a way that is suitable for presentation in a court of law.

 computer hardware - Computer hardware is a collective term used to describe any of


the physical components of an analog or digital computer.

 computer hardware chart - This handy computer hardware quick look-up was designed
by Sonic84.

 Computer History Museum - The Computer History Museum is an institution dedicated


to the preservation of artifacts and information related to the development of computers.

 computer operator - A computer operator is the person responsible for monitoring and
controlling computer systems especially mainframe computer systems in a company or
organization.

 computer pidgin language (CPL) - Computer pidgin language (CPL) is an artificial


language designed to facilitate speech recognition between humans and computers.

 computer room air conditioning unit (CRAC) - A computer room air conditioning
(CRAC) unit is a device that monitors and maintains the temperature, air distribution and
humidity in a network room or data center.

 computer-based training (CBT) - Computer-based training (CBT) is any course of


instruction whose primary means of delivery is a computer.

 computer-intensive - Computer-intensive is a term that applies to any computing


application that requires the resources of a lot of computers, such as grid computing.
 concatenation (concatenate, concatenating) - Concatenation (from Latin concatenare,
to link together) is taking two or more separately located things and placing them side-by-
side next to each other so that they can now be treated as one thing.

 concurrent processing - Concurrent processing is a computing model in which multiple


processors execute instructions simultaneously for better performance.

 configuration - Generally, a configuration is the arrangement - or the process of making


the arrangement - of the parts that make up a whole.

 connection - In telecommunication and computing in general, a connection is the


successful completion of necessary arrangements so that two or more parties (for example,
people or programs) can communicate at a long distance.

 connectionless - In telecommunication, connectionless describes communication


between two network end points in which a message can be sent from one end point to
another without prior arrangement.

 conservation of angular momentum - Conservation of angular momentum is a physical


property of a spinning system such that its spin remains constant unless it is acted upon by an
external torque; put another way, the speed of rotation is constant as long as net torque is
zero.

 contact center - A contact center -- also referred to as a customer interaction center or e-


contact center -- is a central point from which all customer interactions across various
channels are managed.

 container (disambiguation) - This page explains how the term container is used in
software development, storage, data center management and mobile device management.

 content - Many people agree that on the World Wide Web, "content is King.

 content aggregator - A content aggregator is an individual or organization that gathers


Web content (and/or sometimes applications) from different online sources for reuse or
resale.
 content filtering (information filtering) - On the Internet, content filtering (also known
as information filtering) is the use of a program to screen and exclude from access or
availability Web pages or e-mail that is deemed objectionable.

 content-addressed storage (CAS) - Content-addressed storage (CAS) is a method of


providing fast access to fixed content (data that is not expected to be updated) by assigning it
a permanent place on disk.

 contiguous - Contiguous describes two or more objects that are adjacent to each other.

 continuation symbol - The continuation symbol is used to indicate extension of a


sequence or set, or to imply the existence of intermediate elements in a sequence or set.

 continuous data protection (storage convergence) - Continuous data protection (CDP),


also called continuous backup, is a storage system in which all the data in an enterprise is
backed up whenever any change is made.

 controller - A controller, in a computing context, is a hardware device or a software


program that manages or directs the flow of data between two entities.

 cool - On the World Wide Web, cool has a number of meanings,


including:EngagingLaid-back, understatedIn tune with the latest thinking, even a little ahead
of itTechnically or graphically impressiveThe term "cool" seems to have originated among
jazz musicians in the 1940s.

 Coordinated Universal Time (UTC, GMT, CUT) - Coordinated Universal Time


(abbreviated as UTC, and therefore often spelled out as Universal Time Coordinated and
sometimes as Universal Coordinated Time) is the standard time common to every place in
the world.

 coordinates - Coordinates are distances or angles, represented by numbers, that uniquely


identify points on surfaces of two dimensions (2D) or in space of three dimensions (3D).

 coprocessor - A coprocessor is a special set of circuits in a microprocessor chip that is


designed to manipulate numbers or perform some other specialized function more quickly
than the basic microprocessor circuits could perform the same task.
 copyleft - Copyleft is the idea and the specific stipulation when distributing software that
the user will be able to copy it freely, examine and modify the source code, and redistribute
the software to others (free or priced) as long as the redistributed software is also passed
along with the copyleft stipulation.

 corollary - A corollary is a statement that follows naturally from some other statement
that has either been proven or is generally accepted as true.

 COTS, MOTS, GOTS, and NOTS - COTS, MOTS, GOTS, and NOTS are
abbreviations that describe pre-packaged software or hardware purchase alternatives.

 counting board - Historically, a counting board was a portable flat surface, usually of
wood or stone, on which a user placed objects such as pebbles or beads for the purpose of
maintaining a count of something.

 coupling - Coupling is the act of joining two things together.

 courseware - Courseware is educational material intended as kits for teachers or trainers


or as tutorials for students, usually packaged for use with a computer.

 Cray Inc. - Cray Inc. is a pioneering computer company that was founded as Cray
Research in 1972 by Seymour Cray, who is known as the father of the supercomputer.

 cross section - A cross section is a cut through something (such as a coaxial cable) at an
angle perpendicular to its axis in order to view its interior structure.

 crumb - In computers, crumb is jargon for two bits (that is, two binary digits).

 cryptographic nonce - A nonce is a random or semi-random number that is generated


for a specific use, typically related to cryptographic communication or information
technology.

 cryptography - Cryptography is a method of protecting information and communications


through the use of codes so that only those for whom the information is intended can read
and process it.
 cumulative trauma disorder (CTD) - In information technology, cumulative trauma
disorder (CTD) refers to any of several physical problems that can result from improper or
excessive use of a computer display or terminal.

 cursor - A cursor is the position indicator on a computer display screen where a user can
enter text.

 customer data integration (CDI) - Customer data integration (CDI) is the process of
defining, consolidating and managing customer information across an organization's business
units and systems to achieve a "single version of the truth" for customer data.

 customer lifecycle - In customer relationship management (CRM), customer lifecycle is


a term used to describe the progression of steps a customer goes through when considering,
purchasing, using and maintaining loyalty to a product or service.

 customer-facing - Customer-facing is an adjective used to describe a hardware or


software product, technology, or anything that the customer of a business deals with directly.

 cyber - Cyber is a prefix used to describe a person, thing, or idea as part of the computer
and information age.

 cyberburger joint - A cyberburger joint is a fast-food restaurant that provides Internet


access at a computer to its customers.

 cybercafe - A cybercafe is a cafe, coffee or espresso shop, or similar food and/or


beverage-serving place that has a number of personal computers connected to the Internet
and available for use by customers.

 cyberextortion - Cyberextortion is a crime involving an attack or threat of an attack


coupled with a demand for money or some other response in return for stopping or
remediating the attack.

 cyberpicketing - Cyberpicketing is the use of the Internet to protest a corporation or


other institution's wages, work conditions, products, environmental policy, or other issues.

 cyberpunk - Cyberpunk is a sensibility or belief that a few outsiders, armed with their
own individuality and technological capability, can fend off the tendencies of traditional
institutions to use technology to control society.
 cyberstalking - Cyberstalking is a crime in which the attacker harasses a victim using
electronic communication, such as e-mail or instant messaging (IM), or messages posted to a
Web site or a discussion group.

 D - D is one of two programming languages, Digital Mars D, an object-oriented


metaprogramming language, or Microsoft D, a key component of the upcoming Oslo
development environment.

 dark energy (quintessence) - Dark energy, also called quintessence, is a mysterious


energy or force that has been postulated by astronomers and cosmologists to explain recent
observations suggesting that the universe is expanding at an ever-increasing rate of speed.

 DAT (Digital Audio Tape) - DAT (Digital Audio Tape) is a standard medium and
technology for the digitalrecording of audioon tape at a professional level of quality.

 data - In computing, data is information that has been translated into a form that is
efficient for movement or processing.

 data center - A data center (or datacenter) is a facility composed of networked


computers and storage that businesses and other organizations use to organize, process, store
and disseminate large amounts of data.

 data classification - Data classification is the process of organizing data into categories
that make it is easy to retrieve, sort and store for future use.

 data compression - Data compression is a reduction in the number of bits needed to


represent data.

 data glove - A data glove is an interactive device, resembling a glove worn on the hand,
which facilitates tactile sensing and fine-motion control in robotics and virtual reality.

 data in motion - Data in motion, also referred to as data in transit or data in flight, is
digital information that is in the process of being transported between locations within or
between computer systems.

 data point - A data point is a discrete unit of information.


 data restore - Data restore is the process of copying backup data from secondary storage
and restoring it to its original location or a new location.

 data set - A data set is a collection of data that contains individual data units organized
(formatted) in a specific way and accessed by one or more specific access methods based on
the data set organization and data structure.

 data storage - Data storage is the collective methods and technologies that capture and
retain digital information on electromagnetic, optical or silicon-based storage media.

 data streaming - Data streaming is the continuous transfer of data at a steady, high-
speed rate.

 data structure - A data structure is a specialized format for organizing, processing,


retrieving and storing data.

 data transfer rate (DTR) - Data transfer rate (DTR) is the amount of digital data that is
moved from one place to another in a given time.

 DB-xx (DB-9, DB-15, DB-25, DB-50, DB-68) - DB-xx is the designation for a series of
port connectors for attaching devices to computers.

 de facto standard - A de facto standard is something that is used so widely that it is


considered a standard for a given application although it has no official status.

 de jure standard - A de jure standard is a technology, method or product that has been
officially endorsed for a given application.

 dead media - In 1995, science-fiction writer Bruce Sterling challenged a conference of


computer artists and the world at large to help identify the extinct species in the new media
taxonomy and face the fact that, for each new medium or technology that survives, dozens
fall by the wayside.

 deadlock - A deadlock is a situation in which two computer programs sharing the same
resource are effectively preventing each other from accessing the resource, resulting in both
programs ceasing to function.
 decimal - Decimal is a term that describes the base-10 number system, probably the most
commonly used number system.

 decoupled architecture - In general, a decoupled architecture is a framework for


complex work that allows components to remain completely autonomous and unaware of
each other.

 default - In computer technology, a default (noun, pronounced dee-FAWLT) is a


predesigned value or setting that is used by a computer program when a value or setting is
not specified by the program user.

 defragmentation - Defragmentation is the process of locating the noncontiguous


fragments of data into which a computer file may be divided as it is stored on a hard disk,
and rearranging the fragments and restoring them into fewer fragments or into the whole file.

 degauss - To degauss is to demagnetize.

 demographics - Demographics is the study of the behaviors and other characteristics of


groups of human beings in terms of statistics.

 Department of Space (India) - The Department of Space (DoS) is a department created


by the Indian government to manage their space program and oversee a number of related
agencies and institutes.

 deploy - To deploy (from the French deployer) is "to spread out or arrange strategically.

 depository - A depository is a file or set of files in which data is stored for the purpose of
safekeeping or identity authentication.

 deprecated - In dictionaries, deprecated is a term used to indicate a pronunciation or


usage that is acknowledged but discouraged.

 design by committee - Design by committee is a term sometimes used to describe a


design that is flawed because too many people provided input.

 desktop - A desktop is a computer display area that represents the kinds of objects one
might find on top of a physical desk, including documents, phone books, telephones,
reference sources, writing and drawing tools, and project folders.
 desktop supercomputer (personal supercomputer) - A desktop supercomputer, also
called a personal supercomputer, is a term that is used to describe any exceptionally powerful
computer that can be placed at a single workstation.

 desktop theme - A desktop theme is a customized graphical user interface (GUI) that
replaces a computer's ordinary sounds, icons, pointer, wallpaper or screensaver with
something designed to reflect the interests of the user.

 device - In general, a device is a machine designed for a purpose.

 Difference Engine - The Difference Engine, designed in the 1820s by the English
mathematician and inventor Charles Babbage, was intended to automatically compute
mathematical tables which, until that time, had been tediously calculated by hand and were
prone to error.

 digit - A digit is an element of a set that, taken as a whole, comprises a system of


numeration.

 digital accessibility - Digital accessibility is the ability of a website, mobile application


or electronic document to be easily navigated and understood by a wide range of users,
including those users who have visual, auditory, motor or cognitive disabilities.

 digital audio broadcasting (DAB) - .

 digital cash (eCash) - Digital cash is a system of purchasing cash credits in relatively
small amounts, storing the credits in your computer, and then spending them when making
electronic purchases over the Internet.

 digital divide - The term 'digital divide' describes the fact that the world can be divided
into people who do and people who don't have access to - and the capability to use - modern
information technology, such as the telephone, television, or the Internet.

 digital library - A digital library is a collection of documents in organized electronic


form, available on the Internet or on CD-ROM (compact-disk read-only memory) disks.

 digital modeling and fabrication - Digital modeling and fabrication is a design and
production process that marries 3-D modeling or computing-aided design (CAD) software
with additive and subtractive manufacturing.
 digital printing - Digital printing describes the process of transferring a document on a
personal computer or other digital storage device to a printing substrate by means of a device
that accepts text and graphic output.

 digitization - Digitization is the process of converting information into a digital format.

 digizine - A digizine is a magazine that is delivered in digital (electronic form) on an


electronic medium, such as a CD-ROM.

 Dilbert - Dilbert is a cartoon strip about the workplace that has a wide following among
millions of corporate and other workers in the United States.

 Direct Memory Access (DMA) - Direct Memory Access (DMA) is a capability provided
by some computer bus architectures that allows data to be sent directly from an attached
device (such as a disk drive) to the memory on the computer's motherboard.

 direct-attached storage (DAS) - Direct-attached storage (DAS) is computer storage that


is connected to one computer and not accessible to other computers.

 directory - A directory is, in general, an approach to organizing information, the most


familiar example being a telephone directory.

 disaster recovery plan (DRP) - A disaster recovery plan (DRP) is a documented,


structured approach that describes how an organization can quickly resume work after an
unplanned incident.

 discrete - Discrete (pronounced dihs-KREET, from the Latin discretus and perhaps
discernere, meaning to separate) is an adjective meaning separate and distinct.

 disintermediation - Disintermediation is giving the user or the consumer direct access to


information that otherwise would require a mediator, such as a salesperson, a librarian, or a
lawyer.

 disk-to-disk-to-tape (D2D2T) - Disk-to-disk-to-tape (D2D2T) is an approach to


computer storage backup and archiving in which data is initially copied to backup storage on
a disk and then later on copied again to tape.
 display modes - The term display mode refers to the characteristics of a computer
display, in particular the maximum number of colors and the maximum image resolution (in
pixels horizontally by pixels vertically).

 disruptive technology - A disruptive technology is one that displaces an established


technology and shakes up the industry or a ground-breaking product that creates a
completely new industry.

 distance learning (e-learning) - Distance learning, sometimes called e-learning, is a


formalized teaching and learning system specifically designed to be carried out remotely by
using electronic communication.

 distributed - Computing is said to be "distributed" when the computer programming and


data that computers work on are spread out over more than one computer, usually over a
network.

 distribution - In marketing, distribution is the process of moving a product from its


manufacturing source to its customers.

 dithering - Dithering is the attempt by a computer program to approximate a color from


a mixture of other colors when the required color is not available.

 document - In general, a document (noun) is a record or the capturing of some event or


thing so that the information will not be lost.

 Document Type Definition (DTD) - A Document Type Definition (DTD) is a specific


document defining and constraining definition or set of statements that follow the rules of the
Standard Generalized Markup Language (SGML) or of the Extensible Markup Language
(XML), a subset of SGML.

 documentation - In computer hardware and software product development,


documentation is the information that describes the product to its users.

 dogcow - The dogcow is a drawing of a rather indiscriminate-looking animal (it looks


mostly like a dog but is said to have the spots of a cow) that is or has been used in the Apple
Macintosh operating system to help tell users about their printing options.
 DOS (Disk Operating System) - DOS (Disk Operating System) can refer to a computer
operating system that is loaded from a disk drive or to an operating system based on
Microsoft Disk Operating System (MS-DOS).

 dot product (scalar product) - The dot product, also called the scalar product, of two
vectors is a number (scalar quantity) obtained by performing a specific operation on the
vector components.

 double factorial - The double factorial, symbolized by two exclamation marks (!!), is a
quantity defined for all integers greater than or equal to -1.

 double-slit experiment - The double-slit experiment is a nineteenth-century


investigation into the properties of light that has since been found to demonstrate both the
duality of photons and the concepts of superposition and quantum interference.

 downsizing - In a business enterprise, downsizing is reducing the number of employees


on the operating payroll.

 drilldown - As currently used in information technology, to drill down (verb) is to focus


in on something.

 DRY principle - The DRY (don't repeat yourself) principle is a best practice in software
development that recommends software engineers to do something once, and only once.

 duh - In general, duh (pronounced DUH, prolonging the UH, pitching the voice a bit low,
and inflecting it with an intonation of imbecility or sarcasm or both, depending on the usage)
is a colloquial comment on one's (or someone else's) lack of knowledge or brain power.

 duty cycle - Duty cycle is the proportion of time during which a component, device, or
system is operated.

 dynamic and static - In general, dynamic means energetic, capable of action and/or
change, or forceful, while static means stationary or fixed.

 Dynamic Data Exchange (DDE) - In the Windows, OS/2, and (with third-party
development kits) other operating systems, Dynamic Data Exchange (DDE) allows
information to be shared or communicated between programs.
 e-inclusion - E-inclusion is a social movement whose goal is to end the digital divide, a
term used to describe the fact that the world can be divided into people who do and people
who don't have access to - and the capability to use - modern information technology (IT).

 e-tailing (electronic retailing) - E-tailing (less frequently: etailing) is the selling of retail
goods on the Internet.

 e-thrombosis - E-thrombosis is a newly recognized variant of deep venous thrombosis


(DVT) caused by sitting at a computer for long periods of time.

 early adopter - An early adopter is a person who embraces new technology before most
other people do.

 Earth's mean orbital speed - Earth's mean orbital speed is the average speed at which
the Earth revolves around the sun.

 Easter Egg - An Easter Egg is an unexpected surprise -- an undocumented procedure or


unauthorized feature that's playful in nature or gives credit to the software developer or chip
designer.

 EDP (electronic data processing) - EDP (electronic data processing), an infrequently


used term for what is today usually called "IS" (information services or systems) or "MIS"
(management information services or systems), is the processing of data by a computer and
its programs in an environment involving electronic communication.

 edu - edu is one of the top-level domain names that can be used when choosing a domain
name.

 edutainment - Edutainment is a neologism (new term coinage), similar to infotainment,


that expresses the marriage of education and entertainment in a work or presentation such as
a television program or a Web site.

 egosurfing - Egosurfing is looking to see how many places on the Web your name
appears.

 electronic discovery (e-discovery or ediscovery) - Electronic discovery (also called e-


discovery or ediscovery) refers to any process in which electronic data is sought, located,
secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
 electronic newspaper - An electronic newspaper is a self-contained, reusable, and
refreshable version of a traditional newspaper that acquires and holds information
electronically.

 electronic nose (e-nose) - An electronic nose (e-nose) is a device that identifies the
specific components of an odor and analyzes its chemical makeup to identify it.

 electronic resume - An electronic resume is a plain text (ASCII), PDF or HTML


document that provides an employer with information regarding a job candidate's
professional experience, education and job qualifications and is meant to be read by a
computer program instead of by a human being.

 elegant solution - The word elegant, in general, is an adjective meaning of fine quality.

 email - Email (electronic mail) is the exchange of computer-stored messages by


telecommunication.

 embedded system - An embedded system is a combination of computer hardware and


software, either fixed in capability or programmable, designed for a specific function or
functions within a larger system.

 enantiomorph - An enantiomorph (pronounced en-ANT-i-o-morf) is a mirror image of


something, an opposite reflection.

 encoding and decoding - Encoding is the process of putting a sequence of characters


(letters, numbers, punctuation, and certain symbols) into a specialized digital format for
efficient transmission or transfer.

 end user - In information technology, the term end user is used to distinguish the person
for whom a hardware or software product is designed from the developers, installers, and
servicers of the product.

 enhancement - In an information technology product, an enhancement is a noteworthy


improvement to the product as part of a new version of it.

 ENIAC - ENIAC (Electronic Numerical Integrator And Computer) was the world’s first
general-purpose computer.
 entanglement - Entanglement is a term used in quantum theory to describe the way that
particles of energy/matter can become correlated to predictably interact with each other
regardless of how far apart they are.

 enterprise - In the computer industry, an enterprise is an organization that uses


computers.

 enterprise architecture (EA) - An enterprise architecture (EA) is a conceptual blueprint


that defines the structure and operation of an organization.

 entity - In general, an entity (pronounced N-tih-tee) is an existing or real thing.

 entrepreneur (entrepreneurship) - An entrepreneur is an individual who identifies a


need in the marketplace and works to fulfill it.

 enviromatics (environmental informatics) - Enviromatics is the use of computer


modeling to analyze the Earth's environment and to predict future trends.

 environment - In computers, the term environment when unqualified usually refers to


the combination of hardware and software in a computer.

 ergonomics - Ergonomics (from the Greek word "ergon" meaning work, and "nomoi"
meaning natural laws), is the science of refining the design of products to optimize them for
human use.

 euro - The euro (pronounced YUR-oh) is now the official monetary unit of 12 member
nations of the European Union.

 event - An event, in a computing context, is an action or occurrence that can be identified


by a program and has significance for system hardware or software.

 event handler - An event handler is a callback routine that operates asynchronously and
handles inputs received into a program.

 executable - In computers, to execute a program is to run the program in the computer,


and, by implication, to start it to run.
 EXL Service (EXL Services) - EXL Service, also known as EXL Services (NASDAQ:
EXLS), provides business process outsourcing services to global corporations.

 expanded memory - Expanded memory, also know as EMS (Expanded Memory


Specification) was a method used to increase the 640KB upper limit of MS-DOS to 1MB
using a gated memory riser card.

 exponent - An exponent is a quantity representing the power to which some other


quantity is raised.

 exponential assembly - In nanotechnology, exponential assembly is a form of self-


replication in which tiny devices called nanorobots repeatedly construct copies of themselves.

 exponential function - An exponential function is a mathematical function of the


following form:f (x) = a xwhere x is a variable, and a is a constant called the base of the
function.

 extended memory - Extended memory, also known as XMS (eXtended Memory


Specification) is a technology that enables capacity above the 640KB standard MS-DOS
limit of main memory.

 extension - In computer operating systems, a file name extension is an optional addition


to the file name in a suffix of the form ".

 eye candy - Eye candy is a term used in information technology for visual elements
displayed on computer monitors that are aesthetically appealing or attention-compelling.

 fabric - In information technology, fabric is a synonym for the words framework or


platform.

 factorial - The factorial, symbolized by an exclamation mark (!), is a quantity defined for
all integers greater than or equal to 0.

 failover - Failover is a backup operational mode in which the functions of a system


component (such as a processor, server, network, or database, for example) are assumed by
secondary system components when the primary component becomes unavailable through
either failure or scheduled down time.
 fair use - Fair use is a legal concept that allows the reproduction of copyrighted material
for certain purposes without obtaining permission and without paying a fee or royalty.

 falsifiability - Falsifiability is the capacity for some proposition, statement, theory or


hypothesis to be proven wrong.

 FAQ (frequently-asked questions) - The FAQ (pronounced FAK) or list of "frequently-


asked questions" (and answers) has become a feature of the Internet.

 Fast Guide to Helpful Tips - Explore the categories below for recently submitted and
archived tips.

 fault-tolerant - Systems with integrated fault tolerance are designed to withstand


multiple hardware failures to ensure continuous availability.

 FCC (Federal Communications Commission) - The FCC (Federal Communications


Commission) is the government body responsible for maintaining laws, censorship and
broadcast licensing pertaining to interstate and international communications in the United
States.

 FDISK - WARNING: Use caution when repartitioning a hard disk drive that contains
data.

 feature creep - Feature creep (sometimes known as requirements creep or scope creep) is
a tendency for product or project requirements to increase during development beyond those
originally foreseen, leading to features that weren't originally planned and resulting risk to
product quality or schedule.

 femtosecond - A femtosecond is one millionth of a nanosecond or 10 -15 of a second and


is a measurement sometimes used in laser technology.

 Fermat prime - A Fermat prime is a Fermat number that is also a prime number.

 Fermat's Last Theorem (FLT) - Fermat's Last Theorem (FLT), a significant hypothesis
in number theory, was first stated by Pierre de Fermat, a 17th-Century laywer and amateur
mathematician.
 ferret - In a computer or a network, a ferret is a program that searches through selected
files, databases, or search engine indexes for information that meets specified search criteria.

 field - A field is an area in a fixed or known location in a unit of data such as a record,
message header, or computer instruction that has a purpose and usually a fixed size.

 file format - In a computer, a file format is the layout of a file in terms of how the data
within the file is organized.

 file transfer - File transfer is the movement of one or more files from one location to
another.

 Finacle - Finacle is a core banking suite developed and marketed by India's Infosys
Technologies.

 finite state machine - Finite state machine (FSM) is a term used by programmers,
mathematicians and other professionals to describe a mathematical model for any system
with a limited number of conditional states of being.

 firehose effect - A firehose effect occurs in a network when the source (transmitting)
computer or terminal sends data too fast for a destination (receiving) computer or terminal to
deal with it.

 first call resolution (FCR) - In customer relationship management (CRM), first call
resolution is properly addressing the customer's need the first time they call, thereby
eliminating the need for the customer to follow up with a second call.

 first-order logic - First-order logic is symbolized reasoning in which each sentence, or


statement, is broken down into a subject and a predicate.

 flaming - On the Internet, flaming is giving someone a verbal lashing in public.

 flash memory card - Flash storage memory cards use nonvolatile semiconductor
memory to store pictures, audio and video data on portable and remote devices.

 flash storage - Flash storage is any type of drive, repository or system that uses flash
memory to keep data for an extended period of time.
 FlashMob supercomputer - A FlashMob supercomputer is a group of computer
enthusiasts who gather together in one physical location for a brief time period in order to
function as a supercomputer and work on a single problem.

 flat address space - 1. A flat address space is a set of addresses arranged on a single
level.

 flexography (surface printing) - Flexography, sometimes referred to as "surface


printing," is a method commonly used for printing on packaging and other uneven surfaces.

 FLOPS (floating-point operations per second) - In computers, FLOPS are floating-


point operations per second.

 flowchart - A flowchart is a formalized graphic representation of a logic sequence, work


or manufacturing process, organization chart, or similar formalized structure.

 fnord - Certain words are intended to be undefinable and "fnord" is one of them.

 folder - In the Windows, Macintosh, and some other operating system s, a folder is a
named collection of related files that can be retrieved, moved, and otherwise manipulated as
one entity.

 Foo Camp - Foo Camp was a gathering of about 200 computer and Internet thinkers and
inventors who were invited by publisher O'Reilly and Associates to spend a week-end
brainstorming, collaborating, and otherwise advancing progress in information technology.

 footprint - In information technology, a footprint is the amount of space a particular unit


of hardware or software occupies.

 forensic - Forensic, in a general sense, means "related to or used in courts of law" or


"used for formal public debate or discussion.

 form factor - In computers, the form factor is the size, configuration, or physical
arrangement of a computing device.

 format - A format (noun, pronounced FOHR-mat ) is a preestablished layout for data.


 Fourier analysis - Fourier analysis is a method of defining periodic waveforms in terms
of trigonometric function s.

 Fourier series - A Fourier (pronounced foor-YAY) series is a specific type of infinite


mathematical series involving trigonometric functions.

 foxed - A fan club Web site can be said to have been "foxed" when it has received a letter
of warning about copyright violations from the owners of images or other copyrighted
material it is using.

 FQA (frequently questioned answers) - FQA (frequently questioned answers) are


conventions or mandates scrutinized by individuals or groups who doubt their validity.

 fragmentation - In some operating system's file systems, a data file over a certain size is
stored in several "chunks" or fragments rather than in a single contiguous sequence of bits in
one place on the storage medium, a process that is called fragmentation.

 framework - In computer systems, a framework is often a layered structure indicating


what kind of programs can or should be built and how they would interrelate.

 framing effect - Framing effect is a form of cognitive bias which causes people to focus
more on the positive or negative aspects of a decision, situation or information based on the
way it is presented.

 free software - Free software is software that can be freely used, modified, and
redistributed with only one restriction: any redistributed version of the software must be
distributed with the original terms of free use, modification, and distribution (known as
copyleft).

 freeware - Freeware (not to be confused with free software) is programming that is


offered at no cost and is a common class of small applications available for downloading and
use in most operating systems.

 FUD (Fear, Uncertainty, and Doubt) - FUD (Fear, Uncertainty, and Doubt) is the term
for any strategy intended to make a company's customers insecure about future product plans
with the purpose of discouraging them from adopting competitors' products.
 full-stack developer - A full-stack developer is a type of programmer that has a
functional knowledge of all techniques, languages and systems engineering concepts
required in software development.

 function - In information technology, the term function (pronounced FUHNK-shun) has


a number of meanings.

 functionality - In information technology, functionality (from Latin functio meaning "to


perform") is the sum or any aspect of what a product, such as a software application or
computing device, can do for a user.

 Furby - Furby (pronounced FURR-bee) is the name of an electronic toy, five inches tall,
that is covered with simulated fur, has big eyes and ears, a vocabulary of over 200 words,
and a limited ability to react to its environment.

 futzing (or futzing around) - Futzing or "futzing around" is unstructured, playful, often
experimental interaction between a human being and a computer, product, or any technology,
sometimes but not always with a productive purpose in mind.

 fuzzy number - A fuzzy number is a quantity whose value is imprecise, rather than exact
as is the case with "ordinary" (single-valued) numbers.

 fuzzy search - A fuzzy search is a process that locates Web pages that are likely to be
relevant to a search argument even when the argument does not exactly correspond to the
desired information.

 game theory - Game theory is the study of mathematical models of negotiation, conflict
and cooperation between individuals, organizations and governments.

 garbage - In computers, garbage has two related meanings: From a user's perceptual
point-of-view, garbage is often used to mean anything on your display screen that looks
unreadable or unviewable.

 geek - In computers and the Internet, a geek is a person who is inordinately dedicated to
and involved with technology.

 geekosphere - The geekosphere is the physical ambiance around you and your
workstation.
 general-purpose computer - A general-purpose computer is one that, given the
appropriate application and required time, should be able to perform most common
computing tasks.

 genetic engineering - Genetic engineering is the deliberate, controlled manipulation of


the genes in an organism with the intent of making that organism better in some way.

 geocaching (GPS stash hunting) - Geocaching, also referred to as GPS stash hunting, is
a recreational activity in which someone "buries" something for others to try to find using a
Global Positioning System (GPS) receiver.

 George Boole - George Boole (1815-1864) was a British mathematician and is known as
the founder of mathematical logic.

 geospatial analysis - Geospatial analysis is the gathering, display, and manipulation of


imagery, GPS, satellite photography and historical data, described explicitly in terms of
geographic coordinates or implicitly, in terms of a street address, postal code, or forest stand
identifier as they are applied to geographic models.

 ghost site - A ghost site is a Web site that is no longer maintained but that remains
available for viewing.

 gibibyte (GiB) - A gibibyte (GiB) is a unit of measure of capacity used in computing.

 gigabit - In data communications, a gigabit is one billion bits, or 1,000,000,000 (that is,
10^9) bits.

 gigaflop - As a measure of computer speed, a gigaflop is a billion floating-point


operations per second (FLOPS).

 glass house - Glass house is a term for centralized computing in an enterprise and the
mindset of those who plan and administer it.

 glitch - In several usages in information technology, a glitch (pronounced GLIHTCH) is


a sudden break in function or continuity, sometimes of a transient nature, with a varying
degree of seriousness.
 globbing - Globbing is the process of expanding a non-specific file name containing a
wildcard character into a set of specific file names that exist in storage on a computer, server,
or network.

 glocalization - Glocalization is the concept that in a global market, a product or service is


more likely to succeed when it is customized for the locality or culture in which it is sold.

 going forward - Going forward is a relatively new and apparently convenient way to
indicate a progression in time from the present.

 googol and googolplex - A googol is 10 to the 100th power (which is 1 followed by 100
zeros).

 Gopher - From about 1992 through 1996, Gopher was an Internet application in which
hierarchically-organized text files could be brought from servers all over the world to a
viewer on your computer.

 gopherspace - Gopherspace is a term used to describe the aggregate of all the


information on the thousands of Gopher servers in the world.

 GPGPU (general purpose graphics processing unit) - A general-purpose GPU


(GPGPU) is a graphics processing unit (GPU) that performs non-specialized calculations that
would typically be conducted by the CPU (central processing unit).

 GPU (graphics processing unit) - A graphics processing unit (GPU) is a computer chip
that performs rapid mathematical calculations, primarily for the purpose of rendering images.

 GPU supercomputer - A GPU supercomputer is a networked group of computers with


multiple graphics processing units working as general-purpose GPUs (GPGPUs) in tandem
on a single task.

 Grace Hopper nanosecond - A Grace Hopper nanosecond is a visual aid that represents
how fast electricity can travel in one billionth of a second.

 graph theory - Graph theory is the study of points and lines.


 gravesite - In the context of the World Wide Web, a gravesite is either: A Web site that
has been abandoned or forgotten by its originators that is nevertheless still accessible on a
server.

 gravity (or gravitation) - Gravity, also called gravitation, is a force that exists among all
material objects in the universe, attracting objects with non-zero mass toward each other.

 gravity wave (or gravitational wave) - A gravity wave (or gravitational wave) is a
ripple in the curvature of the space-time continuum (the enmeshed combination of our three
perceived physical dimensions, plus time) created by the movement of matter.

 gravure - Gravure is a printing method in which an image is applied to a printing


substrate by use of a metal plate mounted on a cylinder.

 gray goo (or grey goo) - Gray goo (in British spelling, "grey goo") is a term used to
describe what life on our planet might become if self-replicating robots or nanomachines got
out of control and began to use up life forms for their own energy needs in some unstoppable
way.

 grayscale - Grayscale is a range of shades of gray without apparent color.

 greedy algorithm - A greedy algorithm is a mathematical process that looks for simple,
easy-to-implement solutions to complex, multi-step problems by deciding which next step
will provide the most obvious benefit.

 Greeking - Greeking is the use of unreadable dummy text in places reserved for text
when prototyping the design or general layout of pages in magazines, books, brochures,
advertisements, Web pages, and other visual media.

 Gregorian calendar - The Gregorian calendar is the calendar in current use in the
Western world, both as the civil and Christian ecclesiastical calendar.

 gremlin - A gremlin is an imaginary creature that causes trouble in devices and systems
of all kinds.

 grid computing - Grid computing uses small, distributed resources from servers and PCs
to solve big problems.
 GUI (graphical user interface) - A GUI (usually pronounced "GOO-ee") is a graphical
(rather than purely textual) user interface to a computer.

 gyroscope - A gyroscope is a device with a spinning disc or wheel mechanism that


harnesses the principle of conservation of angular momentum: the tendency for the spin of a
system to remain constant unless subjected to external torque.

 H.264 (MPEG-4 AVC) - H.264, also known as MPEG-4 AVC (Advanced Video
Coding), is a video compression standard that offers significantly greater compression than
its predecessors.

 half-life - In science, a half-life (also, as a noun, spelled half life) is the amount of time it
takes for half of a substance or entity to undergo some specified process.

 hangup (or hang) - A hangup, also called a hang, is a condition that sometimes occurs
when computer programs conflict or do not run properly.

 haptics - Haptics (pronounced HAP-tiks) is the science of applying touch (tactile)


sensation and control to interaction with computer applications.

 hard copy (printout) - A hard copy (or "hardcopy") is a printed copy of information
from a computer.

 hard drive shredder - A hard drive shredder is a mechanical device that physically
destroys old hard drives in such a way that the data they contain cannot be recovered.

 hard error - A hard error is an issue in RAM that results from a permanent physical flaw
in the module caused by a hardware failure or defect.

 hard reset (factory reset; master reset) - A hard reset, also known as a factory reset or
master reset, is the restoration of a device, such as a smartphone or tablet, to its state when it
left the factory.

 header - In information technology, a header is, in general, something that goes in front
of something else and is usually repeated as a standard part of the units of something else.

 Herman Hollerith - Born in 1860 in Buffalo, NY, Herman Hollerith was the creator of
the Hollerith Electric Tabulating System, the ancestor to computers as we know them today.
 heterogeneous - Heterogeneous (pronounced HEH-tuh-roh-DJEEN-ee-uhs, from the
Greek heteros or "other" and genos or "kind") is the characteristic of containing dissimilar
constituents.

 heuristic - As an adjective, heuristic (pronounced hyu-RIS-tik and from the Greek


"heuriskein" meaning "to discover") pertains to the process of gaining knowledge or some
desired result by intelligent guesswork rather than by following some preestablished formula.

 hexadecimal - Hexadecimal describes a base-16 number system.

 hibernation - Hibernation is a mode in which a computer is turned off but saves its state
to resume when it is turned on again.

 hiccup - In information technology, hiccup is an informal term for a non-recurring


problem of indeterminate cause that usually does not cause a significant disruption of work
or activity.

 hierarchy - A hierarchy is an organizational structure in which items are ranked


according to levels of importance.

 high-performance computing (HPC) - High-performance computing (HPC) is the use


of parallel processing for running advanced application programs efficiently, reliably and
quickly.

 histogram - A histogram is a display of statistical information that uses rectangles to


show the frequency of data items in successive numerical intervals of equal size.

 holographic print - A holographic print is a rendition of a hologram on a flat surface,


producing 3-D (three-dimensional) effects when viewed.

 holographic storage (holostorage) - Holographic storage is computer storage that uses


laser beams to store computer-generated data in three dimensions.

 home server - A home server is a computer that functions as a server in a client-server


home network.

 host (in computing) - A host (also known as "network host") is a computer or other
device that communicates with other hosts on a network.
 hotfix - A hotfix is code (sometimes called a patch) that fixes a bug in a product.

 htm - htm is sometimes used as a short form of the file name suffix for an HTML file.

 human factors (ergonomics) - In industry, human factors (also known as ergonomics) is


the study of how humans behave physically and psychologically in relation to particular
environments, products, or services.

 Human Genome Project - The Human Genome Project is a global, long-term research
effort to identify the estimated 30,000 genes in human DNA (deoxyribonucleic acid) and to
figure out the sequences of the chemical bases that make up human DNA.

 humanware - Humanware is hardware and software that emphasizes user capability and
empowerment and the design of the user interface.

 hybrid application (hybrid app) - A hybrid application (hybrid app) is one that
combines elements of both native and Web applications.

 hyper - As an adjective, hyper is slang for "keyed up" or "overwrought.

 hyperspace - Hyperspace is a term that describes the total number of individual locations
and all of their interconnections in a hypertext environment.

 hypervisor - A hypervisor is a function that abstracts -- isolates -- operating systems


(OSes) and applications from the underlying computer hardware.

 hypothesis - A hypothesis (plural: hypotheses) is a statement that may be tested and


proven to be either true or false.

 hysteresis - Hysteresis is the tendency for a system to change or react based on a trend of
how it has already transformed leading up to a specific point in time.

 ICT (information and communications technology, or technologies) - ICT, or


information and communications technology (or technologies), is the infrastructure and
components that enable modern computing.

 ICT4D (Information and Communications Technologies for Development) - ICT4D


(Information and Communications Technologies for Development) is an initiative aimed at
bridging the digital divide (the disparity between technological "have" and "have not"
geographic locations or demographic groups) and aiding economic development by ensuring
equitable access to up-to-date communications technologies.

 identity management (ID management) - Identity management (ID management) is the


organizational process for identifying, authenticating and authorizing individuals or groups
of people to have access to applications, systems or networks by associating user rights and
restrictions with established identities.

 idoru - An idoru is a virtual (computer-created) media star.

 IFrame (Inline Frame) - The IFrame HTML element is often used to insert content from
another source, such as an advertisement, into a Web page.

 image compression - Image compression is minimizing the size in bytes of a graphics


file without degrading the quality of the image to an unacceptable level.

 image of the early universe - An image of the early universe, showing irregularities in
its brightness 380,000 years after its birth, has been produced by a device called the
Wilkinson Microwave Anisotropy Probe (WMAP).

 imaginary number - An imaginary number is a quantity of the form ix, where x is a real
number and i is the positive square root of -1.

 IMHO (in my humble opinion) - Like FYI (for your information), IMHO (in my
humble opinion) is an abbreviation for a phrase sometimes used in online chatting and e-mail.

 implementation - Implementation is the execution of any idea, model, or method; in IT,


it refers to the process of setting up new software or hardware after a purchase is made.

 Incompleteness Theorem - The Incompleteness Theorem is a pair of logical proofs that


revolutionized mathematics.

 increment - An increment is a small, unspecified, nonzero change in the value of a


quantity.
 incubator - In the business world, an incubator is an enterprise that is set up to provide
office space, equipment, and sometimes mentoring assistance and capital to new businesses
that are just getting started.

 indemnification - In service level agreements (SLAs) and other legal contracts such as
end-user license agreements (EULAs), indemnification is the part of an agreement that
provides for one party to bear the monetary costs, either directly or by reimbursement, for
losses incurred by a second party.

 indempotency - Based on our inferences about the only three uses of this term that we
have discovered on the Internet, indempotency (pronounced ihn-dehm-POH-tuhns-ee, from
Latin indemnis or "unharmed") is the ability to preserve the integrity of a thing or action no
matter how much it is used or accessed by another thing or action.

 industrial strength - In information technology, industrial strength is a characteristic


sometimes ascribed to a hardware or software product or a system to describe its ability to
work capably and dependably in the operational world of business.

 inertia - Inertia is a property of matter that causes it to resist changes in velocity (speed
and/or direction).

 infinite sequence - An infinite sequence is a list or string of discrete objects, usually


numbers, that can be paired off one-to-one with the set of positive integers {1, 2, 3,.

 infinity - In general, infinity is the quality or state of endlessness or having no limits in


terms of time, space, or other quantity.

 infomercial - On television, an infomercial is a short or regular-length television


program that combines information presentation with an integrated suggestion to buy a
particular product or service.

 infonesia - Infonesia is an inability to remember where you saw or heard an item of


information.

 information - Information is stimuli that has meaning in some context for its receiver.
 information architecture - In technical writing, information architecture is the set of
ideas about how all information in a given context should be treated philosophically and, in a
general way, how it should be organized.

 information design - Information design is the detailed planning of specific information


that is to be provided to a particular audience to meet specific objectives.

 information technology (IT) - Information technology (IT) is the use of any computers,
storage, networking and other physical devices, infrastructure and processes to create,
process, store, secure and exchange all forms of electronic data.

 information theory - Information theory is a branch of mathematics that overlaps into


communications engineering, biology, medical science, sociology, and psychology.

 infotainment - Infotainment, combining information with entertainment, is a fairly recent


neologism for a television program, Web site feature, or other presentation that combines
information with entertainment.

 input/output (I/O) - I/O (input/output), pronounced "eye-oh," describes any operation,


program, or device that transfers data to or from a computer.

 instruction - An instruction is an order given to a computer processor by a computer


program.

 instruction set - An instruction set is a group of commands for a CPU in machine


language.

 integer - An integer (pronounced IN-tuh-jer) is a whole number (not a fractional number)


that can be positive, negative, or zero.

 integer overflow - Integer overflow is the result of trying to place into computer memory
an integer (whole number) that is too large for the integer data type in a given system.

 integration - Integration is the act of bringing together smaller components into a single
system that functions as one.

 Intel 8086 - The Intel 8086 was Intel’s first x86 processor.
 intelligent device - An intelligent device is any type of equipment, instrument, or
machine that has its own computing capability.

 intelligent system - An intelligent system is a machine with an embedded, Internet-


connected computer that has the capacity to gather and analyze data and communicate with
other systems.

 interactivity - In computers, interactivity is the dialog that occurs between a human


being (or possibly another live creature) and a computer program.

 interface - As a noun, an interface is either:A user interface, consisting of the set of dials,
knobs, operating system commands, graphical display formats, and other devices provided
by a computer or a program to allow the user to communicate and use the computer or
program.

 interlaced GIF - An interlaced GIF (Graphics Interchange Format) is a GIF image that
seems to arrive on your display like an image coming through a slowly-opening Venetian
blind.

 intermediary - In general, an intermediary is a person or service that is involved as a


third party between two or more end points in a communication or transaction.

 internationalization (I18N) - Internationalization (sometimes shortened to "I18N,


meaning "I - eighteen letters -N") is the process of planning and implementing products and
services so that they can easily be adapted to specific local languages and cultures, a process
called localization.

 Internet problems - Here are:Three rules-of-thumb for dealing with Internet problemsA
table showing the most common codes and messages you're likely to see on your Web
browser (HTTP), when accessing Usenet, using e-mail, or using the FTP protocol to upload
or download files Three Rules-of-Thumb for Dealing with Internet ProblemsIf you get a
message saying the domain name server (DNS) can't find your page and you're sure you've
typed it in correctly or clicked on a valid link, try it again - TWO more times! (Sometimes
packets don't get there!)If you get a "Not found" message, the page may be temporarily
missing because of miscoding at the target site.
 interoperability - Interoperability (pronounced IHN-tuhr-AHP-uhr-uh-BIHL-ih-tee) is
the ability of different systems, devices, applications or products to connect and
communicate in a coordinated way, without effort from the end user.

 interrupt latency - Interrupt latency, also called interrupt response time, is the length of
time that it takes for a computer interrupt to be acted on after it has been generated.

 intersection symbol - The intersection symbol denotes the intersection of two sets.

 IPP (Internet presence provider) - An Internet presence provider (IPP) is a company


that provides the disk space, high-speed Internet connection, and possibly the Web site
design and other services for companies, organizations, or individuals to have a visible
presence (meaning Web site) on the Internet.

 IRQ (interrupt request) - An IRQ (interrupt request) value is an assigned location


where the computer can expect a particular device to interrupt it when the device sends the
computer signals about its operation.

 irrational number - An irrational number is a real number that cannot be reduced to any
ratio between an integer p and a natural number q.

 IS (information system or information services) - An information system (IS) is the


collection of technical and human resources that provide the storage, computing, distribution,
and communication for the information required by all or some part of an enterprise.

 iSCSI switch (Internet Small Computer System Interface switch) - An iSCSI switch
is an appliance that processes and channels data between an iSCSI initiator and target on a
storage device.

 isotope - An isotope is a form of a chemical element whose atomic nucleus contains a


specific number of neutron s, in addition to the number of protons that uniquely defines the
element.

 ISRS (information storage and retrieval system) - An information storage and retrieval
system (ISRS) is a network with a built-in user interface that facilitates the creation,
searching, and modification of stored data.
 ISV (independent software vendor) - An ISV (independent software vendor) makes and
sells software products that run on one or more computer hardware or operating system (OS)
platforms.

 IT Survival Kits - We've gathered a collection of resources to help you explore an IT


topic you might not know much about.

 iterative development - Iterative development is a way of breaking down the software


development of a large application into smaller chunks.

 Jack Kilby - Jack Kilby is generally credited with being the inventor of the integrated
circuit (IC).

 JBoss - JBoss is a division of Red Hat that provides support for the JBoss open source
application server program and related middleware services marketed under the JBoss
Enterprise Middleware brand.

 jiffy - The term jiffy refers to a brief, usually unspecified, interval of time.

 job - In certain computer operating systems, a job is the unit of work that a computer
operator gives to the operating system.

 job step - In certain computer operating systems, a job step is part of a job, a unit of work
that a computer operator (or a program called a job scheduler) gives to the operating system.

 John von Neumann - John von Neumann was the scientist who conceived a fundamental
idea that serves all modern computers - that a computer's program and the data that it
processes do not have to be fed into the computer while it is working, but can be kept in the
computer's memory - a notion generally referred to as the stored-program computer.

 jolt - On the Internet, jolt is a denial of service (DoS) attack caused by a very large ICMP
packet that is fragmented in such a way that the targeted machine is unable to reassemble it
for use.

 K-12 - K-12, a term used in education and educational technology in the United States,
Canada, and possibly other countries, is a short form for the publicly-supported school
grades prior to college.
 Kbps (kilobits per second) - In the U.S.

 keitai - Keitai (pronounced k-tie) is a Japanese word meaning "portable.

 kelvin (K) - The kelvin (abbreviation K), less commonly called the degree Kelvin
(symbol, o K), is the Standard International (SI) unit of thermodynamic temperature.

 keyboard shortcut - A keyboard shortcut is a combination of keys that, when pressed


simultaneously, perform some task that ordinarily requires use of a mouse or other input
device and may take longer to do.

 kilobit - In data communications, a kilobit is a thousand (103) bits.

 kilogram (kg) - The kilogram (abbreviation, kg) is the Standard International (SI)
System of Units unit of mass.

 kinetic energy - Kinetic energy is the energy of motion, observable as the movement of
an object, particle, or set of particles.

 kiosk - A kiosk (pronounced KEE-ahsk ) is a small, free-standing physical structure that


displays information or provides a service.

 KISS Principle (Keep It Simple, Stupid) - The KISS Principle (Keep It Simple, Stupid)
is self-descriptive and recognizes two things: 1.

 kludge - In information technology, a kludge (pronounced KLOOdzh) is an awkward or


clumsy (but at least temporarily effective) solution to a programming or hardware design or
implementation problem.

 knowledge - In information technology, knowledge is, to an enterprise or an individual,


the possession of information or the ability to quickly locate it.

 knowledge base - In general, a knowledge base is a centralized repository for


information: a public library, a database of related information about a particular subject, and
whatis.

 knowledge worker - A knowledge worker is anyone who works for a living at the tasks
of developing or using knowledge.
 Kryder's Law - Kryder's Law describes the rate at which former Seagate CTO Mark
Kryder predicted disk drive density would grow.

 L1 and L2 - L1 and L2 are levels of cache memory in a computer.

 lambda - Lambda, the 11th letter of the Greek alphabet, is the symbol for wavelength.

 lambda (general definition) - Lambda, the 11th letter of the Greek alphabet, is used as a
symbol in optical fiber networking, in mathematics and in computer programming.

 landscape - In printing from a computer, landscape refers to a mode in which content is


printed for reading on the longer length of the sheet of paper.

 laser - A laser is a coherent and focused beam of photons; coherent, in this context,
means that it is all one wavelength, unlike ordinary light which showers on us in many
wavelengths.

 laser diode (injection laser or diode laser) - A laser diode, also known as an injection
laser or diode laser, is a semiconductor device that produces coherent radiation (in which the
waves are all at the same frequency and phase) in the visible or infrared (IR) spectrum when
current passes through it.

 latent data (ambient data) - Latent data, also known as ambient data, is the information
in computer storage that is not referenced in file allocation tables and is generally not
viewable through the operating system (OS) or standard applications.

 latitude and longitude - Latitude and longitude are angles that uniquely define points on
a sphere.

 layering - In computer programming, layering is the organization of programming into


separate functional components that interact in some sequential and hierarchical way, with
each layer usually having an interface only to the layer above it and the layer below it.

 lead generation - Lead generation is the use of a computer program, a database, the
Internet, or a specialized service to obtain or receive information for the purpose of
expanding the scope of a business, increasing sales revenues, looking for a job or for new
clients, or conducting specialized research.
 lean manufacturing (lean production) - Lean manufacturing is a methodology that
focuses on minimizing waste within manufacturing systems while simultaneously
maximizing productivity.

 learning curve - Learning curves are a visualization of the difficulty estimated in


learning a subject over a period of time as well as relative progress throughout the process of
learning.

 learning management system (LMS) - A learning management system (LMS) is a


software application or web-based technology used to plan, implement and assess a specific
learning process.

 Learning Path: Electronics - So that you can give yourself a quick tutorial on
electronics, we've arranged our definitions in this Learning Path in a sequence, with more
basic building block topics placed at the beginning.

 Learning Paths - We call the idea "Learning paths.

 legacy application - A legacy application (legacy app) is a software program that is


outdated or obsolete.

 lemniscate - A lemniscate is a plane curve with a characteristic shape, consisting of two


loops that meet at a central point as shown below.

 Leonardo da Vinci's car - Da Vinci's car is a vehicle developed from the Renaissance
artist/engineer/architect's drawings.

 level of support (support level) - Level of support indicates a specific extent of technical
assistance in the total range of assistance that is provided by an information technology
product (such as a software product) to its customers.

 leverage - In the physical sense, leverage is an assisted advantage.

 library - In computing, a library is a collection of similar objects that are stored for
occasional use - most frequently, programs in source code or object code form, data files,
scripts, templates, fonts, and physical storage units such as tape cartridges.
 lights-out management (LOM) - Lights-out management (LOM) is the ability for a
system administrator to monitor and manage servers by remote control.

 lightweight - In information technology, the term lightweight is sometimes applied to a


program, protocol, device, or anything that is relatively simpler or faster or that has fewer
parts than something else.

 limit - In mathematics, a limit is a value toward which an expression converges as one or


more variables approach certain values.

 linearity - Linearity is the behavior of a circuit, particularly an amplifier, in which the


output signal strength varies in direct proportion to the input signal strength.

 linkrot - Linkrot is the tendency of hypertext links from one Web site to another site to
become useless as other sites cease to exist or remove or reorganize their Web pages.

 Linus Torvalds - Linus Torvalds, the creator of the Linux kernel, was born in Helsinki,
Finland, on December 28, 1969.

 Linux freeware and shareware guide - Here you'll find a number of useful tools that
can be used as is or customized to create your own tools.

 load balancing - Load balancing is a technique used to distribute workloads uniformly


across servers or other compute resources to optimize network efficiency, reliability and
capacity.

 localization - Localization (sometimes shortened to "L10n") is the process of adapting a


product or service to a particular language, culture and desired local "look-and-feel.

 lock - A lock is a mechanism for controlling access to something.

 logarithm (logarithmic) - A logarithm is an exponent used in mathematical calculations


to depict the perceived levels of variable quantities such as visible light energy,
electromagnetic field strength, and sound intensity.

 logical AND symbol - For a practical application, see logic gate.


 logical block addressing (LBA) - Logical block addressing is a technique that allows a
computer to address a hard disk larger than 528 megabytes.

 logical equivalence - Logical equivalence is a type of relationship between two


statements or sentences in propositional logic or Boolean algebra.

 logical implication - Logical implication is a type of relationship between two statements


or sentences.

 logical negation symbol - The logical negation symbol is used in Boolean algebra to
indicate that the truth value of the statement that follows is reversed.

 logical OR symbol - For a practical application, see logic gate.

 logon (or login) - In general computer usage, logon is the procedure used to get access to
an operating system or application, usually in a remote computer.

 longitudinal time code (LTC) - Longitidinal time code (LTC) is a timing signal that is
part of an audio tape recording.

 look-to-book ratio - The look-to-book ratio is a figure used in the travel industry that
shows the percentage of people who visit a travel Web site compared to those who actually
make a purchase.

 lossless and lossy compression - Lossless and lossy compression are terms that describe
whether or not, in the compression of a file, all original data can be recovered when the file is
uncompressed.

 lowerCamelCase - lowerCamelCase (part of CamelCase) is a naming convention in


which a name is formed of multiple words that are joined together as a single word with the
first letter of each of the multiple words (except the first one) capitalized within the new
word that forms the name.

 Luddite - A Luddite is a person who dislikes technology, especially technological


devices that threaten existing jobs or interfere with personal privacy.

 lurking - Lurking is the very common practice of reading an online or e-mail discussion
without taking part in the discussion.
 LZW compression - LZW compression is the compression of a file into a smaller file
using a table-based lookup algorithm invented by Abraham Lempel, Jacob Ziv, and Terry
Welch.

 m-commerce (mobile commerce) - M-commerce (mobile commerce) is the buying and


selling of goods and services through wireless handheld devices such as smartphones and
tablets.

 M-theory - M-theory (the "M" stands for the mother of all theories, magic, mystery, or
matrix, depending on the source) is an adaptation of superstring theory developed by Ed
Witten of Princeton and Paul Townsend of Cambridge.

 Mac mini - The Mac mini from Apple is a low-cost and very compact personal computer
that runs the Mac OS X operating system and is sold without a display, keyboard, or mouse.

 machine code (machine language) - Machine code, also known as machine language, is
the elemental language of computers.

 Macintosh - The Macintosh (often called "the Mac") was the first widely-sold personal
computer with a graphical user interface (GUI) and a mouse.

 magnetic stripe reader (magstripe reader) - A magnetic stripe reader, also called a
magstripe reader, is a hardware device that reads the information encoded in the magnetic
stripe located on the back of a plastic badge.

 marcom (or marcomm) - Marcom (sometimes spelled "marcomm") is an abbreviation


for "marketing communications.

 Master Boot Record (MBR) - The Master Boot Record (MBR) is the information in the
first sector of any hard disk or diskette that identifies how and where an operating system is
located so that it can be boot (loaded) into the computer's main storage or random access
memory.

 master/slave - In computer networking, master/slave is a model for a communication


protocol in which one device or process (known as the master) controls one or more other
devices or processes (known as slaves).
 Mathematical Symbols - This table contains mathematical symbols and links to
definitions of what they represent.

 matrix - Apart from information technology, matrix (pronounced MAY-triks) has a


number of special meanings.

 matter - Matter is a substance that has inertia and occupies physical space.

 Mbps (megabits per second) - Megabits per second (Mbps) are a unit of measurement
for bandwidth and throughput on a network.

 mebibyte (MiB) - A mebibyte (MiB) is a unit of measurement used in computer data


storage.

 medium - A medium is a third-party or element through which a message is


communicated.

 megabit - In data communications, a megabit is a million binary pulses, or 1,000,000


(that is, 106) pulses (or "bits").

 megabyte (MB) - As a measure of computer processor storage and real and virtual
memory, a megabyte (abbreviated MB) is 2 to the 20th power bytes, or 1,048,576 bytes in
decimal notation.

 megabytes per second (MBps) - Megabytes per second (MBps) describes a unit of data
transfer to and from a computer storage device.

 megatransfer - On a Small Computer System Interface (SCSI) computer bus, a


megatransfer is one million data transfers.

 meme - A meme is an idea that is passed on from one human generation to another.

 memory map - A memory map is a massive table, in effect a database, that comprises
complete information about how the memory is structured in a computer system.

 memory read error - A memory read error is a malfunction that occurs when data is
being accessed from memory for use by a program, or when a value read from RAM fails to
match an expected value.
 Mersenne prime (or Marsenne prime) - A Mersenne (also spelled Marsenne) prime is a
specific type of prime number.

 message - (Using e-mail, a message is an individual piece of mail.

 message-driven processing - Message-driven processing is an approach used within the


client/server computing model in which a client (for example, your Web browser) sends a
service request in the form of a specially-formatted message to a program that acts as a
request broker, handling messages from many clients intended for many different server
applications.

 meta - Metadata is a description of data.

 metabolomics - Metabolomics is a term sometimes used to describe the emerging


science of measurement and analysis of metabolites, such as sugars and fats, in the cells of
organisms at specific times and under specific conditions.

 metacharacter - A metacharacter (sometimes spelled meta character or meta-character)


is a special character in a program or data field that provides information about other
characters.

 metasyntactic variable - In programming, a metasyntactic (which derives from meta and


syntax) variable is a variable (a changeable value) that is used to temporarily represent a
function.

 meter - The meter (abbreviation, m; the British spelling is metre) is the International
System of Units (SI) unit of displacement or length.

 meter per second squared - The meter per second squared (symbolized m/s 2 or m/sec 2)
is the Standard International (SI) unit of acceleration vector magnitude.

 metered services (pay-per-use) - Metered services (also called pay-per-use) is any type
of payment structure in which a customer has access to potentially unlimited resources but
only pays for what they actually use.

 metric system - The metric system is considered almost synonymous with the Standard
International System of Units (SI) and is sometimes called the meter-kilogram-second (MKS
or mks) system.
 micro fuel cell - A micro fuel cell is a power source for electronic devices that converts
chemical energy into electrical energy.

 microdata - Microdata is a type of specification language that is embedded within


HTML content to improve machine readability, annotate elements and analyze web pages.

 microrobot - A microrobot is a miniaturized, sophisticated machine designed to perform


a specific task or tasks repeatedly and with precision.

 microsecond - A microsecond (us or Greek letter mu plus s) is one millionth (10 -6) of a
second.

 Microsoft Remote Desktop Web Access (Microsoft RD Web Access) - Microsoft


Remote Desktop Web Access (Microsoft RD Web Access) is a feature in Windows Server
2008 R2 and Windows Server 2012 that allows users to access RemoteApp and Desktop
Connection through the Start menu or a Web browser.

 Microsoft TechNet - Microsoft TechNet is an online resource site that offers IT


professionals free access to learning content and discussion forums.

 Microsoft Windows Control Panel - The Microsoft Windows Control Panel is a


management tool for the Windows operating system (OS) that allows end users to change
settings and manage tasks within the OS.

 Microsoft Windows Defender - Windows Defender is Microsoft's antimalware software.

 middleware - Middleware is software that is used to bridge the gap between applications
and other tools or databases.

 MIDI (Musical Instrument Digital Interface) - MIDI (Musical Instrument Digital


Interface) is a protocol designed for recording and playing back music on digital synthesizers
that is supported by many makes of personal computer sound cards.

 midrange - In general, midrange refers to computers that are more powerful and capable
than personal computers but less powerful and capable than mainframe computers.

 millennium - A millennium is a period of one thousand years.


 Millennium Simulation - The Millennium Simulation is a computer program that uses
the laws of physics and initial conditions at the time the universe was formed to simulate the
structure and the evolution of the universe, and in particular, the evolution of black hole s,
galaxies, and quasar s.

 millimeter (mm, millimetre) - A millimeter (abbreviated as mm and sometimes spelled


as millimetre) is a small unit of length/distance in the metric system, one-thousandth of a
meter (which is similar in length to a yard in the Imperial system of measurement).

 millisecond - (This definition follows U.

 Mini-ITX 2.0 - Mini-ITX 2.0 is a motherboard designed for use in small form factor
personal computers (PCs).

 MIPS (million instructions per second) - The number of MIPS (million instructions per
second) is a general measure of computing performance and, by implication, the amount of
work a larger computer can do.

 MIS (management information systems) - MIS, or management information systems,


is the software and hardware to support critical business applications.

 mobile device - A mobile device is essentially a handheld computer.

 mobo (motherboard) - Mobo is a short form for motherboard that is sometimes used in
Usenet newsgroups and Web forum discussions.

 modeling and simulation (M&S) - Modeling and simulation (M&S) is the use of a
physical or logical representation of a given system to generate data and help determine
decisions or make predictions about the system.

 mole per meter cubed (Avogadro constant) - The mole per meter cubed (mol / m 3) is
the International Unit of amount-of-substance concentration.

 molecule - A molecule is the smallest particle in a chemical element or compound that


has the chemical properties of that element or compound.

 monolithic - Monolithic, in information technology, means either very large or


composed all in one piece, depending on the particular context.
 Monte Carlo method or Monte Carlo analysis - The Monte Carlo method, also called
Monte Carlo analysis, is a means of statistical evaluation of mathematical functions using
random samples.

 moof monster - The moof monster is a vague and indefinable source of trouble for users
of information technology.

 Morse code - Morse code is a method of sending text messages by keying in a series of
electronic pulses, usually represented as a short pulse (called a "dot") and a long pulse (a
"dash").

 Mortimer - A Mortimer is a person who knows a lot about computers or the Internet but
would rather ridicule those who know less than share some knowledge.

 Mosaic - Mosaic was the first widely-distributed graphical browser or viewer for the
World Wide Web.

 most significant bit or byte - The most significant bit (MSB) is the bit in a multiple-bit
binary number with the largest value.

 motherboard - A motherboard is the main printed circuit board (PCB) in a computer.

 motive power - Motive power is a term in thermodynamics referring to the harnessed


energy or force that is used to power a mechanical device or system.

 mouse miles - "Mouse miles" is slang for user time at the computer (as in "I travelled a
lot of mouse miles this week") and also an actual measure of how much activity a computer
mouse has had over time.

 MP3 (MPEG-1 Audio Layer-3) - MP3 (MPEG-1 Audio Layer-3) is a standard


technology and format for a sound sequence into a very small file (about one-twelfth the size
of the original file) while preserving the original level of sound quality when it is played.

 MPEG (Moving Picture Experts Group) - MPEG (pronounced EHM-pehg), the


Moving Picture Experts Group, develops standards for digital video and digital audio
compression.

 mu - The lowercase Greek letter mu is used to represent the prefix multiplier 0.


 multi-core processor - A multi-core processor is an integrated circuit (IC) to which two
or more processors have been attached for enhanced performance, reduced power
consumption, and more efficient simultaneous processing of multiple tasks.

 MultiMediaCard (MMC) - A MultiMediaCard (MMC) is a tiny memory card that uses


flash memory to make storage portable among various devices, such as car navigation
systems, cellular phones, eBooks, PDAs, smartphones, and digital cameras, music players,
and video camcorders, and personal computers.

 multiprocessing - Multiprocessing is the coordinated processing of programs by more


than one computer processor.

 multitasking - Multitasking, in an operating system, is allowing a user to perform more


than one computer task (such as the operation of an application program) at a time.

 multithreading - It is easy to confuse multithreading with multitasking or


multiprogramming, which are somewhat different ideas.

 Murphy's Law - The original Murphy's Law was "If there are two or more ways to do
something, and one of those ways can result in a catastrophe, then someone will do it.

 NAK (negative acknowledgment or not acknowledged) - NAK is an abbreviation for


negative acknowledgment or not acknowledged.

 nanobiomechanics (nanoscale biomechanics) - Nanobiomechanics, also called


nanoscale biomechanics, is a field of biomedical technology that involves measurement of
the mechanical characteristics of individual living cells.

 nanocomputer - A nanocomputer is a computer whose physical dimensions are


microscopic.

 nanomachine (nanite) - A nanomachine, also called a nanite, is a mechanical or


electromechanical device whose dimensions are measured in nanometers (millionths of a
millimeter, or units of 10 -9 meter).

 nanometer - A nanometer is a unit of spatial measurement that is 10-9 meter, or one


billionth of a meter.
 nanosecond (ns or nsec) - (This definition follows U.

 nanotransistor - A nanotransistor is a transistor - the component that acts as an


electronic signal switch or amplifier - that is near the scale of a billionth of a meter (or
nanometer) in size.

 nanotube (carbon nanotube) - A carbon nanotube (CNT) is a miniature cylindrical


carbon structure that has hexagonal graphite molecules attached at the edges.

 native - In computer systems, native means "original" or "basic.

 native app - A native application is a software program that is developed for use on a
particular platform or device.

 nerd - A nerd is a technically bright but socially inept person.

 net - "net" is a top-level domain name.

 net metering - Net metering is a utility resource usage and payment scheme in which a
customer who generates their own power is compensated monetarily.

 network availability - Network availability is the amount of uptime in a network system


over a specific time interval.

 network protocols - Network protocols are sets of established rules that dictate how to
format, transmit and receive data so computer network devices -- from servers and routers to
endpoints -- can communicate regardless of the differences in their underlying infrastructures,
designs or standards.

 network socket - Sockets are created and used with a set of programming requests or
"function calls" sometimes called the sockets application programming interface (API).

 neuromarketing - Neuromarketing is the study of how people's brains respond to


advertising and other brand-related messages by monitoring brainwave activity, eye-tracking
and skin response.

 neutrino - A neutrino is a sub atom ic particle with no electric charge.


 newbie - A newbie (pronounced NOO-bee) is a novice or neophyte: anyone who is new
to any particular type of endeavor, such as a sport or a technology.

 newton - The newton is the Standard International (SI) unit of force.

 nibble - In computers and digital technology, a nibble (pronounced NIHB-uhl;


sometimes spelled nybble) is four binary digits or half of an eight-bit byte.

 Nikola Tesla - Nikola Tesla was a Serbian-American scientist, electrical engineer, and
inventor whose research laid much of the groundwork for modern electrical and
communication systems.

 nil - In general use, nil (a contraction of Latin "nihil") means "nothing" or the absence of
something.

 nomadicity - Nomadicity is the tendency of a person, or group of people, to move with


relative frequency.

 non-geographic number - A non-geographic number, also called a virtual number, is a


telephone number associated with a country, but not to any single geographic location within
that country.

 norm - A norm (from norma, Latin for carpenter's square) is a model of what should
exist or be followed, or an average of what currently does exist in some context, such as an
average salary among members of a large group.

 normative - In general, normative - pertaining to a norm - has two related meanings: (a


prescriptive meaning (for example, the rules specified in a standard or guideline), and (2) a
descriptive meaning (for example, the median salary range in an particular occupation).

 nuclear fusion - Nuclear fusion is an atomic reaction in which multiple atoms combine
to create a single, more massive atom.

 null set - In mathematical sets, the null set, also called the empty set, is the set that does
not contain anything.
 number theory (higher arithmetic) - Number theory, also known as higher arithmetic,
is a branch of mathematics concerned with the properties of integer s, rational number s,
irrational number s, and real number s.

 OA&M (operations, administration, and management) - OA&M (operations,


administration, and management) is a general term used to describe the costs, tasks involved,
or other aspects of operating, administering, and managing something such as a computer
network.

 object code - Source code and object code refer to the "before" and "after" versions of a
computer program that is compiled (see compiler) before it is ready to run in a computer.

 object ID (OID) - An object identifier (OID) is an unambiguous, long-term name for any
type of object or entity.

 obliquity - In systems engineering, obliquity is a theory that proposes the best way to
achieve a goal when you are working with a complex system is to take an indirect approach
instead of a direct one.

 Ockham's razor (Occam's razor) - Ockham's razor (also spelled Occam's razor,
pronounced AHK-uhmz RAY-zuhr) is the idea that, in trying to understand something,
getting unnecessary information out of the way is the fastest way to the truth or to the best
explanation.

 octal - Octal (pronounced AHK-tuhl, from Latin octo or "eight") is a term that describes
a base-8 number system.

 octet - In computers, an octet (from the Latin octo or "eight") is a sequence of eight bit s.

 OEM (original equipment manufacturer) - OEM, or original equipment manufacturer,


is a broad term that describes a web of relationships among IT hardware vendors, hardware
component makers, software vendors and channel partners such as resellers and distributors.

 office cubicle - An idea that is now over 40 years old, the office cubicle is a somewhat
partitioned space for one or several workers in what is otherwise an unpartitioned and open
building space for offices.
 offline - Offline is the condition of being capable of but currently not connected to a
network of computers or other devices.

 offshore outsourcing - Offshore outsourcing, a type of business process outsourcing


(BPO), is the exporting of IT-related work from the United States and other developed
countries to areas of the world where there is both political stability and lower labor costs or
tax savings.

 ohnosecond - An ohnosecond is that very short moment in time during which you realize
that you have pressed the wrong key and deleted hours, days, or weeks of work.

 OK - OK (pronounced oh-KAY and occasionally spelled okay) is a short way to say "I
agree.

 on the fly - In relation to computer technology, "on the fly" describes activities that
develop or occur dynamically rather than as the result of something that is statically
predefined.

 on-demand computing - On-demand (OD) computing is an increasingly popular


enterprise model in which computing resources are made available to the user as needed.

 one-banana problem - A one-banana problem is an easily resolved issue.

 online - Online is the condition of being connected to a network of computers or other


devices.

 onshore outsourcing (domestic outsourcing) - Onshore outsourcing (also called


domestic outsourcing) is the obtaining of services from someone outside a company but
within the same country.

 ontology - In general, ontology (pronounced ahn-TAH-luh-djee) is the study or concern


about what kinds of things exist - what entities there are in the universe.

 ooblick - According to Eric Raymond, compiler of The New Hacker's Dictionary,


"ooblick" derives from the Dr.

 open - In information technology, a product or system is described as open when its


workings are exposed to the public and capable of being modified or improved by anyone.
 open system - In a computing context, an open system is an open source operating
system, typically composed of coordinated modular components from a number of sources
and not reliant upon any proprietary elements.

 operand - In computers, an operand is the part of a computer instruction that specifies


data that is to be operating on or manipulated and, by extension, the data itself.

 operation - An operation, in mathematics and computer science, is an action that is


carried out to accomplish a given task.

 operations research (OR) - Operations research (OR) is an analytical method of


problem-solving and decision-making that is useful in the management of organizations.

 order of magnitude - An order of magnitude is an exponential change of plus-or-minus


1 in the value of a quantity or unit.

 Our Favorite Technology Quotations - These are some of our favorite quotations about
computers, the Internet, and technology in general.

 out of the box - "Out of the box" is an expression that describes nonconformal, creative
thinking.

 outsourcing - Outsourcing is a business practice in which a company hires another


company or an individual to perform tasks, handle operations or provide services that are
either usually executed or had previously been done by the company's own employees.

 overhead - In business accounting, overhead is general operating expenses, including


such items as heat and electricity for the premises, that have no direct relationship to the
production or selling of a company's goods and services.

 packet-switched - Packet-switched describes the type of network in which relatively


small units of data called packets are routed through a network based on the destination
address contained within each packet.

 page - On the World Wide Web, a page is a file notated with the Hypertext Markup
Language (HTML).
 pagefile - In storage, a pagefile is a reserved portion of a hard disk that is used as an
extension of random access memory (RAM) for data in RAM that hasn't been used recently.

 paper and binding sizes - Standard weights and measures provided by S.

 para-site - A para-site is a Web site that frames other Web sites or pages within its own
site.

 paradigm - A paradigm (pronounced PEHR-uh-daim, from Greek paradeiknyai - to


show side by side) is a pattern or an example of something.

 paradox - A paradox is a statement or concept that contains conflicting ideas.

 parallel - In the context of the Internet and computing, parallel means more than one
event happening at a time.

 parallel processing - Parallel processing is a method in computing of running two or


more processors (CPUs) to handle separate parts of an overall task.

 parallel processing software - Parallel processing software manages the execution of a


program on parallel processing hardware with the objectives of obtaining unlimited
scalability (being able to handle an increasing number of interactions at the same time) and
reducing execution time.

 PARC (Palo Alto Research Center) - PARC is Xerox's Palo Alto Research Center,
located in Palo Alto, California, in the high-tech area that has become known as Silicon
Valley.

 parity - Parity is a method of detecting errors in data transmissions between computers,


while parity bit and parity checking are used in RAID technology to guard against data loss.

 PC Card - A PC Card (previously known as a PCMCIA card) is a credit card-size


memory or I/O device that fits into a personal computer, usually a notebook or laptop
computer.

 PC philanthropy - PC philanthropy is sharing some of the unused resources of your


personal computer, especially unused computer cycles, to benefit a social cause.
 Pepys' weblog - The famous diary that Samuel Pepys (pronounced PEEPS), once the
head of England's Navy, kept during the years 1660-1669 is being made available online in
the form of a weblog.

 performance - Performance seems to have two meanings: The speed at which a


computer operates, either theoretically (for example, using a formula for calculating Mtops -
millions of theoretical instructions per second) or by counting operations or instructions
performed (for example, (MIPS) - millions of instructions per second) during a benchmark
test.

 personal operating space (POS) - A personal operating space (POS) is a roughly


spherical region that surrounds a portable or handheld digital wireless device operated by a
person.

 personality profile - A personality profile is a knowledge management tool used to


provide an evaluation of an employee's personal attributes, values and life skills in an effort
to maximize his or her job performance and contribution to the company.

 pervasive computing (ubiquitous computing) - Pervasive computing, also called


ubiquitous computing, is the growing trend of embedding computational capability
(generally in the form of microprocessors) into everyday objects to make them effectively
communicate and perform useful tasks in a way that minimizes the end user's need to interact
with computers as computers.

 petaflop - A petaflop is a measure of a computer's processing speed and can be expressed


as a quadrillion (thousand trillion) floating point operations per second (FLOPS).

 pharming - Pharming is a scamming practice in which malicious code is installed on a


personal computer or server, misdirecting users to fraudulent Web sites without their
knowledge or consent.

 phase-change memory (PCM) - Phase-change memory (PCM) is a form of computer


RAM (random-access memory) that stores data by altering the state of the matter from which
the device is fabricated.

 phenomenon - A phenomenon, in a scientific context, is something that is observed to


occur or to exist.
 photometric stereo - Photometric stereo is a computer vision method of analyzing and
detailing the contour and reflectivity of a surface in 3D (three-dimensional) space.

 photonic ink (P-Ink) - Photonic ink (P-Ink) is a substance that can change color
electronically.

 photonics - Photonics is an area of study that involves the use of radiant energy (such as
light), whose fundamental element is the photon.

 physical security - Physical security is the protection of people and systems from
damage or loss due to physical events such as fire, flood, disasters, crimes or accidents.

 pi - Pi is a numerical constant that represents the ratio of a circle's circumference to its


diameter on a flat plane surface.

 picosecond - A picosecond is one trillionth (10 -12) of a second, or one millionth of a


microsecond.

 pictograph - In graph theory, a pictograph is a graph that shows numerical information


by using picture symbols or icons to represent data sets.

 pie graph (or pie chart) - A pie graph (or pie chart) is a specialized graph used in
statistics.

 pin or PIN - A pin is a pronged contact as part of a signal interface in a computer or


other communications device.

 ping strangeness - Ping strangeness is a term used in troubleshooting to describe the


incidence of an unusual pattern of ICMP ECHO_REQUEST packets being sent to a specific
network node or an unusual number of error messages returning.

 pipelining - In computers, a pipeline is the continuous and somewhat overlapped


movement of instruction to the processor or in the arithmetic steps taken by the processor to
perform an instruction.

 pixel - The pixel (a word invented from "picture element") is the basic unit of
programmable color on a computer display or in a computer image.
 pixilated - Pixilated, an adjective derived from pixie (a fairy elf), describes someone who
is whimsical or bemused, slightly drunk (tipsy), or, according to Webster's, "somewhat
unbalanced mentally.

 placeshifting - Placeshifting (or place shifting) is a technology that allows anyone with a
broadband Internet connection to have video streams from their home television set or
personal video recorder (PVR) forwarded for viewing at any location where they have a
computer display and a high-speed Internet connection.

 platform - A computer platform is an underlying computer system on which application


programs can run, or, in general, any base of technologies on which other technologies or
processes are built.

 plesiochronous - Plesiochronous (pronounced plee-see-AH-krun-us, from Greek plesos,


meaning close, and chronos, meaning time) is an adjective that describes operations that are
almost, but not quite, in synchronization - in other words, almost synchronous.

 plug-in - Plug-in applications are programs that can easily be installed and used as part of
your Web browser.

 polar coordinates - Polar coordinates provide a method of rendering graphs and


indicating the positions of points on a two-dimensional (2D) surface.

 Polish notation (prefix notation) - Polish notation, also known as prefix notation, is a
symbolic logic invented by Polish mathematician Jan Lukasiewicz in the 1920's.

 polled interrupt - In a computer, a polled interrupt is a specific type of I/O interrupt that
notifies the part of the computer containing the I/O interface that a device is ready to be read
or otherwise handled but does not indicate which device.

 polynomial - A polynomial is a mathematical expression consisting of a sum of terms,


each term including a variable or variables raised to a power and multiplied by a coefficient.

 portal - Portal is a term, generally synonymous with gateway, for a World Wide Web
site that is or proposes to be a major starting site for users when they get connected to the
Web or that users tend to visit as an anchor site.
 portrait - In computer printing, portrait is a mode in which the printer orients content for
reading across the shorter length (the width) of the sheet of paper.

 positional assembly - Positional assembly is a technique that has been suggested as a


means to build objects, devices, and systems on a molecular scale using automated processes
in which the components that carry out the construction process would follow programmed
paths.

 POST (Power-On Self-Test) - When power is turned on, POST (Power-On Self-Test) is
the diagnostic testing sequence that a computer's basic input/output system (or "starting
program") runs to determine if the computer keyboard, random access memory, disk drives,
and other hardware are working correctly.

 pounds per square inch (PSI) - PSI is commonly used to measure the pressure of gasses
(pneumatic pressure) or liquids (hydraulic pressure).

 power user - A power user, also called a super user, is someone whose computer skills
are better than those of an organization's average end user.

 predictive technology - Predictive technology is a body of tools capable of discovering


and analyzing patterns in data so that past behavior can be used to forecast likely future
behavior.

 printed circuit board (PCB) - A printed circuit board (PCB) is the board base for
physically supporting and wiring surface-mounted and socketed components in most
electronics.

 probability - Probability is a branch of mathematics that deals with calculating the


likelihood of a given event's occurrence, which is expressed as a number between 1 and 0.

 problem program - Now seldom used, the term problem program is used to distinguish
a computer program that directly supports a user application from an operating system, a
utility, or any other underlying support programming.

 product - In information technology, a product is something (for example, a software


application) that is created and then made available to customers, usually with a distinct
name or order number.
 program - In computing, a program is a specific set of ordered operations for a computer
to perform.

 project management - Project management is the discipline of using established


principles, procedures and policies to successfully guide a project from conception through
completion.

 project planning - Project planning is a discipline for stating how to complete a project
within a certain timeframe, usually with defined stages, and with designated resources.

 propagation delay - Propagation delay, symbolized tpd, is the time required for a digital
signal to travel from the input(s) of a logic gate to the output.

 propeller head (or propellor head, prop head, prophead) - A propeller head (also
spelled propellor head, and sometimes shortened to prop head or prophead) is jargon for
someone who is exceptionally, perhaps weirdly bright or knowledgeable, especially in some
technical field.

 proper subset symbol - The proper subset symbol indicates a specific relationship
between two set s.

 proportionality - In mathematics, proportionality indicates that two quantities or


variables are related in a linear manner.

 prototype - In software development, a prototype is a rudimentary working model of a


product or information system, usually built for demonstration purposes or as part of the
development process.

 pseudo-random number generator (PRNG) - A pseudo-random number generator


(PRNG) is a program written for, and used in, probability and statistics applications when
large quantities of random digits are needed.

 public domain software - Programs that are uncopyrighted because their authors
intended to share them with everyone else are in the public domain.

 public sector - The public sector is the segment of an economic system that is controlled
by government; it contrasts with the private sector, which is run by private citizens.
 pulse amplitude modulation (PAM) - Pulse amplitude modulation (PAM) is the
transmission of data by varying the amplitudes (voltage or power levels) of the individual
pulses in a regularly timed sequence of electrical or electromagnetic pulses.

 Q format - Q (number) format is a fixed-point method of coding fractional and whole


integers for processing by a computer’s CPU or a digital signal processor (DSP).

 quality - In an information technology product or service, quality is sometimes defined


as "meeting the requirements of the customer.

 quantum - Quantum is the Latin word for amount and, in modern understanding, means
the smallest possible discrete unit of any physical property such as energy or matter.

 quantum computer - A quantum computer is a machine, as-yet hypothetical, that


performs calculations based on the behavior of particles at the sub-atomic level.

 quantum computing - Quantum computing is the area of study focused on developing


computer technology based on the principles of quantum theory, which explains the nature
and behavior of energy and matter on the quantum (atomic and subatomic) level.

 quantum internet - The quantum internet is a theoretical system of interconnected


quantum computers that uses quantum signals to send information rather than radio waves.

 quantum microphone - A quantum microphone is an extremely device that detects the


smallest particles of sound, such as packets of vibrational energy called phonons.

 quantum supremacy - Quantum supremacy is the experimental demonstration of a


quantum computer's dominance and advantage over classic computers by performing
calculations that were previously impossible at unmatched speeds.

 quantum theory - Quantum theory is the theoretical basis of modern physics explaining
the nature and behavior of matter and energy on the atomic and subatomic level, sometimes
called quantum mechanics or quantum physics.

 quark - A quark is one of two currently recognized groups of fundamental particles,


which are subatomic, indivisible (at least as far as we know today) particles that represent the
smallest known units of matter.
 qubit - A qubit is a quantum bit, the counterpart in quantum computing to the binary
digit or bit of classical computing.

 queries-per-second (QPS) - Queries-per-second (QPS) (or the query-per-second rate) is


a measure of how much traffic a particular query server is handling at a given time.

 queue - In general, a queue is a line of people or things waiting to be handled, usually in


sequential order starting at the beginning or top of the line or sequence.

 queueing theory - In computer science, queueing theory is the study of queues as a


technique for managing processes and objects in a computer.

 quiet zone - In barcode technology, a quiet zone is the blank margin on either side of a
bar code that's used to tell the barcode reader where a barcode's symbology starts and stops.

 Quiz: Talkin' tech turkey - A quiz full of tasty tech terms.

 Quiz: Who Done IT? A Murder Mystery - How to take the quiz: - After reading the
question, click on the answer that you think is correct.

 radian - The radian is the Standard International (SI) unit of plane angular measure.

 radian per second (rad/s or rad/sec) - The radian per second (symbolized rad/s or
rad/sec) is the Standard International (SI) unit of angular (rotational) speed.

 radian per second squared - The radian per second squared is the unit of angular
(rotational) acceleration magnitude in the International System of Units (SI).

 random numbers - Random numbers are numbers that occur in a sequence such that two
conditions are met: ( the values are uniformly distributed over a defined interval or set, and
(2) it is impossible to predict future values based on past or present ones.

 raster graphics - Raster graphics are digital images created or captured (for example, by
scanning in a photo) as a set of samples of a given space.

 ratio - In general, a ratio is a way of concisely showing the relationship between two
quantities of something.
 rational number - A rational number is a number determined by the ratio of some
integer p to some nonzero natural number q.

 raw data (source data or atomic data) - Raw data (sometimes called source data or
atomic data) is data that has not been processed for meaningful use.

 read-only - Read-only is a file attribute which only allows a user to view a file,
restricting any writing to the file.

 read-only memory (ROM) - Read-only memory, or ROM, is a type of computer storage


containing non-volatile, permanent data that, normally, can only be read, not written to.

 real number - A real number is any element of the set R, which is the union of the set of
rational numbers and the set of irrational numbers.

 real time - Real time is a level of computer responsiveness that a user senses as
sufficiently immediate or that enables the computer to keep up with some external process
(for example, to present visualizations of the weather as it constantly changes).

 real-time monitoring - Real-time monitoring is the streaming of continuously updated


zero to low latency information.

 Rear Admiral Grace Murray Hopper - Grace Murray Hopper (1906-1992) was a
pioneer in computer science.

 reboot (warm boot, cold boot) - To reboot is to restart a computer and reload the
operating system.

 refresh - In a computer display, to refresh is to redraw the image information from


memory.

 reliability - Reliability is an attribute of any computer-related component (software, or


hardware, or a network, for example) that consistently performs according to its
specifications.

 reload - In computers, to reload is to start a program over again, usually because it has
crashed or because it has begun to display aberrant behavior.
 remote-control software - Remote-control software is programming in a central or
server computer that is used to control other computers (or their users) at a distance, either
under the control of an administrator or at the request of the user.

 replicator - A replicator is an object or organism that can make copies of itself.

 request for quotation (RFQ) - A request for quotation (RFQ) is a document that an
organization submits to one or more potential suppliers eliciting quotations for a product or
service.

 reseller - In information technology, a reseller is a company that typically purchases IT


products or services from a product manufacturer, distributor or service provider and then
markets them to customers.

 resolution - In computers, resolution is the number of pixels (individual points of color)


contained on a display monitor, expressed in terms of the number of pixels on the horizontal
axis and the number on the vertical axis.

 response time - According to the IBM Dictionary of Computing (which cites


International Organization for Standardization Information Technology Vocabulary as the
source), response time is: The elapsed time between the end of an inquiry or demand on a
computer system and the beginning of a response; for example, the length of the time
between an indication of the end of an inquiry and the display of the first character of the
response at a user terminal.

 return merchandise authorization (RMA) - An RMA (return merchandise


authorization) is a numbered authorization provided by a mail-order merchant to permit the
return of a product.

 reverse engineering - Reverse engineering is taking apart an object to see how it works
in order to duplicate or enhance the object.

 RGB (red, green, and blue) - RGB (red, green, and blue) refers to a system for
representing the colors to be used on a computer display.

 RISC (reduced instruction set computer) - RISC (reduced instruction set computer) is
a microprocessor that is designed to perform a smaller number of types of computer
instructions so that it can operate at a higher speed (perform more millions of instructions per
second, or MIPS).

 Riven - Riven is the sequel to Myst, the best-selling puzzle-and-exploration computer


game on CD-ROM from Broderbund.

 Robokoneko (robot kitten) - The Robokoneko was a proposed robot kitten (robot +
Japanese ko for "child" + neko for "cat") that was intended to have a remote computer brain
containing "neural net" modules that could evolve their intelligence based on experience and
prearranged rules.

 robot - A robot is a machine designed to execute one or more tasks automatically with
speed and precision.

 robotics - Robotics is a branch of engineering that involves the conception, design,


manufacture, and operation of robots.

 RoC (restart on crash) - RoC (restart on crash) is a functionality built into Windows
that automatically restarts an operating system or application when it hangs, freezes or
crashes.

 rogue - In general, a rogue is someone who strays from the accepted path, is mischievous,
or is a cheat.

 ROI (return on investment) - For a given use of money in an enterprise, the ROI (return
on investment) is how much profit or cost saving is realized as a result.

 ROM emulation - ROM emulation is the process of copying data from a ROM (read-
only memory) chip to a storage medium such as a hard disk or flash memory.

 root cause analysis - Root cause analysis is a way to determine how a problematic event
occurred by examining why, how and when the casual factors happened after the fact.

 rotoscoping - For either broadcast video or Internet streaming video, rotoscoping is the
rotated projection of a sequence of usually photographed action image frames so that the
artist can trace from the frame or create an image to superimpose on it.
 run book - In a computer system or network, a run book is a written set of procedures for
the routine and exceptional operation of the system or network by an administrator or
operator.

 runt - In networks, a runt is a packet that is too small.

 runtime system - A runtime system is an engine that translates a given programming


language or languages into machine code.

 S-Video (Super-Video, Y/C Video, component video) - S-Video (Super-Video,


sometimes referred to as Y/C Video, or component video) is a video signal transmission in
which the luminance signal and the chrominance signal are transmitted separately to achieve
superior picture clarity.

 sample rate - In developing an audio sound for computers or telecommunication, the


sample rate is the number of samples of a sound that are taken per second to represent the
event digitally.

 Sarbanes-Oxley Act (SOX) - The Sarbanes-Oxley Act of 2002 is a federal law that
established sweeping auditing and financial regulations for public companies.

 satellite constellation (satellite swarm) - A satellite constellation, also called a satellite


swarm, is a system of satellites that work together to achieve a single purpose.

 scalability - It is the ability of a computer application or product (hardware or software)


to continue to function well as it (or its context) is changed in size or volume in order to meet
a user need.

 Schrodinger's cat - Schrödinger's cat is a famous hypothetical experiment designed to


point out a flaw in the Copenhagen interpretation of superposition as it applies to quantum
theory.

 scientific method - Scientific method is a logical approach to seeking knowledge that


involves forming and testing a hypothesis.

 scientific notation (power-of-10 notation) - Scientific notation, also called power-of-10


notation, is a method of writing extremely large and small numbers.
 search neutrality - Search neutrality is the direct conducting of transparent search
processes that do not discriminate between users or favor specific sites.

 search operator - A search operator (sometimes referred to as a search parameter) is a


character or string of characters used in a search engine query to narrow the focus of the
search.

 searching - On the Internet, searching is just trying to find the information you need.

 seat - In a networked computer system, a seat is a workstation that can be operated by


one user at a time.

 seat management - Seat management is a method of coordinating all the workstations in


an enterprise network by overseeing the installation, operation, and maintenance of hardware
and software at each workstation.

 second (s or sec) - The second (abbreviation,s or sec) is the Standard International (SI)
unit of time.

 segmented memory - Segmented memory is a system of addressing computer memory,


which may be physical or virtual and may be operating in real or protected mode.

 self-assembly - Self-assembly is a branch of nanotechnology in which objects, devices,


and systems form structures without external prodding.

 self-healing - In information technology, self-healing describes any device or system that


has the ability to perceive that it is not operating correctly and, without human intervention,
make the necessary adjustments to restore itself to normal operation.

 Self-Monitoring Analysis & Reporting Technology (S.M.A.R.T.) - Self-Monitoring


Analysis and Reporting Technology (S.

 self-replication - In nanotechnology, self-replication is a process in which devices whose


diameters are of atomic scale, on the order of nanometers, create copies of themselves.

 sensor - A sensor is a device that detects and responds to some type of input from the
physical environment.
 sequential logic - Sequential logic is a form of binary circuit design that employs one or
more inputs and one or more outputs, whose states are related by defined rules that depend,
in part, on previous states.

 serendipity - In general, serendipity is the act of finding something valuable or delightful


when you are not looking for it.

 serial - Serial means one event at a time.

 serial presence detect (SPD) - When a computer is booted (started), serial presence
detect (SPD) is information stored in anelectrically erasable programmable read-only
memory (EEPROM) chip on a synchronous dynamic random access memory (SDRAM)
memory module that tells thebasic input/output system (BIOS) the module's size, data width,
speed, and voltage.

 server - A server is a computer program or device that provides a service to another


computer program and its user, also known as the client.

 server stack - A server stack is the collection of software that forms the operational
infrastructure on a given machine.

 server virtualization - Server virtualization is a process that creates and abstracts


multiple virtual instances on a single server.

 server-side include (SSI) - A server-side include is a variable value (for example, a file
"Last modified" date) that a server can include in an HTML file before it sends it to the
requestor.

 service-level management - Service-level management is the monitoring and


management of the quality of service(QoS) of an entity's key performance indicators(KPIs).

 service-oriented architecture (SOA) - Service-oriented architecture (SOA) is a software


development model that allows services to communicate across different platforms and
languages to form applications.

 service-oriented integration (SOI) - SOI is also an abbreviation for Silicon-On-


Insulator.
 service-oriented management (SOM) - Service-oriented management (SOM) is the
operational management of service delivery within a service-oriented architecture (SOA).

 session - In telecommunication, a session is a series of interactions between two


communication end points that occur during the span of a single connection.

 set - A set is a group or collection of objects or numbers, considered as an entity unto


itself.

 Shannon's Law - Shannon's Law, formulated by Claude Shannon, a mathematician who


helped build the foundations for the modern computer, is a statement in information theory
that expresses the maximum possible data speed that can be obtained in a data channel.

 shebang (#!) - Among UNIX shell (user interface) users, a shebang is a term for the "#!"
characters that must begin the first line of a script.

 shift register - A shift register is a digital memory circuit found in calculators, computers,
and data-processing systems.

 shovelware - Shovelware is content taken from any source and put on the Web as fast as
possible with little regard for appearance and usability.

 Siebel - Siebel Systems is a prominent vendor of interoperable e-business software.

 significant figures - The term significant figures refers to the number of important single
digits (0 through 9 inclusive) in the coefficient of an expression in scientific notation.

 silicon (Si) - Silicon is a chemical element (its symbol in chemical formula expressions is
"Si") that is present in sand and glass and which is the best known semiconductor material in
electronic components.

 Silicon Alley - Silicon Alley is the growing community of Internet and computer-
oriented businesses, mainly startup companies, in the New York metropolitan area,
particularly Manhattan's downtown.

 simplicity - In information technology, simplicity is a quality that is frequently sought by


both users and technologists, although, as users frequently attest, it is not always found.
 single-system image (SSI) - Single-system image (SSI) is the idea that the resources
provided by cluster computing or in any system which aggregates resources should present a
single interface to the user.

 site map - A site map is a visual or textually organized model of a Web site's content that
allows the users to navigate through the site to find the information they are looking for, just
as a traditional geographical map helps people find places they are looking for in the real
world.

 six degrees of separation - Six degrees of separation is the theory that any person on the
planet can be connected to any other person on the planet through a chain of acquaintances
that has no more than five intermediaries.

 Six Sigma - Six Sigma is an approach to data-driven management that seeks to improve
quality by measuring how many defects there are in a process and systematically eliminating
them until there are as close to zero defects as possible.

 SKU (stockkeeping unit) - SKU (stockkeeping unit, sometimes spelled "Sku") is an


identification, usually alphanumeric, of a particular product that allows it to be tracked for
inventory purposes.

 SkunkWorks project (Skunk Works) - A SkunkWorks project (also known as Skunk


Works) is an innovative undertaking, involving a small group of people, that is outside the
normal research and development channels within an organization.

 slack space (file slack space) - Slack space is the difference between its logical and
physical size.

 Slashdot Effect - The Slashdot Effect is the sudden, relatively temporary surge in traffic
to a Web site that occurs when a high-traffic Web site or other source posts a story that refers
visitors to another Web site.

 sleep mode - Sleep mode, sometimes called standby or suspend mode, is a power-sparing
state that a computer can enter when not in use.

 slice and dice - To slice and dice is to break a body of information down into smaller
parts or to examine it from different viewpoints so that you can understand it better.
 slow-scan television (SSTV) - Slow-scan television (SSTV) is a mode of video
communications in which a sequence of fixed images is sent and received at intervals of
several seconds.

 slowness movement - The slowness movement is a grassroots reaction to the hectic pace,
overwork, and lack of leisure typical of modern life.

 Small Office Home Office (SOHO) - In information technology, SOHO is a term for the
small office or home office environment and business culture.

 smart machines - A smart machine is a device embedded with machine-to-machine


(M2M) and/or cognitive computing technologies such as artificial intelligence (AI), machine
learning or deep learning, all of which it uses to reason, problem-solve, make decisions and
even, ultimately, take action.

 SMB (small and medium-sized business or small and midsized business) - SMB is an
abbreviation for small and medium-sized business, sometimes seen as small and midsized
business.

 smiley - In Internet e-mail messages and Web discussions, a smiley is a sequence of


typed characters that graphically produces the sideways image of someone smiling, like
this::-)The first use of a smiley is currently attributed to Scott E.

 SNAFU (situation normal, all f***ed up) - SNAFU is an acronym for "situation normal,
all f***ed up.

 snap-in - Snap-in, in general, refers to an object that can be attached to another object
and that will then function as part of the whole.

 sneakernet - Sneakernet is a jargon term for the method of transmitting electronic


information by personally carrying it from one place to another on floppy disk or other
removable medium.

 Sniglet - Words that should be in the dictionary (but aren't) - A sniglet is a word that
should be in the dictionary but isn't.

 snoopware - In mobile computing, snoopware is malware that is capable of monitoring


activity on a smartphone.
 soft copy - A soft copy (sometimes spelled "softcopy") is an electronic copy of some
type of data, such as a file viewed on a computer's display or transmitted as an e-mail
attachment.

 soft error - A soft error is an issue that causes a temporary condition in RAM that alters
stored data in an unintended way.

 soft reset - A soft reset is a restart of a device, such as a smartphone, tablet, laptop or
personal computer (PC).

 software - Software is a set of instructions, data or programs used to operate computers


and execute specific tasks.

 software package - A software package is an assemblage of files and information about


those files.

 sound card - A sound card (also referred to as an audio card) is a peripheral device that
attaches to the ISA or PCI slot on a motherboard to enable the computer to input, process,
and deliver sound.

 sound wave - A sound wave is the pattern of disturbance caused by the movement of
energy traveling through a medium (such as air, water, or any other liquid or solid matter) as
it propagates away from the source of the sound.

 space - In mathematics, space is an unbounded continuum (unbroken set of points) in


which exactly three numerical coordinates are necessary to uniquely define the location of
any particular point.

 spaghetti code - Spaghetti code is a derogatory term for computer programming that is
unnecessarily convoluted, and particularly programming code that uses frequent branching
from one section of code to another.

 spam for life (S4L) - S4L is an online chat acronyms for "spam for life," the possible
result of subscribing to an online service or becoming anyone's customer or client.

 spamdexing - Spamdexing, coined from spam and index, is the practice of including
information in a Web page that causes search engines to index it in some way that produces
results that satisfy the spamdexer but usually dissatisify the search engine providers and
users.

 spectrum analyzer - A spectrum analyzer is a device that displays signal amplitude


(strength) as it varies by signal frequency.

 speech synthesis - Speech synthesis is the computer-generated simulation of human


speech.

 speed of gravity - The speed of gravity is the rate, in meters per second or other standard
units, at which gravitational fields or effects propagate through space.

 spin (angular momentum) - Spin, in physics, is the velocity of rotation of something


around a particular axis.

 splash page (splash screen) - A splash page (or splash screen) is: An initial Web site
page used to capture the user's attention for a short time as a promotion or lead-in to the site
home page or to tell the user what kind of browser and other software they need to view the
site.

 spod - On the Internet in the United Kingdom, a spod is a person who frequents chat
rooms or discussion groups a little too frequently.

 square root symbol - The square root symbol () is used to indicate the quantity or
quantities which, when multiplied by itself or themselves, results in the quantity
encompassed by the symbol.

 Squid proxy server - Squid is a Unix-based proxy server that caches Internet content
closer to a requestor than its original point of origin.

 SRAM (static random access memory) - SRAM (static RAM) is random access
memory (RAM) that retains data bits in its memory as long as power is being supplied.

 stack - TCP/IP is frequently referred to as a "stack.

 standard - A standard is a generally agreed-upon technology, method or format for a


given application.
 standards organization - A standards organization, sometimes referred to as a standards
body, is an organization with authority to endorse official standards for given applications.

 standby power - Standby power is electrical power that a device consumes when not in
present use, but plugged in to a source of power and ready to be used.

 state machine - In general, a state machine is any device that stores the status of
something at a given time and can operate on input to change the status and/or cause an
action or output to take place for any given change.

 statistical mean, median, mode and range - Calculating the mean, median, mode and
range of a set of numbers allows you to track changes over time and set acceptable ranges
and variance.

 STEM (science, technology, engineering, and mathematics) - STEM is an educational


program developed to prepare primary and secondary students for college and graduate study
in the fields of science, technology, engineering, and mathematics (STEM).

 steradian - The steradian (symbolized sr) is the Standard International (SI) unit of solid
angular measure.

 stereoscopy (stereoscopic imaging) - Stereoscopy, sometimes called stereoscopic


imaging, is a technique used to enable a three-dimensional effect, adding an illusion of depth
to a flat image.

 stickiness - Stickiness is anything about a Web site that encourages a visitor to stay
longer.

 storage consolidation - Storage consolidation, also called storage convergence is a


method of centralizing data storage among multiple servers.

 storage filer - A storage filer is a file server designed and programmed for high-volume
data storage, backup, and archiving.

 storage medium (storage media) - In computers, a storage medium is any technology --


including devices and materials -- used to place, keep and retrieve electronic data.
 storage utilization - Storage utilization is a measure of how well the available data
storage space in an enterprise is used.

 storage volume - A definition of volume must include a comparison of the unit of data
storage to a partition, as well as insight into logical volume management, a form of storage
virtualization.

 straw man - In general, a straw man is an object, document, person, or argument that
temporarily stands in for and is intended to be "knocked down" by something more
substantial.

 streaming media - Streaming media is video or audio content sent in compressed form
over the Internet and played immediately, rather than being saved to the hard drive.

 subset symbol - The subset symbol indicates a specific relationship between two sets.

 suffix - A suffix is something added at the end of a word that conditions its usage or
meaning.

 summation (sum) - A summation, also called a sum, is the result of arithmetically


adding numbers or quantities.

 Sun Microsystems - Sun Microsystems (often just called "Sun"), the leading company in
computers used as Web servers, also makes servers designed for use as engineering
workstations, data storage products, and related software.

 supercomputer - The first commercially successful supercomputer, the CDC (Control


Data Corporation) 6600 was designed by Seymour Cray.

 supercomputer center - In general, a supercomputer center is a site with a


supercomputer that is shared by a number of other sites, usually research sites.

 superposition - Superposition is the ability of a quantum system to be in multiple states


at the same time until it is measured.

 superstring theory (string theory, Theory of Everything) - Superstring theory - known


less formally as "string theory" - is sometimes called the Theory of Everything (TOE),
because it is a unifying physics theory that reconciles the differences between quantum
theory and the theory of relativity to explain the nature of all known forces and matter.

 support - In information technology, support refers to functionality that is provided


between or among products, programs, devices, modes, or accessories.

 surd - A surd is a number or quantity that cannot be expressed as the ratio of two integer
s.

 surf - In using the World Wide Web, to surf is to either: Explore a sequence of Web sites
in a random, unplanned way, or2) Simply use the Web to look for something in a questing
way.

 symbology - A symbology is a protocol for arranging the bars and spaces that make up a
particular kind of bar code.

 symmetric communications - Compare asymmetric communications.

 synchronicity - Synchronicity is a concept developed by psychologist Carl Jung to


describe a perceived meaningful coincidence.

 synchronous - In general, synchronous (pronounced SIHN-kro-nuhs, from Greek syn-,


meaning "with," and chronos, meaning "time") is an adjective describing objects or events
that are coordinated in time.

 system - A system is a collection of elements or components that are organized for a


common purpose.

 system administrator (sysadmin) - In information technology (IT), a system


administrator (sysadmin) is a person who supports a multi-user computing environment and
ensures continuous, optimal performance of IT services and support systems.

 system software - System software is a type of computer program that is designed to run
a computer’s hardware and application programs.

 systems thinking - Systems thinking is a holistic approach to analysis that focuses on the
way that a system's constituent parts interrelate and how systems work over time and within
the context of larger systems.
 table - In computer programming, a table is a data structure used to organize information,
just as it is on paper.

 Table of Physical Constants - Quick look-up chart.

 talk time - In customer relationship management (CRM), talk time is the amount of time
a call center agent spends with a caller during a transaction.

 Tamagotchi - A Tamagotchi (pronounced "tom-ah-GOT-chee") is a relatively


inexpensive toy containing a small liquid crystal display display, a few touch-sensitive user
controls, and a program in which the image of a small creature is visible.

 taxonomy - Taxonomy is the science of classification according to a predetermined


system, with the resulting catalog being used to provide a conceptual framework for
discussion or analysis.

 TCO (total cost of ownership) - Total cost of ownership is a calculation to assess direct
and indirect expenses and benefits related to the purchase of a product or infrastructure
component.

 teach box - A teach box is a device that registers and memorizes mechanical motions or
processes for later recall and execution by an electronic or computer system.

 tebibyte (TiB) - A tebibyte (TiB) is a unit of measure used to describe computing


capacity.

 technical requirements - Technical requirements, in the context of software


development and systems engineering, are the factors required to deliver a desired function
or behavior from a system to satisfy a user’s standards and needs.

 techno-fiend - In information technology, a techno-fiend is someone who is addicted to


finding out and knowing how things work in one or more aspects of cyberspace.

 technobabble - In information technology and other specialized areas, technobabble is


the use of technical or "insider" terms that, to the uninitiated, have no meaning.
 technological convergence - Technological convergence is a term that describes the
layers of abstraction that enable different technologies to interoperate efficiently as a
converged system.

 telecommuting - Telecommuting is an arrangement to work outside the traditional office


or workplace, usually at home or in a mobile situation.

 telepresence - Telepresence is a sophisticated form of robotic remote control in which a


human operator has a sense of being in a remote location so that the experience resembles
virtual reality (VR).

 Terabyte (TB) - A Terabyte (TB) is a measure of computer storage capacity that is


approximately 2 to the 40th power, or 10 to the 12th power, which equals approximately a
trillion bytes.

 teraflop - A teraflop is a measure of a computer's speed and can be expressed as: A


trillion floating point operations per second 10 to the 12th power floating-point operations
per second 2 to the 40th power flops Today's fastest parallel computing operations are
capable of teraflop speeds.

 term boosting - Term boosting is the ability to assign higher importance to specific
words in a search engine query.

 text - In information technology, text is a human-readable sequence of characters and the


words they form that can be encoded into computer-readable formats such as ASCII.

 thang - A thang, a jargon variant of "thing" based on regional U.

 The speed of end-user and backbone transmission technologies - This table shows the
stated data rates for the most important end-user and backbone transmission technologies.

 theory of relativity - Albert Einstein's theory of relativity is actually two separate


theories: his special theory of relativity, postulated in the 1905 paper, The Electrodynamics
of Moving Bodies and his theory of general relativity, an expansion of the earlier theory,
published as The Foundation of the General Theory of Relativity in 1916.

 thin-film transistor (TFT) - A display screen made with TFT (thin-film transistor)
technology is a liquid crystal display (LCD), common in notebook and laptop computers,
that has a transistor for each pixel (that is, for each of the tiny elements that control the
illumination of your display).

 thing (in the Internet of Things) - A thing, in the context of the Internet of things (IoT),
is an entity or physical object that has a unique identifier, an embedded system and the
ability to transfer data over a network.

 thread-safe - In computer programming, thread-safe describes a program portion or


routine that can be called from multiple programming threads without unwanted interaction
between the threads.

 throughput - Throughput is a term used in information technology that indicates how


many units of information can be processed in a set amount of time.

 TIFF (Tag Image File Format) - TIFF (Tag Image File Format) is a common format for
exchanging raster graphics (bitmap) images between application programs, including those
used for scanner images.

 tilde - A tilde (pronounced TILL-duh or TILL-dee) looks like this: ~.

 Tim Berners-Lee - Tim Berners-Lee is the creator of the World Wide Web and director
of the coordinating body for Web development, the W3C.

 time - Time is an observed phenomenon, by means of which human beings sense and
record changes in the environment and in the universe.

 timeshifting - Timeshifting is the process of recording and storing data for later viewing,
listening, or reading.

 tipping point - The tipping point is the critical point in an evolving situation that leads to
a new and irreversible development.

 token - In general, a token is an object that represents something else, such as another
object (either physical or virtual), or an abstract concept as, for example, a gift is sometimes
referred to as a token of the giver's esteem for the recipient.

 toolbar - In the graphical user interface (GUI) for a computer, a toolbar is a horizontal
row or vertical column of selectable image "buttons" that give the user a constantly visible
reminder of and an easy way to select certain desktop or other application functions, such as
saving or printing a document or moving pages forwards or backwards within a Web
browser.

 torque - Torque is a twisting or turning force that tends to cause rotation around an axis;
it can also be thought of as the ability of something that is rotating, such as a gear or a shaft,
to overcome turning resistance.

 Total Quality Management (TQM) - Total Quality Management is a management


framework based on the belief that an organization can build long-term success by having all
its members, from low-level workers to its highest ranking executives, focus on quality
improvement and, thus, delivering customer satisfaction.

 transcendental number - A transcendental number is a real number that is not the


solution of any single-variable polynomial equation whose coefficients are all integers.

 transcription error - A transcription error is a specific type of data entry error that is
commonly made by human operators or by optical character recognition (OCR) programs.

 transition ad - A transition ad is a Web page containing a commercial message that


appears temporarily between two other Web pages.

 transparent - In computers, transparent means something a little different than its


general meaning of having the quality of being easily seen through, coming closer to
meaning invisible or undetectable.

 transparent computing - Transparent computing is a characteristic of pervasive


computing, the possible future state in which we will be surrounded by computers
everywhere in the environment that respond to our needs without our conscious use.

 transparent GIF - A transparent GIF (Graphics Interchange Format) is an image file that
has one color assigned to be "transparent" so that the assigned color will be replaced by the
browser's background color, whatever it may be.

 tree network - In telecommunication networks, a tree network is a combination of two or


more star networks connected together.
 trigraph - A trigraph is a three-character replacement for a special or nonstandard
character in a text file.

 trinary - Trinary logic is three-level digital logic, with states represented by the numbers
-1, 0, and 1.

 true multitasking - True multitasking is the capacity of an operating system to carry out
two or more tasks simultaneously rather than switching from one task to another.

 trusted execution environment (TEE) - A trusted execution environment (TEE) is an


area on the main processor of a device that is separated from the system’s main operating
system (OS) to ensure that sensitive data can be stored and managed in a secure environment.

 truth table - A truth table is a breakdown of a logic function by listing all possible values
the function can attain.

 Turing Test - A Turing Test is a method of inquiry in artificial intelligence (AI) for
determining whether or not a computer is capable of thinking like a human being.

 turnkey - Turnkey is a product or service that is designed, supplied, built, or installed


fully complete and ready to operate.

 twip (twentieth of a point) - A twip (twentieth of a point) is a measure used in laying out
space or defining objects on a page or other area that is to be printed or displayed on a
computer screen.

 ultra-mobile personal computer (UMPC or Ultra-mobile PC) - Ultra-mobile PC


(UMPC) is a design specification for a hand-held computer that is larger than a PDA but
smaller than a laptop.

 ultrabook - An ultrabook is a category of thin and light laptop computers designed to


bridge the market gap between tablets and premium notebook PCs.

 unary - The term unary defines operators in Boolean (binary) algebra, trinary algebra,
arithmetic, and set theory.
 uncertainty principle - The uncertainty principle is the concept that precise,
simultaneous measurement of some complementary variables -- such as the position and
momentum of a subatomic particle -- is impossible.

 uncompressing (or decompressing) - Uncompressing (or decompressing) is the act of


expanding a compression file back into its original form.

 Undernet - For terms frequently used in online keyboard chatting, see chat
acronyms/IRC/BBS.

 unified field theory or Theory of Everything (TOE) - Unified field theory is


sometimes called the Theory of Everything (TOE, for short): the long-sought means of tying
together all known phenomena to explain the nature and behavior of all matter and energy in
existence.

 union symbol - The union symbol () denotes the union of two set s.

 unique identifier (UID) - A unique identifier (UID) is a numeric or alphanumeric string


that is associated with a single entity within a given system.

 universal constructor - A universal constructor is a device that can self-replicate - that is,
make copies of itself.

 unzipping - Unzipping is the act of extracting the files from a zipped single file or
similar file archive.

 upgrade - In computers, an upgrade is a new version of or addition to a hardware or,


more often, software product that is already installed or in use.

 UpperCamelCase - UpperCamelCase (part of CamelCase) is a naming convention in


which a name is formed of multiple words that are joined together as a single word with the
first letter of each of the multiple words capitalized within the new word that forms the name.

 uptime and downtime - Uptime is a computer industry term for the time during which a
computer is operational.

 URL shortening - URL shortening is the translation of a long Uniform Resource Locator
(URL) into an abbreviated alternative that redirects to the longer URL.
 URL-minder - URL-minder is an agent or robot program (bot) that notifies you when a
particular Web page has changed.

 usability - Also see human-computer interaction and graphical user interface.

 user group - In personal or business computing, a user group is a set of people who have
similar interests, goals, or concerns.

 UTF-16 (16- bit Unicode Transformation Format) - UTF-16 (16- bit Unicode
Transformation Format) is a standard method of encoding Unicode character data.

 utility - In computers, a utility is a small program that provides an addition to the


capabilities provided by the operating system.

 utility computing - Utility computing is a service provisioning model in which a service


provider makes computing resources and infrastructure management available to the
customer as needed, and charges them for specific usage rather than a flat rate.

 UXGA (Ultra Extended Graphics Array) - UXGA (Ultra Extended Graphics Array) is
a display modein which the resolutionis 1600 pixels horizontally by 1200 pixels vertically
(1600 x 1200).

 value chain - A value chain is "a string of companies working together to satisfy market
demands.

 value-added reseller (VAR) - A value-added reseller (VAR) is a company that resells


software, hardware and networking products and provides value beyond order fulfillment.

 valve - A valve is a mechanism that opens and closes to control the flow of fluids.

 vandal - A vandal is an executable file, usually an applet or an ActiveX control,


associated with a Web page that is designed to be harmful, malicious, or at the very least
inconvenient to the user.

 vanilla - In information technology, vanilla (pronounced vah-NIHL-uh) is an adjective


meaning plain or basic.
 Vannevar Bush - An electrical engineer by training, Vannevar Bush is credited with
having the idea of hypertext or "instant cross-referencing," decades before the term itself was
conceived by Ted Nelson and before the concept was widely implemented on the World
Wide Web.

 vaporware - Vaporware is software or hardware that is announced publicly and actively


promoted by a vendor even though it does not yet exist.

 varicode - Varicode is a method of binary character encoding in which the number of


bits for each character is not fixed, but varies for each character depending on how often that
character occurs in general usage.

 vector - A vector is a quantity or phenomenon that has two independent properties:


magnitude and direction.

 vector graphics rendering (VML) - Vector graphics rendering, sometimes abbreviated


VML, refers to scalable vector graphics (SVG) used in Web pages.

 vectored interrupt - In a computer, a vectored interrupt is an I/O interrupt that tells the
part of the computer that handles I/O interrupts at the hardware level that a request for
attention from an I/O device has been received and and also identifies the device that sent the
request.

 vendor - A vendor is an individual or company that sells goods or services to somone


else in the economic production chain.

 Venn diagram - A Venn diagram is an illustration of the relationships between and


among sets, groups of objects that share something in common.

 vertical cavity surface emitting laser (VCSEL) - A vertical cavity surface emitting
laser (VCSEL) is a specialized laser diode that promises to revolutionize fiber optic
communications by improving efficiency and increasing data speed.

 video card (graphics card) - A video adapter (alternate terms include graphics card,
display adapter, video card, video board and almost any combination of the words in these
terms) is an integrated circuit card in a computer or, in some cases, a monitor that provides
digital-to-analog conversion, video RAM, and a video controller so that data can be sent to a
computer's display.
 Vint Cerf (Vinton Gray Cerf) - Vint Cerf (Vinton Gray Cerf) is an American computer
scientist best known as an Internet pioneer.

 virtual - In computing, virtual is a digitally replicated version of something real.

 virtual commerce (vCommerce, v-commerce, or vCom) - Virtual commerce


(sometimes known as vCommerce, v-commerce, or vCom) is a type of application, service,
or product feature that helps enterprises implement strategies and design Web sites for e-
commerce (the buying and selling of goods and services using the Internet).

 virtual learning environment (VLE) or managed learning environment (MLE) - A


virtual learning environment (VLE) is a set of teaching and learning tools designed to
enhance a student's learning experience by including computers and the Internet in the
learning process.

 virtual reality - Virtual reality is an artificial environment that is created with software
and presented to the user in such a way that the user suspends belief and accepts it as a real
environment.

 virtual reality sickness (VR motion sickness) - Virtual reality sickness (VR motion
sickness) is the physical discomfort that occurs when an end user's brain receives conflicting
signals about self-movement in a digital environment.

 viseme - A viseme is a generic facial image that can be used to describe a particular
sound.

 vocoder - A vocoder is an audio processor that captures the characteristic elements of an


an audio signal and then uses this characteristic signal to affect other audio signals.

 voice morphing - Voice morphing is the software-generated alteration of a person's


natural voice.

 volatile - In general, volatile (from the Latin "volatilis" meaning "to fly")is an adjective
used to describe something unstable or changeable.

 volatile memory - Volatile memory is computer storage that only maintains its data
while the device is powered.
 von Neumann bottleneck - The von Neumann bottleneck is a limitation on throughput
caused by the standard personal computer architecture.

 wall time (real-world time or wall-clock time) - Wall time, also called real-world time
or wall-clock time, refers to elapsed time as determined by a chronometer such as a
wristwatch or wall clock.

 warchalking (war chalking) - Warchalking is a grass roots effort to create a standard


iconography for public Wi-Fi access.

 warez - Warez (pronounced as though spelled "wares" or possibly by some pronounced


like the city of "Juarez") is a term used by software "pirates" to describe software that has
been stripped of its copy-protection and made available on the Internet for downloading.

 Waste Electrical and Electronic Equipment Regulation (WEEE) - Waste Electrical


and Electronic Equipment Regulation (WEEE) is a directive in the European Union that
designates safe and responsible collection, recycling and recovery procedures for all types of
electronic waste.

 Wave file - A Wave file is an audio file format, created by Microsoft, that has become a
standard PC audio file format for everything from system and game sounds to CD-quality
audio.

 wave number - The term wave number refers to the number of complete wave cycles of
an electromagnetic field (EM field) that exist in one meter (1 m) of linear space.

 waving a dead chicken - Waving a dead chicken is a slang expression for an effort to
solve a problem even when the effort is expected to be futile.

 Web application (Web app) - A Web application (Web app) is an application program
that is stored on a remote server and delivered over the Internet through a browser interface.

 Web ring (Webring) - A Web ring (or Webring) is a way of interlinking related Web
sites so that you can visit each site one after the other, eventually (if you keep going)
returning to the first Web site.

 Web slate - A Web slate is a wireless Internet appliance that consists of a liquid crystal
display (LCD) with a touch screen that allows the user to view and interact with Web pages.
 Web year - A Web year is the length of time it takes for Internet technology to evolve as
much as technology in another environment might evolve in a calendar year.

 Web-Braille - Web-Braille is a delivery system that allows content to be read on a


Braille display or transmitted to a Braille embosser.

 Webification - Webification (sometimes seen with a lower case w) is the act of


converting content from its original format into a format capable of being displayed on the
World Wide Web.

 Webify - The act of converting content from its original format into a format capable of
being displayed on the World Wide Web.

 webmaster - A webmaster is a person who creates and manages the content and
organization of a website, manages the computer server and technical programming aspects
of a website or does both.

 WebTV - WebTV, now owned by Microsoft, was one of the first entries in the much
publicized convergence of the World Wide Web with television.

 weenie - On bullet board systems (BBS) and in Internet chatting groups, a weenie is an
avid but immature participant who disrupts orderly conversation.

 Werner Heisenberg - Werner Heisenberg (1901 - 1976), one of the greatest physicists of
the twentieth century, is best known for his contributions to quantum mechanics, specifically
for the uncertainty principle in quantum theory.

 white paper - A white paper is an article that states an organization's position or


philosophy about a social, political, or other subject, or a not-too-detailed technical
explanation of an architecture, framework, or product technology.

 white space device (WSD) - A white space device is an FCC-certified wireless device
that can be used without an exclusive broadcast license in the RF spectrum below 700 MHz:
underutilized, unlicensed portions of the spectrum called white space.

 winner's curse - In negotiation, winner's curse is an offer that is immediately accepted


by the other party.
 wipe - Wipe, in a computing context, means to erase all data on a hard drive to render it
unreadable.

 word - In computer architecture, a word is a unit of data of a defined bitlength that can be
addressed and moved between storageand the computer processor.

 Words-to-Go: Voice over IP - Internet Protocol (IP) - method or protocol by which data
is sent from one computer to another on the Internet.

 workaround - A workaround is a method, sometimes used temporarily, for achieving a


task or goal when the usual or planned method isn't working.

 workload - In computing, the workload is the amount of processing that the computer
has been given to do at a given time.

 WPAN (wireless personal area network) - A WPAN (wireless personal area network)
is a personal area network - a network for interconnecting devices centered around an
individual person's workspace - in which the connections are wireless.

 X dimension - In barcode technology, the X dimension is the narrowest part of a


barcode's symbology.

 X-engineering (cross-engineering) - X-engineering (sometimes called cross-engineering)


is a collaborative and process-oriented approach to change management in the business
world.

 x86-64 - x86-64 is a 64-bit processing technology developed by AMD that debuted with
the Opteron and Athlon 64 processor.

 Y2K (year 2000) - Y2K is an abbreviation for "year 2000.

 yottabyte (YB) - A yottabyte is a measure of theoretical storage capacity and is 2 to the


80th power bytes, or, in decimal, approximately 1,000 zettabytes, a trillion terabytes or a
million trillion megabytes.

 zap - In general usage, zap (noun) is spiciness, kick, or a powerful force.


 zero (0) - In mathematics, zero, symbolized by the numeric character 0, is both a place
indicator meaning "no units of this multiple" in a positional number system, and an
independent value midway between +1 and -1.

 zettabyte - A zettabyte is a measure of storage capacity and is 2 to the 70th power bytes,
also expressed as 1021 or 1 sextillion bytes.

 Zettabyte Era - The Zettabyte Era is the current age in terms of digital data.

 zettaflops - Zettaflop or (ZFlop) is a processing power of one septillion floating point


operations per second (FLOPS).

 zoetrope - The zoetrope (pronounced ZOH-uh-trohp), invented in 1834 by William


George Horner, was an early form of motion picture projector that consisted of a drum
containing a set of still images, that was turned in a circular fashion in order to create the
illusion of motion.

 Zulu (Zulu time) - Zulu (short for "Zulu time") is used in the military and in navigation
generally as a term for Universal Coordinated Time (UCT), sometimes called Universal
Time Coordinated (UTC) or Coordinated Universal Time (but abbreviated UTC), and
formerly called Greenwich Mean Time.

It is the year when the general electric corporation delivered its ERMA computing system to the
Bank of America in California.
1959
These locations are numbered, and the sequence number of a location is called?
Select one:
Address
It is the year when the development of Arpanet began with the financial backing of the
department of defense.
Select one:
1969
It is the year when Atanasoff and Berry came up with ABC prototype.
Select one:
1939
A computer's main memory is also known as ?
Select one:
RAM
The year when Intel produced large scale integration circuits.
Select one:
1972
Punchcard or Hollerith card, is a piece of stiff paper that contains non digital information
represented by the presence or absence of holes in none predefined positions.
True
The Z3 consisted of separate units, such as a punch tape reader, control unit, floating-point
arithmeticc unit, and input/output devices.
Select one:
True
A computer is built to carry out instructions that are written in a very simple type of language
called?
Select one:
Machine Language
It is the year that the history of computers dates back to the invention of a mechanical adding
machine.
Select one:
1642
During Third Generation semiconductors decreased the speed and efficiency of the computer.
Select one:
False
A Vacuum tube is a device used to amplify, switch, otherwise modify, or create an electrical
signal by controlling the movement of electrons in a low-pressure space.
Select one:
True
It is the year when John V. Atanasoff devised the first digital electronic computer.
Select one:
c. 1937
It is a set of numbers with one or more operations.
Select one:
b. number system
As binary system uses the power of?
Select one:
c. 2
A number system with a ten possible values.
Select one:
b. binary
The conversion of 27 octal to decimal is 23.
Select one:
True
The given decimal number: 26 if converted to binary is equal to?
Select one:
c. 11010
2 raised to 4 is equal to 8
Select one:
False
The conversion of 76 octal to hexadecimal is E3.
Select one:
False
The given binary number: 1101111 if converted to hexadecimal is equal to?
a. 6F
The conversion of 87 hexadecimal to binary is 11100001.
Select one:
False
The given binary number: 110110 if converted to octal is equal to?
Select one:
d. 66
A number system with eight possible values.
octal
The conversion of 53 hexadecimal to binary is 1100101.
False
The United States (U.S) Army's Ballistic Research Laboratory came up with the Electronic
Numerical Integrator and Calculator (ENIAC) in the year?
1946
Semiconductors are used in almost all electronic equipment in use today and have revolutionized
the world of electronics.
True
LSB is also known as?
Least Significant Bit
It is the year when Z3 of Konrad Zuse's was a notable achievement in the evolution of computers.
1941
A series of eight bit.
byte
Decimal number system is using based 10
True
The year when Intel produced large scale integration circuits.
1971
These locations are numbered, and the sequence number of a location is called?
Select one:
Main Memory
It is known as a complex system consisting of many different components.
Microcomputer

The given decimal number: 75 if converted to octal is equal to?


Select one:
113
The conversion of 54 octal to hexadecimal is C2.
True
It is the year where the evolution of computer started.
Select one:
1930
The conversion of 71 octal to binary is 111001.
Select one:
True
The conversion of 67 decimal to hexadecimal is 43.
Select one:
True
The given binary number: 10110 if converted to decimal is equal to?
Select one:
22
It is the year when DEC launched the first minicomputer called the PDP-8.
Select one:
1968
A number system with fifteen possible values.
Select one:
hexadecimal
Abacist is the term called for the user of an abacus who slides the beads of the abacus by hand.
Select one:
True
Stanford Research Institute brought about ERMA, Electronic Recording Machine Accounting
project, which dealt with the automation of the process of bookkeeping in banking.
Select one:
True
Computer system under fifth generation are going to be based on principles of Artificial
Intelligence and Natural Language recognition.
Select one:
True
The Abacus known as early computing tool which logarithm is invented by John Clipper and the
invention of slide rule by William Oughtred.
Select one:
True
This is consists of a sequence of locations.
Select one:
a. Random Access Memory
In First Generation computer in this generation were not expensive and bulky. They used
machine language for computing and could solve problem at a time. Computers during this phase
cannot support multitasking task.
Select one:
False
It is a device inside your computer that follows a program instruction.
Select one:
b. CPU
It a number is made up of just two possible digits, zero and one.
Select one:
d. Binary
It is simply a list of unambiguous instructions meant to be followed mechanically by a computer.
Select one:
Programming Language
The abacus, also called a counting mechanism, is a calculating tool used primarily in parts of
Asia for performing arithmetic processes.
Select one:
True
2 raised to 0 is equal to 1
True
The given binary number: 011011111 if converted to octal is equal to?
Select one:
337
The given binary number: 1100 if converted to decimal is equal to?
Select one:
12
The given decimal number: 15 if converted to binary is equal to?
Select one:
1111
The given binary number: 110110111 if converted to hexadecimal is equal to?
Select one:
1B7
The conversion of 175 decimal to hexadecimal is AF.
Select one:
True
The decimal value of 11 is equal to B in hexadecimal
Select one:
True
The given decimal number: 55 if converted to octal is equal to?
Select one:
67
8 raised to 2 is equal to 64
Select one:
True
It is the fundamental system of a computer based system.
Select one:
number system
ERMA (Electronic Recording Machine-Academy), was a pioneering computer development
project run at SRI under contract Bank of Africa in order to automate banking bookkeeping.
Select one:
True
Convert the following number system to the following base as shown in the table below.
. .... . ..

Popular presentation software include MS PowerPoint, Keynote, and Impress.


Select one:
True

Computing professionals should not share technical knowledge with the public, foster awareness
of computing, and encourage understanding of computing.
Select one:
False

This principle discuss that computing professionals should not misrepresent an organization's
policies or procedures, and should not speak on behalf of an organization unless authorized to do
so.
Select one:
Be Honest and Trustworthy

Leaders should not thoroughly investigate viable alternatives to removing support for a legacy
system
Select one:
False

Breaches of computer security cause harm.


Select one:
True

Individuals and organizations do not have the right to restrict access to their systems
Select one:
False

It collects and stores data on sales numbers market research, logistics, linguistics, or other
behaviors
Select one:
Data Analyst

It is an essential component of trustworthiness


Select one:
Honesty
A PDF or Portable Document Format is a file format that provides an electronic image of text or
text and graphics that looks like a printed document and can be viewed, printed, and
electronically transmitted.
Select one:
True

The client alone may decide to pursue the assignment with the professional after additional time
to acquire the necessary competencies
Select one:
False
it is known as not limited as text
Select one:
Word Processor

This let the user scroll through a document that is too large to fit inside the document area.
Select one:
Scroll bar

To deselect selected block of text click the mouse anywhere on the screen or press any arrow key.
Select one:
True

One single sentence is known as a paragraph.


False

This is used to control the appearance of the character.


Select one:
Type Style
It display the button of frequently used commands
Select one:
Toolbars

Paragraph are line of text that run along the top and bottom of every page.
Select one:
False

It is a contiguous group of characters, words, lines, sentences or paragraphs in your document


that you mark for editing.
Select one:
Block

It is an application that provides extensive tools for creating all kinds of text-based documents.
Select one:
Word Processing Software

Document dimension is also determined by the orientation of the paper.


Select one:
True

Breaches of computer security cause harm.


Select one:
True
It is either be a formal designation or arise informally from influence over others
Select one:
Leadership
This is either be a formal designation or arise informally from influence over others.
Select one:
Leadership

This principle, which concerns the quality of life of all people, affirms an obligation of
computing professionals, both individually and collectively, to use their skills for the benefit of
society, its members, and the environment surrounding them.
Select one:
Contribute to Society and to Human Well-being, Acknowledging that all People are Stakeholders
in Computing

Pertaining to local, regional, national, and international laws and regulations that professional
worker must know
Select one:
Rules

Spreadsheet applications contain a lot of features that can help the ICT professionals
Select one:
True

This is well-known organization for computing professionals


Select one:
ACM

A way of minimizing computer viruses and threats


Select one:
Anti-viruses
A value may be unethical when it has an inadequate moral basis or causes recognizable harm
Select one:
False
This enables the collection, monitoring, and exchange of personal information quickly,
inexpensively
Select one:
Technology

When appropriate standards of care do not exist, computing professionals do not have a duty to
ensure they are developed.
Select one:
False

This means negative consequences, especially when those consequences are significant and
unjust
Select one:
Harm

The future of computing depends on both technical and ethical excellence


Select one:
True

A way of minimizing the use of paper in ACM


Select one or more:
Spreadsheet application
Presentation software
PDF Readers

People—including users, customers, colleagues, and others affected directly or indirectly—


should always be the central concern in computing
True
A person who basically writes programming languages.
Select one:
Application Developer

It is someone who develops applications for computers.


Select one:
Application Developer

Part of that stewardship requires establishing policies for fair system access, including for those
who may have been excluded
Select one:
True

A storage of all the important data and information of a company


Select one:
Database

Leaders should consider the personal and professional development, accessibility requirements,
physical safety, psychological well-being, and human dignity of all workers
Select one:
True

It work with a company's computer network, using information technology to make network
systems for all employees to use
Select one:
Network Engineer

Which formatting tool is used to highlight the texts?


Select one:
Which formatting toolbar is used to change the line spacing of the selected text/paragraph?
Select one:

Which formatting toolbar is used to change the text/paragraph alignment to justify?


Select one:

Under the INSERT menu bar, which toolbar you can find the shape tool?
Select one:

Which formatting toolbar is used to add color to the shape?


Select one:

(not sure)

Under the INSERT menu bar, which toolbar you can find the text box?
Select one:

Which formatting toolbar is used to change the text color to blue?


Select one:
Which formatting toolbar is used to change the upper case into lower case.
Select one:

This determine how close each line of the paragraph comes to the margins
Select one:
Indents

Which short-cut key is used to find the word organizational within the word file?

Select one:
CTRL + F

The amount of space between each paragraph


Select one:
Paragraph Spacing

When you text reaches the right edge of the screen it automatically moves the insertion point to
the next line. This feature is called word wrap.
Select one:
True

These are the white borders around the edge of the page. Every document has top, bottom, left,
and right margins.
Select one:
Margin
It is a software that permits users to work with numbers formatted in lines and columns normally
used for accounting jobs.
Select one:
Electronic spreadsheet

The future of computing depends on both technical and ethical excellence


Select one:
True

It permits users to create and maintain several files and extract in an easy convenient manner.
Select one:
Word processing

The amount of space between each line of the text in a paragraph.


Select one:
Paragraph Spacing

This is also knows as Association for Computing Machinery


Select one:
ACM

Refers to the orientation of the lines of a paragraph with respect to the margins.
Select one:
Alignment

When you select text, it changes the color-becoming highlighted


Select one:
True
These are tools used by application developers to develop applications.
Select one:
IDE

This is a line that is drawn on one or more side of paragraph


Select one:
Border

The term processing is procedure where processor that transforms raw data into useful
information.
Select one:
True

Changing an existing document is called editing the document.


Select one:
True

A documents are set up to fit 8 1/2 by 11 inch paper, a standard known as letter size paper.
Select one:
True

The same with web developer but more focus on websites


Select one:
Web Developer

These people are usually knowledgeable in using scripting languages such as HTML and CSS.
Select one:
Web Developer
The CPU is a rigid rectangular card containing the circuitry that connects the processor to the
other hardware
Select one:
True

It is consists of pattern or color that is displayed as a background of the text in a paragraph.


Select one:
Shading
Rows are effective formats for certain types of document.
Select one:
True

You cannot embed sounds file in your document in much the same way that you embed a
graphic file.
Select one:
False

It is the is the first general purpose electronic computer.


Select one:
ENIAC

The more processor the computer has, the more it can do, and the faster it can perform a certain
task
Select one:
True

This refers to the characteristics of the letters, symbols, and punctuation marks in your document.
Select one:
Font
An application that is used to sending messages or files electronically.
Select one:
Email

One of the capability of computer is to perform logical operations


Select one:
True

This display the information related to the position in the documents, the page count, and the
status of keyboard keys.
Select one:
Status bar

LAN is also known as _______________.


Select one:
Local Area Network

Document are also useful in arranging images


True

The blinking insertion point is also known as?


Select one:
Cursor

In which menu bar you can find the FONT setting in Microsoft word?
Select one:
Home
This is where we view the document
Select one:
Document Area / Document Window

Long documents generally include header and footer or both.


Select one:
True

This show the position of text, tabs, margins, indents and other elements on the page.
Select one:
Ruler

The process of formatting a document includes controlling the appearance of text, the layout of
text on the page, and the use of pictures and other graphic element.
Select one:
True
It display the list of commands and options
Select one:
Menu bar

Templates are designed documents that are blank except for preset margins, fonts, paragraphs
formats, headings, rulers, graphics, header, footers.
Select one:
True

This is used to measure the font in points


Select one:
Type Size
They bring technical expertise to ensure the quality and accuracy of that data, then process,
design and present it in ways to help people
Select one:
Data Analyst

Two types of memory are CDROM and ROM


Select one:
False

It is called to the person who uses an abacus.


Select one:
Abacist

It is represented by a piece of paper that may contain digital information represented by a hole in
a predefined position
Select one:
Punch card

An application that is used in presenting business proposals to clients or sales reports in the
office.
Select one:
Presentation
Output devices accept data and instructions from the user or from another computer
Select one:
False
It allows a computer to read PDFs.
Select one:
PDF reader
Computing Fundamentals – Franz Mabait
Semiconductors are used in almost all electronic equipment in use today and have
revolutionized the world of electronics.

=False
It is the year that the history of computers dates back to the invention of a mechanical
adding machine.

=1642
It is the year where the evolution of computer started.

=1930
Abacist is the term called for the user of an abacus who slides the beads of the abacus by
hand.

=False
The abacus, also called a counting mechanism, is a calculating tool used primarily in parts of
Asia for performing arithmetic processes.

=False
Computer system under fifth generation are going to be based on principles of Artificial
Intelligence and Natural Language recognition.

=True
Punchcard or Hollerith card, is a piece of stiff paper that contains non digital information
represented by the presence or absence of holes in none predefined positions.

=False
A computer's main memory is also known as ?

=RAM
The United States (U.S) Army's Ballistic Research Laboratory came up with the Electronic
Numerical Integrator and Calculator (ENIAC) in the year?

=1946
The year when Intel produced large scale integration circuits.

= 1972

In First Generation computer in this generation were not expensive and bulky. They used
machine language for computing and could solve problem at a time. Computers during this
phase cannot support multitasking task.

=FALSE
It is the year when John V. Atanasoff devised the first digital electronic computer.

= 1937
The Z3 consisted of separate units, such as a punch tape reader, control unit, floating-point
arithmeticc unit, and input/output devices.

=TRUE
Stanford Research Institute brought about ERMA, Electronic Recording Machine Accounting
project, which dealt with the automation of the process of bookkeeping in banking.

=TRUE
It is the year when the general electric corporation delivered its ERMA computing system to
the Bank of America in California.

=1959
It is simply a list of unambiguous instructions meant to be followed mechanically by a
computer.

= Programs
ERMA (Electronic Recording Machine-Academy), was a pioneering computer development
project run at SRI under contract Bank of Africa in order to automate banking bookkeeping.

=FALSE
It is known as a complex system consisting of many different components.

= Computer
The Abacus known as early computing tool which logarithm is invented by John Clipper and
the invention of slide rule by William Oughtred.

=FALSE
This is also known as intangible parts of a computer.

=Data
These locations are numbered, and the sequence number of a location is called?

= Main Memory
It a number is made up of just two possible digits, zero and one.

= Binary

It is the year when DEC launched the first minicomputer called the PDP-8.

= 1968

It is the year when Atanasoff and Berry came up with ABC prototype.

= 1939

It is a device inside your computer that follows a program instruction.

= CPU

It is the tangible parts of the computer that you can touch.

=Hardware

ENVAC was a turning-complete, digital computer capable of being reprogrammed to solve


a full range of computing problem.

=FALSE

A computer is built to carry out instructions that are written in a very simple type of
language called?

= Machine Language

It is the year when the development of Arpanet began with the financial backing of the
department of defense.

= 1969

It is the year when Z3 of Konrad Zuse's was a notable achievement in the evolution of
computers.

= 1941
During Third Generation semiconductors decreased the speed and efficiency of the
computer.

= False

This is consists of a sequence of locations.

= Main memory
A Vacuum tube is a device used to amplify, switch, otherwise modify, or create an electrical
signal by controlling the movement of electrons in a low-pressure space.

= True

LSB is also known as?

=Least Significant Bit


Decimal number system is using based 10

=FALSE
The conversion of 67 decimal to hexadecimal is 43.

=TRUE
A number system with a ten possible values.

=decimal
2 raised to 4 is equal to 8

=True
The given decimal number: 15 if converted to binary is equal to?

=1111

The given binary number: 011011111 if converted to octal is equal to?

=337
The given decimal number: 26 if converted to binary is equal to?

=11010
The given binary number: 1101111 if converted to hexadecimal is equal to?

=6F
It is a set of numbers with one or more operations.

=number system
The conversion of 87 hexadecimal to decimal is 135.

=TRUE
The given binary number: 110110 if converted to octal is equal to?

=66
The given binary number: 1100 if converted to decimal is equal to?

=12
The conversion of 54 octal to hexadecimal is C2.

=FALSE
The conversion of 87 hexadecimal to binary is 11100001.

=FALSE
It is represented by 0's and 1's.

=binary system
The given binary number: 110110111 if converted to hexadecimal is equal to?

=1B7
A number system with fifteen possible values.

=hexadecimal
The given binary number: 10110 if converted to decimal is equal to?

=22
8 raised to 2 is equal to 64

=TRUE
A number system with eight possible values.

=octal

The given decimal number: 55 if converted to octal is equal to?

=67

It is called as a bit.

=binary digit

The given decimal number: 75 if converted to octal is equal to?

=113

A series of eight bit.

=byte

As binary system uses the power of?

=2

The conversion of 76 octal to hexadecimal is E3.

=FALSE

The conversion of 27 octal to decimal is 23.

=TRUE

The conversion of 53 octal to binary is 101011.

=TRUE

2 raised to 0 is equal to 1

=FALSE
The conversion of 53 hexadecimal to binary is 1100101.

=FALSE
It is the fundamental system of a computer based system.

=binary numeral system


The conversion of 175 decimal to hexadecimal is AF.

=FALSE
The decimal value of 11 is equal to B in hexadecimal

=TRUE
The conversion of 71 octal to binary is 111001.

=TRUE
It is the year when the general electric corporation delivered its
ERMA computing system to the Bank of America in California.
1959
These locations are numbered, and the sequence number of a location is
called?
Select one:
Address
It is the year when the development of Arpanet began with the
financial backing of the department of defense.
Select one:
1969
It is the year when Atanasoff and Berry came up with ABC prototype.
Select one:
1939
A computer's main memory is also known as ?
Select one:
RAM
The year when Intel produced large scale integration circuits.
Select one:
1972
Punchcard or Hollerith card, is a piece of stiff paper that contains
non digital information represented by the presence or absence of
holes in none predefined positions.
True
A computer is built to carry out instructions that are written in a
very simple type of language called?
Select one:
Machine Language
It is the year that the history of computers dates back to the
invention of a mechanical adding machine.
Select one:
1642
During Third Generation semiconductors decreased the speed and
efficiency of the computer.
Select one:
False
A Vacuum tube is a device used to amplify, switch, otherwise modify,
or create an electrical signal by controlling the movement of
electrons in a low-pressure space.
Select one:
True
It is the year when John V. Atanasoff devised the first digital
electronic computer.
Select one:
c. 1937
It is a set of numbers with one or more operations.
Select one:
b. number system
As binary system uses the power of?
Select one:
c. 2
A number system with a ten possible values.
Select one:
b. binary
The conversion of 27 octal to decimal is 23.
Select one:
True
2 raised to 4 is equal to 8
Select one:
False
The conversion of 76 octal to hexadecimal is E3.
Select one:
False
The given binary number: 1101111 if converted to hexadecimal is equal
to?
a. 6F
The conversion of 87 hexadecimal to binary is 11100001.
Select one:
False
The given binary number: 110110 if converted to octal is equal to?
Select one:
d. 66
A number system with eight possible values.
octal
The conversion of 53 hexadecimal to binary is 1100101.
False
The United States (U.S) Army's Ballistic Research Laboratory came up
with the Electronic Numerical Integrator and Calculator (ENIAC) in the
year?
1946
Semiconductors are used in almost all electronic equipment in use
today and have revolutionized the world of electronics.
True
LSB is also known as?
Least Significant Bit

A series of eight bit.


byte
Decimal number system is using based 10
True
The year when Intel produced large scale integration circuits.
1971
These locations are numbered, and the sequence number of a location is
called?
Select one:
Main Memory
It is known as a complex system consisting of many different
components.
Microcomputer

The given decimal number: 75 if converted to octal is equal to?


Select one:
113
The conversion of 54 octal to hexadecimal is C2.
True
It is the year where the evolution of computer started.
Select one:
1930
The conversion of 71 octal to binary is 111001.
Select one:
True
The given binary number: 10110 if converted to decimal is equal to?
Select one:
22
It is the year when DEC launched the first minicomputer called the
PDP-8.
Select one:
1968
A number system with fifteen possible values.
Select one:
hexadecimal
Abacist is the term called for the user of an abacus who slides the
beads of the abacus by hand.
Select one:
True
Computer system under fifth generation are going to be based on
principles of Artificial Intelligence and Natural Language
recognition.
Select one:
True
The Abacus known as early computing tool which logarithm is invented
by John Clipper and the invention of slide rule by William Oughtred.
Select one:
True
This is consists of a sequence of locations.
Select one:
a. Random Access Memory
In First Generation computer in this generation were not expensive and
bulky. They used machine language for computing and could solve
problem at a time. Computers during this phase cannot support
multitasking task.
Select one:
False
It is a device inside your computer that follows a program
instruction.
Select one:
b. CPU
It a number is made up of just two possible digits, zero and one.
Select one:
d. Binary
It is simply a list of unambiguous instructions meant to be followed
mechanically by a computer.
Select one:
Programming Language
The abacus, also called a counting mechanism, is a calculating tool
used primarily in parts of Asia for performing arithmetic processes.
Select one:
True
2 raised to 0 is equal to 1
True
The given binary number: 011011111 if converted to octal is equal to?
Select one:
337
The given binary number: 1100 if converted to decimal is equal to?
Select one:
12
The given decimal number: 15 if converted to binary is equal to?
Select one:
1111
The given binary number: 110110111 if converted to hexadecimal is
equal to?
Select one:
1B7
The conversion of 175 decimal to hexadecimal is AF.
Select one:
True
The decimal value of 11 is equal to B in hexadecimal
Select one:
True
The given decimal number: 55 if converted to octal is equal to?
Select one:
67
8 raised to 2 is equal to 64
Select one:
True
ERMA (Electronic Recording Machine-Academy), was a pioneering computer
development project run at SRI under contract Bank of Africa in order
to automate banking bookkeeping.
Select one:
True
Convert the following number system to the following base as shown in
the table below.

. .... . ..
It is the year when the general electric corporation delivered its
ERMA computing system to the Bank of America in California.
1959
These locations are numbered, and the sequence number of a location is
called?
Select one:
Address
It is the year when the development of Arpanet began with the
financial backing of the department of defense.
Select one:
1969
It is the year when Atanasoff and Berry came up with ABC prototype.
Select one:
1939
A computer's main memory is also known as ?
Select one:
RAM
The year when Intel produced large scale integration circuits.
Select one:
1972
Punchcard or Hollerith card, is a piece of stiff paper that contains
non digital information represented by the presence or absence of
holes in none predefined positions.
True
The Z3 consisted of separate units, such as a punch tape reader,
control unit, floating-point arithmeticc unit, and input/output
devices.
Select one:
True
A computer is built to carry out instructions that are written in a
very simple type of language called?
Select one:
Machine Language
It is the year that the history of computers dates back to the
invention of a mechanical adding machine.
Select one:
1642
During Third Generation semiconductors decreased the speed and
efficiency of the computer.
Select one:
False
A Vacuum tube is a device used to amplify, switch, otherwise modify,
or create an electrical signal by controlling the movement of
electrons in a low-pressure space.
Select one:
True
It is the year when John V. Atanasoff devised the first digital
electronic computer.
Select one:
c. 1937
It is a set of numbers with one or more operations.
Select one:
b. number system
As binary system uses the power of?
Select one:
c. 2
A number system with a ten possible values.
Select one:
b. binary
The conversion of 27 octal to decimal is 23.
Select one:
True
The given decimal number: 26 if converted to binary is equal to?
Select one:
c. 11010
2 raised to 4 is equal to 8
Select one:
False
The conversion of 76 octal to hexadecimal is E3.
Select one:
False
The given binary number: 1101111 if converted to hexadecimal is equal
to?
a. 6F
The conversion of 87 hexadecimal to binary is 11100001.
Select one:
False
The given binary number: 110110 if converted to octal is equal to?
Select one:
d. 66
A number system with eight possible values.
octal
The conversion of 53 hexadecimal to binary is 1100101.
False
The United States (U.S) Army's Ballistic Research Laboratory came up
with the Electronic Numerical Integrator and Calculator (ENIAC) in the
year?
1946
Semiconductors are used in almost all electronic equipment in use
today and have revolutionized the world of electronics.
True
LSB is also known as?
Least Significant Bit
It is the year when Z3 of Konrad Zuse's was a notable achievement in
the evolution of computers.
1941
A series of eight bit.
byte
Decimal number system is using based 10
True
The year when Intel produced large scale integration circuits.
1971
These locations are numbered, and the sequence number of a location is
called?
Select one:
Main Memory
It is known as a complex system consisting of many different
components.
Microcomputer

The given decimal number: 75 if converted to octal is equal to?


Select one:
113
The conversion of 54 octal to hexadecimal is C2.
True
It is the year where the evolution of computer started.
Select one:
1930
The conversion of 71 octal to binary is 111001.
Select one:
True
The conversion of 67 decimal to hexadecimal is 43.
Select one:
True
The given binary number: 10110 if converted to decimal is equal to?
Select one:
22
It is the year when DEC launched the first minicomputer called the
PDP-8.
Select one:
1968
A number system with fifteen possible values.
Select one:
hexadecimal
Abacist is the term called for the user of an abacus who slides the
beads of the abacus by hand.
Select one:
True
Stanford Research Institute brought about ERMA, Electronic Recording
Machine Accounting project, which dealt with the automation of the
process of bookkeeping in banking.
Select one:
True
Computer system under fifth generation are going to be based on
principles of Artificial Intelligence and Natural Language
recognition.
Select one:
True
The Abacus known as early computing tool which logarithm is invented
by John Clipper and the invention of slide rule by William Oughtred.
Select one:
True
This is consists of a sequence of locations.
Select one:
a. Random Access Memory
In First Generation computer in this generation were not expensive and
bulky. They used machine language for computing and could solve
problem at a time. Computers during this phase cannot support
multitasking task.
Select one:
False
It is a device inside your computer that follows a program
instruction.
Select one:
b. CPU
It a number is made up of just two possible digits, zero and one.
Select one:
d. Binary
It is simply a list of unambiguous instructions meant to be followed
mechanically by a computer.
Select one:
Programming Language
The abacus, also called a counting mechanism, is a calculating tool
used primarily in parts of Asia for performing arithmetic processes.
Select one:
True
2 raised to 0 is equal to 1
True
The given binary number: 011011111 if converted to octal is equal to?
Select one:
337
The given binary number: 1100 if converted to decimal is equal to?
Select one:
12
The given decimal number: 15 if converted to binary is equal to?
Select one:
1111
The given binary number: 110110111 if converted to hexadecimal is
equal to?
Select one:
1B7
The conversion of 175 decimal to hexadecimal is AF.
Select one:
True
The decimal value of 11 is equal to B in hexadecimal
Select one:
True
The given decimal number: 55 if converted to octal is equal to?
Select one:
67
8 raised to 2 is equal to 64
Select one:
True
It is the fundamental system of a computer based system.
Select one:
number system
ERMA (Electronic Recording Machine-Academy), was a pioneering computer
development project run at SRI under contract Bank of Africa in order
to automate banking bookkeeping.
Select one:
True
Convert the following number system to the following base as shown in
the table below.
. .... . ..

Popular presentation software include MS PowerPoint, Keynote, and


Impress.
Select one:
True

Computing professionals should not share technical knowledge with the


public, foster awareness of computing, and encourage understanding of
computing.
Select one:
False

This principle discuss that computing professionals should not


misrepresent an organization's policies or procedures, and should not
speak on behalf of an organization unless authorized to do so.
Select one:
Be Honest and Trustworthy

Leaders should not thoroughly investigate viable alternatives to


removing support for a legacy system
Select one:
False

Breaches of computer security cause harm.


Select one:
True

Individuals and organizations do not have the right to restrict access


to their systems
Select one:
False
It is an essential component of trustworthiness
Select one:
Honesty

A PDF or Portable Document Format is a file format that provides an


electronic image of text or text and graphics that looks like a
printed document and can be viewed, printed, and electronically
transmitted.
Select one:
True
The client alone may decide to pursue the assignment with the
professional after additional time to acquire the necessary
competencies
Select one:
False
it is known as not limited as text
Select one:
Word Processor

This let the user scroll through a document that is too large to fit
inside the document area.
Select one:
Scroll bar

To deselect selected block of text click the mouse anywhere on the


screen or press any arrow key.
Select one:
True

One single sentence is known as a paragraph.


False

This is used to control the appearance of the character.


Select one:
Type Style

It display the button of frequently used commands


Select one:
Toolbars

Paragraph are line of text that run along the top and bottom of every
page.
Select one:
False

It is a contiguous group of characters, words, lines, sentences or


paragraphs in your document that you mark for editing.
Select one:
Block

It is an application that provides extensive tools for creating all


kinds of text-based documents.
Select one:
Word Processing Software

Document dimension is also determined by the orientation of the paper.


Select one:
True

Breaches of computer security cause harm.


Select one:
True
It is either be a formal designation or arise informally from
influence over others
Select one:
Leadership
This principle, which concerns the quality of life of all people,
affirms an obligation of computing professionals, both individually
and collectively, to use their skills for the benefit of society, its
members, and the environment surrounding them.
Select one:
Contribute to Society and to Human Well-being, Acknowledging that all
People are Stakeholders in Computing
Spreadsheet applications contain a lot of features that can help the
ICT professionals
Select one:
True

This is well-known organization for computing professionals


Select one:
ACM

A way of minimizing computer viruses and threats


Select one:
Anti-viruses
A value may be unethical when it has an inadequate moral basis or
causes recognizable harm
Select one:
False

This enables the collection, monitoring, and exchange of personal


information quickly, inexpensively
Select one:
Technology

When appropriate standards of care do not exist, computing


professionals do not have a duty to ensure they are developed.
Select one:
False

This means negative consequences, especially when those consequences


are significant and unjust
Select one:
Harm

The future of computing depends on both technical and ethical


excellence
Select one:
True
A person who basically writes programming languages.
Select one:
Application Developer

A storage of all the important data and information of a company


Select one:
Database
It work with a company's computer network, using information
technology to make network systems for all employees to use
Select one:
Network Engineer

Which formatting tool is used to highlight the texts?


Select one:

Which formatting toolbar is used to change the line spacing of the


selected text/paragraph?
Select one:

Which formatting toolbar is used to change the text/paragraph


alignment to justify?
Select one:
Under the INSERT menu bar, which toolbar you can find the shape tool?
Select one:

Which formatting toolbar is used to add color to the shape?


Select one:

(not sure)

Under the INSERT menu bar, which toolbar you can find the text box?
Select one:

Which formatting toolbar is used to change the text color to blue?


Select one:

Which formatting toolbar is used to change the upper case into lower
case.
Select one:

This determine how close each line of the paragraph comes to the
margins
Select one:
Indents

Which short-cut key is used to find the word organizational within the
word file?

Select one:
CTRL + F

The amount of space between each paragraph


Select one:
Paragraph Spacing

When you text reaches the right edge of the screen it automatically
moves the insertion point to the next line. This feature is called
word wrap.
Select one:
True

These are the white borders around the edge of the page. Every
document has top, bottom, left, and right margins.
Select one:
Margin

It is a software that permits users to work with numbers formatted in


lines and columns normally used for accounting jobs.
Select one:
Electronic spreadsheet

The future of computing depends on both technical and ethical


excellence
Select one:
True
It permits users to create and maintain several files and extract in
an easy convenient manner.
Select one:
Word processing

The amount of space between each line of the text in a paragraph.


Select one:
Paragraph Spacing

This is also knows as Association for Computing Machinery


Select one:
ACM

Refers to the orientation of the lines of a paragraph with respect to


the margins.
Select one:
Alignment

When you select text, it changes the color-becoming highlighted


Select one:
True

These are tools used by application developers to develop


applications.
Select one:
IDE

This is a line that is drawn on one or more side of paragraph


Select one:
Border
The term processing is procedure where processor that transforms raw
data into useful information.
Select one:
True

Changing an existing document is called editing the document.


Select one:
True

A documents are set up to fit 8 1/2 by 11 inch paper, a standard known


as letter size paper.
Select one:
True

The same with web developer but more focus on websites


Select one:
Web Developer
The CPU is a rigid rectangular card containing the circuitry that
connects the processor to the other hardware
Select one:
True

It is consists of pattern or color that is displayed as a background


of the text in a paragraph.
Select one:
Shading
Rows are effective formats for certain types of document.
Select one:
True
You cannot embed sounds file in your document in much the same way
that you embed a graphic file.
Select one:
False

It is the is the first general purpose electronic computer.


Select one:
ENIAC

The more processor the computer has, the more it can do, and the
faster it can perform a certain task
Select one:
True

This refers to the characteristics of the letters, symbols, and


punctuation marks in your document.
Select one:
Font

An application that is used to sending messages or files


electronically.
Select one:
Email

One of the capability of computer is to perform logical operations


Select one:
True

This display the information related to the position in the documents,


the page count, and the status of keyboard keys.
Select one:
Status bar
LAN is also known as _______________.
Select one:
Local Area Network

Document are also useful in arranging images


True

The blinking insertion point is also known as?


Select one:
Cursor

In which menu bar you can find the FONT setting in Microsoft word?
Select one:
Home

This is where we view the document


Select one:
Document Area / Document Window

Long documents generally include header and footer or both.


Select one:
True

This show the position of text, tabs, margins, indents and other
elements on the page.
Select one:
Ruler
The process of formatting a document includes controlling the
appearance of text, the layout of text on the page, and the use of
pictures and other graphic element.
Select one:
True
It display the list of commands and options
Select one:
Menu bar

Templates are designed documents that are blank except for preset
margins, fonts, paragraphs formats, headings, rulers, graphics,
header, footers.
Select one:
True

This is used to measure the font in points


Select one:
Type Size

They bring technical expertise to ensure the quality and accuracy of


that data, then process, design and present it in ways to help people
Select one:
Data Analyst

Two types of memory are CDROM and ROM


Select one:
False

It is called to the person who uses an abacus.


Select one:
Abacist
It is represented by a piece of paper that may contain digital
information represented by a hole in a predefined position
Select one:
Punch card

An application that is used in presenting business proposals to


clients or sales reports in the office.
Select one:
Presentation

Output devices accept data and instructions from the user or from
another computer
Select one:
False

It is made up of just two possible digits, zero and one.


=binary

Spreadsheets do not offer a choice of fonts and type style, shadowed borders and more.
=TRUE

This is also known as another data-analysis tool

=Sorting

This is any number you enter or number that results from a computation.

=Value

It is a software tool for entering, calculating, manipulating and analyzing sets of numbers.

=Spreadsheet program

Worksheet can be collected into groups called?


=Workbook

This find values for one or more cells that make the results of a formula equal to a value you
specify.

= Goal seeking

Spreadsheets have a limited range of uses-form family budgets to corporate earnings


statements.

=FALSE

The intersection of row and column is known as?

= Cell

This can use cell references to use data in other cells.

= Formula

Numbers cannot be shown with or without commas, decimal points.


=FALSE

This help the user make data easier to understand.

= Charts

This counts many values are in a range of cells. Many functions are complex.

= COUNT

These are the values (often called cell reference) that the function uses in its operation.

= Arguments

A text entered in a worksheet is also known as?

= Label

The combination of the column letter and row number.

= Cell Address

You can easily change one part of formula or a cell that it refers to see how that changed
affect the rest of the worksheets.

=True

You cannot create a special effect by adding graphics, such as clip art, to your worksheets.

=False
This is the process of using spreadsheet to test how alternative scenarios affect numeric
results.

= Analysis

You can manually edit any part of a formula or a function, simply by selecting its cell and
making you changes in the formula bar.
=True

A document area in spreadsheet is known as?

= Document Area

These are necessary part of most worksheets

= Dates

You add arguments within the parentheses of the functions.


=True

It is easier to perform calculations on the results even if not sorted.


=False

A more sophisticated type of analysis is a table that automatically calculates the results
based on any number of assumptions.
=True

This calculate numbers based on values or formulas in other cells.

= Formula

Like a word processors, a spreadsheet programs are extremely accommodating when you
want to make the desired changes.
=True

You can add new sheets to a workbook file or delete worksheets you no longer need.
=True

This can be formatted in various ways

= Values and dates

This is used to perform specialized calculations automatically

= Function
A set of noted added in the slide

=Animation

You can insert or delete rows and column

=True

All spreadsheet allow you to do simple analysis.

=True

ATOM is a powerful text editor that can be used by any platform

=True

HTML 2.0 was completed in what year?

= 1995

In 1989, Berners-Lee proposed another kind of system called _______?

=HTML

This is a mark-up language used to create webpages and/or websites

= HTML

The predecessor of HTML is also known as ____?

= CERN

This is a collection of information located on a server connected to the World Wide Web.

= Website

It is a special link which brings you from one page to another page on the web.

= Hypertext

Every website has no specific web address on the WWW

=False

In what year does W3C maintained the specification of HTML?

= 1996

It is the current version of HTML being used today.

= HTML 5

Tim Berners Lee is a Physicist who develop the HTML

=TRUE
The HTML3C is the organization in-charge with designing and maintaining HTML

=False

Back-up is used to format the appearance of your website

=False

HTML file can be save as .html or .htm

=True

You cannot manually edit any part of a formula or a function

=FALSE

NSF established three supercomputing centers that were available to anyone who wanted to
use them for academic purposes.

=TRUE

The W3C Stands for ________?

=World Wide Web Consortium

CERN is a European Organization for Nuclear Research

=True

Safari is a website developed by Mozilla.

=False

Notepad++ is an advanced text editor for creating HTML programs

=True

TextEdit is the default text editor for MAC.

=True

In the 1980s, a physicist named Tim Berners-Lee proposed system prototype called _____?

= ENQUIRE

HTML files are viewable in _____?

= Internet Browser

IETF stands for _______?

= Internet Engineering Task Force


It is consist of a series of short codes typed into a text-file

=HTML

.gov extension indicate a website for academe

=False

Notepad is a text editor for advance users.

=False

What version of HTML was developed in the year 2005?

= HTML 4.01

Programmers use HTML tags to design and create websites

=True

The HTML tags document was released in what year?

= 1991

Which of the following is not included in CSS Styles

= Center

This allows you to select element(s) where an exact property will be applied

= Class selector

A CSS is composed of style rules that are understood by a web browser and then applied to
the corresponding elements within your document.

=True

An ID in CSS starts with the symbol?

=#

This is used when you have one element on the page that will have specific style unique to
other elements.

= ID Selector

All elements having the given ID will be set according to the defined rule.

=True

This is used to select elements with a specific class.

= period (.)
This is used to control the visual appearance of the html content.

= CSS
Each property declared in CSS must be terminated by a ________?
= colon (:)

2px solid A#99AAA is also known as Attribute.

=False
This property is used to control the location of an image in the background.

= background-position

This property is used to assign a background image of an element.

= background-image

This is used as a quick access to various background properties.

= background

This property is used to assign a background color to an element

= background-color

This property is used to make a font italic or oblique.

= font-style

What is the current version of CSS?

= CSS 3

Text-align: left is also known as tags

=True

This property is used to control the frequency of an image used in the background.

= background-repeat

This property is used to control how the image will behave in the background upon
scrolling.

= background-attachment

This property is used to change the face of a font.

= font-family

Font-size property is used to increase or decrease the size of a font.


=False

Font-variant property is used to create a small-caps effect.

=True

This selector is used to specify context

= Contextual selector

Border is also known as values.

=FALSE

2EM in CSS is equivalent to 13pt

=FALSE

CSS allows you to apply style to many selectors twice.

=FALSE

Using an image as a background can also be done through CSS

=TRUE

Font-variant on the other hand, allows you to set the font weight of an element.

=FALSE

Font-weight property is used to increase or decrease how bold or light a font appears.

=TRUE

In CSS each property has a name and a value separated by______?

= colon (:)

Font-size property allows you to change the uppercase display of text or use a font’s default
setting.

=False

This is used to identify the font family, the boldness of font, and even the font style.

= CSS Font

CSS Font properties can help identify the font family, the boldness of font, and even the font
style.

=True

This is used to separate one selector to the other selector.


= comma (,)

1em in CSS is equal to 12pt.

=TRUE

This is known to be useful in analyzing data.

=Spreadsheet

It is a method by which you move around on the web

=Hypertext

A way of minimizing the use of paper in ACM


=PDF Readers

The conversion of 87 hexadecimal to binary is 11100001.


=False

Stanford Research Institute brought about ERMA, Electronic Recording Machine Accounting
project, which dealt with the automation of the process of bookkeeping in banking.
=True

It is someone who develops applications for computers.

=Application Developer

Leaders should consider the personal and professional development, accessibility


requirements, physical safety, psychological well-being, and human dignity of all workers
=True

A computer is built to carry out instructions that are written in a very simple type of
language called?

=Machine Language

The Z3 consisted of separate units, such as a punch tape reader, control unit, floating-point
arithmeticc unit, and input/output devices.
=True

An application such as Pages, and Writer are just some of the application used by an ICT
professional when creating documents.

=Word Processing

It is the year when Z3 of Konrad Zuse's was a notable achievement in the evolution of
computers.
= 1941

It is the fundamental system of a computer based system.

=binary numeral system


These people are usually knowledgeable in using scripting languages such as HTML and
CSS.

= Web Developer

A Vacuum tube is a device used to amplify, switch, otherwise modify, or create an electrical
signal by controlling the movement of electrons in a low-pressure space.

= True
Part of that stewardship requires establishing policies for fair system access, including for
those who may have been excluded

=True

It allows a computer to read PDFs.

=PDF reader

It collects and stores data on sales numbers market research, logistics, linguistics, or other
behaviors

= Database Administrator

It collects and stores data on sales numbers market research, logistics, linguistics, or other
behaviors.

= Database Administrator

The conversion of 67 decimal to hexadecimal is 43.

=True

It is a software that allow users to produce near type-set-quality copy of newsletter,


advertisements, and other publishing jobs.

= Desktop publishing

This enables the collection, monitoring, and exchange of personal information quickly,
inexpensively

=Technology

Input devices return processed data to the user or to another computer system.
=True

Pertaining to local, regional, national, and international laws and regulations that
professional worker must know

=Rules

The given decimal number: 26 if converted to binary is equal to?

=11010
This is either be a formal designation or arise informally from influence over others.

=Leadership

People—including users, customers, colleagues, and others affected directly or indirectly—


should always be the central concern in computing

=True

People—including users, customers, colleagues, and others affected directly or indirectly—


should always be the central concern in computing

=True

MIDTERM: 41/50

This can display slide to large audience


=From a Digital Projector

These are small boxes (usually white or black in color) that you can drag to resize the frame.

=Handles

This is like a printed one-a source of alternatives words.

=Thesaurus

What is the default layout of the slide when you insert/add a new slide?

=Title Slide

A presentation program can contain a single slide or hundreds.

=True

Which menu bar can you find the Charts?

=Insert
This matches each word in a document against a built in dictionary containing standard
spelling.

=Spell Checker

Adding animation enables you to create a wide range of moods for your presentation,
therefore, it is important to choose colors carefully.

=False

To navigate the worksheet, you need to understand its system of ______?

=Cell Address

This can include different types of text, charts, tables and graphics.

=Slide

Rulers separate different elements and help hold the viewer attention or individual parts of
the slide.

=False

Which animation type “Scribble” belongs to?

=Emphasis Effects

It is the process of combining a form letter with the contents of database

=Mail Merge

This tells you specific information about the worksheet.

=Status bar

Enable you to organize your slides content as you create them

=Outlining

These are used to perform calculations in the worksheets. Formulas can use cell references
to use data in other cells.

=Formulas

This help you find errors in your spelling and grammar; they also may have tools to help you
find just the right word or avoid overusing certain words.

=Language tools
This is a pre-designed documents that are blank except for preset margins, fonts,
paragraphs formats, headings, rulers, graphics, header, footers.

=Template

This can be used to set up rows and columns of information in a document

=Table

You cannot use the programs drawing tools to draw on a slide while it is being displayed.

=False

These are other common data analysis tools found in spreadsheets.

=Goal seeking and Sorting

Which menu bar is used to change the design of the slide?


=Design

Is a predefined formula provided by the spreadsheet program.

=Functions

Paragraph in slide is usually in the form of tiles, headings, and lists.


=FALSE

This changes color as it moves from one part of the slide to another.

=Gradient fill

Animations, sounds effects, and hyperlinks are cool, but they get annoying quickly.
=TRUE

This is used for creating and editing simple graphics.

=Paint Program

Spreadsheet programs have limited formats specifically for numbers.


=FALSE

Presentation programs provide many of the features found in word processor (for working
with text), spreadsheet (for creating charts), and paint program (for creating and editing
simple graphics).
=TRUE

Spreadsheet software has no ability to generate charts based on numeric data

=FALSE
Spreadsheets can work with whole numbers, decimals, negative numbers, currency, and
other types of values, including scientific notation.

=TRUE

It is easier and faster to work with one of the presentation programs many ______?

=Slide template

A textbox cannot hold multiple paragraphs, the paragraphs themselves are usually quite
short.

=FALSE

Which animation type “Blinds” belongs to?

=Emphasis Effects

You can create slides from scratch starting with _____?

=Blank slide

To add text to a textbox, simply click in the box at the place where you want to insert text,
and then type your text.

=TRUE

Presentation programs have a built-in timing feature that you can use to determine how
long your slides are going to be on the screen

=TRUE

This is used to produce slides-single screen images that contain a combination of text,
numbers, and graphics (such as charts, clip arts and graphics), often on a colorful
background.

=Presentation Program

This compare each sentence to a set of standard grammatical rules, notifies you if it finds a
potential problems, and providing grammatical correct options.

=Grammar Checker

Presentation programs are used to produce slides- single screen images that contain a
combination of text, numbers, and graphics (such as charts, clip arts and graphics), often on
a colorful background.

=TRUE
Work like spell checker, but they inspect you document for grammatical problems

=Grammar Checker

This bar tell the specific information about the worksheet.

=Status bar

The intersection of a column and row is called a _____?

=Cell

This can connect your computer to a standard television and view the PCs video output on
the television monitor.

=On a Large Format Monitor

Which short cut key is use to show the slide show in presentation mode?

=CTRL + F5

This is an important tool for anyone who must present information to a group.

=Presentation Software

Presentation software is an important tool for anyone who must present information to a
group.
=TRUE

This is a process of organizing the slides so that the information flows logically.

=Outlining

Formatting text in a presentation programs is not the same with formatting in word
processor.
=FALSE

This can display your slides at the proper resolution and in large enough format for a sizable
audience to view comfortably.

=On a Large Format Monitor

It is a special resizable boxes for text and graphical elements

=Special text boxes and frames

The text is formatted automatically, but you can easily reformat the text later, using many of
the same formatting options that are available in word processors.
=TRUE
Slides can be simple or sophisticated.
=TRUE

Which type of view where it allows the user to add a note?


=Note pages

Presentation programs do not have a built n paint tools also enable you to draw simple
graphics and add them to your slides.
=FALSE

This help you make sense of a worksheet contents.

=Labels

You cannot automate the presentation by setting a display time for each slide

=False

This is used to make text pop up or crawl onto the screen, or to make your slides "build"
themselves by adding individual pieces of text that appear as you introduce them to the
audience.

=Animation

This is used for creating charts.

=Spreadsheet

If your topic is interesting, and your presentation is crisp, your audience is more likely to
respond.

=TRUE

This display a definition of the selected word and a list of possible replacement.

=Thesaurus

The active cell is indicated by a ______?

=Cell pointer

You can move from one slide to the next slide by clicking the mouse button or by pressing
home button key.

=FALSE
This is useful in arranging images (such as clip art or photographs) on a page and for
arranging images and text in interesting ways.

=Table

Each slide should focus on one unique topic and have no more than three to five bullets
points.

=TRUE

It is a pre-designed document that already has coordinating fonts, a layout, and a


background.

=Presentation template

A special effect that causes slide to blend together when you switch from one slide to the
next.

=Transition

What type of layout is the first slide belongs to?

=Title and Content

Images quality may suffer even if a PC-to-TV converter is used.

=TRUE

Regardless of the method you use to project your slides, navigating a slide show is not a
simple process.

=TRUE

To insert clip art or another type of graphic in a slide, you can select an image from your
software collections of graphics or import an image file, such as scanned photograph or clip
art.

=TRUE

Most presentation programs do not allow the user to save a set of slides as a group in one
file.

=FALSE

WAN is also known as _______________.

=Wide Area Network

It is a software that allows users to enter, store, manipulate and print text.

=Word processing
Creating HTML Programs can be done by using any text editors.

=TRUE

This is simply a part of the web page that is link to the URL

= hyperlink

ARPA also wanted users in remote locations to be able to share scarce computing resources.

=TRUE

Personal websites are mostly build by software company focusing on building a system.

=FALSE

Move from one slide to the other slide by using the ______ key?

= F5

This is consists of a series of short codes typed into a text-file.

= HTML

Which of the following is not included in formatting the slides?

= Adding charts based on data

Which of the following is not included as ways to show the slide to the audience?

= Cellular Phone

Every Web server has an IP address

=TRUE

A default browser for Windows operating system

=Internet Explorer

The future of computing do not depends on both technical and ethical excellence
=FALSE
Every Web server has a domain name
=TRUE

This is used to add a space between characters.

=letter-spacing

This provide a service to other computers connected to it.


=HOST

Each item on the list uses <LI> tag at the beginning and </LI> to close each item on the list.
=TRUE

Suppose that the given program is executed. What is the title of the page?
=CSS Background

The link between NSFNET, ARPANET and other network is called?

=INTERNET

Attribute are used to format the appearance of your webpage.


=FALSE

This is one of the problems that an ICT professional may encounter.

= Computer Viruses

A browser that offers seamless browsing and downloads that works on all platforms.

= Maxthon

Which of the following is not included in the critical part of HTML 5?

= Chart

HTML uses the <URL> tag to insert image into your website
=FALSE

The ordered list is denoted by what tags?


=<OL></OL>

The open < and close > symbol is known as HTML tags
=TRUE

A collection of networked network is describe as being ?

= Inter-networked
The NSF created a higher capacity network called?

= NSFNET

Placing the style="" attribute inside an HTML tag is what type of CSS Style?

= Inline

This is one of the most popular text editors used for creating HTML programs

= Notepad

What is the conversion of 00100011 (base 2) if to be converted to octal?

=43

This is a set of protocols and software that allows the global computer network (called the
Internet)

=WWW

This becomes a common tool for ICT professionals in sending messages or files.

=Email

What is the new agency that accept the ARPANET project after the department of defense?

= The National Science Foundation

This helps the user search for information by typing one or more words.

= Search Engine

This is used to add a space between words.


= word-spacing

In what year Tim Berners Lee started to develop the browser and the server software.

= 1990

This is being utilized to create a webpage to show the multimedia documents

= Markup language

What is the conversion of 85 (base 10) if to be converted to hexadecimal?


=55

WHATWG stands for ________?

=Web Hypertext Application Technology Working Group


This is a popular data storage technology which is revolutionizing home entertainment.

=DVD

This enables you to search for information by selecting categories of subject matter.

= Directories

A word processor can make you a good writer.

=FALSE

What is the ISO number of HTML, in which it became an international standard?


= (ISO/IEC 15445:2000)

Which of the following in included in HTML tags purposes?

= Physical tags and logical styles

This is used to catch spelling mistakes.

= Spell Checker

A strong emphasized text is denoted by <B></B>


=FALSE

A tag for monospace is <BR></BR>


=FALSE

This is another common type of storage device.

= CD-ROM

Text in Citation is denoted by what tags?


=<b></b>

This is most common input devices.

= Keyboard

The ARPANET discontinued in 1994.

=FALSE

This is just like a printed one-a source of alternatives words

= Thesaurus\
All the data found on a website is not bounded by code, which can range from simple
markup

=FALSE

ARPANET was basically a large network serving hundreds of users.

=TRUE

It is an alternative web-browser that has a clean UI and is easy to use


= Opera

The text in spreadsheet is also known as ____?

= Values

The IETF or (Internet Engineering Task Force) was developed in what year?
The IETF or (Internet Engineering Task Force) was developed in what year?
=1994
You cannot create slides from scratch

=FALSE

To use the language tool and check the spelling which menu bar a user should click?

= Review

Placing the style tags inside the portion is what type of CSS Style
=CENTER

This is an application program that is stored on your computers disk.

= Web Browser

Which of the following is not included in presentation program interface

= Formula bar

A Popular Browser by Internet giant Google is known as Google Chrome

=TRUE

Placing the style tags inside the portion is what type of CSS Style
=CENTER
Do not use a class selector if you will be applying a consistent style to multiple elements
within your web page/site.

=FALSE

This is used to put underline, overline, line-through or blink.


= text-decoration

A web page may open in the browser window as soon as you launch the program, this page
is called

= start page

Arguments in spreadsheet are the values or also known as_____?

= Arguments

This is the process of combining a form letter with the contents of database

= Mail Merge

It is the year where the seeds of Internet was planted.

=1969

HTML documents can be a document file that contains two parts, the web content and tags.

=true
COMPUTING FUNDAMENTALS- (maj)

MAG OPEN PO KAYO NG MODULE PARA MAKA PERFECT:) GOODLUCK!

Quiz 5 and 6 and FINAL EXAM

This is one of the most popular text editors used for creating HTML programs
Notepad

It is a method by which you move around on the web Hypertext

HTML files are viewable in _____? Internet Browser

What version of HTML was published and refined in the year 2000? HTML 4.01

This is a collection of information located on a server connected to the World Wide


Web. Website

.gov extension indicate a website for academe false

Back-up is used to format the appearance of your website false

Programmers use HTML tags to design and create websites true

TextEdit is the default text editor for MAC. True

The open < and close > symbol is known as HTML tags true

In the 1980s, a physicist named Tim Berners-Lee proposed system prototype called
_____? ENQUIRE

It is a special link which brings you from one page to another page on the web.
Hyperlink

It is the current version of HTML being used today. HTML 5

Notepad++ is an advanced text editor for creating HTML programs true

Notepad is a text editor for advance users. false


This is a mark-up language used to create webpages and/or websites HTML

The HTML tags document was released in what year? 1991

Websites include links to other sites in the form of _____? Hypertext

The HTML3C is the organization in-charge with designing and maintaining HTML
False

IETF stands for _______? Internet Engineering Task Force

QUIZ 6
2px solid A#99AAA is also known as Attribute. false

This property is used to make a font italic or oblique. font-style

2EM in CSS is equivalent to 13pt FALSE

A CSS is composed of style rules that are understood by a web browser and then
applied to the corresponding elements within your document. True

CSS Font properties can help identify the font family, the boldness of font, and even
the font style. True

Font-size property allows you to change the uppercase display of text or use a font’s
default setting. False

In CSS each property has a name and a value separated by______? colon (:)

This property is used to assign a background color to an element background-color

This allows you to select element(s) where an exact property will be applied Class
selector

Font-weight property is used to increase or decrease how bold or light a font appears.
true
ACM stands for __________? Association for Computing Machinery

The ARPANET discontinued in 1994. False

Which of the following is not included as one of the special features of presentation
program? Formulas

An ICT professional is often exposed to a lot applications as it is part of their day to


day job true

AInternet backbone is the central structure that connects other elements of the
network. FALSE

In what year Tim Berners Lee started to develop the browser and the server software.
1990

This is used to add a space between characters. letter-spacing

The ARPANET jumped across Anlantic to Norway in what year? 1973

This is used to present processed data to the user. Output Devices

Creating HTML Programs can be done by using any text editors. True

This is used to select elements with a specific class. period (.)

CSS Stands for _____? Cascading Style Sheet

A browser powered by Blink Engine. Slimjet

Avery fast browser that is based on the WebKit rendering engine Safari

Height value can also be changed using two different units: pixels (bx) or through the
percentage (%) of the screen’s actual size. false

To add a theme in the presentation which menu bar should a user click? home

This is a popular browser for both desktop and mobile devices. UC Browser

The link between NSFNET, ARPANET and other network is called? INTERNET

Each item on the list uses <LI> tag at the beginning and </LI> to close each item on
the list. True
It is an alternative web-browser that has a clean UI and is easy to use opera

The IETF or (Internet Engineering Task Force) was developed in what year? 1994

This is used to left, right, center, justify the text. text-align

Browsers are not primarily intended to access the World Wide Web false

This is the current version of CSS CSS 3

This return processed data to the user or to another computer system. Output
Devices

This is used to add indentation that appears before the first line of the
text. text-indent

What is the conversion of 11011 (base 2) if to be converted to decimal? 27


COMPUTING FUNDAMENTALS- (maj)

MAG OPEN PO KAYO NG MODULE PARA MAKA PERFECT:) GOODLUCK!

Quiz 5 and 6 and FINAL EXAM

This is one of the most popular text editors used for creating HTML programs
Notepad

It is a method by which you move around on the web Hypertext

HTML files are viewable in _____? Internet Browser

What version of HTML was published and refined in the year 2000? HTML 4.01

This is a collection of information located on a server connected to the World Wide


Web. Website

.gov extension indicate a website for academe false

Back-up is used to format the appearance of your website false

Programmers use HTML tags to design and create websites true

TextEdit is the default text editor for MAC. True

The open < and close > symbol is known as HTML tags true

In the 1980s, a physicist named Tim Berners-Lee proposed system prototype called
_____? ENQUIRE

It is a special link which brings you from one page to another page on the web.
Hyperlink

It is the current version of HTML being used today. HTML 5

Notepad++ is an advanced text editor for creating HTML programs true

Notepad is a text editor for advance users. false


This is a mark-up language used to create webpages and/or websites HTML

The HTML tags document was released in what year? 1991

Websites include links to other sites in the form of _____? Hypertext

The HTML3C is the organization in-charge with designing and maintaining HTML
False

IETF stands for _______? Internet Engineering Task Force

QUIZ 6
2px solid A#99AAA is also known as Attribute. false

This property is used to make a font italic or oblique. font-style

2EM in CSS is equivalent to 13pt FALSE

A CSS is composed of style rules that are understood by a web browser and then
applied to the corresponding elements within your document. True

CSS Font properties can help identify the font family, the boldness of font, and even
the font style. True

Font-size property allows you to change the uppercase display of text or use a font’s
default setting. False

In CSS each property has a name and a value separated by______? colon (:)

This property is used to assign a background color to an element background-color

This allows you to select element(s) where an exact property will be applied Class
selector

Font-weight property is used to increase or decrease how bold or light a font appears.
true
ACM stands for __________? Association for Computing Machinery

The ARPANET discontinued in 1994. False

Which of the following is not included as one of the special features of presentation
program? Formulas

An ICT professional is often exposed to a lot applications as it is part of their day to


day job true

AInternet backbone is the central structure that connects other elements of the
network. FALSE

In what year Tim Berners Lee started to develop the browser and the server software.
1990

This is used to add a space between characters. letter-spacing

The ARPANET jumped across Anlantic to Norway in what year? 1973

This is used to present processed data to the user. Output Devices

Creating HTML Programs can be done by using any text editors. True

This is used to select elements with a specific class. period (.)

CSS Stands for _____? Cascading Style Sheet

A browser powered by Blink Engine. Slimjet

Avery fast browser that is based on the WebKit rendering engine Safari

Height value can also be changed using two different units: pixels (bx) or through the
percentage (%) of the screen’s actual size. false

To add a theme in the presentation which menu bar should a user click? home

This is a popular browser for both desktop and mobile devices. UC Browser

The link between NSFNET, ARPANET and other network is called? INTERNET

Each item on the list uses <LI> tag at the beginning and </LI> to close each item on
the list. True
It is an alternative web-browser that has a clean UI and is easy to use opera

The IETF or (Internet Engineering Task Force) was developed in what year? 1994

This is used to left, right, center, justify the text. text-align

Browsers are not primarily intended to access the World Wide Web false

This is the current version of CSS CSS 3

This return processed data to the user or to another computer system. Output
Devices

This is used to add indentation that appears before the first line of the
text. text-indent

What is the conversion of 11011 (base 2) if to be converted to decimal? 27


COMPUTING FUNDAMENTALS- (maj)

MAG OPEN PO KAYO NG MODULE PARA MAKA PERFECT:) GOODLUCK!

Quiz 5 and 6 and FINAL EXAM

This is one of the most popular text editors used for creating HTML programs
Notepad

It is a method by which you move around on the web Hypertext

HTML files are viewable in _____? Internet Browser

What version of HTML was published and refined in the year 2000? HTML 4.01

This is a collection of information located on a server connected to the World Wide


Web. Website

.gov extension indicate a website for academe false

Back-up is used to format the appearance of your website false

Programmers use HTML tags to design and create websites true

TextEdit is the default text editor for MAC. True

The open < and close > symbol is known as HTML tags true

In the 1980s, a physicist named Tim Berners-Lee proposed system prototype called
_____? ENQUIRE

It is a special link which brings you from one page to another page on the web.
Hyperlink

It is the current version of HTML being used today. HTML 5

Notepad++ is an advanced text editor for creating HTML programs true

Notepad is a text editor for advance users. false


This is a mark-up language used to create webpages and/or websites HTML

The HTML tags document was released in what year? 1991

Websites include links to other sites in the form of _____? Hypertext

The HTML3C is the organization in-charge with designing and maintaining HTML
False

IETF stands for _______? Internet Engineering Task Force

QUIZ 6
2px solid A#99AAA is also known as Attribute. false

This property is used to make a font italic or oblique. font-style

2EM in CSS is equivalent to 13pt FALSE

A CSS is composed of style rules that are understood by a web browser and then
applied to the corresponding elements within your document. True

CSS Font properties can help identify the font family, the boldness of font, and even
the font style. True

Font-size property allows you to change the uppercase display of text or use a font’s
default setting. False

In CSS each property has a name and a value separated by______? colon (:)

This property is used to assign a background color to an element background-color

This allows you to select element(s) where an exact property will be applied Class
selector

Font-weight property is used to increase or decrease how bold or light a font appears.
true
ACM stands for __________? Association for Computing Machinery

The ARPANET discontinued in 1994. False

Which of the following is not included as one of the special features of presentation
program? Formulas

An ICT professional is often exposed to a lot applications as it is part of their day to


day job true

AInternet backbone is the central structure that connects other elements of the
network. FALSE

In what year Tim Berners Lee started to develop the browser and the server software.
1990

This is used to add a space between characters. letter-spacing

The ARPANET jumped across Anlantic to Norway in what year? 1973

This is used to present processed data to the user. Output Devices

Creating HTML Programs can be done by using any text editors. True

This is used to select elements with a specific class. period (.)

CSS Stands for _____? Cascading Style Sheet

A browser powered by Blink Engine. Slimjet

Avery fast browser that is based on the WebKit rendering engine Safari

Height value can also be changed using two different units: pixels (bx) or through the
percentage (%) of the screen’s actual size. false

To add a theme in the presentation which menu bar should a user click? home

This is a popular browser for both desktop and mobile devices. UC Browser

The link between NSFNET, ARPANET and other network is called? INTERNET

Each item on the list uses <LI> tag at the beginning and </LI> to close each item on
the list. True
It is an alternative web-browser that has a clean UI and is easy to use opera

The IETF or (Internet Engineering Task Force) was developed in what year? 1994

This is used to left, right, center, justify the text. text-align

Browsers are not primarily intended to access the World Wide Web false

This is the current version of CSS CSS 3

This return processed data to the user or to another computer system. Output
Devices

This is used to add indentation that appears before the first line of the
text. text-indent

What is the conversion of 11011 (base 2) if to be converted to decimal? 27


COMPUTING FUNDAMENTALS- (maj)

MAG OPEN PO KAYO NG MODULE PARA MAKA PERFECT:) GOODLUCK!

Quiz 5 and 6 and FINAL EXAM

This is one of the most popular text editors used for creating HTML programs
Notepad

It is a method by which you move around on the web Hypertext

HTML files are viewable in _____? Internet Browser

What version of HTML was published and refined in the year 2000? HTML 4.01

This is a collection of information located on a server connected to the World Wide


Web. Website

.gov extension indicate a website for academe false

Back-up is used to format the appearance of your website false

Programmers use HTML tags to design and create websites true

TextEdit is the default text editor for MAC. True

The open < and close > symbol is known as HTML tags true

In the 1980s, a physicist named Tim Berners-Lee proposed system prototype called
_____? ENQUIRE

It is a special link which brings you from one page to another page on the web.
Hyperlink

It is the current version of HTML being used today. HTML 5

Notepad++ is an advanced text editor for creating HTML programs true

Notepad is a text editor for advance users. false


This is a mark-up language used to create webpages and/or websites HTML

The HTML tags document was released in what year? 1991

Websites include links to other sites in the form of _____? Hypertext

The HTML3C is the organization in-charge with designing and maintaining HTML
False

IETF stands for _______? Internet Engineering Task Force

QUIZ 6
2px solid A#99AAA is also known as Attribute. false

This property is used to make a font italic or oblique. font-style

2EM in CSS is equivalent to 13pt FALSE

A CSS is composed of style rules that are understood by a web browser and then
applied to the corresponding elements within your document. True

CSS Font properties can help identify the font family, the boldness of font, and even
the font style. True

Font-size property allows you to change the uppercase display of text or use a font’s
default setting. False

In CSS each property has a name and a value separated by______? colon (:)

This property is used to assign a background color to an element background-color

This allows you to select element(s) where an exact property will be applied Class
selector

Font-weight property is used to increase or decrease how bold or light a font appears.
true
ACM stands for __________? Association for Computing Machinery

The ARPANET discontinued in 1994. False

Which of the following is not included as one of the special features of presentation
program? Formulas

An ICT professional is often exposed to a lot applications as it is part of their day to


day job true

AInternet backbone is the central structure that connects other elements of the
network. FALSE

In what year Tim Berners Lee started to develop the browser and the server software.
1990

This is used to add a space between characters. letter-spacing

The ARPANET jumped across Anlantic to Norway in what year? 1973

This is used to present processed data to the user. Output Devices

Creating HTML Programs can be done by using any text editors. True

This is used to select elements with a specific class. period (.)

CSS Stands for _____? Cascading Style Sheet

A browser powered by Blink Engine. Slimjet

Avery fast browser that is based on the WebKit rendering engine Safari

Height value can also be changed using two different units: pixels (bx) or through the
percentage (%) of the screen’s actual size. false

To add a theme in the presentation which menu bar should a user click? home

This is a popular browser for both desktop and mobile devices. UC Browser

The link between NSFNET, ARPANET and other network is called? INTERNET

Each item on the list uses <LI> tag at the beginning and </LI> to close each item on
the list. True
It is an alternative web-browser that has a clean UI and is easy to use opera

The IETF or (Internet Engineering Task Force) was developed in what year? 1994

This is used to left, right, center, justify the text. text-align

Browsers are not primarily intended to access the World Wide Web false

This is the current version of CSS CSS 3

This return processed data to the user or to another computer system. Output
Devices

This is used to add indentation that appears before the first line of the
text. text-indent

What is the conversion of 11011 (base 2) if to be converted to decimal? 27

You might also like