0% found this document useful (0 votes)
30 views24 pages

05 Terms, Acronyms and Definitions

This document defines terms, acronyms, and definitions related to computers and technology. It provides explanations for common terms like 3D printing, 32-bit/16-bit, 802.11 wireless standards, access control lists, active programs, ActiveX, algorithms, Android operating system, Apache web server software, arrays, artificial intelligence, and more. The definitions clarify technologies, programming concepts, file and network terms, and other IT vocabulary.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views24 pages

05 Terms, Acronyms and Definitions

This document defines terms, acronyms, and definitions related to computers and technology. It provides explanations for common terms like 3D printing, 32-bit/16-bit, 802.11 wireless standards, access control lists, active programs, ActiveX, algorithms, Android operating system, Apache web server software, arrays, artificial intelligence, and more. The definitions clarify technologies, programming concepts, file and network terms, and other IT vocabulary.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

TERMS, ACRONYMS AND DEFINITIONS

Matthew Varghese
NW DCES: CAT & IT
TERMS, ACRONYMS AND DEFINITIONS

3D printing/printers 3D printers can create three-dimensional solid objects like human


tissue for replacement, (e.g. jewellery, clothing from a digital model of
the item by adding successive layers of material on top of one
another.

32-bit/16-bit This denotes the number of "pieces" (or bits) of information required
by an operating system to run a certain application. It also deals with
the construction of the computer's CPU (Central Processing Unit) or
brain. The Pentium CPU easily runs 32-bit applications because the
wires that hold all the pieces together (known as busses) are big
enough to flow through 32 bits at a time. 486s, 386s, and below aren't
big enough. They work with 16 bits at a time.

802.11 a/b/g/n Refers to a set of specification and protocols used in communication


of a wireless network. The letters (a, b, g, n) simply indicate different
versions of the Wi-Fi standard.

Access Control List ACL Stands for "Access Control List." An ACL is a list of user
permissions for a file, folder, or other object. It defines what users and
groups can access the object and what operations they can perform.
These operations typically include read, write, and execute. For
example, if an ACL specifies read-only access for a specific user of a
file, that user will be able open the file, but cannot write to it or run the
file.

Access time The performance of a hard drive or other storage device - how long it
takes to locate a file.

Active program or The application or window at the front (foreground) on the monitor.
window

ActiveX ActiveX is a technology used to view desktop documents in Web


browsers as it links interactively with the World Wide Web. In order
for ActiveX to work correctly so you can view all Web content, you
must make sure you have the latest version of ActiveX installed on
your computer.

ActiveX controls Software add-ons created with ActiveX are called ActiveX controls.
These controls can be implemented in all types of programs, but they
are most commonly distributed as small Web applications. For
example, a basic ActiveX control might display a clock on a webpage.
Advanced ActiveX controls can be used for creating stock tickers,
interactive presentations, or even Web-based games.

1|Page
Address Bar An address bar is a text field near the top of a Web browser window
that displays the URL of the current webpage. The URL, or web
address, reflects the address of the current page and automatically
changes whenever you visit a new webpage. Therefore, you can
always check the location of the webpage you are currently viewing
with the browser's address bar.

ADSL Stands for "Asymmetric Digital Subscriber Line." ADSL is a type of


DSL, which is a method of transferring data over copper telephone
lines. While symmetrical DSL (SDSL) uploads and downloads data at
the same speed, ADSL has different maximum data transfer rates for
uploading and downloading data.

Adware Adware is free software that is supported by advertisements.


Common adware programs are toolbars that sit on your desktop or
work in conjunction with your Web browser. They include features
like advanced searching of the Web or your hard drive and better
organization of your bookmarks and shortcuts. They are free to use,
but require you to watch advertisements as long as the programs are
open.
Alert (alert box) - A message that appears on screen, usually to tell you
something went wrong.

Algorithm An algorithm is a set of instructions, sometimes called a procedure or


a function that is used to perform a certain task. This can be a simple
process, such as adding two numbers together, or a complex
function, such as adding effects to an image.

Alias An icon that points to a file, folder or application.

ALU Stands for "Arithmetic Logic Unit." An ALU is an integrated circuit


within a CPU or GPU that performs arithmetic and logic operations.
Arithmetic instructions include addition, subtraction, and shifting
operations, while logic instructions include Boolean comparisons,
such as AND, OR, XOR, and NOT operations.

Android Android is a mobile operating system developed by Google. It is used


by several smartphones, such as the Motorola Droid, the Samsung
Galaxy, and Google's own Nexus One. The Android operating system
(OS) is based on the open Linux kernel. Unlike the iPhone OS,
Android is open source, meaning developers can modify and
customize the OS for each phone.

2|Page
ANSI Stands for "American National Standards Institute." ANSI is a U.S.-
based non-profit organization that works to develop and promote
standards in the United States and around the world. By standardizing
new products and technologies, ANSI both strengthens the United
States' position in the global marketplace and helps ensure product
integrity and safety. ANSI was originally called the "American
Engineering Standards Committee" (AESC).

Apache Apache is the most popular Web server software. It enables a


computer to host one or more websites that can be accessed over
the Internet using a Web browser. Apache Group became the
Apache Software Foundation, a non-profit organization that currently
maintains the development of the Apache Web server software.

Applet An applet is a small application designed to run within another


application. While the term "applet" is sometimes used to describe
small programs included with a computer's operating system, it
usually refers to Java applets, or small applications written in the Java
programming language

Array An array is a data structure that contains a group of elements.


Typically these elements are all of the same data type, such as an
integer or string. Arrays are commonly used in computer programs
to organize data so that a related set of values can be easily sorted or
searched.

Artificial Intelligence Artificial Intelligence, or AI, is the ability of a computer to act like a
human being. It has several applications, including software
simulations and robotics. However, artificial intelligence is most
commonly used in video games, where the computer is made to act
as another player.

Asynchronous: Transferring data with the help of start and stop bits that indicate the
beginning and end of each character being sent.

Augmented reality (See Virtual reality ) This technology is similar to Virtual reality
(creating virtual environment like using helmets with screen) but it
takes the physical world and adds (augments) objects such as
graphics within the real world. Eg. Training aircraft simulators and
medicine with surgeons perform remote surgery.

Autoresponder Autoresponder is most commonly used on email accounts to send an


automatic response to any emails sent to a certain email address. It
can be run through a mail server or a Web-based interface.
Individuals often use an autorepsonder if they will not be checking
their emails for a while and anyone who sends one to them will be
automatically sent a reply informing them that the individual is not able
to respond.

3|Page
AVI Stands for Audio/Video Interleaved. Microsoft's format for encoding
video & audio for digital transmission.

Backbone Backbone is system used to carry data to the smaller transmission


lines in a network. A local backbone is made up of network lines that
connect several LANs together, this creates a wide area network
which is linked by the backbone connection. The result is a wide area
network (WAN) linked by a backbone connection.

Background Part of the multitasking capability. A program can run and perform
tasks in the background while another program is being used in the
foreground.

Backlink A backlink is an incoming link from an external website to specific


webpage. For example, if you publish a webpage and 20 other
websites link to it, your webpage has 20 backlinks. Links to the page
from within your own website are not included in the backlink total.

Backside Bus Backside and Frontside buses are used to carry data back and forth
from a computers CPU. The Frontside bus does this between the
memory and CPU while the Backside bus moves data in and out of
the computer's L2 cache. As this data is frequently used it is stored
near to the processor, and as a result the computer's CPU can work
much faster.

Backup A copy of a file or disk you make for archiving purposes.

Bandwidth The capacity of a networked connection. Bandwidth determines how


much data can be sent along the networked wires. Bandwidth is
particularly important for Internet connections, since greater
bandwidth also means faster downloads Bandwidth is a word used to
describe the amount of data that can be sent down a digital
connection is a certain time period i.e how many bytes can be sent
per second.

Baud Baud is a unit of measurement that states how many electrical signals
per second, are sent to networks, modems and other data transfer
devices. This is a measurement of the amount of data that can be
transferred in one second. Example: A 14.4 baud modem can transfer
14,400 bits of information in one second.

Beta Software Beta Software is software that is still in it's testing phase, it can contain
bugs, errors and other problems which are ironed out before the
software becomes available to the general public. If there is a b in a
program's properties it is beta software.

4|Page
Big data Very large structured and un structured data sets that are analysed
using computers to reveal trends and associations. Refers to
challenges regarding storages, curation, querying etc.

Bidorbuy Bidorbuy is South Africa’s largest internet auction website, run by


bidorbuy (Pty) Ltd.

Binary This is a basic system of numbering using ones and zeros.

BIOS Stands for Basic Input/output System. This is the little set of programs
that lets all the different parts of the computer talk to each other. BIO
is pre-installed on every Windows computer and means Basic
Input/output System. It is used when the computer starts up and it
checks all the devices and hardware connections on a computer. If
everything is functioning the boot up process will begin.

Bitcoin Virtual, digital currency. Bitcoin can be exchanged for other


currencies, products and services. Bitcoin caused concerns
regarding the payment in criminal activities such as ransomware
demands.

Bit/s It is the smallest piece of information used by the computer. Derived


from “binary digit”. In computer language, either a one (1) or a zero
(0).

Blogs A blog is an online diary or journal that is usually in chronological


order that is normally about one topic. The entries are known as posts
and people can comment on these posts on a blog. Also known as
Web logs, these allow users to post thoughts and updates about their
life on the Web.

Bluetooth Bluetooth is a wireless connection that is used to transmit data


between Bluetooth enabled devices at short range. Laptops, PDAs
and mobile phones as well as scanners and printers use Bluetooth
frequently.

Blu-ray Blu-ray is a recently developed optical disk format which can be used
for holding huge amounts of data in HD format. One disk is capable
of containing 25GB of data – a CD can only hold 700MB of data while
a DVD can hold 4.7GB.
BMP (Pronounced “bimp”): It’s a bitmap, an image made up of little dots.

Boolean Boolean is the artificial logic that a computer uses to decide if


something is true or false. Boolean uses 4 operators AND, NOT, OR
and XOR and it is the combination of true and false within these
operators that allows a computer to come to a true or false decision.

5|Page
Boot To start up a computer.

Bot Bots are usually used online and they are software programs that are
automated and perform specific functions when ordered to. For
example they can monitor online chat rooms and can throw people
who do not abide by the rules of the chat room out.

Bridge Bridges connect LANs together and allow for faster transmission of
data between them. A bridge is much faster than a router, but it
cannot act as a firewall like the majority of routers do.

Browse To explore a website or a number of websites by scanning and


reading information.

Browser Software, such as Microsoft Internet Explorer, used to find information


on the Web. The most visible part of a browser sits at the top of the
computer screen, above the web page.

Buffer: The buffer is a section of the computer where data is stored before
being used. This buffering allows time for an application to fix
differences in bit rates among other things. It creates a space of time
for compensation.

Bug A programming error that causes a program to behave in an


unexpected way.

Bus An electronic pathway through which data is transmitted between


components in a computer.

BYOD Bring Your Own Device (BYOD) refers to a concept where people are
allowed to bring and use their own devices- portable devices such as
laptops tablets to work on and access the network instead of a device
owned by a company or institution.

Byte A piece of computer information made up of eight bits.

Card A printed circuit board that adds some features to a computer.

Card reader A device connected to a computer that is designed to accept and read
data from different types of storage media, such as SIM and SD cards
and flash drives.

Cartridge drive A storage device, like a hard drive, in which the medium is a cartridge
that can be removed.

6|Page
CD CD is the term used for the circular disk that was created in the 1980s.
CDs can hold 700MB of data and this data (stored in the form of
notches) is read by a laser in a CD player’s optical drive.

CD-R CD-R (Compact Disk Recordable) is a CD which is able to have data


written to it. A CD burner must be used for this. Although they can
hold audio data they can also be used to store other data such as
Power Point presentations and Word documents.

CD-ROM CD-ROM or Compact Disk Read-Only Memory are CDs that are able
to be read by a computer as long as it has an optical drive. CD-ROMs
cannot be changed or wiped and contain a large amounts of different
data as they are not formatted the same way as CDs. They are usually
retail software.

CD-RW A CD-RW (Compact Disk Re-Writable) is a Rewritable CD that can


have data burned onto it. The difference between a CD-R and a CD-
RW is that a CD-RW can be written on countless times, it cannot
however be overwritten and needs to be erased first. Due to their
nature CD-RW are not the best way of backing up data so it would be
better to use a CD-R.

Clipboard A portion of memory where the Mac temporarily stores information.


Called a Copy Buffer in many PC applications because it is used to
hold information which is to be moved, as in word processing where
text is “cut” and then “pasted”.
Clock Rate (MHz) The instruction processing speed of a computer measured in millions
of cycles per second (i.e., 200 MHz).

Clock Speed Clock Speed is the term used to measure the rate that a processor
can complete it’s processing cycles. They are normally measured in
Megahertz (1,000,000 cycles per second) and Gigahertz
(1,000,000,000 cycles per second).

Cloud computing Cloud computing refers to the on-demand provision of computational


resources (data, software) via a computer network, rather than from
a local computer.

CMYK CMYK (Cyan Magenta Yellow Black) these colours are the four main
colours used for printing documents. Computers screens use Red,
Blue and Green, CMYK colours can be blended to make various
colours and shades and are known as subtractive.

Command The act of giving an instruction to your Mac either by menu choice or
keystroke.

Compiler A program the converts programming code into a form that can be
used by a computer.

7|Page
Compression A technique that reduces the size of a saved file by elimination or
encoding redundancies (i.e., JPEG, MPEG, LZW, etc.)

Cookie Cookies are data that is sent to your computer when you have visited
a Website. If you revisit the site the cookie will load particular pages
depending on what information is contained in it.

Crash A system malfunction in which the computer stops working and has
to be restarted.

Crowd funding A process where a single idea or business practice is funded by


multiple small donations from contributors. The contributors will then
receive the product when it is finally put into production.

Cursor The pointer, usually arrow or cross shaped, which is controlled by the
mouse.

Data (the plural of datum) information processed by a computer.

Database An electronic list of information that can be sorted and/or searched.

Database A database is a collection of related fields grouped into records. :


Anything that accepts data is a database. A pile of newspapers is a
database. A computer database has the ability to manipulate that
data. It is possible to attach applications to that database to search
the contents.

DDR DDR or Double Data Rate is an up to date version of SDRAM


(computer memory) that is twice as fast as it’s predecessor. It is also
called DDR-SDRAM and due to its efficient performance (it can both
send and receive signals in half the time) it is often used in notebook
computers.

DDR2 DDR2 (Double Data Rate 2) is a faster, advanced version of DDR


memory and like DDR it can send data on the rising and falling edges
of the processors clock cycles although it is twice as fast. DDR2 RAM
has an improved design to DDR RAM and this gives the DDR2 RAM a
larger bandwidth and this allows a greater volume of data to be
passed through the RAM chip.

Defragment To concatenate fragments of data into contiguous blocks in memory


or on a hard drive.

Dialog box An on-screen message box that appears when the system requires
additional information before completing a command.

8|Page
Digital signatures A digital signature (not to be confused with a digital certificate) is an
electronic signature that can be used to authenticate the identity of
the sender of a message or the signer of a document, and possibly to
ensure that the original content of the message or document that has
been sent is unchanged.

Disk drive The machinery that writes the data from a disk and/or writes data to
a disk.

DNS This stands for Domain Name System. The Internet runs by assigning
different sites “Names.” They are actually 4-part strains of numbers
associated with names, but names nonetheless. Getting a DNS error
means that the address you are attempting to reach is not recognized
by the Internet community.
Document A file you create, as opposed to the application which created it.

DOS Acronym for Disk Operating System – used in IBM PCs.

Download To transfer data from one computer to another. (If you are on the
receiving end, you are downloading. If you are on the sending end,
you are uploading).

DPI Acronym for Dots Per Inch – a gauge of visual clarity on the printed
page or on the computer screen.

Driver A file on a computer which tells it how to communicate with an add-


on piece of equipment (like a printer).

DVD Digital Video Disc—Similar to a CD-ROM, it stores and plays both


audio and video.

E – books readers/ An e-book reader, also called an e-book device or e-reader, is a


digital readers portable electronic device that is designed primarily for the purpose
of reading digital books and periodicals.

eBay eBay is an online auction and shopping website in which people and
businesses buy and sell a broad variety of goods and services
worldwide. eBay generates revenue from various fees.

Ebook An electronic (usually hand-held) reading device that allows a person


to view digitally stored reading materials.

Ethernet A protocol for fast communication and file transfer across a network.

Expansion slot A connector inside the computer which allows one to plug in a printed
circuit board that provides new or enhanced features.

9|Page
Facebook Facebook is a social utility that connects people with friends and
others who work, study and live around them

FAQs Stands for Frequently Asked Questions. These are commonly asked
questions and answers that appear on many websites.

FAT32 FAT32 (File Allocation Table) is the term used for the method that
Windows uses to store data on a hard drive. It helps your computer
to find files even if they have been fragmented. As it uses a greater
number of bits in order to 10tilize10d a cluster it is a better version of
FAT. FAT32 has a serious amount of storage space – 2 terabytes on
a hard disk which is more than enough for a home computer user.

Fiber-Optic Cable Fiber-Optic Cables are cables that are made of extremely thin strands
of glass or other material which is transparent and capable of carrying
beams of light. Data can be sent through fiber-optic cables at the
speed of light, due to the fact that they are light-based. A laser
transmitter sends the signal and it is translated back into data when it
reaches the end and this is used by a computer. Fiber-optic cables
are useful as they are not able to be interfered with by noise or
vibrations, the only downside to them is that they are very fragile. Due
to this they are usually installed underground but this is expensive
and mending broken fiber-optic cables is a difficult, expensive and
time consuming process.

File The generic word for an application, document, control panel or other
computer data.

Firewall A set of security programs that protect a computer from outside


interference or access via the Internet. A Firewall is used to protect
a client machine or networked server from any 10tilize10d10on
access. A firewall can be either software of hardware-based and
routers are a hardware device that has an inbuilt firewall. Monitoring
and restricting software programs are also classed as firewalls as they
only allow particular messages from the Internet enter the network.

Folder An electronic subdirectory which contains files.

Font A typeface that contains the characters of an alphabet or some other


letterforms.

Foursquare Foursquare is a location-based social networking website based on


software for mobile devices?

Fragmentation The breaking up of a file into many separate locations in memory or


on a disk.

10 | P a g e
Freeware Software created by people who are willing to give it away for the
satisfaction of sharing or knowing they helped to simplify other
people’s lives. It may be freestanding software, or it may add
functionality to existing software.
Freeze A system error which causes the cursor to lock in place.

Geo-tagging A process where a geographical position of the latitude and longitude


information is added or embedded in to the photograph.

Gig A gigabyte = 1024 megabytes.

GNU Free Call GNU Free Call is a new project to develop and deploy secure self-
organized communication services worldwide for private use and for
public administration.

Gopher A Gopher is a means of finding information through the use of a text


interface. The whole system works on a client – server basis in which
a gopher client server will search through other gopher servers.
Menus which contain links to programs and documents are used in
place of hyperlinks.

GPS GPS (Global Positioning System) is a military developed satellite


navigation system that enables the exact position, speed and
direction of travel of an object fitted with GPS. Today many cars use
GPS systems to help the driver with directions.

Gum tree Gumtree is an extensive network of online classifieds and community


websites. Classified ads are either free or paid for depending on the
product category and the geographical market. Sellers may promote
their listing through featured placements on the homepage or under
product categories

Hacker A Hacker was once known as a person who was an expert in


programming, now it is used to refer to someone who can hack their
way through the security systems of a network or computer system.
This can be done on many levels, from working out a password to
creating a code or program to get into such systems.

Hard drive A large capacity storage device made of multiple disks housed in a
rigid case.

HDMI High definition multimedia interface is a standard/port for connecting


high definition video devices, such as computer monitors, video
projectors and television. HDMI carries high quality video and audio
signals.

11 | P a g e
HDTV HDTV (High Definition Television) is a new video standard that is of a
high quality has been created in order to replace the traditional SDTV.
It has many advantages over SDTV which include: digital signals,
which reduce interference and improve picture quality, the picture is
also shown in 16:9 ratio which is closer to how humans view the world
thus making them more realistic. HDTV also has a higher resolution
which further improves picture quality as it is finer and sharper.
However in order to be able to view HDTV you will need to have a HD
compatible television.

Home Page The first thing you see when you come to a website, or the opening
page of a website. It provides information about the site and directs
you to other pages on the site.

Hub A Hub is a device that enables a number of computers to be


connected together in a network and it acts as a central connection.
It is normally Ethernet based and enables any information that is sent
to flow to any computer on the specific network.
Hyperlink A highlighted or underlined feature on a web page that, when clicked,
will take you to another web page. A link most often appears as
underlined words or an image.

Hyper-Threading Hyper-Threading is an Intel Corporation developed technology that is


used to enable a processor, such as an Intel Xeon to have two threads
of information being executed at the same time.

Icon A small picture or image representing a command (such as print), a


file, or a program. When you click on an icon, you start a command,
open a file, or launch a program.

IM IM (Instant Messaging) is a method of communication via the internet


whereby users are in private chat rooms and can see which of their
list of buddies is online at any time and invite them to chat. You can
have more than one chat room open at any one time and have as
many conversations as you like.

Installer Software used to install a program on your hard drive.

Internet A vast, international collection of computer networks that transfers


information. A combination of the words international and network.
Websites and e-mail are part of the Internet.

Interrupt button A tool used by programmers to enter the debugging mode. The
button is usually next to the reset button.

Intranet Intranet is an internal form of the Internet, many businesses have their
own Intranet that contains information relating to the business and
only those within the 12tilize12d12on have access to it.

12 | P a g e
iPad The iPad is a line of tablet computers designed, developed and
marketed by Apple Inc. primarily as a platform for audio-visual media
including books, periodicals, movies, music, games, and web content.
Its size and weight falls between those of contemporary smartphones
and laptop computers

IRC IRC (Internet Relay Chat) is a method of online communication that


takes place in real time over the Internet. In order to use it you have
to be on the same IRC server and connect to the same channel. Chat
rooms use this method to allow users to chat to each other.

IRQ IRQ (Interrupt Request) is a term used to describe the managing of


various hardware operations on one processor. When a program is
run it will send an interrupt request to the processor that lets the
program join the list of requests running.

JPEG JPEG (Joint Photographic Experts Group) is a format for images that
is popular. It is normally used to encode photographic pictures and
art.

Kalahari.net South Africa’s leading online retailer, selling books, music, DVDs,
games, electronics, iphones, ipads, cameras, toys, gifts and more.

Kernel Kernel is a term that is normally only used by computer experts and
refers to the base layer of a computers operating system. Operating
systems are created in layers with each layer being responsible for a
certain function such as disk access. The kernel is responsible for
memory management and hardware-software interaction, the better
the kernel of a computer, the better the computer.

Keyboard shortcut A combination of keystrokes that performs some function otherwise


found in a pulldown menu.

Kilobyte 1024 bytes.

Landscape In printing from a computer, to print sideways on the page.

Linkedln LinkedIn is a business-related social networking site

Log On To gain access to a computer system or to a page on a website by


entering a password or user ID.

LTE A standard used in wireless communication which provides for high


speed data transfer between cellular devices and ISPs. It is the next
generation of cellular connectivity after 3G. LTE is also called 4G

13 | P a g e
Mac Address Mac Address (Media Access Control Address) is a term that
describes the unique number assigned to each device that is located
on a network. Every single Ethernet or WiFi card has them as do
network cards and as they are entered during the manufacture they
cannot be altered.

Malware Malware (Malicious Software) is a term used to describe any software


that has a malicious intent. These include things like viruses and
worms which can cause untold damage to your computer if allowed.
In order to protect your computer it is essential that you have up to
date anti-virus protection.

MB Short for megabyte. 1 Megabyte – 1024 kilobytes.

Memory The temporary holding area where data is stored while it is being used
or changed; the amount of RAM a computer has installed.

Menu A list of program commands listed by topic.

Micro- USB A smaller version of a USB port, usually found on a portable devices
such as smartphones.

Moodle Moodle (Modular Object-Oriented Dynamic Learning Environment) is


a form of interface that is 14tilize14d so large organisations can
14tilize e-learning or learn over the Internet. This method of learning
is opening up new gateways to learners who wish to learn at home
and educators can provide the appropriate online course.

Multi tasking Running more than one application in memory at the same time.

Multi-touch screen Feature of screen that allows it to register more than one point being
touched simultaneously.

Myspace Myspace is the leading social entertainment destination powered by


the passion of fans.

Nanosecond One billionth of a second. (Or, the time between the theatrical release
of a Dudley Moore film and the moment it begins to play on airplanes).

Netbook Netbooks are a category of small, lightweight, legacy-free, and


inexpensive laptop computers.

14 | P a g e
Netiquette Netiquette is the etiquette a person should follow when using the
Internet, this includes things like not doing anything that is likely to
upset or annoy other people. Online chat rooms, newsgroups and e-
mails are three areas where netiquette is very important. If you are
unsure about the netiquette of a chat room you are in you should take
some time to watch others and see how they behave.

NFC Near field communication (NFC) is a standard that allows devices


such as smartphones to connect wirelessly. If two devices are on the
same proximity (nearby) they can exchange files or sending a file for
printing wirelessly.

Newsgroup A newsgroup is a discussion about a particular subject consisting of


notes written to a central Internet site and redistributed through
Usenet, a worldwide network of news discussion groups.

OCR OCR (Optical Character Recognition) is a type of software that is used


to adapt a text that has been scanned into a readable and editable
word document.

Open Source Open Source or OSS (Open Source Software) is a way of sharing
software that is under license. Most of these programs will have an
Open Source Definition written into their license agreement.

Operating system The system software that controls the computer.

Optical disk A high-capacity storage medium that is read by a laser light.

Palette A small floating window that contains tools used in a given application.

Partition A subdivision of a hard drives surface that is defined and used as a


separate drive.

Paste To insert text, or other material, from the clipboard or copy buffer.

PCI Acronym for Peripheral Component Interchange – the newer, faster


bus architecture

Peripheral An add-on component to your computer.

Phablet A smaller version of a tablet, which also incorporates features found


on a smartphone, such as voice calls and SMSs.

15 | P a g e
Pharming Pharming is a method of manipulating those who use the Internet by
redirecting them to false Web sites. DNS servers are used to translate
a domain name into an IP address and then redirects the user to the
Web site. Once this has happened the information will be stored on
the users DNS cache if they ever revisit the site. Pharming poisons
the information stored on a users DNS cache and is then able to
redirect the user to which ever site the hacker has designated.

Phishing Phishing is method that phishers use to try to get personal data about
people. This can be done in many ways, such as sending out fake e-
mails that look very much like they are legitimate. These e-mails will
normally ask you to part with personal information, either by clicking
into a link or by sending out false forms to fill in and e-mail back. If
you are ever suspicious of an e-mail go to the Web site that claims to
have sent it and check the details, DO NOT ever click through an e-
mail that you suspect to be false. If once you get to the Web site of
whoever was supposed to have sent you the e-mail (ebay for
example) see if there are any alerts there for you. If not it is likely that
the e-mail was a phishing attempt. Also reputable companies such as
ebay will be addressed to you by name or your user name.

Podcasts A podcast (or non-streamed webcast) is a series of digital media files


(either audio or video) that are released episodically and often
downloaded through web syndication.

Pop-up menu Any menu that does not appear at the top of the screen in the menu
bar. (may pop up or down)

Port A connection socket, or jack on the computer.

Portal Portal is a term, generally synonymous with gateway, for a World


Wide Web site that is or proposes to be a major starting site for users
when they get connected to the Web or that users tend to visit as an
anchor site.

Power PC A processing chip designed by Apple, IBM and Motorola (RISC


based).

Print spooler A program that stores documents to be printed on the hard drive,
thereby freeing the memory up and allowing other functions to be
performed while printing goes on in the background.

16 | P a g e
Proxy Server Proxy Servers are used by large companies and it a server that every
networked computer must pass through before gaining Internet
access. Using a proxy server improves the Internet connection and
as it caches web pages they don’t have to reload so the process is
faster. Another use of a proxy server is restricting access from
networked computers onto certain Internet sites, these are usually
those with questionable content.

RAID Raid (Redundant Array of Independent Disks) is the term for using
multiple disks for storing data, when they are placed in a RAID
Configuration they will appear to be one large disk which operate
better than single disks. As the disks can be accessed and read at the
same time the hard drive access time becomes faster.
RAM Acronym for Random-Access Memory.

Redundancy The general definition of redundancy is exceeding what is normal.


However, in computing, the term is used more specifically and refers
to duplicate devices that are used for backup purposes. The goal of
redundancy is to prevent or recover from the failure of a specific
component or system.

Repository In software development, a repository is a central file storage location.


It is used by version control systems to store multiple versions of files.
While a repository can be configured on a local machine for a single
user, it is often stored on a server, which can be accessed by multiple
users.
Resize box The small square at the lower right corner of a window which, when
dragged, resizes the window.

RISC Acronym for Reduced Instruction Set Computing; the smaller set of
commands used by the PowerPC.

ROM Acronym for Read Only Memory; memory that can only be read from
and not written to.

Root directory The main hard drive window.

Save To write a file onto a disk.

Save as A File menu item to save a previously saved file in a new location
and/or with a new name.

Scroll To shift the contents of a window to bring hidden items into view.

Scroll bar A bar at the bottom or right side of a window that contains the scroll
box and allows scrolling.

17 | P a g e
Scroll box The box in a scroll bar that is used to navigate through a window.

SCSI port A 25 pin connector on the back of a PC (native SCSI port); used to
connect SCSI devices to the CPU.

Serial port A port that allows data to be transmitted in a series (one after the
other), such as the printer and modem ports on a PC

Server A central computer dedicated to sending and receiving data from


other computers (on a network).

Shareware There is commercial software and then there is shareware. With


commercial software, you have to pay for the product before you use
it. With shareware, you can use the product for a trial period and then
decide if you want to keep it. If you want to keep the software after
the trial period is up, you’re supposed to (and should) register the
product and pay the shareware fee. As an extra incentive to pay for
the software, many shareware programs disable certain features in
the non-registered version and some will keep bugging you to register
the program after the trial period has expired
Shut down The command from the Special menu that shuts down the computer
safely.

Site Map A list of the contents on a website, similar to an index in a book. A link
to the site map is usually found at the top or bottom of the home page.

Skype Skype allows users to make telephone calls from their computer to
other Skype users free of charge, or to landlines and cell phones for
a fee.

Smartphone Smartphone is a mobile phone that includes advanced functionality


beyond making phone calls and sending text messages. Most smart
phones have the capability to display photos, play videos, check and
send e-mail, and surf the Web. Modern smart phones, such as the
iPhone and Android based phones can run third-party applications,
which provides limitless functionality.
Solid-state drive A drive that has no moving parts making it quieter. They are faster
than the traditional hard drives as they store data electronically and
not magnetically as with a traditional hard drive.

Social networking Sites like Facebook and MySpace allow users to build and customize
their own profile sand communicate with friends.

Software Files on disk that contain instructions for a computer.

18 | P a g e
Spam SPAM or Spamming is used to send unsolicited messages in large
volumes through any medium that is uses electronic communication.
The most common form of spam is e-mailing advertising although it
can be used for other purposes and spam is not just confined to e-
mailing.

Spoofing The word “spoof” means to hoax, trick, or deceive. This is typically
done by hiding one’s identity or faking the identity of another user on
the Internet. Spoofing can take place on the Internet in several
different ways. One common method is through e-mail. E-mail
spoofing involves sending messages from a bogus e-mail address or
faking the e-mail address of another user.
Spreadsheet A program designed to look like an electronic ledger.

Spyware This is software that “spies” on your computer. Spyware can capture
information like Web browsing habits, e-mail messages, usernames
and passwords, and credit card information. If left unchecked, the
software can transmit this data to another person’s computer over the
Internet.

SSL Certificate Certificate or SSL or secure certificate is an installed file on a Web


server and is there to prove the identity of the site and ensure it is
secure. This gives consumers added security when shopping online
and they are verified.

Start up disk The disk containing system software and is designated to be used to
start the computer.

Static Website A static website contains Web pages with fixed content. Each page is
coded in HTML and displays the same information to every visitor.
Static sites are the most basic type of website and are the easiest to
create. Unlike dynamic websites, they do not require any Web
programming or database design. A static site can be built by simply
creating a few HTML pages and publishing them to a Web server.

Streaming Streaming is a method of playing back video clips and the like without
downloading it first. Shareware and software updates do not stream
as they need to download fully in order to operate. QuickTime is one
example of documents that can be steaming whilst you are watching
them.

Surge suppressor A power strip that has circuits designed to reduce the effects of surge
in electrical power.

19 | P a g e
Switch A Switch is used when networking multiple computers. Consumer
switches normally have up to 8 Ethernet ports and are used to
connect DSL or cable modems, computers and other switches. High-
end switches however are larger and can be rack mounted and can
have 50 ports. Switches are further advanced than hubs, as they can
limit the traffic flowing in and out of each port in order to maintain the
bandwidth for each device connected to it. Unlike a router a switch is
unable to provide a log or firewall and a switch can only function in
the way the hardware was made for, a router however can be
software configured. Switch can also be used in refer to a button or
small lever that can be found on computer hardware.

System file A file in the System folder that allows your PC to start and run.

TCP/IP Stands for “Transmission Control Protocol/Internet Protocol.” The


purpose was to allow computers to communicate over long distance
networks. The TCP part has to do with the verifying delivery of the
packets. The IP part refers to the moving of data packets between
nodes. TCP/IP has since then become the foundation of the Internet.
Therefore, TCP/IP software is built into all major operating systems,
such as Unix, Windows, and the Mac OS.
Tunneling The term “tunneling” probably brings to mind images of digging
tunnels underground, perhaps for a subway system, or for you more
technically-minded, a fiber optic cable connection. In the virtual world
of computers world, however, tunneling refers to a protocol in which
one protocol is encapsulated within another. Tunneling protocols are
often used for establishing various types of connections over
common protocols, such as HTTP.
Tweak When you modify a certain piece of hardware for better performance,
it is often referred to as “tweaking” it. Overclocking the computer’s
CPU or changing jumper settings on the motherboard are common
examples of hardware tweaking. Removing system limitations and
adding plug-ins or extensions to a computer’s operating system are
types of software tweaking

Tweet For most of history, “tweet” has been the sound a bird makes.
However, with the advent of Twitter, the word “tweet” has taken on a
whole new meaning

Tweet A tweet is an online posting, or “micro-blog” created by a Twitter user.


The purpose of each tweet is to answer the question, “What are you
doing?” However, tweets can contain any information you want to
post, such as your plans for the weekend, your thoughts about a TV
show, or even notes from a lecture. You can publish a tweet using a
computer or a mobile phone.

20 | P a g e
Twitter Twitter is an online service that allows you to share updates with other
users by answering one simple question: “What are you doing?” In
order to use Twitter, you must first sign up for a free account. Once
you have created your account, you can post your own updates and
view the updates others have posted. Once you have selected a
number of users, their most recent posts, or “tweets,” will show up on
your Twitter home page. Likewise, your own latest tweets will show
up on the home pages of people who have decided to follow you

Uninterruptible Power Acronym for Uninterruptible Power Source. A constantly charging


Source (UPS) battery pack which powers the computer. A UPS should have enough
charge to power your computer for several minutes in the event of a
total power failure, giving you time to save your work and safely shut
down.

Upload To send a file from one computer to another through a network.

URL shortener This is a tool or service, such as TinyURL.com, which converts a long
URL to a shorter version. This shorter version will take the user to the
same web address which is easier to remember and type out.

Virtual computers With a singular goal of using virtualization to make PC’s more flexible,
manageable, reliable and secure, without sacrificing the end-user’s
computing experience, Virtual Computer leads the market in
distributed desktop virtualization

Virtual keyboard A virtual keyboard is a software component that allows a user to enter
characters. A virtual keyboard can usually be operated with multiple
input devices, which may include a touch screen, an actual keyboard,
a computer mouse, a head mouse and an eye mouse.

Virtual reality(VR) This refers to using technology to create a simulation of a 3D


environment that can be interacted with by a person in a real or
physical way. This is achieved by using equipment such as helmets
with screens gloves fitted with sensors.

VoIP VoIP (Voice Over Internet Protocol) is a telephone line that is used
over the Internet. The information is digitally sent and using VoIP is
free so eliminates long distance phone call bills. In order to use VoIP
you need (as well as a computer and Internet access) VoIP software
which can be downloaded for free and a microphone and speakers,
although you can buy VoIP telephones and headsets.
VPN VPN (Virtual Private Network) is used mainly by large companies as
it encrypts all the data being transferred via the Internet so that it
cannot be seen. Hence the term "Virtual Private Network" it is similar
to having the Intranet via the Internet.

21 | P a g e
Web 2.0 The term that was introduced in 2004 and refers to the second
generation of the World Wide Web. The term "2.0" comes from the
software industry, where new versions of software programs are
labeled with an incremental version number. Like software, the new
generation of the Web includes new features and functionality that
was not available in the past. However, Web 2.0 does not refer to a
specific version of the Web, but rather a series of technological
improvements.

Web Address or URL The address for a website. (URL stands for Uniform Resource
Locator.) Web addresses usually start with the letters www (for World
Wide Web) and end with a dot followed by letters that indicate the
type of website it is: .com = commercial enterprise or business.org =
non-profit organization.edu = educational institution.gov =
government agency.mil = military agency.net = another ending for a
commercial website.

Web applications A broad range of new applications make it possible for users to run
programs directly in a Web browser

Webinars Webinars is short for Web-based seminar, a presentation, lecture,


workshop or seminar that is transmitted over the Web. A key feature
of a Webinar is its interactive elements the ability to give, receive and
discuss information. Contrast with Webcast, in which the data
transmission is one way and does not allow interaction between the
presenter and the audience.

Website A location on the World Wide Web (and Internet) that contains
information about a specific topic. A website usually contains multiple
pages with different types of information about the topic.

WEP Stands for "Wired Equivalent Privacy." WEP is a security protocol for
Wi-Fi networks. Since wireless networks transmit data over radio
waves, it is easy to intercept data or "eavesdrop" on wireless data
transmissions. The goal of WEP is to make wireless networks as
secure as wired networks, such as those connected by Ethernet
cables.
Wi-Fi Wi-Fi (Wireless Fidelity) is a term used to describe wireless network
devices that are founded on the Wireless Alliances 802.11 standards.
This means that any Wi-Fi device can be used with any Wi-Fi certified
access point.
Wikis Sites like Wikipedia and others enable users from around the world
to add and update online content.
Windows 7 Is an operating system released by Microsoft on October 22, 2009. It
follows the previous (sixth) version of Windows, called Windows Vista.

22 | P a g e
World Wide Web Also known as the Web, it is a system that lets you access information
on the Internet. People often use the term Web to refer to the Internet,
but they are not exactly the same thing. The World Wide Web
operates over the Internet, and it is the most widely used part of the
Internet.

XML Stands for "Extensible Markup Language." XML is used to define


documents with a standard format that can be read by any XML-
compatible application. The language can be used with HTML pages,
but XML itself is not a markup language. Instead, it is a "meta-
language" that can be used to create markup languages for specific
applications.

YouTube video website

Wizard A feature of Microsoft Word software that helps a user create a


customized document; it asks the user questions about formatting
and content options and uses the answer to create the document.

Workstation A desktop computer than runs applications and serves as an access


point in a local area network.

WWW The World Wide Web.

Worm A type of computer virus that runs a program to destroy data on a


user’s hard drive. Worms spread by sending copies of themselves to
everyone on the user’s list of e-mail addresses.

WYSIWYG (pronounced wiz-zy-wig). An acronym derived from what you see is


what you get. A computer design standard that lets the user see on
the screen how a page will look when it is printed.

Zombie A computer that has been hijacked by a cracker without the owner’s
knowledge and used to perform malicious tasks on the Internet.

23 | P a g e

You might also like