05 Terms, Acronyms and Definitions
05 Terms, Acronyms and Definitions
Matthew Varghese
NW DCES: CAT & IT
TERMS, ACRONYMS AND DEFINITIONS
32-bit/16-bit This denotes the number of "pieces" (or bits) of information required
by an operating system to run a certain application. It also deals with
the construction of the computer's CPU (Central Processing Unit) or
brain. The Pentium CPU easily runs 32-bit applications because the
wires that hold all the pieces together (known as busses) are big
enough to flow through 32 bits at a time. 486s, 386s, and below aren't
big enough. They work with 16 bits at a time.
Access Control List ACL Stands for "Access Control List." An ACL is a list of user
permissions for a file, folder, or other object. It defines what users and
groups can access the object and what operations they can perform.
These operations typically include read, write, and execute. For
example, if an ACL specifies read-only access for a specific user of a
file, that user will be able open the file, but cannot write to it or run the
file.
Access time The performance of a hard drive or other storage device - how long it
takes to locate a file.
Active program or The application or window at the front (foreground) on the monitor.
window
ActiveX controls Software add-ons created with ActiveX are called ActiveX controls.
These controls can be implemented in all types of programs, but they
are most commonly distributed as small Web applications. For
example, a basic ActiveX control might display a clock on a webpage.
Advanced ActiveX controls can be used for creating stock tickers,
interactive presentations, or even Web-based games.
1|Page
Address Bar An address bar is a text field near the top of a Web browser window
that displays the URL of the current webpage. The URL, or web
address, reflects the address of the current page and automatically
changes whenever you visit a new webpage. Therefore, you can
always check the location of the webpage you are currently viewing
with the browser's address bar.
2|Page
ANSI Stands for "American National Standards Institute." ANSI is a U.S.-
based non-profit organization that works to develop and promote
standards in the United States and around the world. By standardizing
new products and technologies, ANSI both strengthens the United
States' position in the global marketplace and helps ensure product
integrity and safety. ANSI was originally called the "American
Engineering Standards Committee" (AESC).
Artificial Intelligence Artificial Intelligence, or AI, is the ability of a computer to act like a
human being. It has several applications, including software
simulations and robotics. However, artificial intelligence is most
commonly used in video games, where the computer is made to act
as another player.
Asynchronous: Transferring data with the help of start and stop bits that indicate the
beginning and end of each character being sent.
Augmented reality (See Virtual reality ) This technology is similar to Virtual reality
(creating virtual environment like using helmets with screen) but it
takes the physical world and adds (augments) objects such as
graphics within the real world. Eg. Training aircraft simulators and
medicine with surgeons perform remote surgery.
3|Page
AVI Stands for Audio/Video Interleaved. Microsoft's format for encoding
video & audio for digital transmission.
Background Part of the multitasking capability. A program can run and perform
tasks in the background while another program is being used in the
foreground.
Backside Bus Backside and Frontside buses are used to carry data back and forth
from a computers CPU. The Frontside bus does this between the
memory and CPU while the Backside bus moves data in and out of
the computer's L2 cache. As this data is frequently used it is stored
near to the processor, and as a result the computer's CPU can work
much faster.
Baud Baud is a unit of measurement that states how many electrical signals
per second, are sent to networks, modems and other data transfer
devices. This is a measurement of the amount of data that can be
transferred in one second. Example: A 14.4 baud modem can transfer
14,400 bits of information in one second.
Beta Software Beta Software is software that is still in it's testing phase, it can contain
bugs, errors and other problems which are ironed out before the
software becomes available to the general public. If there is a b in a
program's properties it is beta software.
4|Page
Big data Very large structured and un structured data sets that are analysed
using computers to reveal trends and associations. Refers to
challenges regarding storages, curation, querying etc.
BIOS Stands for Basic Input/output System. This is the little set of programs
that lets all the different parts of the computer talk to each other. BIO
is pre-installed on every Windows computer and means Basic
Input/output System. It is used when the computer starts up and it
checks all the devices and hardware connections on a computer. If
everything is functioning the boot up process will begin.
Blu-ray Blu-ray is a recently developed optical disk format which can be used
for holding huge amounts of data in HD format. One disk is capable
of containing 25GB of data – a CD can only hold 700MB of data while
a DVD can hold 4.7GB.
BMP (Pronounced “bimp”): It’s a bitmap, an image made up of little dots.
5|Page
Boot To start up a computer.
Bot Bots are usually used online and they are software programs that are
automated and perform specific functions when ordered to. For
example they can monitor online chat rooms and can throw people
who do not abide by the rules of the chat room out.
Bridge Bridges connect LANs together and allow for faster transmission of
data between them. A bridge is much faster than a router, but it
cannot act as a firewall like the majority of routers do.
Buffer: The buffer is a section of the computer where data is stored before
being used. This buffering allows time for an application to fix
differences in bit rates among other things. It creates a space of time
for compensation.
BYOD Bring Your Own Device (BYOD) refers to a concept where people are
allowed to bring and use their own devices- portable devices such as
laptops tablets to work on and access the network instead of a device
owned by a company or institution.
Card reader A device connected to a computer that is designed to accept and read
data from different types of storage media, such as SIM and SD cards
and flash drives.
Cartridge drive A storage device, like a hard drive, in which the medium is a cartridge
that can be removed.
6|Page
CD CD is the term used for the circular disk that was created in the 1980s.
CDs can hold 700MB of data and this data (stored in the form of
notches) is read by a laser in a CD player’s optical drive.
CD-ROM CD-ROM or Compact Disk Read-Only Memory are CDs that are able
to be read by a computer as long as it has an optical drive. CD-ROMs
cannot be changed or wiped and contain a large amounts of different
data as they are not formatted the same way as CDs. They are usually
retail software.
Clock Speed Clock Speed is the term used to measure the rate that a processor
can complete it’s processing cycles. They are normally measured in
Megahertz (1,000,000 cycles per second) and Gigahertz
(1,000,000,000 cycles per second).
CMYK CMYK (Cyan Magenta Yellow Black) these colours are the four main
colours used for printing documents. Computers screens use Red,
Blue and Green, CMYK colours can be blended to make various
colours and shades and are known as subtractive.
Command The act of giving an instruction to your Mac either by menu choice or
keystroke.
Compiler A program the converts programming code into a form that can be
used by a computer.
7|Page
Compression A technique that reduces the size of a saved file by elimination or
encoding redundancies (i.e., JPEG, MPEG, LZW, etc.)
Cookie Cookies are data that is sent to your computer when you have visited
a Website. If you revisit the site the cookie will load particular pages
depending on what information is contained in it.
Crash A system malfunction in which the computer stops working and has
to be restarted.
Cursor The pointer, usually arrow or cross shaped, which is controlled by the
mouse.
Dialog box An on-screen message box that appears when the system requires
additional information before completing a command.
8|Page
Digital signatures A digital signature (not to be confused with a digital certificate) is an
electronic signature that can be used to authenticate the identity of
the sender of a message or the signer of a document, and possibly to
ensure that the original content of the message or document that has
been sent is unchanged.
Disk drive The machinery that writes the data from a disk and/or writes data to
a disk.
DNS This stands for Domain Name System. The Internet runs by assigning
different sites “Names.” They are actually 4-part strains of numbers
associated with names, but names nonetheless. Getting a DNS error
means that the address you are attempting to reach is not recognized
by the Internet community.
Document A file you create, as opposed to the application which created it.
Download To transfer data from one computer to another. (If you are on the
receiving end, you are downloading. If you are on the sending end,
you are uploading).
DPI Acronym for Dots Per Inch – a gauge of visual clarity on the printed
page or on the computer screen.
eBay eBay is an online auction and shopping website in which people and
businesses buy and sell a broad variety of goods and services
worldwide. eBay generates revenue from various fees.
Ethernet A protocol for fast communication and file transfer across a network.
Expansion slot A connector inside the computer which allows one to plug in a printed
circuit board that provides new or enhanced features.
9|Page
Facebook Facebook is a social utility that connects people with friends and
others who work, study and live around them
FAQs Stands for Frequently Asked Questions. These are commonly asked
questions and answers that appear on many websites.
FAT32 FAT32 (File Allocation Table) is the term used for the method that
Windows uses to store data on a hard drive. It helps your computer
to find files even if they have been fragmented. As it uses a greater
number of bits in order to 10tilize10d a cluster it is a better version of
FAT. FAT32 has a serious amount of storage space – 2 terabytes on
a hard disk which is more than enough for a home computer user.
Fiber-Optic Cable Fiber-Optic Cables are cables that are made of extremely thin strands
of glass or other material which is transparent and capable of carrying
beams of light. Data can be sent through fiber-optic cables at the
speed of light, due to the fact that they are light-based. A laser
transmitter sends the signal and it is translated back into data when it
reaches the end and this is used by a computer. Fiber-optic cables
are useful as they are not able to be interfered with by noise or
vibrations, the only downside to them is that they are very fragile. Due
to this they are usually installed underground but this is expensive
and mending broken fiber-optic cables is a difficult, expensive and
time consuming process.
File The generic word for an application, document, control panel or other
computer data.
10 | P a g e
Freeware Software created by people who are willing to give it away for the
satisfaction of sharing or knowing they helped to simplify other
people’s lives. It may be freestanding software, or it may add
functionality to existing software.
Freeze A system error which causes the cursor to lock in place.
GNU Free Call GNU Free Call is a new project to develop and deploy secure self-
organized communication services worldwide for private use and for
public administration.
Hard drive A large capacity storage device made of multiple disks housed in a
rigid case.
11 | P a g e
HDTV HDTV (High Definition Television) is a new video standard that is of a
high quality has been created in order to replace the traditional SDTV.
It has many advantages over SDTV which include: digital signals,
which reduce interference and improve picture quality, the picture is
also shown in 16:9 ratio which is closer to how humans view the world
thus making them more realistic. HDTV also has a higher resolution
which further improves picture quality as it is finer and sharper.
However in order to be able to view HDTV you will need to have a HD
compatible television.
Home Page The first thing you see when you come to a website, or the opening
page of a website. It provides information about the site and directs
you to other pages on the site.
Interrupt button A tool used by programmers to enter the debugging mode. The
button is usually next to the reset button.
Intranet Intranet is an internal form of the Internet, many businesses have their
own Intranet that contains information relating to the business and
only those within the 12tilize12d12on have access to it.
12 | P a g e
iPad The iPad is a line of tablet computers designed, developed and
marketed by Apple Inc. primarily as a platform for audio-visual media
including books, periodicals, movies, music, games, and web content.
Its size and weight falls between those of contemporary smartphones
and laptop computers
JPEG JPEG (Joint Photographic Experts Group) is a format for images that
is popular. It is normally used to encode photographic pictures and
art.
Kalahari.net South Africa’s leading online retailer, selling books, music, DVDs,
games, electronics, iphones, ipads, cameras, toys, gifts and more.
Kernel Kernel is a term that is normally only used by computer experts and
refers to the base layer of a computers operating system. Operating
systems are created in layers with each layer being responsible for a
certain function such as disk access. The kernel is responsible for
memory management and hardware-software interaction, the better
the kernel of a computer, the better the computer.
13 | P a g e
Mac Address Mac Address (Media Access Control Address) is a term that
describes the unique number assigned to each device that is located
on a network. Every single Ethernet or WiFi card has them as do
network cards and as they are entered during the manufacture they
cannot be altered.
Memory The temporary holding area where data is stored while it is being used
or changed; the amount of RAM a computer has installed.
Micro- USB A smaller version of a USB port, usually found on a portable devices
such as smartphones.
Multi tasking Running more than one application in memory at the same time.
Multi-touch screen Feature of screen that allows it to register more than one point being
touched simultaneously.
Nanosecond One billionth of a second. (Or, the time between the theatrical release
of a Dudley Moore film and the moment it begins to play on airplanes).
14 | P a g e
Netiquette Netiquette is the etiquette a person should follow when using the
Internet, this includes things like not doing anything that is likely to
upset or annoy other people. Online chat rooms, newsgroups and e-
mails are three areas where netiquette is very important. If you are
unsure about the netiquette of a chat room you are in you should take
some time to watch others and see how they behave.
Open Source Open Source or OSS (Open Source Software) is a way of sharing
software that is under license. Most of these programs will have an
Open Source Definition written into their license agreement.
Palette A small floating window that contains tools used in a given application.
Paste To insert text, or other material, from the clipboard or copy buffer.
15 | P a g e
Pharming Pharming is a method of manipulating those who use the Internet by
redirecting them to false Web sites. DNS servers are used to translate
a domain name into an IP address and then redirects the user to the
Web site. Once this has happened the information will be stored on
the users DNS cache if they ever revisit the site. Pharming poisons
the information stored on a users DNS cache and is then able to
redirect the user to which ever site the hacker has designated.
Phishing Phishing is method that phishers use to try to get personal data about
people. This can be done in many ways, such as sending out fake e-
mails that look very much like they are legitimate. These e-mails will
normally ask you to part with personal information, either by clicking
into a link or by sending out false forms to fill in and e-mail back. If
you are ever suspicious of an e-mail go to the Web site that claims to
have sent it and check the details, DO NOT ever click through an e-
mail that you suspect to be false. If once you get to the Web site of
whoever was supposed to have sent you the e-mail (ebay for
example) see if there are any alerts there for you. If not it is likely that
the e-mail was a phishing attempt. Also reputable companies such as
ebay will be addressed to you by name or your user name.
Pop-up menu Any menu that does not appear at the top of the screen in the menu
bar. (may pop up or down)
Print spooler A program that stores documents to be printed on the hard drive,
thereby freeing the memory up and allowing other functions to be
performed while printing goes on in the background.
16 | P a g e
Proxy Server Proxy Servers are used by large companies and it a server that every
networked computer must pass through before gaining Internet
access. Using a proxy server improves the Internet connection and
as it caches web pages they don’t have to reload so the process is
faster. Another use of a proxy server is restricting access from
networked computers onto certain Internet sites, these are usually
those with questionable content.
RAID Raid (Redundant Array of Independent Disks) is the term for using
multiple disks for storing data, when they are placed in a RAID
Configuration they will appear to be one large disk which operate
better than single disks. As the disks can be accessed and read at the
same time the hard drive access time becomes faster.
RAM Acronym for Random-Access Memory.
RISC Acronym for Reduced Instruction Set Computing; the smaller set of
commands used by the PowerPC.
ROM Acronym for Read Only Memory; memory that can only be read from
and not written to.
Save as A File menu item to save a previously saved file in a new location
and/or with a new name.
Scroll To shift the contents of a window to bring hidden items into view.
Scroll bar A bar at the bottom or right side of a window that contains the scroll
box and allows scrolling.
17 | P a g e
Scroll box The box in a scroll bar that is used to navigate through a window.
SCSI port A 25 pin connector on the back of a PC (native SCSI port); used to
connect SCSI devices to the CPU.
Serial port A port that allows data to be transmitted in a series (one after the
other), such as the printer and modem ports on a PC
Site Map A list of the contents on a website, similar to an index in a book. A link
to the site map is usually found at the top or bottom of the home page.
Skype Skype allows users to make telephone calls from their computer to
other Skype users free of charge, or to landlines and cell phones for
a fee.
Social networking Sites like Facebook and MySpace allow users to build and customize
their own profile sand communicate with friends.
18 | P a g e
Spam SPAM or Spamming is used to send unsolicited messages in large
volumes through any medium that is uses electronic communication.
The most common form of spam is e-mailing advertising although it
can be used for other purposes and spam is not just confined to e-
mailing.
Spoofing The word “spoof” means to hoax, trick, or deceive. This is typically
done by hiding one’s identity or faking the identity of another user on
the Internet. Spoofing can take place on the Internet in several
different ways. One common method is through e-mail. E-mail
spoofing involves sending messages from a bogus e-mail address or
faking the e-mail address of another user.
Spreadsheet A program designed to look like an electronic ledger.
Spyware This is software that “spies” on your computer. Spyware can capture
information like Web browsing habits, e-mail messages, usernames
and passwords, and credit card information. If left unchecked, the
software can transmit this data to another person’s computer over the
Internet.
Start up disk The disk containing system software and is designated to be used to
start the computer.
Static Website A static website contains Web pages with fixed content. Each page is
coded in HTML and displays the same information to every visitor.
Static sites are the most basic type of website and are the easiest to
create. Unlike dynamic websites, they do not require any Web
programming or database design. A static site can be built by simply
creating a few HTML pages and publishing them to a Web server.
Streaming Streaming is a method of playing back video clips and the like without
downloading it first. Shareware and software updates do not stream
as they need to download fully in order to operate. QuickTime is one
example of documents that can be steaming whilst you are watching
them.
Surge suppressor A power strip that has circuits designed to reduce the effects of surge
in electrical power.
19 | P a g e
Switch A Switch is used when networking multiple computers. Consumer
switches normally have up to 8 Ethernet ports and are used to
connect DSL or cable modems, computers and other switches. High-
end switches however are larger and can be rack mounted and can
have 50 ports. Switches are further advanced than hubs, as they can
limit the traffic flowing in and out of each port in order to maintain the
bandwidth for each device connected to it. Unlike a router a switch is
unable to provide a log or firewall and a switch can only function in
the way the hardware was made for, a router however can be
software configured. Switch can also be used in refer to a button or
small lever that can be found on computer hardware.
System file A file in the System folder that allows your PC to start and run.
Tweet For most of history, “tweet” has been the sound a bird makes.
However, with the advent of Twitter, the word “tweet” has taken on a
whole new meaning
20 | P a g e
Twitter Twitter is an online service that allows you to share updates with other
users by answering one simple question: “What are you doing?” In
order to use Twitter, you must first sign up for a free account. Once
you have created your account, you can post your own updates and
view the updates others have posted. Once you have selected a
number of users, their most recent posts, or “tweets,” will show up on
your Twitter home page. Likewise, your own latest tweets will show
up on the home pages of people who have decided to follow you
URL shortener This is a tool or service, such as TinyURL.com, which converts a long
URL to a shorter version. This shorter version will take the user to the
same web address which is easier to remember and type out.
Virtual computers With a singular goal of using virtualization to make PC’s more flexible,
manageable, reliable and secure, without sacrificing the end-user’s
computing experience, Virtual Computer leads the market in
distributed desktop virtualization
Virtual keyboard A virtual keyboard is a software component that allows a user to enter
characters. A virtual keyboard can usually be operated with multiple
input devices, which may include a touch screen, an actual keyboard,
a computer mouse, a head mouse and an eye mouse.
VoIP VoIP (Voice Over Internet Protocol) is a telephone line that is used
over the Internet. The information is digitally sent and using VoIP is
free so eliminates long distance phone call bills. In order to use VoIP
you need (as well as a computer and Internet access) VoIP software
which can be downloaded for free and a microphone and speakers,
although you can buy VoIP telephones and headsets.
VPN VPN (Virtual Private Network) is used mainly by large companies as
it encrypts all the data being transferred via the Internet so that it
cannot be seen. Hence the term "Virtual Private Network" it is similar
to having the Intranet via the Internet.
21 | P a g e
Web 2.0 The term that was introduced in 2004 and refers to the second
generation of the World Wide Web. The term "2.0" comes from the
software industry, where new versions of software programs are
labeled with an incremental version number. Like software, the new
generation of the Web includes new features and functionality that
was not available in the past. However, Web 2.0 does not refer to a
specific version of the Web, but rather a series of technological
improvements.
Web Address or URL The address for a website. (URL stands for Uniform Resource
Locator.) Web addresses usually start with the letters www (for World
Wide Web) and end with a dot followed by letters that indicate the
type of website it is: .com = commercial enterprise or business.org =
non-profit organization.edu = educational institution.gov =
government agency.mil = military agency.net = another ending for a
commercial website.
Web applications A broad range of new applications make it possible for users to run
programs directly in a Web browser
Website A location on the World Wide Web (and Internet) that contains
information about a specific topic. A website usually contains multiple
pages with different types of information about the topic.
WEP Stands for "Wired Equivalent Privacy." WEP is a security protocol for
Wi-Fi networks. Since wireless networks transmit data over radio
waves, it is easy to intercept data or "eavesdrop" on wireless data
transmissions. The goal of WEP is to make wireless networks as
secure as wired networks, such as those connected by Ethernet
cables.
Wi-Fi Wi-Fi (Wireless Fidelity) is a term used to describe wireless network
devices that are founded on the Wireless Alliances 802.11 standards.
This means that any Wi-Fi device can be used with any Wi-Fi certified
access point.
Wikis Sites like Wikipedia and others enable users from around the world
to add and update online content.
Windows 7 Is an operating system released by Microsoft on October 22, 2009. It
follows the previous (sixth) version of Windows, called Windows Vista.
22 | P a g e
World Wide Web Also known as the Web, it is a system that lets you access information
on the Internet. People often use the term Web to refer to the Internet,
but they are not exactly the same thing. The World Wide Web
operates over the Internet, and it is the most widely used part of the
Internet.
Zombie A computer that has been hijacked by a cracker without the owner’s
knowledge and used to perform malicious tasks on the Internet.
23 | P a g e