1 bit (binary digit*) = the value of 0 or 1
8 bits = 1 byte
1024 bytes = 1 kilobyte
1024 kilobytes = 1 megabyte
1024 megabytes = 1 gigabyte
1024 gigabytes = 1 terabyte
1024 terabytes = 1 petabyte
S.NO.
|
TERM
|
MEANING
|
|
Absolute Address
|
Exact data memory location
|
|
ActiveX
|
Tools to link applications to the web
|
|
Adware
|
Software supported by advertisements
|
|
Analog
|
Data represented by a continuous signal or
information
|
|
Applet
|
A Java program embedded in web page
|
|
Archie
|
A program to find files on FTP servers
|
|
Avatar
|
A character representing an internet user
|
|
Backbone
|
Network mainline carrying data to smaller lines
|
|
Bandwidth
|
Amount of data sent through network
|
|
Bit
|
Smallest piece of information, that is, either 1 or 0
|
|
Bluetooth
|
A short range wireless technology to connect
electronic devices
|
|
Boot
|
To start a computer
|
|
Byte
|
Sequence of information bits, which equals 8 bits
|
|
Cache
|
Technically classifying, it stores recently visited
web addresses, web pages in hard disk/RAM/near processor, depending on cache
types, for fast retrieval
|
|
Captcha
|
Response test that shows if the user is human or not
|
|
Centronics
|
36 pin parallel interface standard
|
|
Computer
|
A machine that computes and is programmable
|
|
Cookie
|
It is an internet term where the web server sent data
records your activities on websites. Some websites record & remember
information like your username and password, so you don’t have to type them
again.
|
|
Crop
|
Removing part of an image or photo
|
|
Cyber Bullying
|
Harassing or threatening the young via cyberspace
|
|
Cyber Squatter
|
Someone registering a domain name (without web pages)
to sell it
|
|
Default
|
When a user does not specify a setting, a preset
value is used
|
|
Degauss
|
Removing magnetism from a device
|
|
Digital
|
Data represented in a series of zeros and ones
|
|
DirectX
|
Mostly used in video games, it is a set of commands
|
|
Domain
|
Network and computers connected to internet
|
|
Domain Name
|
Website name
|
|
Driver
|
A file that aids computer to connect with the
hardware device
|
|
Dual-Core
|
A CPU that has 2 processors in a chip
|
|
Embed
|
Adding something from one document to another
|
|
Emoticons
|
Text based faces/objects
|
|
Encryption
|
Conversion of data into unreadable state
|
|
Ethernet
|
A networking connection that uses coaxial cables
|
|
Exabyte
|
Unit of data storage equalling to 2 to 60th power
bytes
|
|
Fiber Optic
|
Transmits information faster than copper wire
|
|
File Sharing
|
Way of giving same file to many users by one server
|
|
Firewire
|
High speed interface for connecting
digital/electronic players to computers
|
|
Firmware
|
Software programmed into hardware
|
|
Flash Drive
|
Data storage device with less units
|
|
Gigabyte (GB)
|
Equals 1024 megabytes
|
|
Gigahertz
|
Measurement for computer processing speed. 1
gigahertz =1000 megahertz
|
|
Gnutella
|
Internet file sharing network
|
|
Golden Master
|
Final version of software program sent to make retail
copies
|
|
Hacker
|
A sly person who gains illegal access to other
people’s computers
|
|
Hard Copy
|
A document that is printed
|
|
Hardware
|
Internal and external physical parts of a computer
system
|
|
Heat Sink
|
A metal alloy that absorbs heat from the processor
|
|
Host
|
A network computer that acts as a server to other
computers
|
|
Icon
|
A tiny display representing files and folders
|
|
Infrared
|
Red light invisible to naked eye and used in some
wireless devices
|
|
Integrated Circuit
|
A semiconductor chip
|
|
Internet
|
A super highway network that connects smaller
networks
|
|
Intranet
|
Internal network within an organisation
|
|
IP Address
|
It is internet protocol numbers ranging from 0 to 255
and separated by 3 dots. It is assigned to a computer connected to internet
by Internet Service Provider (ISP).
|
|
Iteration
|
Program process repetition
|
|
JavaScript
|
A scripting language developed by Sun Microsystems
|
|
Joystick
|
A device consisting of base and stick used in video
games
|
|
Jumper
|
Metal bridge to close electrical circuit
|
|
Kerberos
|
Used to give secure network authentication
|
|
Kernel
|
The foundation layer of an operating system
|
|
Keygen
|
Key generator that automatically generates a
registration or serial #
|
|
Keylogger
|
Keystrokes recording program that could be used by a
hacker to find out passwords
|
|
Kibibyte (KiB)
|
Exact units of 1024 bytes
|
|
Kilobyte (KB)
|
Estimated 1000 bytes or 1024 bytes depending on the
content in use. Hence, kilobyte has ambiguous units.
|
|
LAN
|
Local area network that covers a small area
|
|
Leaf
|
A file in hard disk
|
|
Limewire
|
A free software that allows network users to share
files
|
|
Linkedin
|
Business social networking site
|
|
Linux
|
Operating system developed by Linus Torvalds. It is a
popular OS for hosting web servers.
|
|
Macro
|
A command/script in form of a key or symbol
|
|
Mainframe
|
Big powerful computer processing mammoth volume at
high speed
|
|
Malware
|
Programs like virus & Trojan intended to
damage computers
|
|
Media
|
Data storage hardware like DVD, CD, HD
|
|
Tool to store details like keywords & contents of
a web page
|
|
|
Memory Stick
|
Sony’s flash memory cards
|
|
Name Server
|
Web domain is referred to IP address by name server
|
|
Nanosecond
|
A billionth of a second
|
|
Network
|
A system of connected computers that send and receive
data
|
|
Node
|
Anything connected to a network
|
|
Null Value
|
Something that has no value in programming
|
|
Offline
|
State of computer devices that are neither turned on
nor connected
|
|
Online
|
State of computer devices that are turned on and
connected
|
|
Operating System(OS)
|
The significant program that runs the computer
hardware
|
|
Oracle
|
Database management program developed by Oracle
Corporation
|
|
Overclock
|
Technique to run a microprocessor faster than
intended
|
|
Packet
|
Amount of data sent from source to destination
|
|
Path
|
Address of file
|
|
Peer to Peer (P2P)
|
Connected workstations sharing files without a
central server
|
|
Peripheral
|
Any device attached to computer externally
|
|
Phishing (i.e. Password harvesting fishing)
|
Attempting to garner personal information via emails
that seem genuine from banking and popular websites
|
|
Primary Key
|
A value that mainly identifies a record in a table
|
|
Quad-Core
|
CPU having 4 separate processors in a chip
|
|
Query
|
Request of a database in computer
|
|
Queue
|
Series of tasks waiting to be done by programs
|
|
QWERTY
|
Denotes standard keyboard because Q,W,E,R,T,Y keys
are side by side in the upper left row
|
|
Random Access Memory (RAM)
|
Memory cells that make up memory module. Data is
always loaded from hard disk to RAM since it is faster to read from it. The
best method to make your computer work faster is to increase its
RAM.
|
|
Raw Data
|
Data that is not processed
|
|
Read-only Memory (ROM)
|
Memory storing hardware information that is not lost
when power is turned off
|
|
Real Time
|
The moment, data is received, it is processed
|
|
Reboot
|
To restart
|
|
Registry
|
Database storing set up, software and hardware
configuration information in Windows OS
|
|
Router
|
A device connecting one local area network to another
|
|
Script
|
A series of commands performed by a program
|
|
Interface or connection to peripherals
|
|
|
Server
|
Mainframe computer that serves other attached
computers
|
|
Shadowing
|
Method of using high speed RAM to make computer to
work faster
|
|
Simplex
|
Circuit that can either transmit or receive
|
|
Software
|
A code or program that is read by computer
|
|
Spam
|
Unnecessary emails
|
|
Static
|
Non interactive web page
|
|
System
|
Comprehensive inclusion of hardware, software &
firmware items
|
|
Terabyte (TB)
|
One trillion bytes
|
|
Terminal
|
An internet computer screen
|
|
Throughout
|
Data amount processed in a given time
|
|
Topology
|
Physical and logical set up of a network
|
|
Trojan
|
Dangerous virus loaded deceptively through a host
program
|
|
Undo
|
A command to cancel previous action
|
|
Universal Resource Locator (URL)
|
Another term for internet address
|
|
Universal Serial Bus (USB)
|
Computer port that is faster
|
|
Unix
|
Web server operating system developed by AT & T
|
|
Upload
|
To transfer files from local computer to web
server/network
|
|
Virtual Memory
|
Memory generated by hard disk sectors when
RAM is full
|
|
Virtual Reality
|
Computer created illusion of reality
|
|
Virus
|
A code or program designed to replicate and damage
computers
|
|
Wave
|
Microsoft’s waveform sound format
|
|
Weblog
|
A personal journal or blog on the web
|
|
Workstation
|
Any computer attached to internet
|
|
X2
|
Technology to send higher data rates on old phone
system
|
|
XMS(Extended Memory Specification)
|
Procedure for using extended memory & area of
disk operating system (DOS)
|
|
Y2K
|
Year 2000; the predicted Millennium Bug that flopped
|
|
Yottabyte (YB)
|
Largest data storage unit, i.e.
1,000,000,000,000,000,000,000,000 bytes
|
|
Zero Day Exploit
|
Computer security loophole issue & attack on it
are known on same day. Zero day left to release patch to fix it.
|
|
Zettabyte (ZB)
|
1,000, 000, 000, 000, 000, 000, 000 bytes
|
|
Zipping
|
Compressing files to save space
|
|
Zune
|
Digital music entertainment developed by Microsoft
|
No comments:
Post a Comment
Comment Here