TERM
|
MEANING
|
Absolute Address
|
Exact data memory location
|
ActiveX
|
Tools to link applications to the web
|
Adware
|
Software supported by advertisements
|
Analog
|
Data represented by a continuous signal or information
|
Applet
|
A Java program embedded in web page
|
Archie
|
A program to find files on FTP servers
|
Avatar
|
A character representing an internet user
|
Backbone
|
Network mainline carrying data to smaller lines
|
Bandwidth
|
Amount of data sent through network
|
Bit
|
Smallest piece of information, that is, either 1 or 0
|
Bluetooth
|
A short range wireless technology to connect electronic devices
|
Boot
|
To start a computer
|
Byte
|
Sequence of information bits, which equals 8 bits
|
Cache
|
Technically classifying, it stores recently visited web addresses, web pages in hard disk/RAM/near processor, depending on cache types, for fast retrieval
|
Captcha
|
Response test that shows if the user is human or not
|
Centronics
|
36 pin parallel interface standard
|
Computer
|
A machine that computes and is programmable
|
Cookie
|
It is an internet term where the web server sent data records your activities on websites. Some websites record & remember information like your username and password, so you don’t have to type them again.
|
Crop
|
Removing part of an image or photo
|
Cyber Bullying
|
Harassing or threatening the young via cyberspace
|
Cyber Squatter
|
Someone registering a domain name (without web pages) to sell it
|
Default
|
When a user does not specify a setting, a preset value is used
|
Degauss
|
Removing magnetism from a device
|
Digital
|
Data represented in a series of zeros and ones
|
DirectX
|
Mostly used in video games, it is a set of commands
|
Domain
|
Network and computers connected to internet
|
Domain Name
|
Website name
|
Driver
|
A file that aids computer to connect with the hardware device
|
Dual-Core
|
A CPU that has 2 processors in a chip
|
Embed
|
Adding something from one document to another
|
Emoticons
|
Text based faces/objects
|
Encryption
|
Conversion of data into unreadable state
|
Ethernet
|
A networking connection that uses coaxial cables
|
Exabyte
|
Unit of data storage equalling to 2 to 60th power bytes
|
Fiber Optic
|
Transmits information faster than copper wire
|
File Sharing
|
Way of giving same file to many users by one server
|
Firewire
|
High speed interface for connecting digital/electronic players to computers
|
Firmware
|
Software programmed into hardware
|
Flash Drive
|
Data storage device with less units
|
Gigabyte (GB)
|
Equals 1024 megabytes
|
Gigahertz
|
Measurement for computer processing speed. 1 gigahertz =1000 megahertz
|
Gnutella
|
Internet file sharing network
|
Golden Master
|
Final version of software program sent to make retail copies
|
Hacker
|
A sly person who gains illegal access to other people’s computers
|
Hard Copy
|
A document that is printed
|
Hardware
|
Internal and external physical parts of a computer system
|
Heat Sink
|
A metal alloy that absorbs heat from the processor
|
Host
|
A network computer that acts as a server to other computers
|
Icon
|
A tiny display representing files and folders
|
Infrared
|
Red light invisible to naked eye and used in some wireless devices
|
Integrated Circuit
|
A semiconductor chip
|
Internet
|
A super highway network that connects smaller networks
|
Intranet
|
Internal network within an organisation
|
IP Address
|
It is internet protocol numbers ranging from 0 to 255 and separated by 3 dots. It is assigned to a computer connected to internet by Internet Service Provider (ISP).
|
Iteration
|
Program process repetition
|
JavaScript
|
A scripting language developed by Sun Microsystems
|
Joystick
|
A device consisting of base and stick used in video games
|
Jumper
|
Metal bridge to close electrical circuit
|
Kerberos
|
Used to give secure network authentication
|
Kernel
|
The foundation layer of an operating system
|
Keygen
|
Key generator that automatically generates a registration or serial #
|
Keylogger
|
Keystrokes recording program that could be used by a hacker to find out passwords
|
Kibibyte (KiB)
|
Exact units of 1024 bytes
|
Kilobyte (KB)
|
Estimated 1000 bytes or 1024 bytes depending on the content in use. Hence, kilobyte has ambiguous units.
|
LAN
|
Local area network that covers a small area
|
Leaf
|
A file in hard disk
|
Limewire
|
A free software that allows network users to share files
|
Linkedin
|
Business social networking site
|
Linux
|
Operating system developed by Linus Torvalds. It is a popular OS for hosting web servers.
|
Macro
|
A command/script in form of a key or symbol
|
Mainframe
|
Big powerful computer processing mammoth volume at high speed
|
Malware
|
Programs like virus & Trojan intended to damage computers
|
Media
|
Data storage hardware like DVD, CD, HD
|
Meta Tag
|
Tool to store details like keywords & contents of a web page
|
Memory Stick
|
Sony’s flash memory cards
|
Name Server
|
Web domain is referred to IP address by name server
|
Nanosecond
|
A billionth of a second
|
Network
|
A system of connected computers that send and receive data
|
Node
|
Anything connected to a network
|
Null Value
|
Something that has no value in programming
|
Offline
|
State of computer devices that are neither turned on nor connected
|
Online
|
State of computer devices that are turned on and connected
|
Operating System(OS)
|
The significant program that runs the computer hardware
|
Oracle
|
Database management program developed by Oracle Corporation
|
Overclock
|
Technique to run a microprocessor faster than intended
|
Packet
|
Amount of data sent from source to destination
|
Path
|
Address of file
|
Peer to Peer (P2P)
|
Connected workstations sharing files without a central server
|
Peripheral
|
Any device attached to computer externally
|
Phishing (i.e. Password harvesting fishing)
|
Attempting to garner personal information via emails that seem genuine from banking and popular websites
|
Primary Key
|
A value that mainly identifies a record in a table
|
Quad-Core
|
CPU having 4 separate processors in a chip
|
Query
|
Request of a database in computer
|
Queue
|
Series of tasks waiting to be done by programs
|
QWERTY
|
Denotes standard keyboard because Q,W,E,R,T,Y keys are side by side in the upper left row
|
Random Access Memory (RAM)
|
Memory cells that make up memory module. Data is always loaded from hard disk to RAM since it is faster to read from it. The best method to make your computer work faster is to increase its RAM.
|
Raw Data
|
Data that is not processed
|
Read-only Memory (ROM)
|
Memory storing hardware information that is not lost when power is turned off
|
Real Time
|
The moment, data is received, it is processed
|
Reboot
|
To restart
|
Registry
|
Database storing set up, software and hardware configuration information in Windows OS
|
Router
|
A device connecting one local area network to another
|
Script
|
A series of commands performed by a program
|
Serial Port
|
Interface or connection to peripherals
|
Server
|
Mainframe computer that serves other attached computers
|
Shadowing
|
Method of using high speed RAM to make computer to work faster
|
Simplex
|
Circuit that can either transmit or receive
|
Software
|
A code or program that is read by computer
|
Spam
|
Unnecessary emails
|
Static
|
Non interactive web page
|
System
|
Comprehensive inclusion of hardware, software & firmware items
|
Terabyte (TB)
|
One trillion bytes
|
Terminal
|
An internet computer screen
|
Throughout
|
Data amount processed in a given time
|
Topology
|
Physical and logical set up of a network
|
Trojan
|
Dangerous virus loaded deceptively through a host program
|
Undo
|
A command to cancel previous action
|
Universal Resource Locator (URL)
|
Another term for internet address
|
Universal Serial Bus (USB)
|
Computer port that is faster
|
Unix
|
Web server operating system developed by AT & T
|
Upload
|
To transfer files from local computer to web server/network
|
Virtual Memory
|
Memory generated by hard disk sectors when RAM is full
|
Virtual Reality
|
Computer created illusion of reality
|
Virus
|
A code or program designed to replicate and damage computers
|
Wave
|
Microsoft’s waveform sound format
|
Weblog
|
A personal journal or blog on the web
|
Workstation
|
Any computer attached to internet
|
X2
|
Technology to send higher data rates on old phone system
|
XMS(Extended Memory Specification)
|
Procedure for using extended memory & area of disk operating system (DOS)
|
Y2K
|
Year 2000; the predicted Millennium Bug that flopped
|
Yottabyte (YB)
|
Largest data storage unit, i.e. 1,000,000,000,000,000,000,000,000 bytes
|
Zero Day Exploit
|
Computer security loophole issue & attack on it are known on same day. Zero day left to release patch to fix it.
|
Zettabyte (ZB)
|
1,000, 000, 000, 000, 000, 000, 000 bytes
|
Zipping
|
Compressing files to save space
|
Zune
|
Digital music entertainment developed by Microsoft
|