Computing Fundamentals: Quiz 1
Computing Fundamentals: Quiz 1
Quiz 1
-Hardware
-Address
-Machine Language
-CPU
-Computer
-False
-1930
Abacist is the term called for the user of an abacus who slides the beads
of the abacus by hand.
-True
It is the year when John V. Atanasoff devised the first digital electronic
computer.
-1937
-1972
It is the year when the general electric corporation delivered its ERMA
computing system to the Bank of America in California.
-1959
ERMA (Electronic Recording Machine-Academy), was a pioneering
computer development project run at SRI under contract Bank of Africa
in order to automate banking bookkeeping.
-False
-RAM
-True
-False
-Programs
-Software
-False
-False
-True
It is the year when the development of Arpanet began with the financial
backing of the department of defense.
-1969
It is the year when Atanasoff and Berry came up with ABC prototype.
-1939
-Binary
-True
-False
It is the year when DEC launched the first minicomputer called the PDP-
8.
-1968
-1941
It is the year that the history of computers dates back to the invention of a
mechanical adding machine.
-1642
-True
The United States (U.S) Army's Ballistic Research Laboratory came up
with the Electronic Numerical Integrator and Calculator (ENIAC) in the
year?
-1946
-Main Memory
Quiz 2
-True
66
113
8 raised to 2 is equal to 64
-True
-True
-False
-22
-Octal
- number system
-byte
-337
-False
-True
-12
-False
-hexadecimal
-67
It is called as a bit.
-binary digit
-1111
-True
-11010
-True
-6F
-1B7
-decimal
-False
-True
2 raised to 0 is equal to 1
-True
-2
-True
2 raised to 4 is equal to 8
-False
PRELIMS
-True
- Data Analyst
-True
-Presentation
-Desktop publishing
Output devices accept data and instructions from the user or from another
computer
-False
-ENIAC
-False
-ACM
-PDF Reader
-Technology
-Web Developer
It permits users to create and maintain several files and extract in an easy
convenient manner.
-Database
-Z-machine
-True
-Harm
- Network Engineer
-True
This principle discuss that computing professionals should not
misrepresent an organization's policies or procedures, and should not
speak on behalf of an organization unless authorized to do so.
-Application Developer
-Abacist
-Anti-viruses
-Data Analyst
-True
-True
-True
They bring technical expertise to ensure the quality and accuracy of that
data, then process, design and present it in ways to help people
-Data Analyst
-True
The CPU is a rigid rectangular card containing the circuitry that connects
the processor to the other hardware
-False
This principle, which concerns the quality of life of all people, affirms an
obligation of computing professionals, both individually and collectively,
to use their skills for the benefit of society, its members, and the
environment surrounding them.
It is a software that allows users to enter, store, manipulate and print text.
-Word processing
-Honesty
-PDF Readers
-Electronic spreadsheet
-False
-Application Developer
-Database
-Leadership
Spreadsheet applications contain a lot of features that can help the ICT
professionals
-True
-policies siguro
-True
-False
-Punch card
Computing professionals should not share technical knowledge with the
public, foster awareness of computing, and encourage understanding of
computing.
-False
-True
The client alone may decide to pursue the assignment with the
professional after additional time to acquire the necessary competencies
-False
-False
An application such as Pages, and Writer are just some of the application
used by an ICT professional when creating documents.
-Word Processing
-False
-True
The more processor the computer has, the more it can do, and the faster it
can perform a certain task
-False
-False
Quiz 3!
Templates are designed documents that are blank except for preset
margins, fonts, paragraphs formats, headings, rulers, graphics, header,
footers.
-False
-Font
- Type Size
This display the information related to the position in the documents, the
page count, and the status of keyboard keys.
- Status bar
-Cursor
Which short-cut key is used to find the word organizational within the
word file?
- CTRL + F
-Menu Bar
-False
You cannot embed sounds file in your document in much the same way
that you embed a graphic file.
-False
-Line Spacing
-Block
When you text reaches the right edge of the screen it automatically moves
the insertion point to the next line. This feature is called word wrap.
-True
-True
These are the white borders around the edge of the page. Every document
has top, bottom, left, and right margins.
- Margin
-True
This determine how close each line of the paragraph comes to the
margins
-Indent
-True
-True
To deselect selected block of text click the mouse anywhere on the screen
or press any arrow key.
-True
-False
This show the position of text, tabs, margins, indents and other elements
on the page.
-Ruler
-Alignment
-Border
This let the user scroll through a document that is too large to fit inside
the document area.
-scroll bar
-Word Processor
-False
Under the INSERT menu bar, which toolbar you can find the shape tool?
Paragraph are line of text that run along the top and bottom of every page.
-False
-Toolbars
In which menu bar you can find the FONT setting in Microsoft word?
-Home
-True
-Shading
-Type style
-True
Under the INSERT menu bar, which toolbar you can find the text box?
Which formatting toolbar is used to change the upper case into lower
case.
Which formatting tool is used to highlight the texts?
Quiz 4
360
-Spreadsheet program
-False
-True
You can add new sheets to a workbook file or delete worksheets you no
longer need.
-True
This is any number you enter or number that results from a computation.
-Value
-Status Bar
These are the values (often called cell reference) that the function uses in
its operation.
-Arguments
-Insert
-False
-Cell Address
-Function
-Analysis
-A4
-Charts
-Cell
You can easily change one part of formula or a cell that it refers to see
how that changed affect the rest of the worksheets.
-True
-False
-False
-True
All spreadsheet allow you to do simple analysis.
-True
This find values for one or more cells that make the results of a formula
equal to a value you specify.
-Goal seeking
Which formatting toolbar is used merge the 1st column to the second
column?
-Dates
-True
You cannot create a special effect by adding graphics, such as clip art, to
your worksheets.
-False
This counts many values are in a range of cells. Many functions are
complex.
-COUNT
-True
-Sorting
Which formatting toolbar is used center the text along the cell?
-False
Like a word processors, a spreadsheet programs are extremely
accommodating when you want to make the desired changes.
-True
-False
=SUM(A1:A5)
-Workbook
-Label
-Spreadsheet
MIDTERM
-Cell address
You cannot automate the presentation by setting a display time for each
slide
-False
Each slide should focus on one unique topic and have no more than three
to five bullets points.
-True
-Spell Checker
What is the default layout of the slide when you insert/add a new slide?
-Status bar
It is easier and faster to work with one of the presentation programs many
______?
-Slide template
Spreadsheets can work with whole numbers, decimals, negative numbers,
currency, and other types of values, including scientific notation.
-True
Adding animation enables you to create a wide range of moods for your
presentation, therefore, it is important to choose colors carefully.
-False
-Presentation template
-True
You can move from one slide to the next slide by clicking the mouse
button or by pressing home button key.
-False
-False
-Word Processor
These are small boxes (usually white or black in color) that you can drag
to resize the frame.
-Handles
-Paragraph Spacing
-False
-False
Presentation programs have a built-in timing feature that you can use to
determine how long your slides are going to be on the screen
-True
Animations, sounds effects, and hyperlinks are cool, but they get
annoying quickly.
-True
A special effect that causes slide to blend together when you switch from
one slide to the next.
-Transition
-True
-Presentation Software
-True
Which short cut key is use to show the slide show in presentation mode?
-F5
-Entrance effects
Work like spell checker, but they inspect you document for grammatical
problems
-Grammar Checker
This can connect your computer to a standard television and view the PCs
video output on the television monitor.
-Grammar Checker
-True
This changes color as it moves from one part of the slide to another.
-Gradient fill
-Note pages
-Labels
The text is formatted automatically, but you can easily reformat the text
later, using many of the same formatting options that are available in
word processors.
-True
To add text to a textbox, simply click in the box at the place where you
want to insert text, and then type your text.
-True
This help you find errors in your spelling and grammar; they also may
have tools to help you find just the right word or avoid overusing certain
words.
-Language tools
To insert clip art or another type of graphic in a slide, you can select an
image from your software collections of graphics or import an image file,
such as scanned photograph or clip art.
-True
This can include different types of text, charts, tables and graphics.
- Slide
This is used to make text pop up or crawl onto the screen, or to make
your slides "build" themselves by adding individual pieces of text that
appear as you introduce them to the audience.
-Transition (wrong)
-Animation(correct)
-Template
-True
-Outlining
-False
You cannot use the programs drawing tools to draw on a slide while it is
being displayed.
-False
Presentation programs do not have a built n paint tools also enable you to
draw simple graphics and add them to your slides.
-False
-Path Animation
-Thesaurus
-True
-Paint Program
Rulers separate different elements and help hold the viewer attention or
individual parts of the slide.
-False
-Mail Merge
-Design
-Presentation program
Most presentation programs do not allow the user to save a set of slides
as a group in one file.
-False
-Table
-True
Which formatting VIEW is used to change the layout of the slides to Note
pages?
- Outlining
-Spreadsheet
-Annotation
-Cell
-Title Slide
Formula
-Formula
This can display your slides at the proper resolution and in large enough
format for a sizable audience to view comfortably.
-Presentation Program
This display a definition of the selected word and a list of possible
replacement.
-Thesaurus
-Worksheet
-Table
-Formula
2 out of 2 points
What bit pattern (base 2) does the follwing hexadecimal pattern represent
E1A
Selected
Answer:
1110 0001 1010
Answers: 0110 0001 1011
0101 0001 1011
1110 0001 1010
0111 0010 11001
Question 2
2 out of 2 points
Convert the following base 10 notation to its equivalent binary form
28
Selected
Answer:
11100
Answers: 11001
11100
11011
11011
Question 3
2 out of 2 points
Which of the following best describes the NOR operation?
Selected
Answer:
An OR followed by a NOT
Answers: An XOR followed by a NOT
An OR followed by a NOT
A NOT followed by an OR
An AND followed by a NOT
Question 4
2 out of 2 points
Use hexadecimal notation to represent the following bit pattern
01001001
Selected
Answer:
49
Answers: 39
48
38
49
q5 p 26
Response Feedback:
Question 5
2 out of 2 points
What is the result of the following addition in binary notation
1011.01
+ 11.11
Selected
Answer:
1111.00
Answers: 1110.00
1111.01
1111.00
1011.00
Question 6
2 out of 2 points
Convert the following base 10 value into binary representation
4 3/4
Selected
Answer:
100.11
Answers: 100.10
100.01
100.11
none of the above
Question 7
2 out of 2 points
Convert the following binary representation to its equivalent base 10
notation
10.11
Selected
Answer:
none of the above
Answers: 3 1/4
3 1/2
3 1/8
none of the above
Question 8
2 out of 2 points
Which of the following bit patterns represents the value -9 in two's
complement notation
Selected
Answer:
1111 0111
Answers: 0001 1010
1111 0111
1000 1001
1111 1011
Question 9
2 out of 2 points
Convert the following binary representation to its equivalent base 10
notation
10011
Selected
Answer:
19
Answers: 17
18
16
19
Question 10
2 out of 2 points
How many bits would be in memory of a computer with 2K of memory ?
Selected
Answer:
16384
Answers: 65536
32768
16384
none of these
· Question 1
2 out of 2 points
Which of the following is not a role of a typical operating system?
Selected Answer:
· Question 2
2 out of 2 points
Which of the following would be a concern of the file manager in a multi-user computer system
that would not be a concern in a single-user system?
Selected Answer:
Maintain records regarding the ownership of files
neither A nor B
· Question 4
2 out of 2 points
Multitasking in a computer with only one CPU is accomplished by a technique called
Selected Answer:
Multiprogramming
Answers: Bootstrapping
Batch processing
Multiprogramming
None of the above
· Question 5
2 out of 2 points
Which of the following components of an operating system handles the details associated with
particular peripheral equipment?
Selected Answer:
Device drivers
Answers:
File manager
Memory manager
None of the above
· Question 6
2 out of 2 points
Which of the following is a task that is not performed by the kernel of an operating system?
Selected Answer:
Communicate with the user
Answers:
Schedule processes
Allocate resources
Avoid deadlock
· Question 7
2 out of 2 points
Execution of an operating system is initiated by a program called :
Selected Answer:
Boot loader
Answers: Window manager
Scheduler
Boot loader
None of the above
· Question 8
2 out of 2 points
A section of a program that should be executed by at most one process at a time is called a
Selected Answer:
Critical region
Answers: Utility
Critical region
Privileged instruction
None of the above
· Question 9
2 out of 2 points
Which of the following components of an operating system maintains the directory system?
Selected Answer:
File manager
Answers: Device drivers
File manager
Memory manager
None of the above
· Question 10
2 out of 2 points
Which of the following would not require real-time processing?
Selected Answer:
Navigation of an aircraft
Forecasting world-wide trend for the next five year period
· Question 1
2 out of 2 points
Which of the following is not a role of a typical operating system?
Selected Answer:
· Question 2
2 out of 2 points
Which of the following would be a concern of the file manager in a multi-user computer system
that would not be a concern in a single-user system?
Selected Answer:
Maintain records regarding the ownership of files
neither A nor B
· Question 4
2 out of 2 points
Multitasking in a computer with only one CPU is accomplished by a technique called
Selected Answer:
Multiprogramming
Answers: Bootstrapping
Batch processing
Multiprogramming
None of the above
· Question 5
2 out of 2 points
Which of the following components of an operating system handles the details associated with
particular peripheral equipment?
Selected Answer:
Device drivers
Answers:
File manager
Memory manager
None of the above
· Question 6
2 out of 2 points
Which of the following is a task that is not performed by the kernel of an operating system?
Selected Answer:
Communicate with the user
Answers:
Schedule processes
Allocate resources
Avoid deadlock
· Question 7
2 out of 2 points
Execution of an operating system is initiated by a program called :
Selected Answer:
Boot loader
Answers: Window manager
Scheduler
Boot loader
None of the above
· Question 8
2 out of 2 points
A section of a program that should be executed by at most one process at a time is called a
Selected Answer:
Critical region
Answers: Utility
Critical region
Privileged instruction
None of the above
· Question 9
2 out of 2 points
Which of the following components of an operating system maintains the directory system?
Selected Answer:
File manager
Answers: Device drivers
File manager
Memory manager
None of the above
· Question 10
2 out of 2 points
Which of the following would not require real-time processing?
Selected Answer:
Navigation of an aircraft
Forecasting world-wide trend for the next five year period
· Question 1
2 out of 2 points
In which of the following locations is information most readily available for manipulation by the
CPU?
Selected Answer:
General-purpose registers
Answers: Cache memory
Main memory
Mass storage
General-purpose registers
· Question 2
2 out of 2 points
Write the answer to the following logic problem.
10101010
OR 11110000
Selected Answer:
11111010
Answers:
11111010
11011011
01011010
11011010
· Question 3
2 out of 2 points
An ARM based processor is an example of what kind of computer architecture?
Selected Answer:
RISC
Answers: DSL
CISC
RISC
Pentium
· Question 4
2 out of 2 points
Which of the following is not a form of parallel processing?
Selected Answer:
SISD
Answers:
SISD
MIMD
SIMD
All are examples of parallel processing
· Question 5
2 out of 2 points
Write the answer to the following logic problem.
10101010
XOR 11110000
Selected Answer:
01011010
Answers: 01011110
01011010
11011010
01001010
· Question 6
2 out of 2 points
Which of the following instructions falls in the category of data transfer instructions?
Selected Answer:
LOAD
Answers:
LOAD
AND
ROTATE
JUMP
· Question 7
2 out of 2 points
Which of the following is not an activity performed entirely within a CPU?
Selected Answer:
Fetch instructions
Answers:
Fetch instructions
Perform Boolean operations
Perform arithmetic operations
Move data between registers
· Question 8
2 out of 2 points
Which of the following is not contained in a CPU?
Selected Answer:
Memory cell
Answers: Instruction register
Program counter
General-purpose register
Memory cell
· Question 9
2 out of 2 points
What is the answer to the following logic problem.
10101010
AND 11110000
Selected Answer:
1010 0000
Answers:
1010 0000
1110 0001
1001 0000
1101 0010
· Question 10
2 out of 2 points
Which of the following instructions does not fall in the category of arithmetic/logic instructions?
Selected Answer:
JUMP
Answers: ROTATE
ADD
OR
JUMP
· Question 11
2 out of 2 points
When comparing computer machines, clock speed rather than a benchmark, is a more
reliable indicator of speed
Selected Answer: Disagree
Answers: Agree
Disagree
· Question 1
2 out of 2 points
Which of the following is not a role of a typical operating system?
Selected Answer:
Answers: Control the allocation of the machine’s resources
Control access to the machine
Maintain records regarding files stored in mass storage
· Question 2
2 out of 2 points
Which of the following would be a concern of the file manager in a multi-user computer system
that would not be a concern in a single-user system?
Selected Answer:
Maintain records regarding the ownership of files
Both A and B
neither A nor B
· Question 4
2 out of 2 points
Multitasking in a computer with only one CPU is accomplished by a technique called
Selected Answer:
Multiprogramming
Answers: Bootstrapping
Batch processing
Multiprogramming
None of the above
· Question 5
2 out of 2 points
Which of the following components of an operating system handles the details associated with
particular peripheral equipment?
Selected Answer:
Device drivers
Answers:
File manager
Memory manager
None of the above
· Question 6
2 out of 2 points
Which of the following is a task that is not performed by the kernel of an operating system?
Selected Answer:
Answers:
Communicate with the user
Schedule processes
Allocate resources
Avoid deadlock
· Question 7
2 out of 2 points
Execution of an operating system is initiated by a program called :
Selected Answer:
Boot loader
Answers: Window manager
Scheduler
Boot loader
None of the above
· Question 8
2 out of 2 points
A section of a program that should be executed by at most one process at a time is called a
Selected Answer:
Critical region
Answers: Utility
Critical region
Privileged instruction
· Question 9
2 out of 2 points
Which of the following components of an operating system maintains the directory system?
Selected Answer:
File manager
Answers: Device drivers
File manager
Memory manager
None of the above
· Question 10
2 out of 2 points
Which of the following would not require real-time processing?
Selected Answer:
Navigation of an aircraft
Forecasting world-wide trend for the next five year period
· Question 1
2 out of 2 points
Which of the following is not a role of a typical operating system?
Selected Answer:
Answers: Control the allocation of the machine’s resources
Control access to the machine
· Question 2
2 out of 2 points
Which of the following would be a concern of the file manager in a multi-user computer system
that would not be a concern in a single-user system?
Selected Answer:
Maintain records regarding the ownership of files
Both A and B
neither A nor B
· Question 4
2 out of 2 points
Multitasking in a computer with only one CPU is accomplished by a technique called
Selected Answer:
Multiprogramming
Answers: Bootstrapping
Batch processing
Multiprogramming
None of the above
· Question 5
2 out of 2 points
Which of the following components of an operating system handles the details associated with
particular peripheral equipment?
Selected Answer:
Device drivers
Answers:
File manager
Memory manager
None of the above
· Question 6
2 out of 2 points
Which of the following is a task that is not performed by the kernel of an operating system?
Selected Answer:
Answers:
Communicate with the user
Schedule processes
Allocate resources
Avoid deadlock
· Question 7
2 out of 2 points
Execution of an operating system is initiated by a program called :
Selected Answer:
Boot loader
Answers: Window manager
Scheduler
Boot loader
None of the above
· Question 8
2 out of 2 points
A section of a program that should be executed by at most one process at a time is called a
Selected Answer:
Critical region
Answers: Utility
Critical region
Privileged instruction
· Question 9
2 out of 2 points
Which of the following components of an operating system maintains the directory system?
Selected Answer:
File manager
Answers: Device drivers
File manager
Memory manager
None of the above
· Question 10
2 out of 2 points
Which of the following would not require real-time processing?
Selected Answer:
Navigation of an aircraft
Forecasting world-wide trend for the next five year period
Low level code is closer to the language the machine understands (binary
code). Higher level languages are more abstract and
human-readable. In general, more can be accomplished with fewer lines
of high-level code.
numbers.
of the system.
HDD vs SSD
Hard Disk Drives use a spinning metal disk, which Solid State Drives
have no moving parts, and store data on integrated circuits.
The 3-2-1 Rule
Select one:
a. Data
b. text files
c. Instructions
Select one:
disks
Select one:
CPU.
d. Each program instruction consists of an arithmetic expression only.
C language is
c. Safe language
f. a simple language
Select one:
a. false, false
b. true, true
c. true, false
d. false, true
· 11th
dimension - The 11th dimension is a characteristic of space-
time that has been proposed as a possible answer to questions that
arise in superstring theory.
· 2001 -
Midnight UTC on January 1, 2001 marked the beginning of
the third millennium on the Western world's Gregorian calendar.
· 3-tier
application architecture - A 3-tier application architecture is
a modular client-server architecture that consists of a presentation tier,
an application tier and a data tier.
· 42
(h2g2, meaning of life, The Hitchhiker's Guide to the Galaxy) -
In Douglas Adams' "The Hitchhiker's Guide to the Galaxy," 42 is the
number from which all meaning ("the meaning of life, the universe,
and everything") can be derived.
· absolute
truth - In general, absolute truth is whatever is always
valid, regardless of parameters or context.
· access
method - In computing, an access method is a program or a
hardware mechanism that moves data between the computer and an
outlying device such as a hard disk (or other form of storage) or a
display terminal.
· adaptive
enterprise (or adaptive organization) - An adaptive
enterprise (or adaptive organization) is a corporation, institution, or
agency in which the business demand and the IT (information
technology) supply are matched and synchronized at all times.
· address
bar - The address bar is the familiar text field at the top of a
web browser’s graphical user interface (GUI) that displays the name
or the URL (uniform resource locator) of the current web page.
· address
space - Address space is the amount of memory allocated for
all possible addresses for a computational entity, such as a device, a
file, a server, or a networked computer.
· addressability -
Addressability is the capacity for an entity to be
targeted and found.
· affective
computing (emotion AI) - Affective computing, also
known as AC or emotion AI, is an area of study within cognitive
computing and artificial intelligence that is concerned with gathering
data from faces, voices and body language to measure human
emotion.
· agentless -
Agentless, in computing, refers to operations where no
service, daemon or process (AKA an agent) needs to run in the
background on the machine the action is being performed on.
· agnostic -
Agnostic, in an information technology (IT) context, refers
to something that is generalized so that it is interoperable among
various systems.
· AIBO
(Artificial Intelligence roBOt) - AIBO (pronounced eye-
bow) is an entertainment robot designed by Sony.
· algorithm -
An algorithm (pronounced AL-go-rith-um) is a
procedure or formula for solving a problem, based on conducting a
sequence of specified actions.
· alphanumeric
(alphameric) - Alphanumeric, also referred to as
alphameric, is a term that encompasses all of the letters and numerals
in a given language set.
· anacronym -
An anacronym is an acronym or an abbreviation so old
or familiar that no one remembers what its letters stand for, such as
BASIC or COBOL.
· analog
computing - Analog computing is a term used by Paul Saffo
of the Institute for the Future in Palo Alto, California, to describe
silicon-based microsensors that sense and react to external (natural)
stimuli in something that approximates the rhythm of reality rather
than the "artificial" binary behavior of digital computing.
· Analytical
Engine - The Analytical Engine was, or would have been,
the world's first general-purpose computer.
· angstrom
(angstrom unit) - The angstrom, also known as the
angstrom unit, is a measure of displacement equal to 0.
· anisotropic
filtering (AF) - Anisotropic filtering (AF) is a feature of
some video cards that sharpens the details of the fading-away part of a
3D object that recedes into the distance.
· anode -
An anode is the electrode in a polarized electrical device
through which current flows in from an outside circuit.
· any
key - The phrase "any key," which frequently appears in the
direction to computer users to "Press any key," is reportedly a source
of confusion to many.
· Apple -
Apple is a prominent hardware and software company best
known for its series of personal computers, the iPod and its innovative
marketing strategies for its products.
· application
program interface (API) - An application program
interface (API) is code that allows two software programs to
communicate with each other.
· approximate
equality - Approximate equality is a concept used
primarily in physics and engineering, and also occasionally in
mathematics.
· Archie -
Archie is a program that allows you to search the files of all
the Internet FTP servers that offer anonymous FTP.
· architecture -
In information technology, especially computers and
more recently networks, architecture is a term applied to both the
process and the outcome of thinking out and specifying the overall
structure, logical components, and the logical interrelationships of a
computer, its operating system, a network, or other conception.
· arithmetic
mean - The arithmetic mean, also called the average or
average value, is the quantity obtained by summing two or more
numbers or variables and then dividing by the number of numbers or
variables.
· artificial
neural network (ANN) - In information technology (IT), a
neural network is a system of hardware and/or software patterned after
the operation of neurons in the human brain.
· artificial
superintelligence (ASI) - Artificial superintelligence (ASI)
is software-based intellectual powers that surpass human ability across
almost all conceivable categories and fields of endeavor.
· Asimov's
Three Laws of Robotics - Science-fiction author Isaac
Asimov is often given credit for being the first person to use the term
robotics in a short story composed in the 1940s.
· ASN.1
(Abstract Syntax Notation One) - ASN.1 (Abstract Syntax
Notation One) is a standard way to describe a message (a unit of
application data) that can be sent or received in a network.
· aspect
ratio - Aspect ratio is an image projection attribute that
describes the proportional relationship between the width of an image
and its height.
· assembly
line - An assembly line is a manufacturing process in
which interchangeable parts are assembled as they are passed in a
direct line from workstation to workstation until a final product is
produced.
· assistive
technology (adaptive technology) - Assistive technology is
a set of devices intended to help people who have disabilities.
· asymmetric
communications - In telecommunications, the term
asymmetric (also asymmetrical or non-symmetrical) refers to any
system in which the data speed or quantity differs in one direction as
compared with the other direction, averaged over time.
· Asynchronous -
In general, asynchronous -- pronounced ay-SIHN-
kro-nuhs, from Greek asyn-, meaning "not with," and chronos,
meaning "time" -- is an adjective describing objects or events that are
not coordinated in time.
· attosecond -
An attosecond is one quintillionth (10 -18) of a second
and is a term used in photon research.
· audio
noise - In audio, noise is generally any unpleasant sound and,
more technically, any unwanted sound that is unintentionally added to
a desired sound.
· audit
trail - In accounting, an audit trail is the sequence of
paperwork that validates or invalidates accounting entries.
· automagically -
Automagically is a term used when the user either
doesn't want to go into the technical details of something or doesn't
know the details but does know what the end result has to be.
· autonomic
computing - Autonomic computing is a self-managing
computing model named after, and patterned on, the human body's
autonomic nervous system.
· AVI
file (Audio Video Interleaved file) - An AVI (Audio Video
Interleaved) file is a sound and motion picture file that conforms to
the Microsoft Windows Resource Interchange File Format (RIFF)
specification.
· azimuth
and elevation - Azimuth and elevation are angles used to
define the apparent position of an object in the sky, relative to a
specific observation point.
· backslash -
The backslash ( \ ) is a typographic and/or keyboard
mark that is widely used in programming languages and other
computing contexts.
· backup
storage device - A data storage device for backup makes
copies of data actively in use.
· balanced
scorecard - The balanced scorecard is a management
system aimed at translating an organization's strategic goals into a set
of performance objectives that, in turn, are measured, monitored and
changed if necessary to ensure that the organization's strategic goals
are met.
· bar
code (or barcode) - A bar code (often seen as a single word,
barcode) is the small image of lines (bars) and spaces that is affixed to
retail store items, identification cards, and postal mail to identify a
particular product number, person, or location.
· barcode
data (point-of-sale data, POS data) - Barcode data
(sometimes called point-of-sale data) is information from barcodes
that is automatically gathered as a consumer's purchases are put
through a check-out.
· bare
metal restore - In disaster recovery, a bare metal restore is the
process of reformatting a computer from scratch after a catastrophic
failure.
· baseband -
Describes a telecommunication system in which
information is carried in digital form on a single unmultiplexed signal
channel on the transmission medium.
· Bayesian
logic - Named for Thomas Bayes, an English clergyman
and mathematician, Bayesian logic is a branch of logic applied to
decision making and inferential statistics that deals with probability
inference: using the knowledge of prior events to predict future
events.
· benchmark -
A benchmark is a point of reference by which
something can be measured.
· bespoke -
Bespoke (pronounced bee-SPOHK) is a term used in the
United Kingdom and elsewhere for an individually- or custom-made
product or service.
· binary -
Binary describes a numbering scheme in which there are
only two possible values for each digit: 0 and 1.
· binary
search (dichotomizing search) - A binary search, also called
a dichotomizing search, is a digital scheme for locating a specific
object in a large set.
· binary
tree - A binary tree is a method of placing and locating files
(called records or keys) in a database, especially when all the data is
known to be in random access memory (RAM).
· biochip -
A biochip is a collection of miniaturized test sites
(microarrays) arranged on a solid substrate that permits many tests to
be performed at the same time in order to achieve higher throughput
and speed.
· bioinformatics -
Bioinformatics is the science of developing
computer databases and algorithms for the purpose of speeding up and
enhancing biological research.
· biotechnology
(biotech) - Biotechnology is the use of biological
processes, organisms, or systems to manufacture products intended to
improve the quality of human life.
· bit
(binary digit) - A bit (short for binary digit) is the smallest unit of
data in a computer.
· bit
map - A bit map (often spelled "bitmap") defines a display space
and the color for each pixelor "bit" in the display space.
· bit
padding - Bit padding is the addition of one or more extra bits to
a transmission or storage unit to make it conform to a standard size.
· bitwise -
Bitwise operations manipulate data at the bit level rather
than with bytes or larger units of data, as is more common.
· black
box (black box testing) - Black box testing assesses a system
solely from the outside, without the operator or tester knowing what is
happening within the system to generate responses to test actions.
· black
hole - The term "black hole" is sometimes used to refer to an
imaginary place where objects, files, or funds go when they get lost
for no apparent reason.
· bloviate -
To bloviate (pronounced BLOW-vee-ayt) is to speak or
write overexpansively or with undue grandiosity.
· blue
screen of death (BSOD) - The blue screen of death (BSOD), is
the informal name given by users to the Windows general protection
fault (GPF) error.
· boot -
To boot (as a verb; also "to boot up") a computer is to load an
operating system into the computer's main memory or random access
memory (RAM).
· boot
sector - A boot sector is a specially assigned section of a storage
drive containing the files required to start the operating system (OS)
and other bootable programs such as antivirus programs, drive
partitioning software, backup tools and diagnostic disks.
· Bootstrap -
Bootstrap is a free and open source front-end
development framework for the creation of websites and web apps.
· bottleneck -
A bottleneck is a stage in a process that causes the entire
process to slow down or stop.
· brain
dump - A brain dump (sometimes spelled braindump, or brain-
dump) is a complete transfer of accessible knowledge about a
particular subject from your brain to some other storage medium, such
as paper or your computer's hard drive.
· brand -
A brand is a product, service, or concept that is publicly
distinguished from other products, services, or concepts so that it can
be easily communicated and usually marketed.
· brick
server - A brick server is a compact computer server module
without a chassis that can come in various processor, RAM, I/O, and
storage configurations and is designed to fit into rack locations similar
to those for blade servers.
· broadband -
In general, broadband refers to telecommunication in
which a wide band of frequencies is available to transmit information.
· broadcast -
In general, to broadcast (verb) is to cast or throw forth
something in all directions at the same time.
· broker -
A broker is someone or something that acts as an
intermediary third party, managing transactions between two other
entities.
· bubble
help - In a computer user interface, bubble help is text
information that is displayed in a small balloon or box when a
computer user moves the mouse cursor over a selected user interface
element, such as the iconic items in a task bar.
· buffer -
A buffer is a data area shared by hardware devices or
program processes that operate at different speeds or with different
sets of priorities.
· burn -
Burn is a colloquial term meaning to write content to a CD,
DVD, or other recordable disc.
· burn
rate - In venture investing and new company development, the
burn rate is the rate at which a new company is spending its capital
while waiting for profitable operation.
· burst -
Burst is a term used in a number of information technology
contexts to mean a specific amount of data sent or received in one
intermittent operation.
· burst
SRAM (SynchBurst SRAM) - Burst SRAM is used as the
external L1 and L2 memory for the Pentium microprocessor chipset.
· business
impact analysis (BIA) - Business impact analysis (BIA) is
a systematic process to determine and evaluate the potential effects of
an interruption to critical business operations as a result of a disaster,
accident or emergency.
· business
process outsourcing (BPO) - Business process
outsourcing, or BPO, is a business practice in which one organization
hires another company to perform a process task that the hiring
organization requires for its own business to operate successfully.
· business
service provider (BSP) - A business service provider
(BSP) is a company that rents third-party software application
packages to their customers.
· butterfly
effect - The butterfly effect is the notion that a small initial
factor may have a part in determining greater and unpredictable
changes in large, complex systems.
· BYOT
(bring your own technology) - Bring your own technology
(BYOT) is a policy that allows employees or students to use their own
personal electronic devices at work or scho.
· byte -
In most computer systems, a byte is a unit of data that is eight
binary digits long.
· bytecode -
Bytecode is computer object code that is processed by a
program, usually referred to as a virtual machine, rather than by the
"real" computer machine, the hardware processor.
· cache
(computing) - A cache -- pronounced CASH -- is hardware or
software that is used to store something, usually data, temporarily in a
computing environment.
· cache
memory - Cache memory, also called CPU memory, is high-
speed static random access memory (SRAM) that a computer
microprocessor can access more quickly than it can access regular
random access memory (RAM).
· caching -
Caching (pronounced “cashing”) is the process of storing
data in a cache.
· calculator -
A calculator is a device that performs arithmetic
operations on numbers.
· calibration -
In information technology and other fields, calibration
is the setting or correcting of a measuring device or base level, usually
by adjusting it to match or conform to a dependably known and
unvarying measure.
· calm
technology - In computing, calm technology aims to reduce the
"excitement" of information overload by letting the user select what
information is at the center of their attention and what information is
peripheral.
· campus -
In telecommunications, a campus is a physically
contiguous association of locations such as several adjacent office
buildings.
· capacity
planning - In information technology, capacity planning is
the science and art of estimating the space, computer hardware,
software and connection infrastructure resources that will be needed
over some future period of time.
· cardinality -
The term cardinality refers to the number of cardinal
(basic) members in a set.
· Cartesian
coordinates (rectangular coordinates) - Cartesian
coordinates, also called rectangular coordinates, provide a method of
rendering graphs and indicating the positions of points on a two-
dimensional (2D) surface or in three-dimensional (3D) space.
· catalog -
In computing, a catalog is a directory of information about
data sets, files, or a database.
· cathode -
A cathode is the metallic electrode through which current
flows out in a polarized electrical device.
· cellular
automaton (CA) - A cellular automaton (CA) is a collection
of cells arranged in a grid, such that each cell changes state as a
function of time according to a defined set of rules that includes the
states of neighboring cells.
· certification -
In information technology as in other fields such as
teaching, accounting, and acupuncture, certification is a formal
process of making certain that an individual is qualified in terms of
particular knowledge or skills.
· change
management - Change management is a systematic approach
to dealing with the transition or transformation of an organization's
goals, processes or technologies.
· chaos
theory - Chaos theory is the study of nonlinear dynamics, in
which seemingly random events are actually predictable from simple
deterministic equations.
· character -
In information technology, a character is a printable
symbol having phonetic or pictographic meaning and usually forming
part of a word of text, depicting a numeral, or expressing grammatical
punctuation.
· Charles
Babbage - If John von Neumann is the father of modern
computing, then the English mathematician and inventor Charles
Babbage can be considered its grandfather.
· cheat
sheet - A cheat sheet is a piece of paper with information
written down on it that an unethical person might create if they
weren't prepared for a test.
· check
digit (checksum character) - A check digit, also known as a
checksum character, is the number located on the far right side of a
bar code.
· checksum -
A checksum is a value that represents the number of bits
in a transmission message and is used by IT professionals to detect
high-level errors within data transmissions.
· citation
style guides - A number of generally recognized authorities
and organizations offer guidance about how to cite sources when
writing an academic or journalistic paper.
· classical
computing - Classical computing is the typical type of
binary data processing in traditional types of processors including
x86, ARM and other bit based computer systems.
· Claude
Shannon - Claude Elwood Shannon, a mathematician born
in Gaylord, Michigan (U.
· clean
electricity - Clean electricity is electrical power that is free
from voltage spikes and drops.
· clean
install - A clean install is a software installation in which any
previous version is removed.
· clean
room - A clean room (or cleanroom) is an enclosed space in
which airborne particulates, contaminants, and pollutants are kept
within strict limits.
· click -
In Web advertising, a click is an instance of a user pressing
down (clicking) on a mouse button in an ad space.
· client -
A client is the requesting program or user in a client/server
relationship.
· client-server
model (client-server architecture) - Client-server is a
relationship in which one program (the client) requests a service or
resource from another program (the server).
· clipboard -
A clipboard is a temporary storage area for data that the
user wants to copy from one place to another.
· clock
cycle - In a computer, the clock cycle is the time between two
adjacent pulses of the oscillator that sets the tempo of the computer
processor.
· clock
speed - In a computer, clock speed refers to the number of
pulses per second generated by an oscillator that sets the tempo for the
processor.
· Clonezilla -
Clonezilla is a free open source disk cloning application
based on Debian.
· closed
captions - Closed captions are a text version of the spoken
part of a television, movie, or computer presentation.
· CMYK
(cyan, magenta, yellow, key) - CMYK is a scheme for
combining primary pigments.
· co-branding -
Co-branding is the practice of using multiple brand
names together on a single product or service.
· code
review - Code review is a phase in the computer program
development process in which the authors of code, peer reviewers,
and perhaps quality assurance reviewers get together to review code,
line by line.
· codebase
(code base) - A codebase (sometimes spelled as two words,
code base) is the complete body of source code for a given software
program or application.
· coefficient -
In a mathematical equation, a coefficient is a constant by
which a variable is multiplied.
· cold
backup (offline backup) - Cold backups are ideal for disaster
recovery because they protect important data.
· cold
buffer - In data processing, a cold buffer is a buffer (segment of
computer memory reserved for temporary data storage) that hasn't
been used or accessed recently.
· cold
fusion - Not to be confused with ColdFusion, a software
product, cold fusion is a hypothetical process in which hydrogen
fusion supposedly occurs at room temperature.
· collaborative
robot (cobot) - A collaborative robot, also known as a
cobot, is a robot that is capable of learning multiple tasks so it can
assist human beings.
· combinatorial
logic - Combinatorial logic is a concept in which two
or more input states define one or more output states, where the
resulting state or states are related by defined rules that are
independent of previous states.
· community
computing - Community computing is a resource-
sharing model in which users are provided with free or low-cost
computer and Internet access.
· community
technology center (CTC) - A community technology
center (CTC) is a facility that provides free or low-cost computer
access, and sometimes training, to people lacking the resources to
have a computer in their home.
· compaction -
In a data center, compaction is the reduction or
consolidation of hardware to make better use of physical floor space.
· complex
system - A complex system is an arrangement of a great
number of related but various elements with intricate interconnections.
· compound -
In chemistry, a compound is a substance that results
from a combination of two or more different chemical elements, in
such a way that the atoms of the different elements are held together
by chemical bonds that are difficult to break.
· compute-intensive -
Compute-intensive is a term that applies to any
computer application that demands a lot of computation, such as
meteorology programs and other scientific applications.
· computer -
A computer is a device that accepts information (in the
form of digitalized data) and manipulates it for some result based on
a program, software, or sequence of instructions on how the data is to
be processed.
· computer
forensics (cyber forensics) - Computer forensics is the
application of investigation and analysis techniques to gather and
preserve evidence from a particular computing device in a way that is
suitable for presentation in a court of law.
· computer
hardware - Computer hardware is a collective term used
to describe any of the physical components of an analog or digital
computer.
· computer
hardware chart - This handy computer hardware quick
look-up was designed by Sonic84.
· Computer
History Museum - The Computer History Museum is an
institution dedicated to the preservation of artifacts and information
related to the development of computers.
· computer
operator - A computer operator is the person responsible
for monitoring and controlling computer systems especially
mainframe computer systems in a company or organization.
· computer
pidgin language (CPL) - Computer pidgin language
(CPL) is an artificial language designed to facilitate speech
recognition between humans and computers.
· computer
room air conditioning unit (CRAC) - A computer room
air conditioning (CRAC) unit is a device that monitors and maintains
the temperature, air distribution and humidity in a network room or
data center.
· computer-based
training (CBT) - Computer-based training (CBT)
is any course of instruction whose primary means of delivery is a
computer.
· computer-intensive -
Computer-intensive is a term that applies to
any computing application that requires the resources of a lot of
computers, such as grid computing.
· concatenation
(concatenate, concatenating) - Concatenation (from
Latin concatenare, to link together) is taking two or more separately
located things and placing them side-by-side next to each other so that
they can now be treated as one thing.
· concurrent
processing - Concurrent processing is a computing
model in which multiple processors execute instructions
simultaneously for better performance.
· configuration -
Generally, a configuration is the arrangement - or the
process of making the arrangement - of the parts that make up a
whole.
· connection -
In telecommunication and computing in general, a
connection is the successful completion of necessary arrangements so
that two or more parties (for example, people or programs) can
communicate at a long distance.
· connectionless -
In telecommunication, connectionless describes
communication between two network end points in which a message
can be sent from one end point to another without prior arrangement.
· conservation
of angular momentum - Conservation of angular
momentum is a physical property of a spinning system such that its
spin remains constant unless it is acted upon by an external torque; put
another way, the speed of rotation is constant as long as net torque is
zero.
· contact
center - A contact center -- also referred to as a customer
interaction center or e-contact center -- is a central point from which
all customer interactions across various channels are managed.
· container
(disambiguation) - This page explains how the term
container is used in software development, storage, data center
management and mobile device management.
· content - Many people agree that on the World Wide Web, "content
is King.
· content
aggregator - A content aggregator is an individual or
organization that gathers Web content (and/or sometimes applications)
from different online sources for reuse or resale.
· content
filtering (information filtering) - On the Internet, content
filtering (also known as information filtering) is the use of a program
to screen and exclude from access or availability Web pages or e-mail
that is deemed objectionable.
· contiguous -
Contiguous describes two or more objects that are
adjacent to each other.
· continuation
symbol - The continuation symbol is used to indicate
extension of a sequence or set, or to imply the existence of
intermediate elements in a sequence or set.
· continuous
data protection (storage convergence) - Continuous
data protection (CDP), also called continuous backup, is a storage
system in which all the data in an enterprise is backed up whenever
any change is made.
· controller -
A controller, in a computing context, is a hardware
device or a software program that manages or directs the flow of data
between two entities.
· cool -
On the World Wide Web, cool has a number of meanings,
including:EngagingLaid-back, understatedIn tune with the latest
thinking, even a little ahead of itTechnically or graphically
impressiveThe term "cool" seems to have originated among jazz
musicians in the 1940s.
· Coordinated
Universal Time (UTC, GMT, CUT) - Coordinated
Universal Time (abbreviated as UTC, and therefore often spelled out
as Universal Time Coordinated and sometimes as Universal
Coordinated Time) is the standard time common to every place in the
world.
· coordinates -
Coordinates are distances or angles, represented by
numbers, that uniquely identify points on surfaces of two dimensions
(2D) or in space of three dimensions (3D).
· coprocessor -
A coprocessor is a special set of circuits in a
microprocessor chip that is designed to manipulate numbers or
perform some other specialized function more quickly than the basic
microprocessor circuits could perform the same task.
· copyleft -
Copyleft is the idea and the specific stipulation when
distributing software that the user will be able to copy it freely,
examine and modify the source code, and redistribute the software to
others (free or priced) as long as the redistributed software is also
passed along with the copyleft stipulation.
· corollary -
A corollary is a statement that follows naturally from
some other statement that has either been proven or is generally
accepted as true.
· COTS,
MOTS, GOTS, and NOTS - COTS, MOTS, GOTS, and
NOTS are abbreviations that describe pre-packaged software or
hardware purchase alternatives.
· counting
board - Historically, a counting board was a portable flat
surface, usually of wood or stone, on which a user placed objects such
as pebbles or beads for the purpose of maintaining a count of
something.
· Cray
Inc. - Cray Inc. is a pioneering computer company that was
founded as Cray Research in 1972 by Seymour Cray, who is known as
the father of the supercomputer.
· cross
section - A cross section is a cut through something (such as a
coaxial cable) at an angle perpendicular to its axis in order to view its
interior structure.
· crumb -
In computers, crumb is jargon for two bits (that is, two
binary digits).
· cryptographic
nonce - A nonce is a random or semi-random number
that is generated for a specific use, typically related to cryptographic
communication or information technology.
· cryptography -
Cryptography is a method of protecting information
and communications through the use of codes so that only those for
whom the information is intended can read and process it.
· cumulative
trauma disorder (CTD) - In information technology,
cumulative trauma disorder (CTD) refers to any of several physical
problems that can result from improper or excessive use of a computer
display or terminal.
· cursor -
A cursor is the position indicator on a computer display
screen where a user can enter text.
· customer
data integration (CDI) - Customer data integration (CDI)
is the process of defining, consolidating and managing customer
information across an organization's business units and systems to
achieve a "single version of the truth" for customer data.
· customer
lifecycle - In customer relationship management (CRM),
customer lifecycle is a term used to describe the progression of steps a
customer goes through when considering, purchasing, using and
maintaining loyalty to a product or service.
· customer-facing -
Customer-facing is an adjective used to describe a
hardware or software product, technology, or anything that the
customer of a business deals with directly.
· cyber -
Cyber is a prefix used to describe a person, thing, or idea as
part of the computer and information age.
· cyberburger
joint - A cyberburger joint is a fast-food restaurant that
provides Internet access at a computer to its customers.
· cybercafe -
A cybercafe is a cafe, coffee or espresso shop, or similar
food and/or beverage-serving place that has a number of personal
computers connected to the Internet and available for use by
customers.
· cyberextortion -
Cyberextortion is a crime involving an attack or
threat of an attack coupled with a demand for money or some other
response in return for stopping or remediating the attack.
· cyberpicketing -
Cyberpicketing is the use of the Internet to protest a
corporation or other institution's wages, work conditions, products,
environmental policy, or other issues.
· cyberpunk -
Cyberpunk is a sensibility or belief that a few outsiders,
armed with their own individuality and technological capability, can
fend off the tendencies of traditional institutions to use technology to
control society.
· cyberstalking -
Cyberstalking is a crime in which the attacker
harasses a victim using electronic communication, such as e-mail or
instant messaging (IM), or messages posted to a Web site or a
discussion group.
· D -
D is one of two programming languages, Digital Mars D, an
object-oriented metaprogramming language, or Microsoft D, a key
component of the upcoming Oslo development environment.
· dark
energy (quintessence) - Dark energy, also called quintessence,
is a mysterious energy or force that has been postulated by
astronomers and cosmologists to explain recent observations
suggesting that the universe is expanding at an ever-increasing rate of
speed.
· DAT
(Digital Audio Tape) - DAT (Digital Audio Tape) is a standard
medium and technology for the digitalrecording of audioon tape at a
professional level of quality.
· data -
In computing, data is information that has been translated into
a form that is efficient for movement or processing.
· data
center - A data center (or datacenter) is a facility composed of
networked computers and storage that businesses and other
organizations use to organize, process, store and disseminate large
amounts of data.
· data
classification - Data classification is the process of organizing
data into categories that make it is easy to retrieve, sort and store for
future use.
· data
compression - Data compression is a reduction in the number of
bits needed to represent data.
· data
glove - A data glove is an interactive device, resembling a glove
worn on the hand, which facilitates tactile sensing and fine-motion
control in robotics and virtual reality.
· data
in motion - Data in motion, also referred to as data in transit or
data in flight, is digital information that is in the process of being
transported between locations within or between computer systems.
· data
restore - Data restore is the process of copying backup data
from secondary storage and restoring it to its original location or a
new location.
· data
set - A data set is a collection of data that contains individual
data units organized (formatted) in a specific way and accessed by one
or more specific access methods based on the data set organization
and data structure.
· data
storage - Data storage is the collective methods and
technologies that capture and retain digital information on
electromagnetic, optical or silicon-based storage media.
· data
streaming - Data streaming is the continuous transfer of data at
a steady, high-speed rate.
· data
structure - A data structure is a specialized format for
organizing, processing, retrieving and storing data.
· data
transfer rate (DTR) - Data transfer rate (DTR) is the amount of
digital data that is moved from one place to another in a given time.
· de
facto standard - A de facto standard is something that is used so
widely that it is considered a standard for a given application although
it has no official status.
· de
jure standard - A de jure standard is a technology, method or
product that has been officially endorsed for a given application.
· deadlock -
A deadlock is a situation in which two computer
programs sharing the same resource are effectively preventing each
other from accessing the resource, resulting in both programs ceasing
to function.
· decimal -
Decimal is a term that describes the base-10 number
system, probably the most commonly used number system.
· decoupled
architecture - In general, a decoupled architecture is a
framework for complex work that allows components to remain
completely autonomous and unaware of each other.
· default -
In computer technology, a default (noun, pronounced dee-
FAWLT) is a predesigned value or setting that is used by a computer
program when a value or setting is not specified by the program user.
· defragmentation -
Defragmentation is the process of locating the
noncontiguous fragments of data into which a computer file may be
divided as it is stored on a hard disk, and rearranging the fragments
and restoring them into fewer fragments or into the whole file.
· demographics -
Demographics is the study of the behaviors and
other characteristics of groups of human beings in terms of statistics.
· Department
of Space (India) - The Department of Space (DoS) is a
department created by the Indian government to manage their space
program and oversee a number of related agencies and institutes.
· deploy -
To deploy (from the French deployer) is "to spread out or
arrange strategically.
· depository -
A depository is a file or set of files in which data is
stored for the purpose of safekeeping or identity authentication.
· deprecated -
In dictionaries, deprecated is a term used to indicate a
pronunciation or usage that is acknowledged but discouraged.
· design
by committee - Design by committee is a term sometimes
used to describe a design that is flawed because too many people
provided input.
· desktop -
A desktop is a computer display area that represents the
kinds of objects one might find on top of a physical desk, including
documents, phone books, telephones, reference sources, writing and
drawing tools, and project folders.
· desktop
supercomputer (personal supercomputer) - A desktop
supercomputer, also called a personal supercomputer, is a term that is
used to describe any exceptionally powerful computer that can be
placed at a single workstation.
· desktop
theme - A desktop theme is a customized graphical user
interface (GUI) that replaces a computer's ordinary sounds, icons,
pointer, wallpaper or screensaver with something designed to reflect
the interests of the user.
· Difference
Engine - The Difference Engine, designed in the 1820s
by the English mathematician and inventor Charles Babbage, was
intended to automatically compute mathematical tables which, until
that time, had been tediously calculated by hand and were prone to
error.
· digit -
A digit is an element of a set that, taken as a whole, comprises
a system of numeration.
· digital
accessibility - Digital accessibility is the ability of a website,
mobile application or electronic document to be easily navigated and
understood by a wide range of users, including those users who have
visual, auditory, motor or cognitive disabilities.
· digital
cash (eCash) - Digital cash is a system of purchasing cash
credits in relatively small amounts, storing the credits in your
computer, and then spending them when making electronic purchases
over the Internet.
· digital
divide - The term 'digital divide' describes the fact that the
world can be divided into people who do and people who don't have
access to - and the capability to use - modern information technology,
such as the telephone, television, or the Internet.
· digital
library - A digital library is a collection of documents in
organized electronic form, available on the Internet or on CD-ROM
(compact-disk read-only memory) disks.
· digital
modeling and fabrication - Digital modeling and fabrication
is a design and production process that marries 3-D modeling or
computing-aided design (CAD) software with additive and subtractive
manufacturing.
· digital
printing - Digital printing describes the process of
transferring a document on a personal computer or other digital
storage device to a printing substrate by means of a device that
accepts text and graphic output.
· digitization -
Digitization is the process of converting information
into a digital format.
· digizine -
A digizine is a magazine that is delivered in digital
(electronic form) on an electronic medium, such as a CD-ROM.
· Dilbert -
Dilbert is a cartoon strip about the workplace that has a
wide following among millions of corporate and other workers in the
United States.
· Direct
Memory Access (DMA) - Direct Memory Access (DMA) is a
capability provided by some computer bus architectures that allows
data to be sent directly from an attached device (such as a disk drive)
to the memory on the computer's motherboard.
· direct-attached
storage (DAS) - Direct-attached storage (DAS) is
computer storage that is connected to one computer and not accessible
to other computers.
· directory -
A directory is, in general, an approach to organizing
information, the most familiar example being a telephone directory.
· disaster
recovery plan (DRP) - A disaster recovery plan (DRP) is a
documented, structured approach that describes how an organization
can quickly resume work after an unplanned incident.
· discrete -
Discrete (pronounced dihs-KREET, from the Latin
discretus and perhaps discernere, meaning to separate) is an adjective
meaning separate and distinct.
· disintermediation -
Disintermediation is giving the user or the
consumer direct access to information that otherwise would require a
mediator, such as a salesperson, a librarian, or a lawyer.
· disk-to-disk-to-tape
(D2D2T) - Disk-to-disk-to-tape (D2D2T) is an
approach to computer storage backup and archiving in which data is
initially copied to backup storage on a disk and then later on copied
again to tape.
· display
modes - The term display mode refers to the characteristics
of a computer display, in particular the maximum number of colors
and the maximum image resolution (in pixels horizontally by pixels
vertically).
· disruptive
technology - A disruptive technology is one that displaces
an established technology and shakes up the industry or a ground-
breaking product that creates a completely new industry.
· distance
learning (e-learning) - Distance learning, sometimes called
e-learning, is a formalized teaching and learning system specifically
designed to be carried out remotely by using electronic
communication.
· distributed -
Computing is said to be "distributed" when the
computer programming and data that computers work on are spread
out over more than one computer, usually over a network.
· distribution -
In marketing, distribution is the process of moving a
product from its manufacturing source to its customers.
· dithering -
Dithering is the attempt by a computer program to
approximate a color from a mixture of other colors when the required
color is not available.
· document -
In general, a document (noun) is a record or the
capturing of some event or thing so that the information will not be
lost.
· Document
Type Definition (DTD) - A Document Type Definition
(DTD) is a specific document defining and constraining definition or
set of statements that follow the rules of the Standard Generalized
Markup Language (SGML) or of the Extensible Markup Language
(XML), a subset of SGML.
· DOS
(Disk Operating System) - DOS (Disk Operating System) can
refer to a computer operating system that is loaded from a disk drive
or to an operating system based on Microsoft Disk Operating System
(MS-DOS).
· dot
product (scalar product) - The dot product, also called the
scalar product, of two vectors is a number (scalar quantity) obtained
by performing a specific operation on the vector components.
· double
factorial - The double factorial, symbolized by two
exclamation marks (!!), is a quantity defined for all integers greater
than or equal to -1.
· double-slit
experiment - The double-slit experiment is a nineteenth-
century investigation into the properties of light that has since been
found to demonstrate both the duality of photons and the concepts of
superposition and quantum interference.
· downsizing -
In a business enterprise, downsizing is reducing the
number of employees on the operating payroll.
· drilldown -
As currently used in information technology, to drill
down (verb) is to focus in on something.
· DRY
principle - The DRY (don't repeat yourself) principle is a best
practice in software development that recommends software engineers
to do something once, and only once.
· duh -
In general, duh (pronounced DUH, prolonging the UH,
pitching the voice a bit low, and inflecting it with an intonation of
imbecility or sarcasm or both, depending on the usage) is a colloquial
comment on one's (or someone else's) lack of knowledge or brain
power.
· duty
cycle - Duty cycle is the proportion of time during which a
component, device, or system is operated.
· dynamic
and static - In general, dynamic means energetic, capable
of action and/or change, or forceful, while static means stationary or
fixed.
· Dynamic
Data Exchange (DDE) - In the Windows, OS/2, and (with
third-party development kits) other operating systems, Dynamic Data
Exchange (DDE) allows information to be shared or communicated
between programs.
· e-inclusion -
E-inclusion is a social movement whose goal is to end
the digital divide, a term used to describe the fact that the world can
be divided into people who do and people who don't have access to -
and the capability to use - modern information technology (IT).
· e-tailing
(electronic retailing) - E-tailing (less frequently: etailing) is
the selling of retail goods on the Internet.
· e-thrombosis -
E-thrombosis is a newly recognized variant of deep
venous thrombosis (DVT) caused by sitting at a computer for long
periods of time.
· early
adopter - An early adopter is a person who embraces new
technology before most other people do.
· Earth's
mean orbital speed - Earth's mean orbital speed is the
average speed at which the Earth revolves around the sun.
· Easter
Egg - An Easter Egg is an unexpected surprise -- an
undocumented procedure or unauthorized feature that's playful in
nature or gives credit to the software developer or chip designer.
· edu -
edu is one of the top-level domain names that can be used when
choosing a domain name.
· edutainment -
Edutainment is a neologism (new term coinage),
similar to infotainment, that expresses the marriage of education and
entertainment in a work or presentation such as a television program
or a Web site.
· egosurfing -
Egosurfing is looking to see how many places on the
Web your name appears.
· electronic
discovery (e-discovery or ediscovery) - Electronic
discovery (also called e-discovery or ediscovery) refers to any process
in which electronic data is sought, located, secured, and searched with
the intent of using it as evidence in a civil or criminal legal case.
· electronic
newspaper - An electronic newspaper is a self-contained,
reusable, and refreshable version of a traditional newspaper that
acquires and holds information electronically.
· electronic
nose (e-nose) - An electronic nose (e-nose) is a device that
identifies the specific components of an odor and analyzes its
chemical makeup to identify it.
· electronic
resume - An electronic resume is a plain text (ASCII),
PDF or HTML document that provides an employer with information
regarding a job candidate's professional experience, education and job
qualifications and is meant to be read by a computer program instead
of by a human being.
· elegant
solution - The word elegant, in general, is an adjective
meaning of fine quality.
· email -
Email (electronic mail) is the exchange of computer-stored
messages by telecommunication.
· embedded
system - An embedded system is a combination of
computer hardware and software, either fixed in capability or
programmable, designed for a specific function or functions within a
larger system.
· enantiomorph -
An enantiomorph (pronounced en-ANT-i-o-morf) is
a mirror image of something, an opposite reflection.
· encoding
and decoding - Encoding is the process of putting a
sequence of characters (letters, numbers, punctuation, and certain
symbols) into a specialized digital format for efficient transmission or
transfer.
· end
user - In information technology, the term end user is used to
distinguish the person for whom a hardware or software product is
designed from the developers, installers, and servicers of the product.
· ENIAC -
ENIAC (Electronic Numerical Integrator And Computer)
was the world’s first general-purpose computer.
· entanglement -
Entanglement is a term used in quantum theory to
describe the way that particles of energy/matter can become correlated
to predictably interact with each other regardless of how far apart they
are.
· enterprise -
In the computer industry, an enterprise is an organization
that uses computers.
· enterprise
architecture (EA) - An enterprise architecture (EA) is a
conceptual blueprint that defines the structure and operation of an
organization.
· entity -
In general, an entity (pronounced N-tih-tee) is an existing or
real thing.
· entrepreneur
(entrepreneurship) - An entrepreneur is an individual
who identifies a need in the marketplace and works to fulfill it.
· enviromatics
(environmental informatics) - Enviromatics is the use
of computer modeling to analyze the Earth's environment and to
predict future trends.
· environment -
In computers, the term environment when unqualified
usually refers to the combination of hardware and software in a
computer.
· ergonomics -
Ergonomics (from the Greek word "ergon" meaning
work, and "nomoi" meaning natural laws), is the science of refining
the design of products to optimize them for human use.
· euro -
The euro (pronounced YUR-oh) is now the official monetary
unit of 12 member nations of the European Union.
· event -
An event, in a computing context, is an action or occurrence
that can be identified by a program and has significance for system
hardware or software.
· event
handler - An event handler is a callback routine that operates
asynchronously and handles inputs received into a program.
· executable -
In computers, to execute a program is to run the
program in the computer, and, by implication, to start it to run.
· EXL
Service (EXL Services) - EXL Service, also known as EXL
Services (NASDAQ: EXLS), provides business process outsourcing
services to global corporations.
· expanded
memory - Expanded memory, also know as EMS
(Expanded Memory Specification) was a method used to increase the
640KB upper limit of MS-DOS to 1MB using a gated memory riser
card.
· exponent -
An exponent is a quantity representing the power to
which some other quantity is raised.
· exponential
assembly - In nanotechnology, exponential assembly is
a form of self-replication in which tiny devices called nanorobots
repeatedly construct copies of themselves.
· exponential
function - An exponential function is a mathematical
function of the following form:f (x) = a xwhere x is a variable, and a
is a constant called the base of the function.
· extended
memory - Extended memory, also known as XMS
(eXtended Memory Specification) is a technology that enables
capacity above the 640KB standard MS-DOS limit of main memory.
· extension -
In computer operating systems, a file name extension is
an optional addition to the file name in a suffix of the form ".
· eye
candy - Eye candy is a term used in information technology for
visual elements displayed on computer monitors that are aesthetically
appealing or attention-compelling.
· fabric -
In information technology, fabric is a synonym for the words
framework or platform.
· factorial -
The factorial, symbolized by an exclamation mark (!), is a
quantity defined for all integers greater than or equal to 0.
· failover -
Failover is a backup operational mode in which the
functions of a system component (such as a processor, server,
network, or database, for example) are assumed by secondary system
components when the primary component becomes unavailable
through either failure or scheduled down time.
· fair
use - Fair use is a legal concept that allows the reproduction of
copyrighted material for certain purposes without obtaining
permission and without paying a fee or royalty.
· falsifiability -
Falsifiability is the capacity for some proposition,
statement, theory or hypothesis to be proven wrong.
· Fast
Guide to Helpful Tips - Explore the categories below for
recently submitted and archived tips.
· fault-tolerant -
Systems with integrated fault tolerance are designed
to withstand multiple hardware failures to ensure continuous
availability.
· FCC
(Federal Communications Commission) - The FCC (Federal
Communications Commission) is the government body responsible
for maintaining laws, censorship and broadcast licensing pertaining to
interstate and international communications in the United States.
· FDISK - WARNING: Use caution when repartitioning a hard disk
drive that contains data.
· feature
creep - Feature creep (sometimes known as requirements
creep or scope creep) is a tendency for product or project requirements
to increase during development beyond those originally foreseen,
leading to features that weren't originally planned and resulting risk to
product quality or schedule.
· femtosecond -
A femtosecond is one millionth of a nanosecond or 10
-15 of a second and is a measurement sometimes used in laser
technology.
· Fermat
prime - A Fermat prime is a Fermat number that is also a
prime number.
· ferret -
In a computer or a network, a ferret is a program that
searches through selected files, databases, or search engine indexes for
information that meets specified search criteria.
· field -
A field is an area in a fixed or known location in a unit of data
such as a record, message header, or computer instruction that has a
purpose and usually a fixed size.
· file
format - In a computer, a file format is the layout of a file in
terms of how the data within the file is organized.
· file
transfer - File transfer is the movement of one or more files from
one location to another.
· Finacle -
Finacle is a core banking suite developed and marketed by
India's Infosys Technologies.
· finite
state machine - Finite state machine (FSM) is a term used by
programmers, mathematicians and other professionals to describe a
mathematical model for any system with a limited number of
conditional states of being.
· firehose
effect - A firehose effect occurs in a network when the
source (transmitting) computer or terminal sends data too fast for a
destination (receiving) computer or terminal to deal with it.
· first
call resolution (FCR) - In customer relationship management
(CRM), first call resolution is properly addressing the customer's need
the first time they call, thereby eliminating the need for the customer
to follow up with a second call.
· first-order
logic - First-order logic is symbolized reasoning in which
each sentence, or statement, is broken down into a subject and a
predicate.
· flash
memory card - Flash storage memory cards use nonvolatile
semiconductor memory to store pictures, audio and video data on
portable and remote devices.
· flash
storage - Flash storage is any type of drive, repository or
system that uses flash memory to keep data for an extended period of
time.
· flat
address space - 1. A flat address space is a set of addresses
arranged on a single level.
· flexography
(surface printing) - Flexography, sometimes referred to
as "surface printing," is a method commonly used for printing on
packaging and other uneven surfaces.
· FLOPS
(floating-point operations per second) - In computers,
FLOPS are floating-point operations per second.
· flowchart -
A flowchart is a formalized graphic representation of a
logic sequence, work or manufacturing process, organization chart, or
similar formalized structure.
· fnord -
Certain words are intended to be undefinable and "fnord" is
one of them.
· folder -
In the Windows, Macintosh, and some other operating
system s, a folder is a named collection of related files that can be
retrieved, moved, and otherwise manipulated as one entity.
· Foo
Camp - Foo Camp was a gathering of about 200 computer and
Internet thinkers and inventors who were invited by publisher O'Reilly
and Associates to spend a week-end brainstorming, collaborating, and
otherwise advancing progress in information technology.
· footprint -
In information technology, a footprint is the amount of
space a particular unit of hardware or software occupies.
· forensic -
Forensic, in a general sense, means "related to or used in
courts of law" or "used for formal public debate or discussion.
· form
factor - In computers, the form factor is the size, configuration,
or physical arrangement of a computing device.
· format -
A format (noun, pronounced FOHR-mat ) is a
preestablished layout for data.
· Fourier
analysis - Fourier analysis is a method of defining periodic
waveforms in terms of trigonometric function s.
· Fourier
series - A Fourier (pronounced foor-YAY) series is a
specific type of infinite mathematical series involving trigonometric
functions.
· foxed -
A fan club Web site can be said to have been "foxed" when it
has received a letter of warning about copyright violations from the
owners of images or other copyrighted material it is using.
· FQA(frequently questioned answers) - FQA (frequently
questioned answers) are conventions or mandates scrutinized by
individuals or groups who doubt their validity.
· fragmentation -
In some operating system's file systems, a data file
over a certain size is stored in several "chunks" or fragments rather
than in a single contiguous sequence of bits in one place on the
storage medium, a process that is called fragmentation.
· framing
effect - Framing effect is a form of cognitive bias which
causes people to focus more on the positive or negative aspects of a
decision, situation or information based on the way it is presented.
· free
software - Free software is software that can be freely used,
modified, and redistributed with only one restriction: any redistributed
version of the software must be distributed with the original terms of
free use, modification, and distribution (known as copyleft).
· freeware -
Freeware (not to be confused with free software) is
programming that is offered at no cost and is a common class of small
applications available for downloading and use in most operating
systems.
· FUD
(Fear, Uncertainty, and Doubt) - FUD (Fear, Uncertainty, and
Doubt) is the term for any strategy intended to make a company's
customers insecure about future product plans with the purpose of
discouraging them from adopting competitors' products.
· full-stack
developer - A full-stack developer is a type of programmer
that has a functional knowledge of all techniques, languages and
systems engineering concepts required in software development.
· function -
In information technology, the term function (pronounced
FUHNK-shun) has a number of meanings.
· functionality -
In information technology, functionality (from Latin
functio meaning "to perform") is the sum or any aspect of what a
product, such as a software application or computing device, can do
for a user.
· Furby -
Furby (pronounced FURR-bee) is the name of an electronic
toy, five inches tall, that is covered with simulated fur, has big eyes
and ears, a vocabulary of over 200 words, and a limited ability to react
to its environment.
· futzing
(or futzing around) - Futzing or "futzing around" is
unstructured, playful, often experimental interaction between a human
being and a computer, product, or any technology, sometimes but not
always with a productive purpose in mind.
· fuzzy
number - A fuzzy number is a quantity whose value is
imprecise, rather than exact as is the case with "ordinary" (single-
valued) numbers.
· fuzzy
search - A fuzzy search is a process that locates Web pages
that are likely to be relevant to a search argument even when the
argument does not exactly correspond to the desired information.
· game
theory - Game theory is the study of mathematical models of
negotiation, conflict and cooperation between individuals,
organizations and governments.
· garbage -
In computers, garbage has two related meanings: From a
user's perceptual point-of-view, garbage is often used to mean
anything on your display screen that looks unreadable or unviewable.
· geek -
In computers and the Internet, a geek is a person who is
inordinately dedicated to and involved with technology.
· geekosphere -
The geekosphere is the physical ambiance around you
and your workstation.
· general-purpose
computer - A general-purpose computer is one
that, given the appropriate application and required time, should be
able to perform most common computing tasks.
· genetic
engineering - Genetic engineering is the deliberate,
controlled manipulation of the genes in an organism with the intent of
making that organism better in some way.
· geocaching
(GPS stash hunting) - Geocaching, also referred to as
GPS stash hunting, is a recreational activity in which someone
"buries" something for others to try to find using a Global Positioning
System (GPS) receiver.
· George
Boole - George Boole (1815-1864) was a British
mathematician and is known as the founder of mathematical logic.
· geospatial
analysis - Geospatial analysis is the gathering, display,
and manipulation of imagery, GPS, satellite photography and
historical data, described explicitly in terms of geographic coordinates
or implicitly, in terms of a street address, postal code, or forest stand
identifier as they are applied to geographic models.
· ghost
site - A ghost site is a Web site that is no longer maintained but
that remains available for viewing.
· gibibyte
(GiB) - A gibibyte (GiB) is a unit of measure of capacity
used in computing.
· gigabit -
In data communications, a gigabit is one billion bits, or
1,000,000,000 (that is, 10^9) bits.
· gigaflop -
As a measure of computer speed, a gigaflop is a billion
floating-point operations per second (FLOPS).
· glass
house - Glass house is a term for centralized computing in an
enterprise and the mindset of those who plan and administer it.
· glitch -
In several usages in information technology, a glitch
(pronounced GLIHTCH) is a sudden break in function or continuity,
sometimes of a transient nature, with a varying degree of seriousness.
· globbing -
Globbing is the process of expanding a non-specific file
name containing a wildcard character into a set of specific file names
that exist in storage on a computer, server, or network.
· glocalization -
Glocalization is the concept that in a global market, a
product or service is more likely to succeed when it is customized for
the locality or culture in which it is sold.
· going
forward - Going forward is a relatively new and apparently
convenient way to indicate a progression in time from the present.
· googol
and googolplex - A googol is 10 to the 100th power (which is
1 followed by 100 zeros).
· Gopher -
From about 1992 through 1996, Gopher was an Internet
application in which hierarchically-organized text files could be
brought from servers all over the world to a viewer on your computer.
· gopherspace -
Gopherspace is a term used to describe the aggregate
of all the information on the thousands of Gopher servers in the world.
· GPGPU
(general purpose graphics processing unit) - A general-
purpose GPU (GPGPU) is a graphics processing unit (GPU) that
performs non-specialized calculations that would typically be
conducted by the CPU (central processing unit).
· GPU
(graphics processing unit) - A graphics processing unit (GPU)
is a computer chip that performs rapid mathematical calculations,
primarily for the purpose of rendering images.
· GPU
supercomputer - A GPU supercomputer is a networked group
of computers with multiple graphics processing units working as
general-purpose GPUs (GPGPUs) in tandem on a single task.
· Grace
Hopper nanosecond - A Grace Hopper nanosecond is a visual
aid that represents how fast electricity can travel in one billionth of a
second.
· gravesite -
In the context of the World Wide Web, a gravesite is
either: A Web site that has been abandoned or forgotten by its
originators that is nevertheless still accessible on a server.
· gravity
(or gravitation) - Gravity, also called gravitation, is a force
that exists among all material objects in the universe, attracting
objects with non-zero mass toward each other.
· gravity
wave (or gravitational wave) - A gravity wave (or
gravitational wave) is a ripple in the curvature of the space-time
continuum (the enmeshed combination of our three perceived physical
dimensions, plus time) created by the movement of matter.
· gravure -
Gravure is a printing method in which an image is applied
to a printing substrate by use of a metal plate mounted on a cylinder.
· gray
goo (or grey goo) - Gray goo (in British spelling, "grey goo") is
a term used to describe what life on our planet might become if self-
replicating robots or nanomachines got out of control and began to use
up life forms for their own energy needs in some unstoppable way.
· greedy
algorithm - A greedy algorithm is a mathematical process
that looks for simple, easy-to-implement solutions to complex, multi-
step problems by deciding which next step will provide the most
obvious benefit.
· Greeking -
Greeking is the use of unreadable dummy text in places
reserved for text when prototyping the design or general layout of
pages in magazines, books, brochures, advertisements, Web pages,
and other visual media.
· gremlin -
A gremlin is an imaginary creature that causes trouble in
devices and systems of all kinds.
· grid
computing - Grid computing uses small, distributed resources
from servers and PCs to solve big problems.
· GUI
(graphical user interface) - A GUI (usually pronounced
"GOO-ee") is a graphical (rather than purely textual) user interface to
a computer.
· gyroscope -
A gyroscope is a device with a spinning disc or wheel
mechanism that harnesses the principle of conservation of angular
momentum: the tendency for the spin of a system to remain constant
unless subjected to external torque.
· H.264
(MPEG-4 AVC) - H.264, also known as MPEG-4 AVC
(Advanced Video Coding), is a video compression standard that offers
significantly greater compression than its predecessors.
· half-life -
In science, a half-life (also, as a noun, spelled half life) is
the amount of time it takes for half of a substance or entity to undergo
some specified process.
· hangup
(or hang) - A hangup, also called a hang, is a condition that
sometimes occurs when computer programs conflict or do not run
properly.
· haptics -
Haptics (pronounced HAP-tiks) is the science of applying
touch (tactile) sensation and control to interaction with computer
applications.
· hard
copy (printout) - A hard copy (or "hardcopy") is a printed copy
of information from a computer.
· hard
drive shredder - A hard drive shredder is a mechanical device
that physically destroys old hard drives in such a way that the data
they contain cannot be recovered.
· hard
error - A hard error is an issue in RAM that results from a
permanent physical flaw in the module caused by a hardware failure
or defect.
· hard
reset (factory reset; master reset) - A hard reset, also known
as a factory reset or master reset, is the restoration of a device, such as
a smartphone or tablet, to its state when it left the factory.
· header -
In information technology, a header is, in general,
something that goes in front of something else and is usually repeated
as a standard part of the units of something else.
· Herman
Hollerith - Born in 1860 in Buffalo, NY, Herman Hollerith
was the creator of the Hollerith Electric Tabulating System, the
ancestor to computers as we know them today.
· heterogeneous -
Heterogeneous (pronounced HEH-tuh-roh-DJEEN-
ee-uhs, from the Greek heteros or "other" and genos or "kind") is the
characteristic of containing dissimilar constituents.
· heuristic -
As an adjective, heuristic (pronounced hyu-RIS-tik and
from the Greek "heuriskein" meaning "to discover") pertains to the
process of gaining knowledge or some desired result by intelligent
guesswork rather than by following some preestablished formula.
· hibernation -
Hibernation is a mode in which a computer is turned
off but saves its state to resume when it is turned on again.
· hiccup -
In information technology, hiccup is an informal term for a
non-recurring problem of indeterminate cause that usually does not
cause a significant disruption of work or activity.
· hierarchy -
A hierarchy is an organizational structure in which items
are ranked according to levels of importance.
· histogram -
A histogram is a display of statistical information that
uses rectangles to show the frequency of data items in successive
numerical intervals of equal size.
· holographic
print - A holographic print is a rendition of a hologram
on a flat surface, producing 3-D (three-dimensional) effects when
viewed.
· holographic storage (holostorage) - Holographic storage is
computer storage that uses laser beams to store computer-generated
data in three dimensions.
· home
server - A home server is a computer that functions as a server
in a client-server home network.
· host
(in computing) - A host (also known as "network host") is a
computer or other device that communicates with other hosts on a
network.
· hotfix -
A hotfix is code (sometimes called a patch) that fixes a bug
in a product.
· htm -
htm is sometimes used as a short form of the file name suffix
for an HTML file.
· hybrid
application (hybrid app) - A hybrid application (hybrid app)
is one that combines elements of both native and Web applications.
· hyper -
As an adjective, hyper is slang for "keyed up" or
"overwrought.
· hyperspace -
Hyperspace is a term that describes the total number of
individual locations and all of their interconnections in a hypertext
environment.
· hypervisor -
A hypervisor is a function that abstracts -- isolates --
operating systems (OSes) and applications from the underlying
computer hardware.
· hypothesis -
A hypothesis (plural: hypotheses) is a statement that
may be tested and proven to be either true or false.
· hysteresis -
Hysteresis is the tendency for a system to change or react
based on a trend of how it has already transformed leading up to a
specific point in time.
· identity
management (ID management) - Identity management (ID
management) is the organizational process for identifying,
authenticating and authorizing individuals or groups of people to have
access to applications, systems or networks by associating user rights
and restrictions with established identities.
· image
compression - Image compression is minimizing the size in
bytes of a graphics file without degrading the quality of the image to
an unacceptable level.
· image
of the early universe - An image of the early universe,
showing irregularities in its brightness 380,000 years after its birth,
has been produced by a device called the Wilkinson Microwave
Anisotropy Probe (WMAP).
· imaginary
number - An imaginary number is a quantity of the form
ix, where x is a real number and i is the positive square root of -1.
· IMHO
(in my humble opinion) - Like FYI (for your information),
IMHO (in my humble opinion) is an abbreviation for a phrase
sometimes used in online chatting and e-mail.
· implementation -
Implementation is the execution of any idea,
model, or method; in IT, it refers to the process of setting up new
software or hardware after a purchase is made.
· Incompleteness
Theorem - The Incompleteness Theorem is a pair of
logical proofs that revolutionized mathematics.
· increment -
An increment is a small, unspecified, nonzero change in
the value of a quantity.
· incubator -
In the business world, an incubator is an enterprise that is
set up to provide office space, equipment, and sometimes mentoring
assistance and capital to new businesses that are just getting started.
· indemnification -
In service level agreements (SLAs) and other legal
contracts such as end-user license agreements (EULAs),
indemnification is the part of an agreement that provides for one party
to bear the monetary costs, either directly or by reimbursement, for
losses incurred by a second party.
· indempotency -
Based on our inferences about the only three uses of
this term that we have discovered on the Internet, indempotency
(pronounced ihn-dehm-POH-tuhns-ee, from Latin indemnis or
"unharmed") is the ability to preserve the integrity of a thing or action
no matter how much it is used or accessed by another thing or action.
· industrial
strength - In information technology, industrial strength is
a characteristic sometimes ascribed to a hardware or software product
or a system to describe its ability to work capably and dependably in
the operational world of business.
· inertia -
Inertia is a property of matter that causes it to resist changes
in velocity (speed and/or direction).
· infinite
sequence - An infinite sequence is a list or string of discrete
objects, usually numbers, that can be paired off one-to-one with the
set of positive integers {1, 2, 3,.
· infinity -
In general, infinity is the quality or state of endlessness or
having no limits in terms of time, space, or other quantity.
· infomercial -
On television, an infomercial is a short or regular-
length television program that combines information presentation with
an integrated suggestion to buy a particular product or service.
· infonesia -
Infonesia is an inability to remember where you saw or
heard an item of information.
· information
design - Information design is the detailed planning of
specific information that is to be provided to a particular audience to
meet specific objectives.
· information
technology (IT) - Information technology (IT) is the
use of any computers, storage, networking and other physical devices,
infrastructure and processes to create, process, store, secure and
exchange all forms of electronic data.
· information
theory - Information theory is a branch of mathematics
that overlaps into communications engineering, biology, medical
science, sociology, and psychology.
· infotainment - Infotainment, combining information with
entertainment, is a fairly recent neologism for a television program,
Web site feature, or other presentation that combines information with
entertainment.
· input/output
(I/O) - I/O (input/output), pronounced "eye-oh,"
describes any operation, program, or device that transfers data to or
from a computer.
· instruction -
An instruction is an order given to a computer processor
by a computer program.
· instruction
set - An instruction set is a group of commands for a
CPU in machine language.
· integer -
An integer (pronounced IN-tuh-jer) is a whole number (not
a fractional number) that can be positive, negative, or zero.
· integer
overflow - Integer overflow is the result of trying to place
into computer memory an integer (whole number) that is too large for
the integer data type in a given system.
· integration -
Integration is the act of bringing together smaller
components into a single system that functions as one.
· Intel 8086 - The Intel 8086 was Intel’s first x86 processor.
· intelligent
device - An intelligent device is any type of equipment,
instrument, or machine that has its own computing capability.
· intelligent
system - An intelligent system is a machine with an
embedded, Internet-connected computer that has the capacity to gather
and analyze data and communicate with other systems.
· interactivity -
In computers, interactivity is the dialog that occurs
between a human being (or possibly another live creature) and a
computer program.
· interface -
As a noun, an interface is either:A user interface,
consisting of the set of dials, knobs, operating system commands,
graphical display formats, and other devices provided by a computer
or a program to allow the user to communicate and use the computer
or program.
· interlaced
GIF - An interlaced GIF (Graphics Interchange Format) is
a GIF image that seems to arrive on your display like an image
coming through a slowly-opening Venetian blind.
· intermediary -
In general, an intermediary is a person or service that
is involved as a third party between two or more end points in a
communication or transaction.
· internationalization
(I18N) - Internationalization (sometimes
shortened to "I18N, meaning "I - eighteen letters -N") is the process of
planning and implementing products and services so that they can
easily be adapted to specific local languages and cultures, a process
called localization.
· Internet
problems - Here are:Three rules-of-thumb for dealing with
Internet problemsA table showing the most common codes and
messages you're likely to see on your Web browser (HTTP), when
accessing Usenet, using e-mail, or using the FTP protocol to upload or
download files Three Rules-of-Thumb for Dealing with Internet
ProblemsIf you get a message saying the domain name server (DNS)
can't find your page and you're sure you've typed it in correctly or
clicked on a valid link, try it again - TWO more times! (Sometimes
packets don't get there!)If you get a "Not found" message, the page
may be temporarily missing because of miscoding at the target site.
· interoperability -
Interoperability (pronounced IHN-tuhr-AHP-uhr-
uh-BIHL-ih-tee) is the ability of different systems, devices,
applications or products to connect and communicate in a coordinated
way, without effort from the end user.
· interrupt
latency - Interrupt latency, also called interrupt response
time, is the length of time that it takes for a computer interrupt to be
acted on after it has been generated.
· intersection
symbol - The intersection symbol denotes the
intersection of two sets.
· IPP
(Internet presence provider) - An Internet presence provider
(IPP) is a company that provides the disk space, high-speed Internet
connection, and possibly the Web site design and other services for
companies, organizations, or individuals to have a visible presence
(meaning Web site) on the Internet.
· irrational
number - An irrational number is a real number that
cannot be reduced to any ratio between an integer p and a natural
number q.
· IS
(information system or information services) - An information
system (IS) is the collection of technical and human resources that
provide the storage, computing, distribution, and communication for
the information required by all or some part of an enterprise.
· isotope -
An isotope is a form of a chemical element whose atomic
nucleus contains a specific number of neutron s, in addition to the
number of protons that uniquely defines the element.
· ISRS
(information storage and retrieval system) - An information
storage and retrieval system (ISRS) is a network with a built-in user
interface that facilitates the creation, searching, and modification of
stored data.
· ISV
(independent software vendor) - An ISV (independent
software vendor) makes and sells software products that run on one or
more computer hardware or operating system (OS) platforms.
· IT
Survival Kits - We've gathered a collection of resources to help
you explore an IT topic you might not know much about.
· iterative
development - Iterative development is a way of breaking
down the software development of a large application into smaller
chunks.
· Jack
Kilby - Jack Kilby is generally credited with being the inventor
of the integrated circuit (IC).
· JBoss -
JBoss is a division of Red Hat that provides support for the
JBoss open source application server program and related middleware
services marketed under the JBoss Enterprise Middleware brand.
· job -
In certain computer operating systems, a job is the unit of work
that a computer operator gives to the operating system.
· job
step - In certain computer operating systems, a job step is part of
a job, a unit of work that a computer operator (or a program called a
job scheduler) gives to the operating system.
· John
von Neumann - John von Neumann was the scientist who
conceived a fundamental idea that serves all modern computers - that
a computer's program and the data that it processes do not have to be
fed into the computer while it is working, but can be kept in the
computer's memory - a notion generally referred to as the stored-
program computer.
· jolt -
On the Internet, jolt is a denial of service (DoS) attack caused
by a very large ICMP packet that is fragmented in such a way that the
targeted machine is unable to reassemble it for use.
· K-12 -
K-12, a term used in education and educational technology in
the United States, Canada, and possibly other countries, is a short
form for the publicly-supported school grades prior to college.
· keitai -
Keitai (pronounced k-tie) is a Japanese word meaning
"portable.
· kelvin
(K) - The kelvin (abbreviation K), less commonly called the
degree Kelvin (symbol, o K), is the Standard International (SI) unit of
thermodynamic temperature.
· keyboard
shortcut - A keyboard shortcut is a combination of keys
that, when pressed simultaneously, perform some task that ordinarily
requires use of a mouse or other input device and may take longer to
do.
· kilogram
(kg) - The kilogram (abbreviation, kg) is the Standard
International (SI) System of Units unit of mass.
· kinetic
energy - Kinetic energy is the energy of motion, observable
as the movement of an object, particle, or set of particles.
· kiosk -
A kiosk (pronounced KEE-ahsk ) is a small, free-standing
physical structure that displays information or provides a service.
· KISS
Principle (Keep It Simple, Stupid) - The KISS Principle
(Keep It Simple, Stupid) is self-descriptive and recognizes two things:
1.
· kludge -
In information technology, a kludge (pronounced
KLOOdzh) is an awkward or clumsy (but at least temporarily
effective) solution to a programming or hardware design or
implementation problem.
· knowledge -
In information technology, knowledge is, to an
enterprise or an individual, the possession of information or the ability
to quickly locate it.
· knowledge
base - In general, a knowledge base is a centralized
repository for information: a public library, a database of related
information about a particular subject, and whatis.
· knowledge
worker - A knowledge worker is anyone who works for a
living at the tasks of developing or using knowledge.
· Kryder's
Law - Kryder's Law describes the rate at which former
Seagate CTO Mark Kryder predicted disk drive density would grow.
· lambda -
Lambda, the 11th letter of the Greek alphabet, is the
symbol for wavelength.
· lambda
(general definition) - Lambda, the 11th letter of the Greek
alphabet, is used as a symbol in optical fiber networking, in
mathematics and in computer programming.
· landscape -
In printing from a computer, landscape refers to a mode
in which content is printed for reading on the longer length of the
sheet of paper.
· laser -
A laser is a coherent and focused beam of photons; coherent,
in this context, means that it is all one wavelength, unlike ordinary
light which showers on us in many wavelengths.
· laser
diode (injection laser or diode laser) - A laser diode, also
known as an injection laser or diode laser, is a semiconductor device
that produces coherent radiation (in which the waves are all at the
same frequency and phase) in the visible or infrared (IR) spectrum
when current passes through it.
· latent
data (ambient data) - Latent data, also known as ambient
data, is the information in computer storage that is not referenced in
file allocation tables and is generally not viewable through the
operating system (OS) or standard applications.
· latitude
and longitude - Latitude and longitude are angles that
uniquely define points on a sphere.
· layering -
In computer programming, layering is the organization of
programming into separate functional components that interact in
some sequential and hierarchical way, with each layer usually having
an interface only to the layer above it and the layer below it.
· lead
generation - Lead generation is the use of a computer program,
a database, the Internet, or a specialized service to obtain or receive
information for the purpose of expanding the scope of a business,
increasing sales revenues, looking for a job or for new clients, or
conducting specialized research.
· lean
manufacturing (lean production) - Lean manufacturing is a
methodology that focuses on minimizing waste within manufacturing
systems while simultaneously maximizing productivity.
· learning
curve - Learning curves are a visualization of the difficulty
estimated in learning a subject over a period of time as well as relative
progress throughout the process of learning.
· learning
management system (LMS) - A learning management
system (LMS) is a software application or web-based technology used
to plan, implement and assess a specific learning process.
· Learning
Path: Electronics - So that you can give yourself a quick
tutorial on electronics, we've arranged our definitions in this Learning
Path in a sequence, with more basic building block topics placed at the
beginning.
· legacy
application - A legacy application (legacy app) is a software
program that is outdated or obsolete.
· lemniscate -
A lemniscate is a plane curve with a characteristic
shape, consisting of two loops that meet at a central point as shown
below.
· Leonardo
da Vinci's car - Da Vinci's car is a vehicle developed
from the Renaissance artist/engineer/architect's drawings.
· level
of support (support level) - Level of support indicates a
specific extent of technical assistance in the total range of assistance
that is provided by an information technology product (such as a
software product) to its customers.
· lights-out
management (LOM) - Lights-out management (LOM) is
the ability for a system administrator to monitor and manage servers
by remote control.
· lightweight -
In information technology, the term lightweight is
sometimes applied to a program, protocol, device, or anything that is
relatively simpler or faster or that has fewer parts than something else.
· limit -
In mathematics, a limit is a value toward which an expression
converges as one or more variables approach certain values.
· linearity -
Linearity is the behavior of a circuit, particularly an
amplifier, in which the output signal strength varies in direct
proportion to the input signal strength.
· linkrot -
Linkrot is the tendency of hypertext links from one Web site
to another site to become useless as other sites cease to exist or
remove or reorganize their Web pages.
· Linus
Torvalds - Linus Torvalds, the creator of the Linux kernel,
was born in Helsinki, Finland, on December 28, 1969.
· Linux
freeware and shareware guide - Here you'll find a number of
useful tools that can be used as is or customized to create your own
tools.
· load
balancing - Load balancing is a technique used to distribute
workloads uniformly across servers or other compute resources to
optimize network efficiency, reliability and capacity.
· localization -
Localization (sometimes shortened to "L10n") is the
process of adapting a product or service to a particular language,
culture and desired local "look-and-feel.
· logical
block addressing (LBA) - Logical block addressing is a
technique that allows a computer to address a hard disk larger than
528 megabytes.
· logical
equivalence - Logical equivalence is a type of relationship
between two statements or sentences in propositional logic or Boolean
algebra.
· logical
implication - Logical implication is a type of relationship
between two statements or sentences.
· logical
negation symbol - The logical negation symbol is used in
Boolean algebra to indicate that the truth value of the statement that
follows is reversed.
· logon
(or login) - In general computer usage, logon is the procedure
used to get access to an operating system or application, usually in a
remote computer.
· longitudinal
time code (LTC) - Longitidinal time code (LTC) is a
timing signal that is part of an audio tape recording.
· look-to-book
ratio - The look-to-book ratio is a figure used in the
travel industry that shows the percentage of people who visit a travel
Web site compared to those who actually make a purchase.
· lossless
and lossy compression - Lossless and lossy compression are
terms that describe whether or not, in the compression of a file, all
original data can be recovered when the file is uncompressed.
· lowerCamelCase -
lowerCamelCase (part of CamelCase) is a
naming convention in which a name is formed of multiple words that
are joined together as a single word with the first letter of each of the
multiple words (except the first one) capitalized within the new word
that forms the name.
· Luddite -
A Luddite is a person who dislikes technology, especially
technological devices that threaten existing jobs or interfere with
personal privacy.
· lurking -
Lurking is the very common practice of reading an online
or e-mail discussion without taking part in the discussion.
· LZW
compression - LZW compression is the compression of a file
into a smaller file using a table-based lookup algorithm invented by
Abraham Lempel, Jacob Ziv, and Terry Welch.
· M-theory -
M-theory (the "M" stands for the mother of all theories,
magic, mystery, or matrix, depending on the source) is an adaptation
of superstring theory developed by Ed Witten of Princeton and Paul
Townsend of Cambridge.
· Mac
mini - The Mac mini from Apple is a low-cost and very
compact personal computer that runs the Mac OS X operating system
and is sold without a display, keyboard, or mouse.
· machine
code (machine language) - Machine code, also known as
machine language, is the elemental language of computers.
· Macintosh -
The Macintosh (often called "the Mac") was the first
widely-sold personal computer with a graphical user interface (GUI)
and a mouse.
· magnetic
stripe reader (magstripe reader) - A magnetic stripe
reader, also called a magstripe reader, is a hardware device that reads
the information encoded in the magnetic stripe located on the back of
a plastic badge.
· marcom
(or marcomm) - Marcom (sometimes spelled "marcomm")
is an abbreviation for "marketing communications.
· Master
Boot Record (MBR) - The Master Boot Record (MBR) is
the information in the first sector of any hard disk or diskette that
identifies how and where an operating system is located so that it can
be boot (loaded) into the computer's main storage or random access
memory.
· master/slave -
In computer networking, master/slave is a model for a
communication protocol in which one device or process (known as the
master) controls one or more other devices or processes (known as
slaves).
· Mathematical
Symbols - This table contains mathematical symbols
and links to definitions of what they represent.
· matrix -
Apart from information technology, matrix (pronounced
MAY-triks) has a number of special meanings.
· Mbps
(megabits per second) - Megabits per second (Mbps) are a
unit of measurement for bandwidth and throughput on a network.
· mebibyte
(MiB) - A mebibyte (MiB) is a unit of measurement used
in computer data storage.
· medium -
A medium is a third-party or element through which a
message is communicated.
· megabit -
In data communications, a megabit is a million binary
pulses, or 1,000,000 (that is, 106) pulses (or "bits").
· megabyte
(MB) - As a measure of computer processor storage and
real and virtual memory, a megabyte (abbreviated MB) is 2 to the 20th
power bytes, or 1,048,576 bytes in decimal notation.
· megabytes
per second (MBps) - Megabytes per second (MBps)
describes a unit of data transfer to and from a computer storage
device.
· megatransfer -
On a Small Computer System Interface (SCSI)
computer bus, a megatransfer is one million data transfers.
· meme -
A meme is an idea that is passed on from one human
generation to another.
· memory
read error - A memory read error is a malfunction that
occurs when data is being accessed from memory for use by a
program, or when a value read from RAM fails to match an expected
value.
· Mersenne
prime (or Marsenne prime) - A Mersenne (also spelled
Marsenne) prime is a specific type of prime number.
· message-driven
processing - Message-driven processing is an
approach used within the client/server computing model in which a
client (for example, your Web browser) sends a service request in the
form of a specially-formatted message to a program that acts as a
request broker, handling messages from many clients intended for
many different server applications.
· metabolomics -
Metabolomics is a term sometimes used to describe
the emerging science of measurement and analysis of metabolites,
such as sugars and fats, in the cells of organisms at specific times and
under specific conditions.
· metacharacter -
A metacharacter (sometimes spelled meta character
or meta-character) is a special character in a program or data field that
provides information about other characters.
· metasyntactic
variable - In programming, a metasyntactic (which
derives from meta and syntax) variable is a variable (a changeable
value) that is used to temporarily represent a function.
· meter -
The meter (abbreviation, m; the British spelling is metre) is
the International System of Units (SI) unit of displacement or length.
· meter
per second squared - The meter per second squared
(symbolized m/s 2 or m/sec 2) is the Standard International (SI) unit
of acceleration vector magnitude.
· metered
services (pay-per-use) - Metered services (also called pay-
per-use) is any type of payment structure in which a customer has
access to potentially unlimited resources but only pays for what they
actually use.
· metric
system - The metric system is considered almost synonymous
with the Standard International System of Units (SI) and is sometimes
called the meter-kilogram-second (MKS or mks) system.
· micro
fuel cell - A micro fuel cell is a power source for electronic
devices that converts chemical energy into electrical energy.
· microdata -
Microdata is a type of specification language that is
embedded within HTML content to improve machine readability,
annotate elements and analyze web pages.
· microrobot -
A microrobot is a miniaturized, sophisticated machine
designed to perform a specific task or tasks repeatedly and with
precision.
· microsecond -
A microsecond (us or Greek letter mu plus s) is one
millionth (10 -6) of a second.
· Microsoft
Remote Desktop Web Access (Microsoft RD Web
Access) - Microsoft Remote Desktop Web Access (Microsoft RD
Web Access) is a feature in Windows Server 2008 R2 and Windows
Server 2012 that allows users to access RemoteApp and Desktop
Connection through the Start menu or a Web browser.
· Microsoft
TechNet - Microsoft TechNet is an online resource site
that offers IT professionals free access to learning content and
discussion forums.
· Microsoft
Windows Control Panel - The Microsoft Windows
Control Panel is a management tool for the Windows operating
system (OS) that allows end users to change settings and manage tasks
within the OS.
· Microsoft
Windows Defender - Windows Defender is Microsoft's
antimalware software.
· middleware -
Middleware is software that is used to bridge the gap
between applications and other tools or databases.
· MIDI
(Musical Instrument Digital Interface) - MIDI (Musical
Instrument Digital Interface) is a protocol designed for recording and
playing back music on digital synthesizers that is supported by many
makes of personal computer sound cards.
· midrange -
In general, midrange refers to computers that are more
powerful and capable than personal computers but less powerful and
capable than mainframe computers.
· Millennium
Simulation - The Millennium Simulation is a computer
program that uses the laws of physics and initial conditions at the time
the universe was formed to simulate the structure and the evolution of
the universe, and in particular, the evolution of black hole s, galaxies,
and quasar s.
· millimeter
(mm, millimetre) - A millimeter (abbreviated as mm and
sometimes spelled as millimetre) is a small unit of length/distance in
the metric system, one-thousandth of a meter (which is similar in
length to a yard in the Imperial system of measurement).
· Mini-ITX
2.0 - Mini-ITX 2.0 is a motherboard designed for use in
small form factor personal computers (PCs).
· MIPS
(million instructions per second) - The number of MIPS
(million instructions per second) is a general measure of computing
performance and, by implication, the amount of work a larger
computer can do.
· MIS
(management information systems) - MIS, or management
information systems, is the software and hardware to support critical
business applications.
· mobo
(motherboard) - Mobo is a short form for motherboard that is
sometimes used in Usenet newsgroups and Web forum discussions.
· modeling
and simulation (M&S) - Modeling and simulation (M&S)
is the use of a physical or logical representation of a given system to
generate data and help determine decisions or make predictions about
the system.
· mole
per meter cubed (Avogadro constant) - The mole per meter
cubed (mol / m 3) is the International Unit of amount-of-substance
concentration.
· molecule -
A molecule is the smallest particle in a chemical element
or compound that has the chemical properties of that element or
compound.
· monolithic -
Monolithic, in information technology, means either
very large or composed all in one piece, depending on the particular
context.
· Monte
Carlo method or Monte Carlo analysis - The Monte Carlo
method, also called Monte Carlo analysis, is a means of statistical
evaluation of mathematical functions using random samples.
· moof
monster - The moof monster is a vague and indefinable source
of trouble for users of information technology.
· Morse
code - Morse code is a method of sending text messages by
keying in a series of electronic pulses, usually represented as a short
pulse (called a "dot") and a long pulse (a "dash").
· Mortimer -A Mortimer is a person who knows a lot about
computers or the Internet but would rather ridicule those who know
less than share some knowledge.
· Mosaic -
Mosaic was the first widely-distributed graphical browser
or viewer for the World Wide Web.
· most
significant bit or byte - The most significant bit (MSB) is the
bit in a multiple-bit binary number with the largest value.
· motherboard -
A motherboard is the main printed circuit board
(PCB) in a computer.
· motive
power - Motive power is a term in thermodynamics referring
to the harnessed energy or force that is used to power a mechanical
device or system.
· mouse
miles - "Mouse miles" is slang for user time at the computer
(as in "I travelled a lot of mouse miles this week") and also an actual
measure of how much activity a computer mouse has had over time.
· MP3
(MPEG-1 Audio Layer-3) - MP3 (MPEG-1 Audio Layer-3) is
a standard technology and format for a sound sequence into a very
small file (about one-twelfth the size of the original file) while
preserving the original level of sound quality when it is played.
· mu -
The lowercase Greek letter mu is used to represent the prefix
multiplier 0.
· multi-core
processor - A multi-core processor is an integrated circuit
(IC) to which two or more processors have been attached for enhanced
performance, reduced power consumption, and more efficient
simultaneous processing of multiple tasks.
· multiprocessing -
Multiprocessing is the coordinated processing of
programs by more than one computer processor.
· multitasking -
Multitasking, in an operating system, is allowing a
user to perform more than one computer task (such as the operation of
an application program) at a time.
· multithreading -
It is easy to confuse multithreading with
multitasking or multiprogramming, which are somewhat different
ideas.
· Murphy's
Law - The original Murphy's Law was "If there are two or
more ways to do something, and one of those ways can result in a
catastrophe, then someone will do it.
· NAK
(negative acknowledgment or not acknowledged) - NAK is
an abbreviation for negative acknowledgment or not acknowledged.
· nanocomputer -
A nanocomputer is a computer whose physical
dimensions are microscopic.
· nanomachine
(nanite) - A nanomachine, also called a nanite, is a
mechanical or electromechanical device whose dimensions are
measured in nanometers (millionths of a millimeter, or units of 10 -9
meter).
· nanometer -
A nanometer is a unit of spatial measurement that is 10-
9 meter, or one billionth of a meter.
· nanotube
(carbon nanotube) - A carbon nanotube (CNT) is a
miniature cylindrical carbon structure that has hexagonal graphite
molecules attached at the edges.
· native
app - A native application is a software program that is
developed for use on a particular platform or device.
· net
metering - Net metering is a utility resource usage and payment
scheme in which a customer who generates their own power is
compensated monetarily.
· network
availability - Network availability is the amount of
uptime in a network system over a specific time interval.
· network
protocols - Network protocols are sets of established rules
that dictate how to format, transmit and receive data so computer
network devices -- from servers and routers to endpoints -- can
communicate regardless of the differences in their underlying
infrastructures, designs or standards.
· network
socket - Sockets are created and used with a set of
programming requests or "function calls" sometimes called the
sockets application programming interface (API).
· neuromarketing -
Neuromarketing is the study of how people's
brains respond to advertising and other brand-related messages by
monitoring brainwave activity, eye-tracking and skin response.
· nibble -
In computers and digital technology, a nibble (pronounced
NIHB-uhl; sometimes spelled nybble) is four binary digits or half of
an eight-bit byte.
· Nikola
Tesla - Nikola Tesla was a Serbian-American scientist,
electrical engineer, and inventor whose research laid much of the
groundwork for modern electrical and communication systems.
· nil -
In general use, nil (a contraction of Latin "nihil") means
"nothing" or the absence of something.
· nomadicity -
Nomadicity is the tendency of a person, or group of
people, to move with relative frequency.
· norm -
A norm (from norma, Latin for carpenter's square) is a model
of what should exist or be followed, or an average of what currently
does exist in some context, such as an average salary among members
of a large group.
· normative -
In general, normative - pertaining to a norm - has two
related meanings: (a prescriptive meaning (for example, the rules
specified in a standard or guideline), and (2) a descriptive meaning
(for example, the median salary range in an particular occupation).
· nuclear
fusion - Nuclear fusion is an atomic reaction in which
multiple atoms combine to create a single, more massive atom.
· null
set - In mathematical sets, the null set, also called the empty set,
is the set that does not contain anything.
· number
theory (higher arithmetic) - Number theory, also known as
higher arithmetic, is a branch of mathematics concerned with the
properties of integer s, rational number s, irrational number s, and real
number s.
· object
code - Source code and object code refer to the "before" and
"after" versions of a computer program that is compiled (see compiler)
before it is ready to run in a computer.
· object
ID (OID) - An object identifier (OID) is an unambiguous,
long-term name for any type of object or entity.
· obliquity -
In systems engineering, obliquity is a theory that proposes
the best way to achieve a goal when you are working with a complex
system is to take an indirect approach instead of a direct one.
· octal -
Octal (pronounced AHK-tuhl, from Latin octo or "eight") is a
term that describes a base-8 number system.
· octet -
In computers, an octet (from the Latin octo or "eight") is a
sequence of eight bit s.
· office
cubicle - An idea that is now over 40 years old, the office
cubicle is a somewhat partitioned space for one or several workers in
what is otherwise an unpartitioned and open building space for
offices.
· offline -
Offline is the condition of being capable of but currently not
connected to a network of computers or other devices.
· offshore
outsourcing - Offshore outsourcing, a type of business
process outsourcing (BPO), is the exporting of IT-related work from
the United States and other developed countries to areas of the world
where there is both political stability and lower labor costs or tax
savings.
· ohnosecond -
An ohnosecond is that very short moment in time
during which you realize that you have pressed the wrong key and
deleted hours, days, or weeks of work.
· OK -
OK (pronounced oh-KAY and occasionally spelled okay) is a
short way to say "I agree.
· on
the fly - In relation to computer technology, "on the fly" describes
activities that develop or occur dynamically rather than as the result of
something that is statically predefined.
· online -
Online is the condition of being connected to a network of
computers or other devices.
· onshore
outsourcing (domestic outsourcing) - Onshore outsourcing
(also called domestic outsourcing) is the obtaining of services from
someone outside a company but within the same country.
· ontology -
In general, ontology (pronounced ahn-TAH-luh-djee) is
the study or concern about what kinds of things exist - what entities
there are in the universe.
· ooblick -
According to Eric Raymond, compiler of The New Hacker's
Dictionary, "ooblick" derives from the Dr.
· open -
In information technology, a product or system is described as
open when its workings are exposed to the public and capable of
being modified or improved by anyone.
· open
system - In a computing context, an open system is an open
source operating system, typically composed of coordinated modular
components from a number of sources and not reliant upon any
proprietary elements.
· operand -
In computers, an operand is the part of a computer
instruction that specifies data that is to be operating on or manipulated
and, by extension, the data itself.
· operation -
An operation, in mathematics and computer science, is an
action that is carried out to accomplish a given task.
· order
of magnitude - An order of magnitude is an exponential
change of plus-or-minus 1 in the value of a quantity or unit.
· Our
Favorite Technology Quotations - These are some of our
favorite quotations about computers, the Internet, and technology in
general.
· out
of the box - "Out of the box" is an expression that describes
nonconformal, creative thinking.
· outsourcing -
Outsourcing is a business practice in which a company
hires another company or an individual to perform tasks, handle
operations or provide services that are either usually executed or had
previously been done by the company's own employees.
· overhead -
In business accounting, overhead is general operating
expenses, including such items as heat and electricity for the premises,
that have no direct relationship to the production or selling of a
company's goods and services.
· packet-switched -
Packet-switched describes the type of network in
which relatively small units of data called packets are routed through a
network based on the destination address contained within each
packet.
· page -
On the World Wide Web, a page is a file notated with the
Hypertext Markup Language (HTML).
· pagefile -
In storage, a pagefile is a reserved portion of a hard disk
that is used as an extension of random access memory (RAM) for data
in RAM that hasn't been used recently.
· para-site -
A para-site is a Web site that frames other Web sites or
pages within its own site.
· paradigm -
A paradigm (pronounced PEHR-uh-daim, from Greek
paradeiknyai - to show side by side) is a pattern or an example of
something.
· paradox -
A paradox is a statement or concept that contains
conflicting ideas.
· parallel -
In the context of the Internet and computing, parallel means
more than one event happening at a time.
· parallel
processing - Parallel processing is a method in computing of
running two or more processors (CPUs) to handle separate parts of an
overall task.
· parallel
processing software - Parallel processing software manages
the execution of a program on parallel processing hardware with the
objectives of obtaining unlimited scalability (being able to handle an
increasing number of interactions at the same time) and reducing
execution time.
· PARC(Palo Alto Research Center) - PARC is Xerox's Palo Alto
Research Center, located in Palo Alto, California, in the high-tech area
that has become known as Silicon Valley.
· parity -
Parity is a method of detecting errors in data transmissions
between computers, while parity bit and parity checking are used in
RAID technology to guard against data loss.
· PC
Card - A PC Card (previously known as a PCMCIA card) is a
credit card-size memory or I/O device that fits into a personal
computer, usually a notebook or laptop computer.
· PC
philanthropy - PC philanthropy is sharing some of the unused
resources of your personal computer, especially unused computer
cycles, to benefit a social cause.
· Pepys'
weblog - The famous diary that Samuel Pepys (pronounced
PEEPS), once the head of England's Navy, kept during the years
1660-1669 is being made available online in the form of a weblog.
· performance -
Performance seems to have two meanings: The speed
at which a computer operates, either theoretically (for example, using
a formula for calculating Mtops - millions of theoretical instructions
per second) or by counting operations or instructions performed (for
example, (MIPS) - millions of instructions per second) during a
benchmark test.
· personal
operating space (POS) - A personal operating space (POS)
is a roughly spherical region that surrounds a portable or handheld
digital wireless device operated by a person.
· personality
profile - A personality profile is a knowledge
management tool used to provide an evaluation of an employee's
personal attributes, values and life skills in an effort to maximize his
or her job performance and contribution to the company.
· pervasive
computing (ubiquitous computing) - Pervasive
computing, also called ubiquitous computing, is the growing trend of
embedding computational capability (generally in the form of
microprocessors) into everyday objects to make them effectively
communicate and perform useful tasks in a way that minimizes the
end user's need to interact with computers as computers.
· petaflop -
A petaflop is a measure of a computer's processing speed
and can be expressed as a quadrillion (thousand trillion) floating point
operations per second (FLOPS).
· photometric
stereo - Photometric stereo is a computer vision method
of analyzing and detailing the contour and reflectivity of a surface in
3D (three-dimensional) space.
· photonic
ink (P-Ink) - Photonic ink (P-Ink) is a substance that can
change color electronically.
· photonics -
Photonics is an area of study that involves the use of
radiant energy (such as light), whose fundamental element is the
photon.
· physical
security - Physical security is the protection of people and
systems from damage or loss due to physical events such as fire,
flood, disasters, crimes or accidents.
· pi -
Pi is a numerical constant that represents the ratio of a circle's
circumference to its diameter on a flat plane surface.
· picosecond -
A picosecond is one trillionth (10 -12) of a second, or
one millionth of a microsecond.
· pictograph -
In graph theory, a pictograph is a graph that shows
numerical information by using picture symbols or icons to represent
data sets.
· pie
graph (or pie chart) - A pie graph (or pie chart) is a specialized
graph used in statistics.
· pin
or PIN - A pin is a pronged contact as part of a signal interface in
a computer or other communications device.
· ping
strangeness - Ping strangeness is a term used in troubleshooting
to describe the incidence of an unusual pattern of ICMP
ECHO_REQUEST packets being sent to a specific network node or
an unusual number of error messages returning.
· pipelining -
In computers, a pipeline is the continuous and somewhat
overlapped movement of instruction to the processor or in the
arithmetic steps taken by the processor to perform an instruction.
· pixel -
The pixel (a word invented from "picture element") is the
basic unit of programmable color on a computer display or in a
computer image.
· pixilated -
Pixilated, an adjective derived from pixie (a fairy elf),
describes someone who is whimsical or bemused, slightly drunk
(tipsy), or, according to Webster's, "somewhat unbalanced mentally.
· placeshifting -
Placeshifting (or place shifting) is a technology that
allows anyone with a broadband Internet connection to have video
streams from their home television set or personal video recorder
(PVR) forwarded for viewing at any location where they have a
computer display and a high-speed Internet connection.
· platform -
A computer platform is an underlying computer system on
which application programs can run, or, in general, any base of
technologies on which other technologies or processes are built.
· plesiochronous -
Plesiochronous (pronounced plee-see-AH-krun-us,
from Greek plesos, meaning close, and chronos, meaning time) is an
adjective that describes operations that are almost, but not quite, in
synchronization - in other words, almost synchronous.
· plug-in -
Plug-in applications are programs that can easily be
installed and used as part of your Web browser.
· polar
coordinates - Polar coordinates provide a method of rendering
graphs and indicating the positions of points on a two-dimensional
(2D) surface.
· Polish
notation (prefix notation) - Polish notation, also known as
prefix notation, is a symbolic logic invented by Polish mathematician
Jan Lukasiewicz in the 1920's.
· polled
interrupt - In a computer, a polled interrupt is a specific type
of I/O interrupt that notifies the part of the computer containing the
I/O interface that a device is ready to be read or otherwise handled but
does not indicate which device.
· polynomial -
A polynomial is a mathematical expression consisting
of a sum of terms, each term including a variable or variables raised to
a power and multiplied by a coefficient.
· portal -
Portal is a term, generally synonymous with gateway, for a
World Wide Web site that is or proposes to be a major starting site for
users when they get connected to the Web or that users tend to visit as
an anchor site.
· portrait -
In computer printing, portrait is a mode in which the
printer orients content for reading across the shorter length (the width)
of the sheet of paper.
· positional
assembly - Positional assembly is a technique that has
been suggested as a means to build objects, devices, and systems on a
molecular scale using automated processes in which the components
that carry out the construction process would follow programmed
paths.
· power
user - A power user, also called a super user, is someone
whose computer skills are better than those of an organization's
average end user.
· predictive
technology - Predictive technology is a body of tools
capable of discovering and analyzing patterns in data so that past
behavior can be used to forecast likely future behavior.
· printed
circuit board (PCB) - A printed circuit board (PCB) is the
board base for physically supporting and wiring surface-mounted and
socketed components in most electronics.
· probability -
Probability is a branch of mathematics that deals with
calculating the likelihood of a given event's occurrence, which is
expressed as a number between 1 and 0.
· problem
program - Now seldom used, the term problem program is
used to distinguish a computer program that directly supports a user
application from an operating system, a utility, or any other
underlying support programming.
· product -
In information technology, a product is something (for
example, a software application) that is created and then made
available to customers, usually with a distinct name or order number.
· program -
In computing, a program is a specific set of ordered
operations for a computer to perform.
· project
management - Project management is the discipline of using
established principles, procedures and policies to successfully guide a
project from conception through completion.
· project
planning - Project planning is a discipline for stating how to
complete a project within a certain timeframe, usually with defined
stages, and with designated resources.
· propagationdelay - Propagation delay, symbolized tpd, is the time
required for a digital signal to travel from the input(s) of a logic gate
to the output.
· propeller
head (or propellor head, prop head, prophead) - A
propeller head (also spelled propellor head, and sometimes shortened
to prop head or prophead) is jargon for someone who is exceptionally,
perhaps weirdly bright or knowledgeable, especially in some technical
field.
· proportionality -
In mathematics, proportionality indicates that two
quantities or variables are related in a linear manner.
· prototype -
In software development, a prototype is a rudimentary
working model of a product or information system, usually built for
demonstration purposes or as part of the development process.
· public
domain software - Programs that are uncopyrighted because
their authors intended to share them with everyone else are in the
public domain.
· public
sector - The public sector is the segment of an economic
system that is controlled by government; it contrasts with the private
sector, which is run by private citizens.
· pulse
amplitude modulation (PAM) - Pulse amplitude modulation
(PAM) is the transmission of data by varying the amplitudes (voltage
or power levels) of the individual pulses in a regularly timed sequence
of electrical or electromagnetic pulses.
· Q
format - Q (number) format is a fixed-point method of coding
fractional and whole integers for processing by a computer’s CPU or a
digital signal processor (DSP).
· quality -
In an information technology product or service, quality is
sometimes defined as "meeting the requirements of the customer.
· quantum -
Quantum is the Latin word for amount and, in modern
understanding, means the smallest possible discrete unit of any
physical property such as energy or matter.
· quantum
computing - Quantum computing is the area of study
focused on developing computer technology based on the principles of
quantum theory, which explains the nature and behavior of energy and
matter on the quantum (atomic and subatomic) level.
· quantum
internet - The quantum internet is a theoretical system of
interconnected quantum computers that uses quantum signals to send
information rather than radio waves.
· quantum
microphone - A quantum microphone is an extremely
device that detects the smallest particles of sound, such as packets of
vibrational energy called phonons.
· quantum
supremacy - Quantum supremacy is the experimental
demonstration of a quantum computer's dominance and advantage
over classic computers by performing calculations that were
previously impossible at unmatched speeds.
· quantum
theory - Quantum theory is the theoretical basis of modern
physics explaining the nature and behavior of matter and energy on
the atomic and subatomic level, sometimes called quantum mechanics
or quantum physics.
· quark -
A quark is one of two currently recognized groups of
fundamental particles, which are subatomic, indivisible (at least as far
as we know today) particles that represent the smallest known units of
matter.
· qubit -
A qubit is a quantum bit, the counterpart in quantum
computing to the binary digit or bit of classical computing.
· queries-per-second(QPS) - Queries-per-second (QPS) (or the
query-per-second rate) is a measure of how much traffic a particular
query server is handling at a given time.
· queue -
In general, a queue is a line of people or things waiting to be
handled, usually in sequential order starting at the beginning or top of
the line or sequence.
· queueing
theory - In computer science, queueing theory is the study
of queues as a technique for managing processes and objects in a
computer.
· quiet
zone - In barcode technology, a quiet zone is the blank margin
on either side of a bar code that's used to tell the barcode reader where
a barcode's symbology starts and stops.
· Quiz:
Who Done IT? A Murder Mystery - How to take the quiz: -
After reading the question, click on the answer that you think is
correct.
· radian -
The radian is the Standard International (SI) unit of plane
angular measure.
· radian
per second (rad/s or rad/sec) - The radian per second
(symbolized rad/s or rad/sec) is the Standard International (SI) unit of
angular (rotational) speed.
· radian
per second squared - The radian per second squared is the
unit of angular (rotational) acceleration magnitude in the International
System of Units (SI).
· raster
graphics - Raster graphics are digital images created or
captured (for example, by scanning in a photo) as a set of samples of a
given space.
· ratio -
In general, a ratio is a way of concisely showing the
relationship between two quantities of something.
· rational
number - A rational number is a number determined by the
ratio of some integer p to some nonzero natural number q.
· raw
data (source data or atomic data) - Raw data (sometimes
called source data or atomic data) is data that has not been processed
for meaningful use.
· read-only -
Read-only is a file attribute which only allows a user to
view a file, restricting any writing to the file.
· read-only
memory (ROM) - Read-only memory, or ROM, is a type
of computer storage containing non-volatile, permanent data that,
normally, can only be read, not written to.
· real
number - A real number is any element of the set R, which is
the union of the set of rational numbers and the set of irrational
numbers.
· real
time - Real time is a level of computer responsiveness that a user
senses as sufficiently immediate or that enables the computer to keep
up with some external process (for example, to present visualizations
of the weather as it constantly changes).
· real-time
monitoring - Real-time monitoring is the streaming of
continuously updated zero to low latency information.
· Rear
Admiral Grace Murray Hopper - Grace Murray Hopper
(1906-1992) was a pioneer in computer science.
· reboot
(warm boot, cold boot) - To reboot is to restart a computer
and reload the operating system.
· refresh -
In a computer display, to refresh is to redraw the image
information from memory.
· reliability -
Reliability is an attribute of any computer-related
component (software, or hardware, or a network, for example) that
consistently performs according to its specifications.
· reload -
In computers, to reload is to start a program over again,
usually because it has crashed or because it has begun to display
aberrant behavior.
· remote-control
software - Remote-control software is programming
in a central or server computer that is used to control other computers
(or their users) at a distance, either under the control of an
administrator or at the request of the user.
· replicator -
A replicator is an object or organism that can make
copies of itself.
· request
for quotation (RFQ) - A request for quotation (RFQ) is a
document that an organization submits to one or more potential
suppliers eliciting quotations for a product or service.
· reseller -
In information technology, a reseller is a company that
typically purchases IT products or services from a product
manufacturer, distributor or service provider and then markets them to
customers.
· resolution -
In computers, resolution is the number of pixels
(individual points of color) contained on a display monitor, expressed
in terms of the number of pixels on the horizontal axis and the number
on the vertical axis.
· response
time - According to the IBM Dictionary of Computing
(which cites International Organization for Standardization
Information Technology Vocabulary as the source), response time is:
The elapsed time between the end of an inquiry or demand on a
computer system and the beginning of a response; for example, the
length of the time between an indication of the end of an inquiry and
the display of the first character of the response at a user terminal.
· return
merchandise authorization (RMA) - An RMA (return
merchandise authorization) is a numbered authorization provided by a
mail-order merchant to permit the return of a product.
· reverse
engineering - Reverse engineering is taking apart an object
to see how it works in order to duplicate or enhance the object.
· RGB
(red, green, and blue) - RGB (red, green, and blue) refers to a
system for representing the colors to be used on a computer display.
· Riven -
Riven is the sequel to Myst, the best-selling puzzle-and-
exploration computer game on CD-ROM from Broderbund.
· Robokoneko
(robot kitten) - The Robokoneko was a proposed robot
kitten (robot + Japanese ko for "child" + neko for "cat") that was
intended to have a remote computer brain containing "neural net"
modules that could evolve their intelligence based on experience and
prearranged rules.
· robot -
A robot is a machine designed to execute one or more tasks
automatically with speed and precision.
· robotics -
Robotics is a branch of engineering that involves the
conception, design, manufacture, and operation of robots.
· RoC
(restart on crash) - RoC (restart on crash) is a functionality
built into Windows that automatically restarts an operating system or
application when it hangs, freezes or crashes.
· rogue -
In general, a rogue is someone who strays from the accepted
path, is mischievous, or is a cheat.
· ROI
(return on investment) - For a given use of money in an
enterprise, the ROI (return on investment) is how much profit or cost
saving is realized as a result.
· ROM
emulation - ROM emulation is the process of copying data
from a ROM (read-only memory) chip to a storage medium such as a
hard disk or flash memory.
· root
cause analysis - Root cause analysis is a way to determine how
a problematic event occurred by examining why, how and when the
casual factors happened after the fact.
· rotoscoping -
For either broadcast video or Internet streaming video,
rotoscoping is the rotated projection of a sequence of usually
photographed action image frames so that the artist can trace from the
frame or create an image to superimpose on it.
· run
book - In a computer system or network, a run book is a written
set of procedures for the routine and exceptional operation of the
system or network by an administrator or operator.
· runtime
system - A runtime system is an engine that translates a
given programming language or languages into machine code.
· S-Video
(Super-Video, Y/C Video, component video) - S-Video
(Super-Video, sometimes referred to as Y/C Video, or component
video) is a video signal transmission in which the luminance signal
and the chrominance signal are transmitted separately to achieve
superior picture clarity.
· sample
rate - In developing an audio sound for computers or
telecommunication, the sample rate is the number of samples of a
sound that are taken per second to represent the event digitally.
· satellite
constellation (satellite swarm) - A satellite constellation,
also called a satellite swarm, is a system of satellites that work
together to achieve a single purpose.
· scalability -
It is the ability of a computer application or product
(hardware or software) to continue to function well as it (or its
context) is changed in size or volume in order to meet a user need.
· Schrodinger'scat - Schrödinger's cat is a famous hypothetical
experiment designed to point out a flaw in the Copenhagen
interpretation of superposition as it applies to quantum theory.
· scientific
method - Scientific method is a logical approach to seeking
knowledge that involves forming and testing a hypothesis.
· scientific
notation (power-of-10 notation) - Scientific notation, also
called power-of-10 notation, is a method of writing extremely large
and small numbers.
· search
neutrality - Search neutrality is the direct conducting of
transparent search processes that do not discriminate between users or
favor specific sites.
· search
operator - A search operator (sometimes referred to as a
search parameter) is a character or string of characters used in a search
engine query to narrow the focus of the search.
· searching -
On the Internet, searching is just trying to find the
information you need.
· seat -
In a networked computer system, a seat is a workstation that
can be operated by one user at a time.
· seat
management - Seat management is a method of coordinating all
the workstations in an enterprise network by overseeing the
installation, operation, and maintenance of hardware and software at
each workstation.
· second
(s or sec) - The second (abbreviation,s or sec) is the Standard
International (SI) unit of time.
· segmented
memory - Segmented memory is a system of addressing
computer memory, which may be physical or virtual and may be
operating in real or protected mode.
· self-assembly -
Self-assembly is a branch of nanotechnology in
which objects, devices, and systems form structures without external
prodding.
· self-healing -
In information technology, self-healing describes any
device or system that has the ability to perceive that it is not operating
correctly and, without human intervention, make the necessary
adjustments to restore itself to normal operation.
· Self-Monitoring
Analysis & Reporting Technology (S.M.A.R.T.) -
Self-Monitoring Analysis and Reporting Technology (S.
· self-replication -
In nanotechnology, self-replication is a process in
which devices whose diameters are of atomic scale, on the order of
nanometers, create copies of themselves.
· sensor -
A sensor is a device that detects and responds to some type
of input from the physical environment.
· sequential
logic - Sequential logic is a form of binary circuit design
that employs one or more inputs and one or more outputs, whose
states are related by defined rules that depend, in part, on previous
states.
· serendipity -
In general, serendipity is the act of finding something
valuable or delightful when you are not looking for it.
· serial
presence detect (SPD) - When a computer is booted (started),
serial presence detect (SPD) is information stored in anelectrically
erasable programmable read-only memory (EEPROM) chip on a
synchronous dynamic random access memory (SDRAM) memory
module that tells thebasic input/output system (BIOS) the module's
size, data width, speed, and voltage.
· server -
A server is a computer program or device that provides a
service to another computer program and its user, also known as the
client.
· server
stack - A server stack is the collection of software that forms
the operational infrastructure on a given machine.
· server
virtualization - Server virtualization is a process that creates
and abstracts multiple virtual instances on a single server.
· server-side
include (SSI) - A server-side include is a variable value
(for example, a file "Last modified" date) that a server can include in
an HTML file before it sends it to the requestor.
· service-level
management - Service-level management is the
monitoring and management of the quality of service(QoS) of an
entity's key performance indicators(KPIs).
· service-oriented
architecture (SOA) - Service-oriented architecture
(SOA) is a software development model that allows services to
communicate across different platforms and languages to form
applications.
· service-oriented
integration (SOI) - SOI is also an abbreviation for
Silicon-On-Insulator.
· session -
In telecommunication, a session is a series of interactions
between two communication end points that occur during the span of
a single connection.
· set -
A set is a group or collection of objects or numbers, considered
as an entity unto itself.
· Shannon's
Law - Shannon's Law, formulated by Claude Shannon, a
mathematician who helped build the foundations for the modern
computer, is a statement in information theory that expresses the
maximum possible data speed that can be obtained in a data channel.
· shebang
(#!) - Among UNIX shell (user interface) users, a shebang is
a term for the "#!" characters that must begin the first line of a script.
· shift
register - A shift register is a digital memory circuit found in
calculators, computers, and data-processing systems.
· shovelware -
Shovelware is content taken from any source and put
on the Web as fast as possible with little regard for appearance and
usability.
· Siebel -
Siebel Systems is a prominent vendor of interoperable e-
business software.
· significant
figures - The term significant figures refers to the number
of important single digits (0 through 9 inclusive) in the coefficient of
an expression in scientific notation.
· silicon
(Si) - Silicon is a chemical element (its symbol in chemical
formula expressions is "Si") that is present in sand and glass and
which is the best known semiconductor material in electronic
components.
· Silicon
Alley - Silicon Alley is the growing community of Internet
and computer-oriented businesses, mainly startup companies, in the
New York metropolitan area, particularly Manhattan's downtown.
· simplicity -
In information technology, simplicity is a quality that is
frequently sought by both users and technologists, although, as users
frequently attest, it is not always found.
· single-system
image (SSI) - Single-system image (SSI) is the idea
that the resources provided by cluster computing or in any system
which aggregates resources should present a single interface to the
user.
· site
map - A site map is a visual or textually organized model of a
Web site's content that allows the users to navigate through the site to
find the information they are looking for, just as a traditional
geographical map helps people find places they are looking for in the
real world.
· six
degrees of separation - Six degrees of separation is the theory
that any person on the planet can be connected to any other person on
the planet through a chain of acquaintances that has no more than five
intermediaries.
· Six
Sigma - Six Sigma is an approach to data-driven management
that seeks to improve quality by measuring how many defects there
are in a process and systematically eliminating them until there are as
close to zero defects as possible.
· SKU(stockkeeping unit) - SKU (stockkeeping unit, sometimes
spelled "Sku") is an identification, usually alphanumeric, of a
particular product that allows it to be tracked for inventory purposes.
· slack
space (file slack space) - Slack space is the difference between
its logical and physical size.
· Slashdot
Effect - The Slashdot Effect is the sudden, relatively
temporary surge in traffic to a Web site that occurs when a high-traffic
Web site or other source posts a story that refers visitors to another
Web site.
· sleep
mode - Sleep mode, sometimes called standby or suspend
mode, is a power-sparing state that a computer can enter when not in
use.
· slice
and dice - To slice and dice is to break a body of information
down into smaller parts or to examine it from different viewpoints so
that you can understand it better.
· slow-scan
television (SSTV) - Slow-scan television (SSTV) is a
mode of video communications in which a sequence of fixed images
is sent and received at intervals of several seconds.
· slowness
movement - The slowness movement is a grassroots
reaction to the hectic pace, overwork, and lack of leisure typical of
modern life.
· Small
Office Home Office (SOHO) - In information technology,
SOHO is a term for the small office or home office environment and
business culture.
· smart
machines - A smart machine is a device embedded with
machine-to-machine (M2M) and/or cognitive computing technologies
such as artificial intelligence (AI), machine learning or deep learning,
all of which it uses to reason, problem-solve, make decisions and
even, ultimately, take action.
· SMB
(small and medium-sized business or small and midsized
business) - SMB is an abbreviation for small and medium-sized
business, sometimes seen as small and midsized business.
· smiley -
In Internet e-mail messages and Web discussions, a smiley is
a sequence of typed characters that graphically produces the sideways
image of someone smiling, like this::-)The first use of a smiley is
currently attributed to Scott E.
· snap-in -
Snap-in, in general, refers to an object that can be attached
to another object and that will then function as part of the whole.
· sneakernet -
Sneakernet is a jargon term for the method of
transmitting electronic information by personally carrying it from one
place to another on floppy disk or other removable medium.
· Sniglet
- Words that should be in the dictionary (but aren't) - A
sniglet is a word that should be in the dictionary but isn't.
· snoopware -
In mobile computing, snoopware is malware that is
capable of monitoring activity on a smartphone.
· soft
copy - A soft copy (sometimes spelled "softcopy") is an
electronic copy of some type of data, such as a file viewed on a
computer's display or transmitted as an e-mail attachment.
· soft
error - A soft error is an issue that causes a temporary condition
in RAM that alters stored data in an unintended way.
· soft
reset - A soft reset is a restart of a device, such as a smartphone,
tablet, laptop or personal computer (PC).
· software -
Software is a set of instructions, data or programs used to
operate computers and execute specific tasks.
· software
package - A software package is an assemblage of files and
information about those files.
· sound
card - A sound card (also referred to as an audio card) is a
peripheral device that attaches to the ISA or PCI slot on a
motherboard to enable the computer to input, process, and deliver
sound.
· sound
wave - A sound wave is the pattern of disturbance caused by
the movement of energy traveling through a medium (such as air,
water, or any other liquid or solid matter) as it propagates away from
the source of the sound.
· space -
In mathematics, space is an unbounded continuum (unbroken
set of points) in which exactly three numerical coordinates are
necessary to uniquely define the location of any particular point.
· spaghetti
code - Spaghetti code is a derogatory term for computer
programming that is unnecessarily convoluted, and particularly
programming code that uses frequent branching from one section of
code to another.
· spam
for life (S4L) - S4L is an online chat acronyms for "spam for
life," the possible result of subscribing to an online service or
becoming anyone's customer or client.
· spamdexing -
Spamdexing, coined from spam and index, is the
practice of including information in a Web page that causes search
engines to index it in some way that produces results that satisfy the
spamdexer but usually dissatisify the search engine providers and
users.
· spectrum
analyzer - A spectrum analyzer is a device that displays
signal amplitude (strength) as it varies by signal frequency.
· speech
synthesis - Speech synthesis is the computer-generated
simulation of human speech.
· speed
of gravity - The speed of gravity is the rate, in meters per
second or other standard units, at which gravitational fields or effects
propagate through space.
· spin
(angular momentum) - Spin, in physics, is the velocity of
rotation of something around a particular axis.
· splash
page (splash screen) - A splash page (or splash screen) is: An
initial Web site page used to capture the user's attention for a short
time as a promotion or lead-in to the site home page or to tell the user
what kind of browser and other software they need to view the site.
· spod -
On the Internet in the United Kingdom, a spod is a person who
frequents chat rooms or discussion groups a little too frequently.
· square
root symbol - The square root symbol () is used to indicate
the quantity or quantities which, when multiplied by itself or
themselves, results in the quantity encompassed by the symbol.
· Squid
proxy server - Squid is a Unix-based proxy server that caches
Internet content closer to a requestor than its original point of origin.
· standard -
A standard is a generally agreed-upon technology, method
or format for a given application.
· standards
organization - A standards organization, sometimes
referred to as a standards body, is an organization with authority to
endorse official standards for given applications.
· standby
power - Standby power is electrical power that a device
consumes when not in present use, but plugged in to a source of
power and ready to be used.
· state
machine - In general, a state machine is any device that stores
the status of something at a given time and can operate on input to
change the status and/or cause an action or output to take place for any
given change.
· statistical
mean, median, mode and range - Calculating the mean,
median, mode and range of a set of numbers allows you to track
changes over time and set acceptable ranges and variance.
· steradian -
The steradian (symbolized sr) is the Standard
International (SI) unit of solid angular measure.
· stereoscopy
(stereoscopic imaging) - Stereoscopy, sometimes called
stereoscopic imaging, is a technique used to enable a three-
dimensional effect, adding an illusion of depth to a flat image.
· stickiness -
Stickiness is anything about a Web site that encourages a
visitor to stay longer.
· storage
consolidation - Storage consolidation, also called storage
convergence is a method of centralizing data storage among multiple
servers.
· storage
filer - A storage filer is a file server designed and
programmed for high-volume data storage, backup, and archiving.
· storage
medium (storage media) - In computers, a storage medium
is any technology -- including devices and materials -- used to place,
keep and retrieve electronic data.
· storage
utilization - Storage utilization is a measure of how well the
available data storage space in an enterprise is used.
· storage
volume - A definition of volume must include a comparison
of the unit of data storage to a partition, as well as insight into logical
volume management, a form of storage virtualization.
· straw
man - In general, a straw man is an object, document, person,
or argument that temporarily stands in for and is intended to be
"knocked down" by something more substantial.
· streaming
media - Streaming media is video or audio content sent in
compressed form over the Internet and played immediately, rather
than being saved to the hard drive.
· subset
symbol - The subset symbol indicates a specific relationship
between two sets.
· suffix -
A suffix is something added at the end of a word that
conditions its usage or meaning.
· Sun
Microsystems - Sun Microsystems (often just called "Sun"), the
leading company in computers used as Web servers, also makes
servers designed for use as engineering workstations, data storage
products, and related software.
· supercomputer -
The first commercially successful supercomputer,
the CDC (Control Data Corporation) 6600 was designed by Seymour
Cray.
· supercomputer
center - In general, a supercomputer center is a site
with a supercomputer that is shared by a number of other sites, usually
research sites.
· superposition -
Superposition is the ability of a quantum system to
be in multiple states at the same time until it is measured.
· superstring
theory (string theory, Theory of Everything) -
Superstring theory - known less formally as "string theory" - is
sometimes called the Theory of Everything (TOE), because it is a
unifying physics theory that reconciles the differences between
quantum theory and the theory of relativity to explain the nature of all
known forces and matter.
· support -
In information technology, support refers to functionality
that is provided between or among products, programs, devices,
modes, or accessories.
· surd -
A surd is a number or quantity that cannot be expressed as the
ratio of two integer s.
· surf -
In using the World Wide Web, to surf is to either: Explore a
sequence of Web sites in a random, unplanned way, or2) Simply use
the Web to look for something in a questing way.
· symbology -
A symbology is a protocol for arranging the bars and
spaces that make up a particular kind of bar code.
· synchronicity -
Synchronicity is a concept developed by
psychologist Carl Jung to describe a perceived meaningful
coincidence.
· synchronous -
In general, synchronous (pronounced SIHN-kro-nuhs,
from Greek syn-, meaning "with," and chronos, meaning "time") is an
adjective describing objects or events that are coordinated in time.
· system -
A system is a collection of elements or components that are
organized for a common purpose.
· system
administrator (sysadmin) - In information technology (IT),
a system administrator (sysadmin) is a person who supports a multi-
user computing environment and ensures continuous, optimal
performance of IT services and support systems.
· system
software - System software is a type of computer program
that is designed to run a computer’s hardware and application
programs.
· table -
In computer programming, a table is a data structure used to
organize information, just as it is on paper.
· Table of Physical Constants - Quick look-up chart.
· talk
time - In customer relationship management (CRM), talk time is
the amount of time a call center agent spends with a caller during a
transaction.
· Tamagotchi -
A Tamagotchi (pronounced "tom-ah-GOT-chee") is a
relatively inexpensive toy containing a small liquid crystal display
display, a few touch-sensitive user controls, and a program in which
the image of a small creature is visible.
· taxonomy -
Taxonomy is the science of classification according to a
predetermined system, with the resulting catalog being used to
provide a conceptual framework for discussion or analysis.
· teach
box - A teach box is a device that registers and memorizes
mechanical motions or processes for later recall and execution by an
electronic or computer system.
· tebibyte
(TiB) - A tebibyte (TiB) is a unit of measure used to
describe computing capacity.
· technical
requirements - Technical requirements, in the context of
software development and systems engineering, are the factors
required to deliver a desired function or behavior from a system to
satisfy a user’s standards and needs.
· techno-fiend -
In information technology, a techno-fiend is someone
who is addicted to finding out and knowing how things work in one or
more aspects of cyberspace.
· telepresence -
Telepresence is a sophisticated form of robotic remote
control in which a human operator has a sense of being in a remote
location so that the experience resembles virtual reality (VR).
· Terabyte
(TB) - A Terabyte (TB) is a measure of computer storage
capacity that is approximately 2 to the 40th power, or 10 to the 12th
power, which equals approximately a trillion bytes.
· teraflop -
A teraflop is a measure of a computer's speed and can be
expressed as: A trillion floating point operations per second 10 to the
12th power floating-point operations per second 2 to the 40th power
flops Today's fastest parallel computing operations are capable of
teraflop speeds.
· term
boosting - Term boosting is the ability to assign higher
importance to specific words in a search engine query.
· text -
In information technology, text is a human-readable sequence
of characters and the words they form that can be encoded into
computer-readable formats such as ASCII.
· The
speed of end-user and backbone transmission technologies -
This table shows the stated data rates for the most important end-user
and backbone transmission technologies.
· theory
of relativity - Albert Einstein's theory of relativity is actually
two separate theories: his special theory of relativity, postulated in the
1905 paper, The Electrodynamics of Moving Bodies and his theory of
general relativity, an expansion of the earlier theory, published as The
Foundation of the General Theory of Relativity in 1916.
· thin-film
transistor (TFT) - A display screen made with TFT (thin-
film transistor) technology is a liquid crystal display (LCD), common
in notebook and laptop computers, that has a transistor for each pixel
(that is, for each of the tiny elements that control the illumination of
your display).
· thing
(in the Internet of Things) - A thing, in the context of the
Internet of things (IoT), is an entity or physical object that has a
unique identifier, an embedded system and the ability to transfer data
over a network.
· thread-safe -
In computer programming, thread-safe describes a
program portion or routine that can be called from multiple
programming threads without unwanted interaction between the
threads.
· throughput -
Throughput is a term used in information technology
that indicates how many units of information can be processed in a set
amount of time.
· TIFF
(Tag Image File Format) - TIFF (Tag Image File Format) is a
common format for exchanging raster graphics (bitmap) images
between application programs, including those used for scanner
images.
· Tim
Berners-Lee - Tim Berners-Lee is the creator of the World
Wide Web and director of the coordinating body for Web
development, the W3C.
· time -
Time is an observed phenomenon, by means of which human
beings sense and record changes in the environment and in the
universe.
· timeshifting -
Timeshifting is the process of recording and storing
data for later viewing, listening, or reading.
· tipping
point - The tipping point is the critical point in an evolving
situation that leads to a new and irreversible development.
· token -
In general, a token is an object that represents something else,
such as another object (either physical or virtual), or an abstract
concept as, for example, a gift is sometimes referred to as a token of
the giver's esteem for the recipient.
· toolbar -
In the graphical user interface (GUI) for a computer, a
toolbar is a horizontal row or vertical column of selectable image
"buttons" that give the user a constantly visible reminder of and an
easy way to select certain desktop or other application functions, such
as saving or printing a document or moving pages forwards or
backwards within a Web browser.
· torque -
Torque is a twisting or turning force that tends to cause
rotation around an axis; it can also be thought of as the ability of
something that is rotating, such as a gear or a shaft, to overcome
turning resistance.
· Total
Quality Management (TQM) - Total Quality Management is
a management framework based on the belief that an organization can
build long-term success by having all its members, from low-level
workers to its highest ranking executives, focus on quality
improvement and, thus, delivering customer satisfaction.
· transcendental
number - A transcendental number is a real number
that is not the solution of any single-variable polynomial equation
whose coefficients are all integers.
· transcription
error - A transcription error is a specific type of data
entry error that is commonly made by human operators or by optical
character recognition (OCR) programs.
· transition
ad - A transition ad is a Web page containing a
commercial message that appears temporarily between two other Web
pages.
· transparent -
In computers, transparent means something a little
different than its general meaning of having the quality of being easily
seen through, coming closer to meaning invisible or undetectable.
· transparent
computing - Transparent computing is a characteristic
of pervasive computing, the possible future state in which we will be
surrounded by computers everywhere in the environment that respond
to our needs without our conscious use.
· transparent
GIF - A transparent GIF (Graphics Interchange Format)
is an image file that has one color assigned to be "transparent" so that
the assigned color will be replaced by the browser's background color,
whatever it may be.
· tree
network - In telecommunication networks, a tree network is a
combination of two or more star networks connected together.
· trigraph -
A trigraph is a three-character replacement for a special or
nonstandard character in a text file.
· trinary -
Trinary logic is three-level digital logic, with states
represented by the numbers -1, 0, and 1.
· true
multitasking - True multitasking is the capacity of an operating
system to carry out two or more tasks simultaneously rather than
switching from one task to another.
· trusted
execution environment (TEE) - A trusted execution
environment (TEE) is an area on the main processor of a device that is
separated from the system’s main operating system (OS) to ensure
that sensitive data can be stored and managed in a secure
environment.
· truth
table - A truth table is a breakdown of a logic function by
listing all possible values the function can attain.
· Turing
Test - A Turing Test is a method of inquiry in artificial
intelligence (AI) for determining whether or not a computer is capable
of thinking like a human being.
· turnkey -
Turnkey is a product or service that is designed, supplied,
built, or installed fully complete and ready to operate.
· twip
(twentieth of a point) - A twip (twentieth of a point) is a
measure used in laying out space or defining objects on a page or
other area that is to be printed or displayed on a computer screen.
· ultra-mobile
personal computer (UMPC or Ultra-mobile PC) -
Ultra-mobile PC (UMPC) is a design specification for a hand-held
computer that is larger than a PDA but smaller than a laptop.
· ultrabook -
An ultrabook is a category of thin and light laptop
computers designed to bridge the market gap between tablets and
premium notebook PCs.
· unary -
The term unary defines operators in Boolean (binary)
algebra, trinary algebra, arithmetic, and set theory.
· uncertainty
principle - The uncertainty principle is the concept that
precise, simultaneous measurement of some complementary variables
-- such as the position and momentum of a subatomic particle -- is
impossible.
· Undernet -
For terms frequently used in online keyboard chatting,
see chat acronyms/IRC/BBS.
· unified
field theory or Theory of Everything (TOE) - Unified field
theory is sometimes called the Theory of Everything (TOE, for short):
the long-sought means of tying together all known phenomena to
explain the nature and behavior of all matter and energy in existence.
· union symbol - The union symbol () denotes the union of two set s.
· unique
identifier (UID) - A unique identifier (UID) is a numeric or
alphanumeric string that is associated with a single entity within a
given system.
· universal
constructor - A universal constructor is a device that can
self-replicate - that is, make copies of itself.
· unzipping -
Unzipping is the act of extracting the files from a zipped
single file or similar file archive.
· upgrade -
In computers, an upgrade is a new version of or addition to
a hardware or, more often, software product that is already installed or
in use.
· uptime
and downtime - Uptime is a computer industry term for the
time during which a computer is operational.
· URL-minder -
URL-minder is an agent or robot program (bot) that
notifies you when a particular Web page has changed.
· user
group - In personal or business computing, a user group is a set
of people who have similar interests, goals, or concerns.
· UTF-16
(16- bit Unicode Transformation Format) - UTF-16 (16-
bit Unicode Transformation Format) is a standard method of encoding
Unicode character data.
· utility -
In computers, a utility is a small program that provides an
addition to the capabilities provided by the operating system.
· utility
computing - Utility computing is a service provisioning
model in which a service provider makes computing resources and
infrastructure management available to the customer as needed, and
charges them for specific usage rather than a flat rate.
· UXGA(Ultra Extended Graphics Array) - UXGA (Ultra Extended
Graphics Array) is a display modein which the resolutionis 1600
pixels horizontally by 1200 pixels vertically (1600 x 1200).
· value
chain - A value chain is "a string of companies working
together to satisfy market demands.
· value-added
reseller (VAR) - A value-added reseller (VAR) is a
company that resells software, hardware and networking products and
provides value beyond order fulfillment.
· valve -
A valve is a mechanism that opens and closes to control the
flow of fluids.
· vandal -
A vandal is an executable file, usually an applet or an
ActiveX control, associated with a Web page that is designed to be
harmful, malicious, or at the very least inconvenient to the user.
· vanilla -
In information technology, vanilla (pronounced vah-NIHL-
uh) is an adjective meaning plain or basic.
· Vannevar
Bush - An electrical engineer by training, Vannevar Bush
is credited with having the idea of hypertext or "instant cross-
referencing," decades before the term itself was conceived by Ted
Nelson and before the concept was widely implemented on the World
Wide Web.
· vaporware -
Vaporware is software or hardware that is announced
publicly and actively promoted by a vendor even though it does not
yet exist.
· varicode -
Varicode is a method of binary character encoding in
which the number of bits for each character is not fixed, but varies for
each character depending on how often that character occurs in
general usage.
· vector -
A vector is a quantity or phenomenon that has two
independent properties: magnitude and direction.
· vector
graphics rendering (VML) - Vector graphics rendering,
sometimes abbreviated VML, refers to scalable vector graphics (SVG)
used in Web pages.
· vectored
interrupt - In a computer, a vectored interrupt is an I/O
interrupt that tells the part of the computer that handles I/O interrupts
at the hardware level that a request for attention from an I/O device
has been received and and also identifies the device that sent the
request.
· vendor -
A vendor is an individual or company that sells goods or
services to somone else in the economic production chain.
· vertical
cavity surface emitting laser (VCSEL) - A vertical cavity
surface emitting laser (VCSEL) is a specialized laser diode that
promises to revolutionize fiber optic communications by improving
efficiency and increasing data speed.
· video
card (graphics card) - A video adapter (alternate terms
include graphics card, display adapter, video card, video board and
almost any combination of the words in these terms) is an integrated
circuit card in a computer or, in some cases, a monitor that provides
digital-to-analog conversion, video RAM, and a video controller so
that data can be sent to a computer's display.
· Vint
Cerf (Vinton Gray Cerf) - Vint Cerf (Vinton Gray Cerf) is an
American computer scientist best known as an Internet pioneer.
· virtual -
In computing, virtual is a digitally replicated version of
something real.
· virtual
commerce (vCommerce, v-commerce, or vCom) - Virtual
commerce (sometimes known as vCommerce, v-commerce, or vCom)
is a type of application, service, or product feature that helps
enterprises implement strategies and design Web sites for e-commerce
(the buying and selling of goods and services using the Internet).
· virtual
learning environment (VLE) or managed learning
environment (MLE) - A virtual learning environment (VLE) is a set
of teaching and learning tools designed to enhance a student's learning
experience by including computers and the Internet in the learning
process.
· virtual
reality - Virtual reality is an artificial environment that is
created with software and presented to the user in such a way that the
user suspends belief and accepts it as a real environment.
· virtual
reality sickness (VR motion sickness) - Virtual reality
sickness (VR motion sickness) is the physical discomfort that occurs
when an end user's brain receives conflicting signals about self-
movement in a digital environment.
· viseme -
A viseme is a generic facial image that can be used to
describe a particular sound.
· vocoder -
A vocoder is an audio processor that captures the
characteristic elements of an an audio signal and then uses this
characteristic signal to affect other audio signals.
· voice
morphing - Voice morphing is the software-generated
alteration of a person's natural voice.
· volatile -
In general, volatile (from the Latin "volatilis" meaning "to
fly")is an adjective used to describe something unstable or
changeable.
· volatile
memory - Volatile memory is computer storage that only
maintains its data while the device is powered.
· von
Neumann bottleneck - The von Neumann bottleneck is a
limitation on throughput caused by the standard personal computer
architecture.
· wall
time (real-world time or wall-clock time) - Wall time, also
called real-world time or wall-clock time, refers to elapsed time as
determined by a chronometer such as a wristwatch or wall clock.
· warchalking
(war chalking) - Warchalking is a grass roots effort to
create a standard iconography for public Wi-Fi access.
· warez -
Warez (pronounced as though spelled "wares" or possibly by
some pronounced like the city of "Juarez") is a term used by software
"pirates" to describe software that has been stripped of its copy-
protection and made available on the Internet for downloading.
· Waste
Electrical and Electronic Equipment Regulation (WEEE) -
Waste Electrical and Electronic Equipment Regulation (WEEE) is a
directive in the European Union that designates safe and responsible
collection, recycling and recovery procedures for all types of
electronic waste.
· Wave
file - A Wave file is an audio file format, created by Microsoft,
that has become a standard PC audio file format for everything from
system and game sounds to CD-quality audio.
· wave
number - The term wave number refers to the number of
complete wave cycles of an electromagnetic field (EM field) that exist
in one meter (1 m) of linear space.
· waving
a dead chicken - Waving a dead chicken is a slang
expression for an effort to solve a problem even when the effort is
expected to be futile.
· Web
application (Web app) - A Web application (Web app) is an
application program that is stored on a remote server and delivered
over the Internet through a browser interface.
· Web
ring (Webring) - A Web ring (or Webring) is a way of
interlinking related Web sites so that you can visit each site one after
the other, eventually (if you keep going) returning to the first Web
site.
· Web
slate - A Web slate is a wireless Internet appliance that consists
of a liquid crystal display (LCD) with a touch screen that allows the
user to view and interact with Web pages.
· Web
year - A Web year is the length of time it takes for Internet
technology to evolve as much as technology in another environment
might evolve in a calendar year.
· Web-Braille -
Web-Braille is a delivery system that allows content to
be read on a Braille display or transmitted to a Braille embosser.
· Webification -
Webification (sometimes seen with a lower case w) is
the act of converting content from its original format into a format
capable of being displayed on the World Wide Web.
· Webify -
The act of converting content from its original format into a
format capable of being displayed on the World Wide Web.
· webmaster -
A webmaster is a person who creates and manages the
content and organization of a website, manages the computer server
and technical programming aspects of a website or does both.
· weenie -
On bullet board systems (BBS) and in Internet chatting
groups, a weenie is an avid but immature participant who disrupts
orderly conversation.
· Werner
Heisenberg - Werner Heisenberg (1901 - 1976), one of the
greatest physicists of the twentieth century, is best known for his
contributions to quantum mechanics, specifically for the uncertainty
principle in quantum theory.
· white
paper - A white paper is an article that states an organization's
position or philosophy about a social, political, or other subject, or a
not-too-detailed technical explanation of an architecture, framework,
or product technology.
· white
space device (WSD) - A white space device is an FCC-
certified wireless device that can be used without an exclusive
broadcast license in the RF spectrum below 700 MHz: underutilized,
unlicensed portions of the spectrum called white space.
· winner's
curse - In negotiation, winner's curse is an offer that is
immediately accepted by the other party.
· wipe -
Wipe, in a computing context, means to erase all data on
a hard drive to render it unreadable.
· word -
In computer architecture, a word is a unit of data of a defined
bitlength that can be addressed and moved between storageand the
computer processor.
· Words-to-Go:
Voice over IP - Internet Protocol (IP) - method or
protocol by which data is sent from one computer to another on the
Internet.
· workload -
In computing, the workload is the amount of processing
that the computer has been given to do at a given time.
· X
dimension - In barcode technology, the X dimension is the
narrowest part of a barcode's symbology.
· x86-64 -
x86-64 is a 64-bit processing technology developed by
AMD that debuted with the Opteron and Athlon 64 processor.
· yottabyte
(YB) - A yottabyte is a measure of theoretical storage
capacity and is 2 to the 80th power bytes, or, in decimal,
approximately 1,000 zettabytes, a trillion terabytes or a million trillion
megabytes.
· zero
(0) - In mathematics, zero, symbolized by the numeric character
0, is both a place indicator meaning "no units of this multiple" in a
positional number system, and an independent value midway between
+1 and -1.
· zettabyte -
A zettabyte is a measure of storage capacity and is 2 to
the 70th power bytes, also expressed as 1021 or 1 sextillion bytes.
· zettaflops -
Zettaflop or (ZFlop) is a processing power of one
septillion floating point operations per second (FLOPS).
· zoetrope -
The zoetrope (pronounced ZOH-uh-trohp), invented in
1834 by William George Horner, was an early form of motion picture
projector that consisted of a drum containing a set of still images, that
was turned in a circular fashion in order to create the illusion of
motion.
· Zulu
(Zulu time) - Zulu (short for "Zulu time") is used in the
military and in navigation generally as a term for Universal
Coordinated Time (UCT), sometimes called Universal Time
Coordinated (UTC) or Coordinated Universal Time (but abbreviated
UTC), and formerly called Greenwich Mean Time.