IT ENGLISH: DS Terms & Definitions (English-English) *WORK IN PROGRESS

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

BinHex

A common file format for Macintosh computers; it enables a binary file to be transferred over the Internet as an ASCII file. Using a program like Stuffit, a file can be encoded and renamed with an ".hqx" extension. The recipient uses a similar program to decode the file.

binary file

A file that cannot be read by standard text editor programs like Notepad or Simple Text. Examples: documents created by applications such as Microsoft Word or WordPerfect or DOS files with the extension ".com" or ".exe".

boolean logic

A form of algebra in which all values are reduced to either true/false, yes/no, on/off, or 1/0.

client

A program or computer that connects to and requests information from a server. Examples: Internet Explorer or Firefox. A client program also may be referred to as "client software" or "client-server software".

browser

A program used to access World Wide Web pages. Examples: Firefox, Safari or Internet Explorer.

AT command set

An industry standard set of commands beginning with the letters "AT" that are used to control a modem. Example: ATDT tells the modem to dial (D) using touch-tone dialing (T). ATDP specifies pulse dialing (P). Also referred to as the "Hayes Command Set".

anonymous FTP

Archive sites where Internet users can log in and download files and programs without a special username or password. Typically, you enter anonymous as a username and your e-mail address as a password.

bitmap

Bitmap file; a common image format on Windows computers. Files of this type usually have the suffix ".bmp" as part of their name.

BI

Business Intelligence - A recognized industry term for organizational analytics, including historical, current, and predictive views of business operations. To learn more please click here.

CGI

Common Gateway Interface; a mechanism used by most web servers to process data received from a client browser (e.g., a user). CGI scripts contain the instructions that tell the web server what to do with the data.

DaaS

Desktop-as-a-Service - Also called virtual desktop or hosted desktop services, it is the outsourcing of a virtual desktop infrastructure (VDI) to a third- party service provider. To learn more please click here.

case-sensitive

Generally applies to a data input field; a case-sensitive restriction means lower-case letters are not equivalent to the same letters in upper-case. Example: "data" is not recognized as being the same word as "Data" or "DATA".

attachment

In this context, a file that is sent along with an e-mail message. ASCII (plain text) files may be appended to the message text, but other types of files are encoded and sent separately (common formats that can be selected include MIME, BinHex, and Uuencode).

blended learning

Instruction that combines aspects of both face-to-face (F2F) and online learning experiences. An increasing number of courses at OSU now offer this type of mix.

buffer

On a multitasking system, a certain amount of RAM that is allocated as a temporary holding area so that the CPU can manipulate data before transferring it to a particular device.

blog

Refers to a weblog, a web page that contains journal-like entries and links that are updated daily for public viewing.

courseware

Software designed specifically for use in a classroom or other educational setting.

cloud

a common shorthand for a provided cloud computing service (or even an aggregation of all existing cloud services) is "The Cloud".To learn more please click here.

authentication

The process of identifying yourself and the verification that you're who you say you are. Computers where restricted information is stored may require you to enter your username and password to gain access.

compress

The process of making a file smaller so that it will save disk space and transfer faster over a network. The most common compression utilities are Winrar for PC or compatible computers (.zip files) and or Stuffit (.sit files) for Macintosh computers.

CMS

'Content Management System' is the collection of procedures used to manage work flow in a collaborative environment. In a CMS, data can be defined as nearly anything: documents, movies, pictures, phone numbers, scientific data, and so forth. CMSs are frequently used for storing, controlling, revising, semantically enriching, and publishing documentation. Serving as a central repository, the CMS increases the version level of new updates to an already existing file. Version control is one of the primary advantages of a CMS.

CD-RW, CD-R disk

A CD-RW disk allows you to write data onto it multiple times instead of just once (a CD-R disk). With a CD-R drive you can use a CD-RW disk just like a floppy or zip disk for backing up files, as well as for creating CD-ROMs and audio CDs.

bit

A binary digit (either 0 or 1); it is the most basic unit of data that can be recognized and processed by a computer.

catcha

A challenge-response test in the form of an image of distorted text the user must enter that to determine whether the user is human or an automated bot.

database

A collection of information organized so that a computer application can quickly access selected information; it can be thought of as an electronic filing system. Traditional databases are organized by fields, records (a complete set of fields), and files (a collection of records). Alternatively, in a Hypertext database, any object (e.g., text, a picture, or a film) can be linked to any other object.

data center

A data center (data centre / datacentre / datacenter) is a facility used to house computer systems and associated components, such as telecommunications and storage systems. It generally includes redundant or backup power supplies, redundant data communications connections, environmental controls (e.g., air conditioning, fire suppression) and security devices.

access point

A device that allows wireless-equipped computers and other devices to communicate with a wired network.

bridge

A device used for connecting two Local Area Networks (LANs) or two segments of the same LAN; bridges forward packets without analyzing or re-routing them.

bookmark

A feature available in certain programs like Internet Explorer, Firefox, and Acrobat Reader; it is a shortcut you can use to get to a particular web page (IE and Firefox) or to a specified location within a document (PDF).

ASCII file

A file that can be opened and read by standard text editor programs (for example, Notepad or Simple Text) on almost any type of computer. Also referred to as "plain text files". Examples: documents saved in ASCII format within word processors like Microsoft Word or WordPerfect; e-mail messages created by a program like Outlook; or HTML files.

cloud computing

A general term used to describe Internet services such as social networking services (e.g., Facebook and Twitter), online backup services, and applications that run within a Web browser. Cloud computing also includes computer networks that are connected over the Internet for server redundancy or cluster computing purposes.

byte

A group of adjacent binary digits that a computer processes as a unit to form a character such as the letter "C". A byte consists of eight bits.

broadband connection

A high-speed Internet connection; at present, cable modems and DSL (Digital Subscriber Lines) are the two technologies that are most commonly available to provide such access.

bandwidth

A measurement of the amount of data that can be transmitted over a network at any given time. The higher the network's bandwidth, the greater the volume of data that can be transmitted.

degauss

A process used to remove magnetism from a computer monitors. Note flat-panel displays do not have a degauss button since magnetism doesn't build up in them.

applet

A program capable of running on any computer regardless of the operating system. Many applets can be downloaded from various sites on the Internet.

application

A program designed for a specific purpose, such as word processing or graphic design.

alias

A short, easy to remember name created for use in place of a longer, more complicated name; commonly used in e-mail applications. Also referred to as a "nickname".

cookie

A small piece of information you may be asked to accept when connecting to certain servers via a web browser. It is used throughout your session as a means of identifying you. A cookie is specific to, and sent only to the server that generated it.

daemon

A special small program that performs a specific task; it may run all the time watching a system, or it can take action only when a task needs to be performed. Example: If an e-mail message is returned to you as undeliverable, you may receive a message from the mailer daemon.

cursor

A special symbol that indicates where the next character you type on your screen will appear. You use your mouse or the arrow keys on your keyboard to move the cursor around on your screen.

cable modem

A special type of modem that connects to a local cable TV line to provide a continuous connection to the Internet. Like an analog modem, a cable modem is used to send and receive data, but the difference is that transfer speeds are much faster. A 56 Kbps modem can receive data at about 53 Kbps, while a cable modem can achieve about 1.5 Mbps (about 30 times faster). Cable modems attach to a 10Base-T Ethernet card inside your computer.

ActiveX

A technology from Microsoft that links desktop applications to the World Wide Web. Using ActiveX tools, interactive web content can be created. Example: In addition to viewing Word and Excel documents from within a browser, additional functionality such as animation, credit card transactions, or spreadsheet calculations.

bounce

A term applied to an e-mail message when it is returned to you as undeliverable.

cyberspace

A term describing the world of computers and the society that uses them

connect

A term that commonly refers to accessing a remote computer; also a message that appears at the point when two modems recognize each other.

backbone

A term that is often used to describe the main network connections that comprise the Internet or other major network.

CD-R drive

A type of disk drive that can create CD-ROMs and audio CDs. CD-R drives that feature multi session recording allow you to continue adding data to a compact disk which is very important if you plan on using the drive for backup.

bluetooth

A wireless networking technology that allows users to send voice and data from one electronic device to another via radio waves.

carrier services

As authorized agents for the biggest names in the telecommunications industry, Dataprise will deliver the most appropriate and cost-effective carrier solutions for your organization. Dataprise will design, implement and support all of your Data, Internet, Voice and Conferencing solutions. To learn more please click here.

accessibility

As specified in Section 508 of the 1998 Rehabilitation Act, the process of designing and developing Web sites and other technology that can be navigated and understood by all people, including those with visual, hearing, motor, or cognitive impairments. This type of design also can benefit people with older/slower software and hardware.

BYOD

Bring Your Own Device or "BYOD" is a business and technology policy that allows employees to bring in personal mobile devices and use these devices to access company data, email, etc.

business continuity plan

Business Continuity Plan or "BCP" is a set of documents, instructions, and procedures which enable a business to respond to accidents, disasters, emergencies, and/or threats without any stoppage or hindrance in its key operations. It is also called a business resumption plan, disaster recovery plan, or recovery plan. Also see above explanation. To learn more please click here.

BCP

Business Continuity Plan, or "BCP," is a set of documents, instructions, and procedures which enable a business to respond to accidents, disasters, emergencies, and/or threats without any stoppage or hindrance in its key operations. It is also called a business resumption plan, disaster recovery plan, or recovery plan.

business continuity

Business continuity is the activity performed by an organization to ensure that critical business functions will be available to customers, suppliers, regulators, and other entities that must have access to those functions. These activities include many daily chores such as project management, system backups, change control, and help desk. Business Continuity is not something implemented at the time of a disaster; Business Continuity refers to those activities performed daily to maintain service, consistency, and recoverability. To learn more please click here.

CSS

Cascading Style Sheet; A set of rules that define how web pages are displayed using CSS, designers can create rules that define how page

CPU

Central processing unit; the part of a computer that oversees all operations and calculations.

CSP

Cloud Service Provider; a business model for providing cloud services. To learn more please click here.

CD-ROM

Compact Disk, Read Only Memory; a high-capacity secondary storage medium. Information contained on a CD is read-only. Special CD-ROM mastering equipment available in the OIT Multimedia Lab can be reserved for creating new CDs.

CBT

Computer-Based Training; a type of training in which a student learns a particular application by using special programs on a computer. Sometimes referred to as "CAI" (Computer-Assisted Instruction) or "CBI" (Computer-Based Instruction), although these two terms may also be used to describe a computer program used to assist a teacher or trainer in classroom instruction.

buffered

Data that is collected but not made immediately available. Compare to a language translator who listens to a whole statement before repeating what the speaker has said rather than providing a word-by-word translation. Example: Streaming media data viewable using a tool like RealMedia Player is buffered.

address

Identifies the location of an Internet resource. Examples: an e-mail address ([email protected]); a web address (http://www.dataprise.com); or an internet address (192.168.100.1).

decompress

Opposite of compressing a file; the process of restoring the file to its original size and format. The most common programs for decompressing files are Winrar for PC and compatible computers (.zip files) and Stuffit Expander (.sit files) for Macintosh computers.

chat

Real-time communication between two or more users via networked-connected computers. After you enter a chat (or chat room), any user can type a message that will appear on the monitors of all the other participants. While most ISPs offer chat, it is not supported by OIT. However, the campus CMS (Carmen) supported by TELR does provide the capability for live chat among students participating in online courses.

client-server technology

Refers to a connection between networked computers in which the services of one computer (the server) are requested by the other (the client). Information obtained is then processed locally on the client computer.

cache

Refers to: 1) a region of computer memory where frequently accessed data can be stored for rapid access; or 2) a optional file on your hard drive where such data also can be stored. Examples: Internet Explorer and Firefox have options for defining both memory and disk cache. The act of storing data for fast retrieval is called "caching".

defragmentation

The process of rewriting parts of a file to contiguous sectors on a hard drive to increase the speed of access and retrieval.

anti-spam

To prevent e-mail spam, both end users and administrators of e-mail systems use various anti-spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users and administrators. No one technique is a complete solution to the spam problem, and each has trade-offs between incorrectly rejecting legitimate e-mail vs. not rejecting all spam, and the associated costs in time and effort. Dataprise Cloud-Based Anti-SPAM e-mail service eliminates the problem almost entirely. Our state-of-the-art solution lets users see only the e-mail they want — and filters out all of the viruses and e-solicitations they don't want before they reach user's computers and mobile devices. To learn more click here.


Kaugnay na mga set ng pag-aaral

Strategic Management Chapters 1, 4, 5, 7, 6

View Set

Integrative Pathophysiology Module 5

View Set

Business Law 1- Chapter 10 Contract Performance, Breach, and Remedies

View Set

Module 2, 2.1.3 Python Operators

View Set

Combo with "Patient Management: Dental Boards Mastery II" and 6 others

View Set