Computer Vocab

Ace your homework & exams now with Quizwiz!

Bounce

. Returning E-mail When you send an e-mail message to another person, the mail server processes the message and delivers it to the appropriate user's mailbox. For example, if you send a message to "[email protected]," the mail.com server looks for a user named "mrman" to deliver the message to. If the user does not exist, the mail server may bounce the message back to the sender, saying "Sorry, that user does not exist." These messages often come from "Mail Delivery Subsystem" and have a subject line that reads "Returned mail: see transcript for details." 2. Restarting a Computer The term "bounce" can also describe the process of rebooting or restarting a computer. For example, a workstation may need to be bounced after installing new software. Similarly, a Web server may be bounced if websites hosted on the server are not responding correctly. 3. Exporting Audio "Bounce" can also describe the process of exporting several tracks in an audio mix to one mono track or two stereo tracks. This helps consolidate audio tracks after they have been mixed. Bouncing audio tracks limits the need for processing power since the computer only has to process one track instead of all the tracks individually. Digital Performer is the primary audio software program that uses bouncing to export audio. 4. Hiding a Network Connection Finally, "bouncing" can also be used in networking to describe a method of hiding the source of a user's network connection. This type of bouncing is often abbreviated "BNC." Someone who bounces his network connection is called a "bouncer," though this is not the same person who checks your ID at the bar.

ASP

1. Active Server Page This is a Web page that has one or more ASP scripts embedded in it. ASP scripts are like small computer programs that run when an ASP-based Web page is accessed. You can tell if you're accessing an active server page if the suffix of the URL is ".asp" (as opposed to ".html"). ASP pages are processed on a Web server before they are transferred to a user's Web browser. ASP pages are typically used for pages that have dynamic, or frequently changing information. For example, an ASP script might get a visitor's zip code through a form on a Web page, then customize the content on the resulting page based on that information. Since ASP technology was designed by Microsoft, ASP scripts are typically written in Microsoft's Visual Basic programming language. 2. Application Service Provider Sometimes refered to as an "app-on-tap," this is a third-party company that distributes software-based services from a central location to customers in other locations. ASPs offer companies services that would otherwise have to be done in-house, or onsite. Using an ASP is often an inexpensive way for companies and organizations to manage their information services. There are five main categories of Application Service Providers: Local or Regional ASP - supplies many different application services for smaller businesses or individuals in a local area. Specialist ASP - provides applications for specific needs, such as Human Resources or Web services. Vertical Market ASP - provides support to a specific industry such as Education. Enterprise ASP - delivers information and services for high-end business. Volume Business ASP - supplies small or medium-sized businesses with services in high volume.

Baseband

A baseband signal is an original transmission signal that has not be modulated, or has been demodulated to its original frequency. Most telecommunications protocols require baseband signals to be converted, or modulated, to a higher frequency so they can be transmitted over long distances. Therefore, the original baseband, or lowpass, signals are converted during the transmission process. When the signal arrives at the destination, it is demodulated so that the recipient receives the original baseband signal. Ethernet is an example of a protocol that does not require signal modulation, since it transmits data in baseband.

Batch File

A batch file is a type of script that contains a list of commands. These commands are executed in sequence and can be used to automate processes. For example, some programs may include a batch file that executes a number of commands as the program starts up. A user can also create a custom batch file to automate tedious processes such as copying multiple directories or renaming several files at once.

Batch Process

A batch process performs a list of commands in sequence. It be run by a computer's operating system using a script or batch file, or may be executed within a program using a macro or internal scripting tool. For example, an accountant may create a script to open several financial programs at once, saving him the hassle of opening each program individually. This type of batch process would be executed by the operating system, such as Windows or the Mac OS. A Photoshop user, on the other hand, might use a batch process to modify several images at one time. For example, she might record an action within Photoshop that resizes and crops an image. Once the action has been recorded, she can batch process a folder of images, which will perform the action on all the images in the folder.

Blob

A blob is a data type that can store binary data. This is different than most other data types used in databases, such as integers, floating point numbers, characters, and strings, which store letters and numbers. Since blobs can store binary data, they can be used to store images or other multimedia files. For example, a photo album could be stored in a database using a blob data type for the images, and a string data type for the captions.

Boot Disc

A boot disk is actually not a computer disk in the shape of a boot. If it was, most disk drives would have a difficult time reading it. Instead, a boot disk is a disk that a computer can start up or "boot" from. The most common type of boot disk is an internal hard drive, which most computers use to start up from. The operating system installed on the hard drive is loaded during the boot process.

Boot Sector

A boot sector is the first section of a hard drive or other data storage media. It contains the master boot record (MBR) which is accessed by the computer during the boot sequence. The boot sector may also include a partition map, which defines each disk partition.

Botnet

A botnet is a network of computers that are controlled from a single source. While some botnets are used for legitimate cluster computing purposes, most botnets are created for malicious activity. Some examples include sending spam messages, spreading viruses, and attacking Internet servers.

Buffer

A buffer contains data that is stored for a short amount of time, typically in the computer's memory (RAM). The purpose of a buffer is to hold data right before it is used. For example, when you download an audio or video file from the Internet, it may load the first 20% of it into a buffer and then begin to play. While the clip plays back, the computer continually downloads the rest of the clip and stores it in the buffer. Because the clip is being played from the buffer, not directly from the Internet, there is less of a chance that the audio or video will stall or skip when there is network congestion.

Byte

A byte is a set of 8 bits that represent a single character in the computer's memory. Do not confuse this term with "bite," as in taking a bite of a cookie, because that is totally different. While bits are often used to measure data transfer speeds, bytes are used to measure file sizes, hard disk space, and computer memory. Larger amounts of data are measured in units such as megabytes, gigabytes, and terabytes. For example, one kilobyte is equal to 1,024 bytes.

Cable Modem

A cable modem is used for connecting to the Internet and is much faster than a typical dial-up modem. While a 56K modem can receive data at about 53 Kbps, cable modems support data transfer rates of up to 30 Mbps. That's over 500 times faster. However, most ISPs limit their subscribers' transfer rates to less than 6 Mbps to conserve bandwidth.

Capthca

A captcha is a challenge-response test that determines whether a user is human or an automated bot. A typical captcha includes an image of distorted text and a form field for the user to enter the text. Captchas are commonly found at the end of website forms, and must be filled out in order for the form to be submitted. By requiring users to decipher and enter the captcha text, webmasters can prevent automated programs from sending spam or other unwanted data through online forms.

Cell

A cell is a location in a spreadsheet defined by the intersection of a row and column. For example, cell C7 is the cell located in the seventh row of column C. Cells may contain several types of data, including numbers, dates, and text. Static cells contain data that is directly entered by the user. Dynamic cells contain formulas and display the result of calculations based on the content of other cells in the spreadsheet.

Character

A character is any letter, number, space, punctuation mark, or symbol that can be typed on a computer. The word "computer," for example, consists of eight characters. The phrase "Hi there." takes up nine characters. Each character requires one byte of space, so "computer" takes up 8 bytes. The list of characters that can be typed is defined by the ASCII and extended ASCII set. Some of the symbols available are pretty strange and may even make you say, "That's quite a character!"

Checksum

A checksum is a calculated sum used to check the integrity of a file. It can be generated from one of many algorithms, such as cyclic redundancy check (CRC) or a cryptographic hash function. When the checksums of two sets of data match, it indicates that the data sets are identical. Therefore, checksums are a quick and easy way to verify disk images, burned discs, and other types of files.

Chipset

A chipset describes the architecture of an integrated circuit. This includes the layout of the circuitry, the components used within the circuit, and the functionality of the circuit board. For example, the chipset of a modem card is much much different than the chipset of a computer's CPU.

Clean Install

A clean install is an operating system (OS) installation that overwrites all other content on the hard disk. Unlike a typical OS upgrade, a clean install removes the current operating system and user files during the installation process. When a clean install finishes, the hard disk only contains the new operating system, similar to a computer that is used for the first time.

ASP.NET

ASP.NET is a set of Web development tools offered by Microsoft. Programs like Visual Studio .NET and Visual Web Developer allow Web developers to create dynamic websites using a visual interface. Of course, programmers can write their own code and scripts and incorporate it into ASP.NET websites as well. Though it often seen as a successor to Microsoft's ASP programming technology, ASP.NET also supports Visual Basic.NET, JScript .NET and open-source languages like Python and Perl.

Active-Matrix

Active-matrix technology is used in high-quality flat-panel displays, such as laptop screens and thin computer monitors. The images on active matrix screens are created by laying diodes, or small semiconductors, over a grid of ultra-small wires. When a current passes through the diodes, they light up in different colors, depending on the strength of the current. Thousands of these diodes next to each other form an image on the screen.

Adware

Adware is free software that is supported by advertisements. Common adware programs are toolbars that sit on your desktop or work in conjunction with your Web browser. They include features like advanced searching of the Web or your hard drive and better organization of your bookmarks and shortcuts. Adware can also be more advanced programs such as games or utilities. They are free to use, but require you to watch advertisements as long as the programs are open. Since the ads often allow you to click to a Web site, adware typically requires an active Internet connection to run.

Certificate

An SSL certificate, or secure certificate, is a file installed on a secure Web server that identifies a website. This digital certificate establishes the identity and authenticity of the company or merchant so that online shoppers can trust that the website is secure and reliable. In order to verify that these sites are legitimate (they are who they say they are), the companies and their websites are verified by a third party, such as Verisign or Thawte.

Access Point

An access point provides wireless access to a network. Devices connected to an access point can communicate with other devices on the network. They may also connect to the Internet if the access point is linked to an Internet connection, which is commonly the case. Access points that use Wi-Fi are also called base stations.

Add-on

An add-on is a software extension that adds extra features to a program. It may extend certain functions within the program, add new items to the program's interface, or give the program additional capabilities. For example, Mozilla Firefox, a popular Web browser, supports add-ons such as the Google toolbar, ad blockers, and Web developer tools. Some computer games support add-ons that provide extra maps, new characters, or give the player game-editing capabilities.

Alert Box

An alert box, sometimes called a message box, is a small window that pops up on your screen to warn you that your computer is about to perform an operation with potentially damaging consequences. For example, when you choose to empty the Trash or Recycle Bin on your computer, an alert box may pop up, saying "Are you sure you want to permanently remove these items?" You are then given the choice to select "OK," to delete the items, or "Cancel," to prevent the items from being removed. Alert boxes act as a safeguard for users, preventing us from doing things we wish we hadn't. Perhaps the most common alert box is the one that pops up when you try to close a document without saving it. You'll mostly likely see an alert box with the message, "Save changes to this document before closing?" You can select "Don't Save," to discard the changes, "Save," to save the changes before closing the document, or "Cancel," to cancel closing the document and continue working on it.

Algorithm

An algorithm is a set of instructions, sometimes called a procedure or a function, that is used to perform a certain task. This can be a simple process, such as adding two numbers together, or a complex function, such as adding effects to an image. For example, in order to sharpen a digital photo, the algorithm would need to process each pixel in the image and determine which ones to change and how much to change them in order to make the image look sharper.

Application

An application, or application program, is a software program that runs on your computer. Web browsers, e-mail programs, word processors, games, and utilities are all applications. The word "application" is used because each program has a specific application for the user. For example, a word processor can help a student create a research paper, while a video game can prevent the student from getting the paper done.

Archive

An archive contains multiple files and/or folders within a single file. Archives can be saved in several different formats, most of which incorporate file compression to reduce the file size. They are used for consolidating a group of files into a single package. This can be helpful when transferring multiple files to another user or when backing up data.

Array

An array is a data structure that contains a group of elements. Typically these elements are all of the same data type, such as an integer or string. Arrays are commonly used in computer programs to organize data so that a related set of values can be easily sorted or searched.

Autoresponder

An autoresponder is a program or script on a mail server that automatically replies to e-mails. Though it is run from the mail server, an autoresponder can usually be set up by the user through a Web-based interface. For example, a company might set up an autoresponder for their support e-mail address to let users know they have received their support requests. The automated reply might read something like, "Thank you, we have received your message. One of our technicians will attempt to answer your question after he finishes his dart game in the lobby."

Avatar

An avatar is an online character that represents a person. For example, games like World of Warcraft and the Sims Online allow players to create custom characters, known as avatars. Players can control their avatars and interact with other players in an online world. An avatar may also refer to the icon and username that a user chooses when registering for a website or online discussion forum. The avatar name and image typically shows up next to any contributions the user makes on the website.

Android

Android is Google's mobile operating system (OS) that is used by several smartphones, such as the G1, Droid, and Nexus One. Android is open source, meaning it is not linked to a specific cell phone manufacturer or service provider. The Android OS also supports third-party applications, which can be downloaded from Android Market, Google's online software store.

Apple

Apple is the company that makes Macintosh computers, such as the iMac, Mac mini, MacBook, MacBook Air, MacBook Pro, and Mac Pro. Apple also makes several personal electronic devices, including the iPod, iPhone, and iPad.

Archie

Archie is a program used for finding files stored on FTP (File Transfer Protocol) servers. Archie is not used very much anymore because to use it effectively, you need to know the exact file name you're looking for. Most file searching is now done via the Web with a Web browser like Internet Explorer or Netscape.

Analog

As humans, we perceive the world in analog. Everything we see and hear is a continuous transmission of information to our senses. This continuous stream is what defines analog data. Digital information, on the other hand, estimates analog data using only ones and zeros.

BASIC

BASIC originally used numbers at the beginning of each instruction (or line) to tell the computer what order to process the instructions. Lines would be numbered as 10, 20, 30, etc., which would allow additional instructions to be placed between commands later on if needed. "GOTO" statements enabled programs to loop back to earlier instructions during execution. For example, line 230 of a BASIC program may have an "if" clause that tells the computer to jump back to line 50 if a variable is less than 10. This instruction might look something like this: 230 IF (N < 10) THEN GOTO 50 More modern BASIC implementations use "while loops," which perform a series of instructions as long as a certain case is true. Newer BASIC development software also supports more data types, such as integers, strings, and arrays, for storing variables and other data. While the first BASIC development environments were strictly text-based, today's BASIC programming software allows developers to design much of their programs visually, using a graphical user interface. Some of the more popular BASIC development programs used today include REALbasic and Microsoft Visual Basic.

Backup

Backup is the most important computer term you should know. A backup is a copy of one or more files created as an alternate in case the original data is lost or becomes unusable. For example, you may save several copies of a research paper on your hard drive as backup files incase you decide to use a previous revision. Better yet, you could save the backups to a USB flash disk, which would also protect the files if the hard drive failed.

Bandwidth

Bandwidth refers to how much data you can send through a network or modem connection. It is usually measured in bits per second, or "bps." You can think of bandwidth as a highway with cars travelling on it. The highway is the network connection and the cars are the data. The wider the highway, the more cars can travel on it at one time. Therefore more cars can get to their destinations faster. The same principle applies to computer data -- the more bandwidth, the more information that can be transferred within a given amount of time.

Ad Hoc Network

Basically, an ad hoc network is a temporary network connection created for a specific purpose (such as transferring data from one computer to another). If the network is set up for a longer period of time, it is just a plain old local area network (LAN).

Beta Software

Before a commercial software program is released to the public, it usually goes through a "beta" phase. During this stage, the software is tested for bugs, crashes, errors, inconsistencies, and any other problems. Though beta versions of software used to be made available only to developers, they are now sometimes made available for the general public to test, usually through the software company's Web site. However, because beta software is free, the programs usually expire after a period of time. If you choose to test a beta software program, don't be surprised if it has multiple problems and causes your computer to repeatedly crash. After all, it is the beta version. You can tell if a program is still in beta by checking the program's properties. If there is a "b" in the version number (i.e. Version: 1.2 b3) that means it's a beta version.

Binary

Binary is a two-digit (Base-2) numerical system, which computers use to store data and compute functions. The reason computers use the binary system is because digital switches inside the computer can only be set to either on or off, which are represented by a 1 or 0. Though the binary system consists of only ones and zeros, the two digits can be used to represent any number.

Bing

Bing is a search engine created by Microsoft. It evolved from "MSN Search," which was later renamed "Windows Live Search," then "Live Search." In 2009, Microsoft decided to revamp their search engine and give it a simple name that is easy to remember and easy to say — "Bing."

Biometrics

Biometrics refers to technologies used to detect and recognize human physical characteristics. In the IT world, biometrics is often synonymous with "biometric authentication," a type of security authorization based on biometric input.

BitTorrent

BitTorrent is a peer-to-peer (P2P) file sharing protocol designed to reduce the bandwidth required to transfer files. It does this by distributing file transfers across multiple systems, thereby lessening the average bandwidth used by each computer. For example, if a user begins downloading a movie file, the BitTorrent system will locate multiple computers with the same file and begin downloading the file from several computers at once. Since most ISPs offer much faster download speeds than upload speeds, downloading from multiple computers can significantly increase the file transfer rate.

Bitrate

Bitrate, as the name implies, describes the rate at which bits are transferred from one location to another. In other words, it measures how much data is transmitted in a given amount of time. Bitrate is commonly measured in bits per second (bps), kilobits per second (Kbps), or megabits per second (Mbps). For example, a DSL connection may be able to download data at 768 kbps, while a Firewire 800 connection can transfer data up to 800 Mbps.

Blu-Ray

Blu-ray is an optical disc format such as CD and DVD. It was developed for recording and playing back high-definition (HD) video and for storing large amounts of data. While a CD can hold 700 MB of data and a basic DVD can hold 4.7 GB of data, a single Blu-ray disc can hold up to 25 GB of data. Even a double sided, dual layer DVD (which are not common) can only hold 17 GB of data. Dual-layer Blu-ray discs will be able to store 50 GB of data. That is equivalent to 4 hours of HDTV. Blu-ray discs can hold more information than other optical media because of the blue lasers the drives use. The laser is actually blue-violet, but "Blu-ray" rolls off the tounge a little easier than "Blu-violet-ray." The blue-violet laser has a shorter wavelength than the red lasers used for CDs and DVDs (405nm compared to 650nm). This allows the laser to focus on a smaller area, which makes it possible to cram significantly more data on a disc the same size as a CD or DVD. Proponents of the Blu-ray format say they expect Blu-ray devices to replace VCRs (thank goodness) and DVD recorders as more people make the transition to HDTV. For the latest Blu-ray news, check out Blu-ray.com.

C/C++

C is a high-level programming language that was developed in the mid-1970s. It was originally used for writing Unix programs, but is now used to write applications for nearly every available platform. Compared to most previous languages, C is easier to read, more flexible (can be used for a wide variety of purposes), and more efficient at using memory. C++, pronounced "C plus plus," is a programming language that was built off the C language. The syntax of C++ is nearly identical to C, but it has object-oriented features, which allow the programmer to create objects within the code. This makes programming easier, more efficient, and some would even say, more fun. Because of the power and flexibility of the language, most software programs today are written in C++.

CGI

CGI stands for "Common Gateway Interface" and is a standard set of rules that define how scripts and programs can be run on a Web server. The "Common" in "Common Gateway Interface" refers to how CGI scripts can run on multiple server platforms and may be written in several different languages. CGI is also short for "Computer Generated Imagery," which refers to 3D computer graphics used in film, TV, and other types of multimedia.

Card Reader

Card reader" is the generic term for an input device that reads flash memory cards. It can be a standalone device that connects to a computer via USB or it may be integrated into a computer, printer, or multifunction device. In fact, most multifunction printer/scanner/copiers now have built-in card readers.

Baud

Contrary to popular belief, baud is not a direct measurement of data transfer speed, but instead it measures how many electrical signals are sent per second. Baud is used to measure the rate of electrical signals, or "signaling elements," for modems, networks, serial cables, and other data transfer mediums.

Boot Sequence

Each time a computer boots up, it goes through an initial series of processes. This sequence of events is aptly named a "boot sequence." During the boot sequence, the computer activates the necessary hardware components and loads the appropriate software so that a user can interact with the machine.

Boot

In simple terms, to boot a computer is to turn it on. Once the computer's power is turned on, the "boot process" takes place. This process involves loading the startup instructions from the computer's ROM, followed by loading the operating system from the current boot disk. The boot disk is usually an internal hard drive, but can also be an external drive, a CD or DVD-ROM, or even a floppy disk. Once the operating system software is loaded, the boot process is complete and the computer is ready to be used.

Base Station

In the computer world, however, a base station refers to the wireless access point for computers with wireless cards. It is basically a router that communicates with devices based on the Wi-Fi standard. Some common Wi-Fi configurations include 802.11b and 802.11g. Wireless base stations are made by companies such as Netgear, Linksys, D-Link, Apple Computer, and other manufacturers. Fortunately, as long as the hardware is based on the Wi-Fi standard, all wireless cards can communicate with base stations from any manufacturer.

Backbone

Just like the human backbone carries signals to many smaller nerves in the body, a network backbone carries data to smaller lines of transmission. A local backbone refers to the main network lines that connect several local area networks (LANs) together. The result is a wide area network (WAN) linked by a backbone connection. The Internet, which is the ultimate wide area network, relies on a backbone to carry data over long distances. The Internet backbone consists of several ultra-high bandwidth connections that link together many different nodes around the world. These nodes route incoming data to smaller networks in the local region. The fewer "hops" your data needs to make before reaching the backbone, the faster it will get sent to the destination. This is why many Web hosts and ISPs have direct connections to the Internet backbone.

Access

Microsoft Access, often abbreviated "MS Access," is a popular database application for Windows. Access allows users to create custom databases that store information in an organized structure. The program also provides a visual interface for creating custom forms, tables, and SQL queries. Data can be entered into an Access database using either visual forms or a basic spreadsheet interface. The information stored within an Access database can be browsed, searched, and accessed from other programs, including Web services.

Bitmap

Most images you see on your computer are composed of bitmaps. A bitmap is a map of dots, or bits (hence the name), that looks like a picture as long you are sitting a reasonable distance away from the screen. Common bitmap filetypes include BMP (the raw bitmap format), JPEG, GIF, PICT, PCX, and TIFF. Because bitmap images are made up of a bunch of dots, if you zoom in on a bitmap, it appears to be very blocky. Vector graphics (created in programs such as Freehand, Illustrator, or CorelDraw) can scale larger without getting blocky.

Banner Ad

Perhaps the most prolific form of Web advertising is the banner ad. It is a long, rectangular image that can be placed just about anywhere on a Web page. Most banner ads are 468 pixels wide by 60 pixels high (468x60). They may contain text, images, or sometimes those annoying animations that make it hard to focus on the page's content. Regardless of the type of banner ad, when a user clicks the advertisement, he or she is redirected to the advertiser's website.

Abend

Short for "Abnormal end." An abend is an unexpected or abnormal end to a process. In computer software, it typically refers to a software crash when a program unexpectedly quits. For example, an error in a program's code may cause it to freeze or crash while running a certain command. The result is an unexpected (and often inconvenient) end to the program.

BMP

Short for "Bitmap." It can be pronounced as "bump," "B-M-P," or simply a "bitmap image." The BMP format is a commonly used raster graphic format for saving image files. It was introduced on the Windows platform, but is now recognized by many programs on both Macs and PCs. The BMP format stores color data for each pixel in the image without any compression. For example, a 10x10 pixel BMP image will include color data for 100 pixels. This method of storing image information allows for crisp, high-quality graphics, but also produces large file sizes. The JPEG and GIF formats are also bitmaps, but use image compression algorithms that can significantly decrease their file size. For this reason, JPEG and GIF images are used on the Web, while BMP images are often used for printable images.

Blog

Short for "Web Log," this term refers to a list of journal entries posted on a Web page. Anybody who knows how to create and publish a Web page can publish their own blog. Some Web hosts have made it even easier by creating an interface where users can simply type a text entry and hit "publish" to publish their blog.

Bookmark

Similar to a real-life bookmark, an Internet bookmark acts as a marker for a Web site. (In Internet Explorer, they're called "Favorites".) When using a Web browser, you can simply select a bookmark from the browser's Bookmarks menu to go to a certain site. This way, you don't have to go through the redundant process of typing in the Internet address each time you visit one of your favorite sites.

AGP

Stands for "Accelerated Graphics Port." This is a graphics card expansion port designed by Intel that resides on the motherboard of a computer. PCI graphics ports typically run at 33 MHz and have a maximum transfer rate of 132 MB/sec. AGP ports, on the other hand, run at 66 MHz and can transfer data up to 528 MB/sec. This allows games and applications to store and retrieve larger, more realistic 3D shapes and textures without slowing down the animation on the screen. Additionally, AGP cards can store graphics in system memory rather than video memory, which also helps improve performance. Becuase of these advantages, AGP cards will typically have better performance per MB of VRAM than PCI graphics cards.

ACL

Stands for "Access Control List." An ACL is a list of user permissions for a file, folder, or other object. It defines what users and groups can access the object and what operations they can perform. These operations typically include read, write, and execute. For example, if an ACL specifies read-only access for a specific user of a file, that user will be able open the file, but cannot write to it or run the file.

ARP

Stands for "Address Resolution Protocol." ARP is a protocol used for mapping an IP address to a computer connected to a local network LAN. Since each computer has a unique physical address called a MAC address, the ARP converts the IP address to the MAC address. This ensures each computer has a unique network identification. The Address Resolution Protocol is used when information sent to a network arrives at the gateway, which serves as the entrance point to the network. The gateway uses the ARP to locate the MAC address of the computer based on the IP address the data is being sent to. The ARP typically looks up this information in a table called the "ARP cache." If the address is found, the information is relayed to the gateway, which will send the incoming data to the appropriate machine. It may also convert the data to the correct network format if necessary.

AIX

Stands for "Advanced Interactive Executive," though some Linux fans have been known to refer to it as "Ain't UNIX." AIX is an operating system developed by IBM and is in fact Unix-based. It is typically used for enterprise servers and comes with a robust set of security options such as Kerberos V5 network authentication and dynamic secure tunnel authentication. AIX allows the system administrator to divide memory, CPU, and disk access between various jobs. The system supports IBM's 64-bit POWER processor and is backwards-compatible with 32-bit applications. It also runs most Linux applications (after recompiling them) and has full support for Java 2. If all that jargon makes no sense to you, relax -- AIX is not your typical consumer operating system. It is mainly used for servers in large businesses where IT geeks get to work with it.

ATA

Stands for "Advanced Technology Attachment." It is a type of disk drive that integrates the drive controller directly on the drive itself. Computers can use ATA hard drives without a specific controller to support the drive. The motherboard must still support an ATA connection, but a separate card (such as a SCSI card for a SCSI hard drive) is not needed. Some different types of ATA standards include ATA-1, ATA-2 (a.k.a. Fast ATA), ATA-3, Ultra ATA (33 MBps maximum transfer rate), ATA/66 (66 MBps), and ATA/100 (100 MBps).

ANSI

Stands for "American National Standards Institute." ANSI's primary goal is to enhance the global competitiveness of U.S. businesses and to improve the American quality of life by promoting and facilitating voluntary consensus standards and conformity assessment systems. "Voluntary" standards are driven by marketplace needs rather than regulated by the government. "Conformity assessment systems" test the compliance of a product or service to a standard. ANSI does not itself develop standards or conduct tests, rather it facilitates this work by "accrediting" (i.e., recognizing) qualified groups with appropriate expertise. The Institute is the official U.S. representative to the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). ANSI is a private, nonprofit membership organization with offices in Washington, DC and New York City.

ASCII

Stands for "American Standard Code for Information Interchange." ASCII is the universal standard for the numerical codes computers use to represent all upper and lower-case letters, numbers, and punctuation. Without ASCII, each type of computer would use a different way of representing letters and numbers, causing major chaos for computer programmers (allowing them even less sleep than they already get).

ADC

Stands for "Analog-to-Digital Converter." Since computers only process digital information, they require digital input. Therefore, if an analog input is sent to a computer, an analog-to-digital converter (ADC) is required. This device can take an analog signal, such as an electrical current, and digitize it into a binary format that the computer can understand.

API

Stands for "Application Program Interface," though it is sometimes referred to as an "Application Programming Interface." An API is a set of commands, functions, and protocols which programmers can use when building software for a specific operating system. The API allows programmers to use predefined functions to interact with the operating system, instead of writing them from scratch.

ADSL

Stands for "Asymmetric Digital Subscriber Line." ADSL is a type of DSL, which is a method of transferring data over copper telephone lines. While symmetrical DSL (SDSL) uploads and downloads data at the same speed, ADSL has different maximum data transfer rates for uploading and downloading data.

ATM

Stands for "Asynchronous Transfer Mode." Most people know of ATMs as automated teller machines -- those friendly boxes that allow you to withdraw cash from your bank or credit account while charging you a ridiculous surcharge for the service. In the computer world, however, ATM has a different meaning. Asynchronous Transfer Mode is a networking technology that transfers data in packets or cells of a fixed size.

AIFF

Stands for "Audio Interchange File Format." AIFF is an audio format originally developed by Apple Computer for storing high-quality sampled audio data. AIFF files are similar to Windows WAVE files in both size and quality. Both AIFF and WAVE files can hold CD quality audio and therefore can be burned onto an audio CD. Though the AIFF format was created by Apple, audio programs on both the Mac and PC can typically read the files.

ADF

Stands for "Automatic Document Feeder." An ADF is used in copiers and scanners to feed pages into the machine. It allows multiple pages to be copied or scanned at one time without the need to place each individual page in the copier or scanner.

BIOS

Stands for "Basic Input/Output System." Most people don't need to ever mess with the BIOS on a computer, but it can be helpful to know what it is. The BIOS is a program pre-installed on Windows-based computers (not on Macs) that the computer uses to start up. The CPU accesses the BIOS even before the operating system is loaded. The BIOS then checks all your hardware connections and locates all your devices. If everything is OK, the BIOS loads the operating system into the computer's memory and finishes the boot-up process.

bps

Stands for "Bits Per Second." (The "b" is lowercase because it stands for bits, not bytes.) Bits per second is the standard way of measuring how fast data moves across a network or phone system. For example, a 56K modem can hypothetically transfer data at 56,700 bits per second.

BCC

Stands for "Blind Carbon Copy." When you send an e-mail to only one person, you type the recipient's address in the "To:" field. When you send a message to more than one person, you have the option to enter addresses in the "Cc:" and "Bcc:" fields. "Cc" stands for "Carbon Copy," while "Bcc" stands for "Blind Carbon Copy."

Cc

Stands for "Carbon Copy." The term comes from carbon copying, in which a piece of carbon paper copies writing from one paper to another (often used when filling out forms). However, the term is now commonly used in reference to e-mail. When you send an e-mail message, you typically type the recipient's address in the "To:" field. If you want to send the message to one or more other recipients, you can use the "Cc:" field to add additional addresses. This will send the e-mail to the address in the "To:" field and to each address listed in the "Cc:" field as well.

CCD

Stands for "Charged Coupled Device." CCDs are sensors used in digital cameras and video cameras to record still and moving images. The CCD captures light and converts it to digital data that is recorded by the camera. For this reason, a CCD is often considered the digital version of film. The quality of an image captured by a CCD depends on the resolution of the sensor. In digital cameras, the resolution is measured in Megapixels (or thousands of or pixels. Therefore, an 8MP digital camera can capture twice as much information as a 4MP camera. The result is a larger photo with more detail.

CDMA

Stands for "Code Division Multiple Access." CDMA is a wireless transmission technology that was developed during World War II by the English allies to avoid having their transmissions jammed. After the war ended, Qualcomm patented the technology and made it commercially available as a digital cellular technology. Now CDMA is a popular communications method used by many cell phone companies.

CISC

Stands for "Complex Instruction Set Computing." This is a type of microprocessor design. The CISC architecture contains a large set of computer instructions that range from very simple to very complex and specialized. Though the design was intended to compute complex instructions in the most efficient way, it was later found that many small, short instructions could compute complex instructions more efficiently. This led to a design called Reduced Instruction Set Computing (RISC), which is now the other major kind of microprocessor architecture. Intel Pentium processors are mainly CISC-based, with some RISC facilities built into them, whereas the PowerPC processors are completely RISC-based.

CAD

Stands for "Computer-Aided Design." Also known by engineers and architects as the best invention of all time. Today, CAD software is used for nearly all three-dimensional designing. Designers can turn an object into an electronic representation more quickly and accurately than by diagraming it with a pencil and paper. Better yet, objects created with CAD software can be moved, resized, and rotated instantly. With a pencil and paper, you can only erase so much before it starts to smudge.

Chip

Technically speaking, a computer chip is a piece of silicon with an electronic circuit embedded in it. However, the word "chip" is often used as a slang term that refers to various components inside a computer. It typically describes an integrated circuit, or IC, such as a central processor or a graphics chip, but may also refer to other components such as a memory module.

Bus

The computer's primary bus is called the frontside bus and connects the CPU to the rest of the components on the motherboard. Expansion buses, such as PCI and AGP, allow data to move to and from expansion cards, including video cards and other I/O devices. While there are several buses inside a computer, the speed of the frontside bus is the most important, as it determines how fast data can move in and out of the processor.

Bespoke

The term "bespoke" comes from England where it originally referred to custom or tailor-made clothing. In recent years, however, the term has been applied to information technology (IT), and refers to custom services or products.

Cache

There are many different types of caches but they all serve the same purpose. A cache stores recently-used information in a place where it can be accessed extremely fast. For example, a Web browser like Internet Explorer uses a cache to store the pages, images, and URLs of recently visted Web sites on your hard drive. With this neat strategy, when you visit a page you have recently been to, the pages and images don't have to be downloaded to your computer all over again. Because accessing your computer's hard disk is much faster than accessing the Internet, caching Web sites can speed up Web browsing significantly. Most Web browsers allow you to adjust the size of the cache in in browser preferenecs.

ActiveX

This Microsoft-based technology was built to link desktop applications to the World Wide Web. Using ActiveX development tools, software developers can create interactive Web content for their applications. For example, Word and Excel documents can be viewed directly in Web browsers that supports ActiveX. While ActiveX is a useful technology, the downside is that you need to have a up-to-date version ActiveX installed on your machine in order to use ActiveX-enabled content.

Applet

This a Java program that can be embedded in a Web page. The difference between a standard Java application and a Java applet is that an applet can't access system resources on the local computer. System files and serial devices (modems, printers, scanners, etc.) cannot be called or used by the applet. This is for security reasons -- nobody wants their system wiped out by a malicious applet on some wacko's Web site. Applets have helped make the Web more dynamic and entertaining and have given a helpful boost to the Java programming language.

Bot

This is an automated software program that can execute certain commands when it receives a specific input (like a ro-"bot"). Bots are most often seen at work in the Internet-related areas of online chat and Web searching. The online chat bots do things like greet people when they enter a chat room, advertise Web sites, and kick people out of chat rooms when they violate the chat room rules. Web searching bots, also known as spiders and crawlers, search the Web and retrieve millions of HTML documents, then record the information and links found on the pages. From there, they generate electronic catalogs of the sites that have been "spidered." These catalogs make up the index of sites that are used for search engine results.

Broadband

This refers to high-speed data transmission in which a single cable can carry a large amount of data at once. The most common types of Internet broadband connections are cable modems (which use the same connection as cable TV) and DSL modems (which use your existing phone line). Because of its multiple channel capacity, broadband has started to replace baseband, the single-channel technology originally used in most computer networks. So now when you see companies like AT&T and SBC pushing those fancy "broadband" ads in your face, you'll at least know what they are talking about.

Bluetooth

This wireless technology enables communication between Bluetooth-compatible devices. It is used for short-range connections between desktop and laptop computers, PDAs (like the Palm Pilot or Handspring Visor), digital cameras, scanners, cellular phones, and printers.

Affiliate

Website affiliates are what drive Internet marketing. Companies run affiliate programs to generate leads and sales from other Websites. They pay the sites who host their ads a commission for products sold through the links on their sites. For example, if a site owner signs up for Amazon.com's affiliate program, he will receive ad banners or links from Amazon.com that he can place anywhere on his site. Then, if a visitor clicks on the Amazon.com banner or a link on his site and buys something, he will receive a commission. Unfortunately for Website owners, affiliate commisions are seldom above 5%, since most Web sales are made with small profit margins.

Burn

When you "burn a disc," you write data on it. If you were taking an SAT test, the analogy would look something like this: Hard Disk : Write :: CD/DVD : Burn The reason the term "burn" is used is because the CD-writer, or burner, literally burns the data onto a writable CD. The laser in a CD-writer can be cranked up to a more powerful level than an ordinary CD-ROM laser. This enables it to engrave thousands of 1's and 0's onto a CD.

Backside Bus

While the frontside bus carries data between the CPU and memory, the backside bus transfers data to and from the computer's secondary cache. The secondary, or L2 cache stores frequently used functions and other data close to the processor. This allows the computer's CPU to work more efficiently since it can repeat processes faster.

Browser

You are probably using a browser to read this right now. A Web browser, often just called a "browser," is the program people use to access the World Wide Web. It interprets HTML code including text, images, hypertext links, Javascript, and Java applets. After rendering the HTML code, the browser displays a nicely formatted page. Some common browsers are Microsoft Internet Explorer, Netscape Communicator, and Apple Safari.

Bug

a bug is an error in a software program. It may cause a program to unexpectedly quit or behave in an unintended manner. For example, a small bug may cause a button within a program's interface not to respond when you click it. A more serious bug may cause the program to hang or crash due to an infinite calculation or memory leak.

Bit

he computer term "bit" comes from the phrase "Binary DigIT," which is different than that thing you put around a horse's mouth. A bit is a single digit number in base-2 (a zero or a one) and is the smallest unit of computer data. A full page of text is composed of about 16,000 bits.

Boolean

his is the logic that computers use to determine if a statement is true or false. There are 4 main boolean operators: AND, NOT, OR, and XOR. Below are some examples of how the 4 operators work: x AND y returns True if both x and y are true, otherwise the expression returns False. NOT x returns True if x is false (or null) and False if x is true. x OR y returns True if either x or y or both are true; only if they are both false will it return False. x XOR y returns True if either x or y are true, but not both. If x and y are both true or false, the statement will return False.

Camera RAW

many high-end cameras have the ability to shoot in RAW mode. This mode does not compress the images at all and leaves them completely unprocessed.

Bridge

n computer networking, a bridge serves the same purpose. It connects two or more local area networks (LANs) together. The cars, or the data in this case, use the bridge to travel to and from different areas of the network. The device is similar to a router, but it does not analyze the data being forwarded. Because of this, bridges are typically fast at transferring data, but not as versatile as a router. For example, a bridge cannot be used as a firewall like most routers can. A bridge can transfer data between different protocols (i.e. a Token Ring and Ethernet network) and operates at the "data link layer" or level 2 of the OSI (Open Systems Interconnection) networking reference model.


Related study sets

Network Defense and Security Midterm

View Set

BLAW FINAl T/F Chapters 7,8, & 22

View Set

Intro to Business Exam 4 Questions

View Set

Checking/Savings and Credit Unit

View Set

Commercial and Investment Properties Exam Prep

View Set

Developmental Concepts - OB Module 1

View Set

مراجعة جدول الضرب

View Set