Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
1. A worksheet, also referred to as a spreadsheet, is a computerized page allowing the user to manipulate many columns and rows of numbers. The worksheet can contain formulas so that if one number is changed, the entire worksheet is automatically updated, based on those formulas. Worksheets can be made with Microsoft Excel and other Formula based Software or Programs. 2. In computing, "word" is a term for the natural unit of data used by a particular computer design. A word is simply a fixed-sized group of bits that are handled together by the machine. The number of bits in a word (the word size or word length) is an important characteristic of a computer architecture. 3. A word processor (more formally known as document preparation system) is a computer application used for the production (including composition, editing, formatting, and possibly printing) of any sort of printable material. 4. A wireless LAN or WLAN is a wireless local area network, which is the linking of two or more computers without using wires. 5. A network card, network adapter or NIC (network interface controller) is a piece of computer hardware designed to allow computers to communicate over a computer network. It is both an OSI layer 1 (physical layer) and layer 2 (data link layer) device, as it provides physical access to a networking medium and provides a low-level addressing system through the use of MAC addresses. It allows users to connect to each other either by using cables or wirelessly. 6. In computing, Winsock (short for Windows Sockets) is a specification that defines how Windows network software should access network services, especially TCP/IP. 7. Windows XP is a line of proprietary operating systems developed by Microsoft for use on general-purpose computer systems, including home and business desktops, notebook computers, and media centers. 8. A wide area network (WAN) is a computer network that covers a broad geographical area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries [1]). Or, less formally, a network that uses routers and public communications links [1]. Contrast with personal area networks (PANs), local area networks (LANs), campus area networks (CANs), or metropolitan area networks (MANs) which are usually limited to a room, building, campus or specific metropolitan area (e.g., a city) respectively. The largest and most well-known example of a WAN is the Internet. 9. Linux refers to any Unix-like computer operating system that uses the Linux kernel. Initially developed and used primarily by individual enthusiasts on personal computers, Linux has since gained the support of corporations such as IBM, Sun Microsystems, Hewlett-Packard, and Novell, Inc., and has risen to prominence as an operating system for servers; Netcraft reported in September 2006 that eight of the ten most reliable internet hosting companies run Linux on their web servers.[1] The Linux kernel is one of the most prominent examples of free software and of open source development; its underlying source code is available for anyone to use, modify, and redistribute freely. 10. A vector-based graphics program uses points connected with curved or straight lines, like connect-the-dots. The spaces defined by the lines can be empty or filled with color. These points, curves, and lines are defined with code. The code is basically a set of x, y coordinates and draw commands. The advantage to using vector art is that it is resolution independent (it can be enlarged and will never lose quality). 11. A firewall is an information technology (IT) security device which is configured to permit, deny or proxy data connections set and configured by the organization's security policy. Firewalls can either be hardware and/or software based. 12. Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware). Antivirus software typically uses two different techniques to accomplish this: Examining (scanning) files to look for known viruses matching definitions in a virus dictionary Identifying suspicious behavior from any computer program which might indicate infection. Such analysis may include data captures, port monitoring and other methods. 13. In the field of information technology, backup refers to the copying of data so that these additional copies may be restored after a data loss event. Backups are useful primarily for two purposes: to restore a computer to an operational state following a disaster (called disaster recovery) and to restore small numbers of files after they have been accidentally deleted or corrupted. 14. A graphical user interface (or GUI, often pronounced "gooey"), is a particular case of user interface for interacting with a computer which employs graphical images and widgets in addition to text to represent the information and actions available to the user. Usually the actions are performed through direct manipulation of the graphical elements. 15. To remove hardware or software from a computer system. In order to remove a software application from a PC, an uninstall program, also called an "uninstaller," deletes all the files that were initially copied to the hard disk and restores the AUTOEXEC.BAT, CONFIG.SYS, WIN.INI and SYSTEM.INI files if they were modified. Most applications come with their own uninstall utility. Otherwise, a generic uninstall program can be used to uninstall any application. Such a program must be running when a new application is first installed, because it works by recording all changes made to the computer system. 16. Twisted pair cabling is a form of wiring in which two conductors are wound together for the purposes of canceling out electromagnetic interference from external sources and crosstalk from neighboring wires. Twisting wires decreases interference because the loop area between the wires (which determines the magnetic coupling into the signal) is reduced. Often the two wires carry equal and opposite signals (differential mode) which are combined by subtraction at the destination. The noise from the two wires cancel each other in this subtraction because the two wires have been exposed to similar electromagnetic interference. The twist rate (usually defined in twists per meter) makes up part of the specification for a given type of cable. The greater the number of twists, the greater the attenuation of crosstalk. 17. A transistor is a semiconductor device that uses a small amount of voltage or electrical current to control a larger change in voltage or current. The transistor is the fundamental building block of the circuitry that governs the operation of computers, cellular phones, and all other modern electronics. Because of its fast response and accuracy, the transistor may be used in a wide variety of digital and analog functions, including amplification, switching, voltage regulation, signal modulation, and oscillators. Transistors may be packaged individually or as part of an integrated circuit chip, which may hold thousands of transistors in a very small area. 18. Platters are organized into specific structures to enable the organized storage and retrieval of data. Each platter is broken into tracks--tens of thousands of them--which are tightly-packed concentric circles. These are similar in structure to the annual rings of a tree (but not similar to the grooves in a vinyl record album, which form a connected spiral and not concentric rings). 19. A track holds too much information to be suitable as the smallest unit of storage on a disk, so each one is further broken down into sectors. A sector is normally the smallest individually-addressable unit of information stored on a hard disk, and normally holds 512 bytes of information. The first PC hard disks typically held 17 sectors per track. Today's hard disks can have thousands of sectors in a single track, and make use of zoned recording to allow more sectors on the larger outer tracks of the disk. 20. Star networks are one of the most common computer network topologies. In its simplest form, a star network consists of one central switch, hub or computer which acts as a router to transmit messages. If the central node is passive, the originating node must be able to tolerate the reception of an echo of its own transmission, delayed by the two-way transmission time (i.e. to and from the central node) plus any delay generated in the central node. An active star network has an active central node that usually has the means to prevent echo-related problems. 21. The type of network topology in which all of the nodes of the network are connected to a common transmission medium which has exactly two endpoints (this is the 'bus', which is also commonly referred to as the backbone, or trunk) – all data that is transmitted between nodes in the network is transmitted over this common transmission medium and is able to be received by all nodes in the network virtually simultaneously (disregarding propagation delays)[1][3]. 22. In computing, a protocol is a convention or standard that controls or enables the connection, communication, and data transfer between two computing endpoints. In its simplest form, a protocol can be defined as the rules governing the syntax, semantics, and synchronization of communication. Protocols may be implemented by hardware, software, or a combination of the two. At the lowest level, a protocol defines the behavior of a hardware connection. 23. The Transmission Control Protocol (TCP) is a virtual circuit protocol that is one of the core protocols of the Internet protocol suite, often simply referred to as TCP/IP. Using TCP, applications on networked hosts can create connections to one another, over which they can exchange streams of data. The protocol guarantees reliable and in-order delivery of data from sender to receiver. TCP also distinguishes data for multiple connections by concurrent applications (e.g., Web server and e-mail server) running on the same host. TCP supports many of the Internet's most popular application protocols and resulting applications, including the World Wide Web, e-mail and Secure Shell. In the Internet protocol suite, TCP is the intermediate layer between the Internet Protocol (IP) below it, and an application above it. 24. In computing, the title bar (or titlebar) consists of that part of a window where the title of the window appears. Most graphical operating systems and window managers position the title bar at the top of the application window as a horizontal bar. 25. In telecommunications, data transfer rate or just transfer rate is the average number of bits, characters, or blocks per unit time passing between equipment in a data transmission system. 26. Client server is network architecture which separates a client (often an application that uses a graphical user interface) from a server. Each instance of the client software can send requests to a server. 27. Client/server describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request. 28. A temporary file is a computer file used to store information for a short time; the file is then deleted after its use. They are often stored in a temporary folder and/or with the .TMP file extension. Temporary files are usually created by applications that need to store information that is either too big for storage in RAM or that needs to be saved in non-volatile memory (such as a hard drive). 29. A template used to create a PowerPoint file with specific style and form. 30. A videoconference (also known as a videoteleconference) is a set of interactive telecommunication technologies which allow two or more locations to interact via two-way video and audio transmissions simultaneously. It has also been called visual collaboration and is a type of groupware. 31. In computing, the taskbar is a term for the application desktop bar which is used to launch and monitor applications in Microsoft Windows 95 and later operating systems. Other desktop environments also feature similar interface elements. 32. Refers to operating systems or operating environments that enable you to switch from one program to another without losing your spot in the first program. Many utilities are available that add task switching to DOS systems. Note that task switching is not the same as multitasking. In multitasking, the CPU switches back and forth quickly between programs, giving the appearance that all programs are running simultaneously. In task switching, the CPU does not switch back and forth, but executes only one program at a time. Task switching does allow you to switch smoothly from one program to another. 33. Tagged Image File Format (abbreviated TIFF) is a file format for mainly storing images, including photographs and line art. TIFF was originally created as an attempt to get desktop scanner vendors of the mid-1980's to agree on a common scanned image file format, rather than have each company promulgate its own proprietary format. In the beginning, TIFF was only a bi-level image format, since that was all that desktop scanners could handle. As scanners became more powerful, and as desktop computer disk space became more plentiful, TIFF grew to accommodate grayscale images, then color images. 34. In computing, a system call is the mechanism used by an application program to request service from the operating system. 35. Asymmetric Digital Subscriber Line (ADSL) is a form of DSL, a data communications technology that enables faster data transmission over copper telephone lines than a conventional modem can provide. It does this by utilizing frequencies that are normally not used by a voice telephone call, in particular, frequencies higher than normal human hearing. This signal will not travel very far over normal telephone cables, so ADSL can only be used over short distances, typically less than 5 km. Once the signal reaches the telephone company's local office, the ADSL signal is stripped off and immediately routed onto a conventional internet network, while any voice-frequency signal is switched into the conventional phone network. This allows a single telephone connection to be used for both ADSL and voice calls at the same time. 36. Symbian OS is an operating system, designed for mobile devices, with associated libraries, user interface frameworks and reference implementations of common tools, produced by Symbian Ltd. 37. NAND-type flash memory data storage devices are usually integrated with a USB interface. They are typically small, lightweight, removable and rewritable. As of November 2006, memory capacities for USB Flash Drives currently are sold from 32 megabytes up to 64 gigabytes [1]. Capacity is limited only by current flash memory densities, although cost per megabyte may increase rapidly at higher capacities due to the expensive components. (USB Memory card readers are also available, that use plug-in rather than built-in memory.) USB flash drives offer potential advantages over other portable storage devices, particularly the floppy disk. They are more compact, generally faster, hold more data, and may be more reliable (due to their lack of moving parts) than floppy disks. These types of drives use the USB mass storage standard, supported natively by modern operating systems such as Linux, Mac OS X, and Windows. 38. Optical storage is made possible by data storage devices such as optical discs and holographic storage systems. This is different from other types of storage mediums that may use a magnetic surface (e.g. magnetic tape storage, a hard disk or floppy disk) or electrical charges (e.g. flash memory). The term optical drive usually refers to a device to read CD-ROMs. 39. Magnetic storage is a term from engineering referring to the storage of data on a magnetised medium. Magnetic storage uses different patterns of magnetization on a magnetically coated surface to store data and is non-volatile memory. The information is accessed using one or more read/write heads. Since the read/write head only covers a part of the surface, magnetic storage is sequential access memory and must seek, cycle or both. As of 2006, magnetic storage media, primarily hard disks and tape cartridges, are widely used to store computer data as well as audio and video signals. 40. A key or combination of keys that executes a specific function or command within an application or operating system. For example, the F7 key in Microsoft Word and most other Microsoft programs runs the Spell Checker. If a shortcut has multiple keys it will be written with all keys required to perform the function. For example, Shift+F7 (pressing and holding the shift key while pressing the F7 key) opens a thesaurus in Microsoft Word. 41. Introduced with the release of Microsoft Windows 95 and included with all future releases of Microsoft Windows Operating System, the start button allows users to access their computer programs or configure Microsoft Windows easily. 42. Also known as a worksheet, a spreadsheet is a data file made up of rows and columns that are used to sort data and allow a user to manipulate and arrange data easily, commonly numerical data. What makes a spreadsheet software program most unique is its ability to calculate values using mathematical formulas and the data in the cells. 43. Also known as an internal card or interface adapter, an expansion card is an electronic board or card added in a desktop computer or other non-portable computer to give that computer a new ability. 44. A software suite or application suite is a collection of computer programs, usually application software and programming software of related functionality, often sharing a more-or-less common user interface and some ability to smoothly exchange data with each other. Sometimes software makers introduce "suites" that are little more than repackaged versions of older programs offered at a lower price. 45. Open-source software is an antonym for closed source and refers to any computer software whose source code is available under a license that permits users to study, change, and improve the software, and to redistribute it in modified or unmodified form. It is often developed in a public, collaborative manner. It is the most prominent example of open source development and often compared to user generated content [1] . 46. A smart card, chip card, or integrated circuit(s) card (ICC), is defined as any pocket-sized card with embedded integrated circuits. Although there is a diverse range of applications, there are two broad categories of ICCs. Memory cards contain only non-volatile memory storage components, and perhaps some specific security logic. Microprocessor cards contain memory and microprocessor components. 47. SCSI stands for "Small Computer System Interface", and is a standard interface and command set for transferring data between devices on both internal and external computer buses. 48. A multitasking operating system may just switch between processes to give the appearance of many processes executing concurrently or simultaneously, though in fact only one process can be executing at any one time per CPU thread (some new processors, such as AMD's Athlon 64 X2, and Intel's Pentium D and Core 2 Duo can actually execute two or even four processes (see Kentsfield at the time, because they are multicore processors. 49. A scrollbar, or slider, is a graphical widget in a GUI with which continuous text, pictures or anything else can be scrolled, i.e., viewed even if it does not fit into the space in a computer display, window, or viewport. 50. A screensaver is a computer program originally designed to conserve the image quality of computer displays by blanking the screen or filling them with moving images or patterns when the computers are not in use. Today, screensavers are primarily used for entertainment or security purposes.