Download 1. A worksheet, also referred to as a spreadsheet, is a computerized

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer science wikipedia , lookup

Telecommunications engineering wikipedia , lookup

Immunity-aware programming wikipedia , lookup

Emulator wikipedia , lookup

Transcript
1.
A worksheet, also referred to as a spreadsheet, is a computerized page allowing the
user to manipulate many columns and rows of numbers. The worksheet can contain
formulas so that if one number is changed, the entire worksheet is automatically
updated, based on those formulas. Worksheets can be made with Microsoft Excel and
other Formula based Software or Programs.
2.
In computing, "word" is a term for the natural unit of data used by a particular
computer design. A word is simply a fixed-sized group of bits that are handled
together by the machine. The number of bits in a word (the word size or word length)
is an important characteristic of a computer architecture.
3.
A word processor (more formally known as document preparation system) is a
computer application used for the production (including composition, editing,
formatting, and possibly printing) of any sort of printable material.
4.
A wireless LAN or WLAN is a wireless local area network, which is the linking of
two or more computers without using wires.
5.
A network card, network adapter or NIC (network interface controller) is a piece of
computer hardware designed to allow computers to communicate over a computer
network. It is both an OSI layer 1 (physical layer) and layer 2 (data link layer) device,
as it provides physical access to a networking medium and provides a low-level
addressing system through the use of MAC addresses. It allows users to connect to
each other either by using cables or wirelessly.
6.
In computing, Winsock (short for Windows Sockets) is a specification that defines
how Windows network software should access network services, especially TCP/IP.
7.
Windows XP is a line of proprietary operating systems developed by Microsoft for
use on general-purpose computer systems, including home and business desktops,
notebook computers, and media centers.
8.
A wide area network (WAN) is a computer network that covers a broad geographical
area (i.e., any network whose communications links cross metropolitan, regional, or
national boundaries [1]). Or, less formally, a network that uses routers and public
communications links [1]. Contrast with personal area networks (PANs), local area
networks (LANs), campus area networks (CANs), or metropolitan area networks
(MANs) which are usually limited to a room, building, campus or specific
metropolitan area (e.g., a city) respectively. The largest and most well-known example
of a WAN is the Internet.
9.
Linux refers to any Unix-like computer operating system that uses the Linux kernel.
Initially developed and used primarily by individual enthusiasts on personal
computers, Linux has since gained the support of corporations such as IBM, Sun
Microsystems, Hewlett-Packard, and Novell, Inc., and has risen to prominence as an
operating system for servers; Netcraft reported in September 2006 that eight of the ten
most reliable internet hosting companies run Linux on their web servers.[1]
The Linux kernel is one of the most prominent examples of free software and of open
source development; its underlying source code is available for anyone to use, modify,
and redistribute freely.
10.
A vector-based graphics program uses points connected with curved or straight lines,
like connect-the-dots. The spaces defined by the lines can be empty or filled with
color. These points, curves, and lines are defined with code. The code is basically a
set of x, y coordinates and draw commands. The advantage to using vector art is that
it is resolution independent (it can be enlarged and will never lose quality).
11.
A firewall is an information technology (IT) security device which is configured to
permit, deny or proxy data connections set and configured by the organization's
security policy. Firewalls can either be hardware and/or software based.
12.
Antivirus software consists of computer programs that attempt to identify, thwart and
eliminate computer viruses and other malicious software (malware).
Antivirus software typically uses two different techniques to accomplish this:
Examining (scanning) files to look for known viruses matching definitions in a virus
dictionary
Identifying suspicious behavior from any computer program which might indicate
infection. Such analysis may include data captures, port monitoring and other
methods.
13.
In the field of information technology, backup refers to the copying of data so that
these additional copies may be restored after a data loss event. Backups are useful
primarily for two purposes: to restore a computer to an operational state following a
disaster (called disaster recovery) and to restore small numbers of files after they have
been accidentally deleted or corrupted.
14.
A graphical user interface (or GUI, often pronounced "gooey"), is a particular case of
user interface for interacting with a computer which employs graphical images and
widgets in addition to text to represent the information and actions available to the
user. Usually the actions are performed through direct manipulation of the graphical
elements.
15.
To remove hardware or software from a computer system. In order to remove a
software application from a PC, an uninstall program, also called an "uninstaller,"
deletes all the files that were initially copied to the hard disk and restores the
AUTOEXEC.BAT, CONFIG.SYS, WIN.INI and SYSTEM.INI files if they were
modified.
Most applications come with their own uninstall utility. Otherwise, a generic uninstall
program can be used to uninstall any application. Such a program must be running
when a new application is first installed, because it works by recording all changes
made to the computer system.
16.
Twisted pair cabling is a form of wiring in which two conductors are wound together
for the purposes of canceling out electromagnetic interference from external sources
and crosstalk from neighboring wires.
Twisting wires decreases interference because the loop area between the wires (which
determines the magnetic coupling into the signal) is reduced. Often the two wires
carry equal and opposite signals (differential mode) which are combined by
subtraction at the destination. The noise from the two wires cancel each other in this
subtraction because the two wires have been exposed to similar electromagnetic
interference.
The twist rate (usually defined in twists per meter) makes up part of the specification
for a given type of cable. The greater the number of twists, the greater the attenuation
of crosstalk.
17.
A transistor is a semiconductor device that uses a small amount of voltage or electrical
current to control a larger change in voltage or current. The transistor is the
fundamental building block of the circuitry that governs the operation of computers,
cellular phones, and all other modern electronics.
Because of its fast response and accuracy, the transistor may be used in a wide variety
of digital and analog functions, including amplification, switching, voltage regulation,
signal modulation, and oscillators. Transistors may be packaged individually or as
part of an integrated circuit chip, which may hold thousands of transistors in a very
small area.
18.
Platters are organized into specific structures to enable the organized storage and
retrieval of data. Each platter is broken into tracks--tens of thousands of them--which
are tightly-packed concentric circles. These are similar in structure to the annual rings
of a tree (but not similar to the grooves in a vinyl record album, which form a
connected spiral and not concentric rings).
19.
A track holds too much information to be suitable as the smallest unit of storage on a
disk, so each one is further broken down into sectors. A sector is normally the
smallest individually-addressable unit of information stored on a hard disk, and
normally holds 512 bytes of information. The first PC hard disks typically held 17
sectors per track. Today's hard disks can have thousands of sectors in a single track,
and make use of zoned recording to allow more sectors on the larger outer tracks of
the disk.
20.
Star networks are one of the most common computer network topologies. In its
simplest form, a star network consists of one central switch, hub or computer which
acts as a router to transmit messages. If the central node is passive, the originating
node must be able to tolerate the reception of an echo of its own transmission, delayed
by the two-way transmission time (i.e. to and from the central node) plus any delay
generated in the central node. An active star network has an active central node that
usually has the means to prevent echo-related problems.
21.
The type of network topology in which all of the nodes of the network are connected
to a common transmission medium which has exactly two endpoints (this is the 'bus',
which is also commonly referred to as the backbone, or trunk) – all data that is
transmitted between nodes in the network is transmitted over this common
transmission medium and is able to be received by all nodes in the network virtually
simultaneously (disregarding propagation delays)[1][3].
22.
In computing, a protocol is a convention or standard that controls or enables the
connection, communication, and data transfer between two computing endpoints. In
its simplest form, a protocol can be defined as the rules governing the syntax,
semantics, and synchronization of communication. Protocols may be implemented by
hardware, software, or a combination of the two. At the lowest level, a protocol
defines the behavior of a hardware connection.
23.
The Transmission Control Protocol (TCP) is a virtual circuit protocol that is one of
the core protocols of the Internet protocol suite, often simply referred to as TCP/IP.
Using TCP, applications on networked hosts can create connections to one another,
over which they can exchange streams of data. The protocol guarantees reliable and
in-order delivery of data from sender to receiver. TCP also distinguishes data for
multiple connections by concurrent applications (e.g., Web server and e-mail server)
running on the same host.
TCP supports many of the Internet's most popular application protocols and resulting
applications, including the World Wide Web, e-mail and Secure Shell.
In the Internet protocol suite, TCP is the intermediate layer between the Internet
Protocol (IP) below it, and an application above it.
24.
In computing, the title bar (or titlebar) consists of that part of a window where the title
of the window appears. Most graphical operating systems and window managers
position the title bar at the top of the application window as a horizontal bar.
25.
In telecommunications, data transfer rate or just transfer rate is the average number of
bits, characters, or blocks per unit time passing between equipment in a data
transmission system.
26.
Client server is network architecture which separates a client (often an application that
uses a graphical user interface) from a server. Each instance of the client software can
send requests to a server.
27.
Client/server describes the relationship between two computer programs in which one
program, the client, makes a service request from another program, the server, which
fulfills the request.
28.
A temporary file is a computer file used to store information for a short time; the file
is then deleted after its use. They are often stored in a temporary folder and/or with
the .TMP file extension.
Temporary files are usually created by applications that need to store information that
is either too big for storage in RAM or that needs to be saved in non-volatile memory
(such as a hard drive).
29.
A template used to create a PowerPoint file with specific style and form.
30.
A videoconference (also known as a videoteleconference) is a set of interactive
telecommunication technologies which allow two or more locations to interact via
two-way video and audio transmissions simultaneously. It has also been called visual
collaboration and is a type of groupware.
31.
In computing, the taskbar is a term for the application desktop bar which is used to
launch and monitor applications in Microsoft Windows 95 and later operating systems.
Other desktop environments also feature similar interface elements.
32.
Refers to operating systems or operating environments that enable you to switch from
one program to another without losing your spot in the first program. Many utilities
are available that add task switching to DOS systems.
Note that task switching is not the same as multitasking. In multitasking, the CPU
switches back and forth quickly between programs, giving the appearance that all
programs are running simultaneously. In task switching, the CPU does not switch
back and forth, but executes only one program at a time. Task switching does allow
you to switch smoothly from one program to another.
33.
Tagged Image File Format (abbreviated TIFF) is a file format for mainly storing
images, including photographs and line art. TIFF was originally created as an attempt
to get desktop scanner vendors of the mid-1980's to agree on a common scanned
image file format, rather than have each company promulgate its own proprietary
format. In the beginning, TIFF was only a bi-level image format, since that was all
that desktop scanners could handle. As scanners became more powerful, and as
desktop computer disk space became more plentiful, TIFF grew to accommodate
grayscale images, then color images.
34.
In computing, a system call is the mechanism used by an application program to
request service from the operating system.
35.
Asymmetric Digital Subscriber Line (ADSL) is a form of DSL, a data
communications technology that enables faster data transmission over copper
telephone lines than a conventional modem can provide. It does this by utilizing
frequencies that are normally not used by a voice telephone call, in particular,
frequencies higher than normal human hearing. This signal will not travel very far
over normal telephone cables, so ADSL can only be used over short distances,
typically less than 5 km. Once the signal reaches the telephone company's local office,
the ADSL signal is stripped off and immediately routed onto a conventional internet
network, while any voice-frequency signal is switched into the conventional phone
network. This allows a single telephone connection to be used for both ADSL and
voice calls at the same time.
36.
Symbian OS is an operating system, designed for mobile devices, with associated
libraries, user interface frameworks and reference implementations of common tools,
produced by Symbian Ltd.
37.
NAND-type flash memory data storage devices are usually integrated with a USB
interface. They are typically small, lightweight, removable and rewritable. As of
November 2006, memory capacities for USB Flash Drives currently are sold from
32 megabytes up to 64 gigabytes [1]. Capacity is limited only by current flash
memory densities, although cost per megabyte may increase rapidly at higher
capacities due to the expensive components. (USB Memory card readers are also
available, that use plug-in rather than built-in memory.)
USB flash drives offer potential advantages over other portable storage devices,
particularly the floppy disk. They are more compact, generally faster, hold more data,
and may be more reliable (due to their lack of moving parts) than floppy disks. These
types of drives use the USB mass storage standard, supported natively by modern
operating systems such as Linux, Mac OS X, and Windows.
38.
Optical storage is made possible by data storage devices such as optical discs and
holographic storage systems. This is different from other types of storage mediums
that may use a magnetic surface (e.g. magnetic tape storage, a hard disk or floppy disk)
or electrical charges (e.g. flash memory).
The term optical drive usually refers to a device to read CD-ROMs.
39.
Magnetic storage is a term from engineering referring to the storage of data on a
magnetised medium. Magnetic storage uses different patterns of magnetization on a
magnetically coated surface to store data and is non-volatile memory. The information
is accessed using one or more read/write heads. Since the read/write head only covers
a part of the surface, magnetic storage is sequential access memory and must seek,
cycle or both. As of 2006, magnetic storage media, primarily hard disks and tape
cartridges, are widely used to store computer data as well as audio and video signals.
40.
A key or combination of keys that executes a specific function or command within an
application or operating system. For example, the F7 key in Microsoft Word and most
other Microsoft programs runs the Spell Checker. If a shortcut has multiple keys it
will be written with all keys required to perform the function. For example, Shift+F7
(pressing and holding the shift key while pressing the F7 key) opens a thesaurus in
Microsoft Word.
41.
Introduced with the release of Microsoft Windows 95 and included with all future
releases of Microsoft Windows Operating System, the start button allows users to
access their computer programs or configure Microsoft Windows easily.
42.
Also known as a worksheet, a spreadsheet is a data file made up of rows and columns
that are used to sort data and allow a user to manipulate and arrange data easily,
commonly numerical data. What makes a spreadsheet software program most unique
is its ability to calculate values using mathematical formulas and the data in the cells.
43.
Also known as an internal card or interface adapter, an expansion card is an electronic
board or card added in a desktop computer or other non-portable computer to give that
computer a new ability.
44.
A software suite or application suite is a collection of computer programs, usually
application software and programming software of related functionality, often sharing
a more-or-less common user interface and some ability to smoothly exchange data
with each other.
Sometimes software makers introduce "suites" that are little more than repackaged
versions of older programs offered at a lower price.
45.
Open-source software is an antonym for closed source and refers to any computer
software whose source code is available under a license that permits users to study,
change, and improve the software, and to redistribute it in modified or unmodified
form. It is often developed in a public, collaborative manner. It is the most prominent
example of open source development and often compared to user generated content
[1]
.
46.
A smart card, chip card, or integrated circuit(s) card (ICC), is defined as any
pocket-sized card with embedded integrated circuits. Although there is a diverse range
of applications, there are two broad categories of ICCs. Memory cards contain only
non-volatile memory storage components, and perhaps some specific security logic.
Microprocessor cards contain memory and microprocessor components.
47.
SCSI stands for "Small Computer System Interface", and is a standard interface and
command set for transferring data between devices on both internal and external
computer buses.
48.
A multitasking operating system may just switch between processes to give the
appearance of many processes executing concurrently or simultaneously, though in
fact only one process can be executing at any one time per CPU thread (some new
processors, such as AMD's Athlon 64 X2, and Intel's Pentium D and Core 2 Duo can
actually execute two or even four processes (see Kentsfield at the time, because they
are multicore processors.
49.
A scrollbar, or slider, is a graphical widget in a GUI with which continuous text,
pictures or anything else can be scrolled, i.e., viewed even if it does not fit into the
space in a computer display, window, or viewport.
50.
A screensaver is a computer program originally designed to conserve the image
quality of computer displays by blanking the screen or filling them with moving
images or patterns when the computers are not in use. Today, screensavers are
primarily used for entertainment or security purposes.