Download Jorge Gomez Intro to Animation September 3, 2015 Input device

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer security wikipedia , lookup

Hacker wikipedia , lookup

Transcript
Jorge Gomez
Intro to Animation
September 3, 2015
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
Input device- a peripheral (piece of computer hardware equipment) used to provide data and control signals to an information
processing system such as a computer or information appliance
Output device- any piece of computer hardware equipment used to communicate the results of data processing carried out by
an information processing system (such as a computer) which converts the electronically generated information into humanreadable form.
Storage- the retention of retrievable data on a computer or other electronic system; memory.
Motherboard- a printed circuit board containing the principal components of a computer or other device, with connectors into
which other circuit boards can be slotted.
Hard Disk Drive (HDD) - the mechanism that controls the positioning, reading, and writing of the hard disk, which furnishes
the largest amount of data storage for the PC.
RAM- random-access memory.
Peripheral- (of a device) able to be attached to and used with a computer, although not an integral part of it.
Bus- aka Front-Side-Bus, connects all the internal components of a computer, such as CPU and memory, to the
motherboard.
Expansion cards- a circuit board that can be inserted in a computer to give extra facilities or memory.
Power supply- A system that converts AC current from the wall outlet into the DC currents required by electronic circuits.
Unit (PSU) - converts mains AC to low-voltage regulated DC power for the internal components of a computer.
Optical Disk- an information storage device for a computer in the shape of a round flat plate that can be rotated to give access
to all parts of the surface. The data may be stored either magnetically (in a magnetic disk) or optically (in an optical disk such
as a CD-ROM).
Drive- (of a device) power or operate (another device).
CentralProcessing Unit- is the electronic circuitry within a computer that carries out the instructions of a computer program by
performing the basic arithmetic, logical, control and input/output (I/O) operations specified by the instructions.
(CPU)- The brains of the computer where most calculations take place.
Software- the programs and other operating information used by a computer
Operating- operating system is an essential component of the system software in a computer system.
System (OS) - system (OS) is system software that manages computer hardware and software resources and provides
common services for computer programs.
Drive- (of a device) power or operate (another device).
Program-provide (a computer or other machine) with coded instructions for the automatic performance of a particular task.
Bootstrapping- start up (an enterprise), especially one based on the Internet, with minimal resources.
BIOS- a set of computer instructions in firmware that control input and output operations.
Command Line- is the space to the right of the command prompt on an all-text display mode on a computer monitor (usually
a CRT or LCD panel) in which a user enters commands and data
Algorithm- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a
computer.
Analog- relating to or using signals or information represented by a continuously variable physical quantity such as spatial
position or voltage.
App- a self-contained program or piece of software designed to fulfill a particular purpose; an application, especially as
downloaded by a user to a mobile device
Application- a program or piece of software designed and written to fulfill a particular purpose of the user.
Array- an indexed set of related elements
Backup- the procedure for making extra copies of data in case the original is lost or damaged.
Bandwidth- the range of frequencies within a given band, in particular that used for transmitting a signal
Binary- digital data used in computer systems consists of binary information, which contains only 0s and 1s
Bit- bit (short for binary digit) is the smallest unit of data in a computer.
Bitmap- a representation in which each item corresponds to one or more bits of information, especially the information used
to control the display of a computer screen.
Byte- a group of binary digits or bits (usually eight) operated on as a unit.
a. A byte considered as a unit of memory size.
Blog- a regularly updated website or web page, typically one run by an individual or small group, that is written in an
informal or conversational style.
37. Blogger- a Web site that contains online personal reflections, comments, and often hyperlinks provided by the writer; also:
the contents of such a site.
38. Bookmark- record the address of (a website, file, etc.) to enable quick access in future.
39. Boot- computer is to load an operating system into the computer's main memory or random access memory (RAM).
40. Broadband- a high-capacity transmission technique using a wide range of frequencies, which enables a large number of
messages to be communicated simultaneously.
41. Browser- a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web.
42. Buffer- store (data) in a buffer while it is being processed or transferred.
43. Bug- is an error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected
result, or to behave in unintended ways.
44. Bus- aka Front-Side-Bus, connects all the internal components of a computer, such as CPU and memory, to the motherboard.
45. Byte- a group of binary digits or bits (usually eight) operated on as a unit.
a. A byte considered as a unit of memory size.
46. Cache- store away in hiding or for future use.
a. Store (data) in a cache memory.
b. Provide (hardware) with a cache memory.
47. Caps Lock- a button on a keyboard that changes if a letter should be capitalized or not. It is located in the position of a similar
Shift lock key
48. Captcha- aka Completely Automated Public Turing test to tell Computers and Humans Apart. Tells weather or not a user is
human or not.
49. Client- a piece of computer hardware or software that accesses a service made available by a server
50. Clip art- simple pictures and symbols made available for computer users to add to their documents.
51. Clip board- a temporary storage area where material cut or copied from a file is kept for pasting into another file
52. Cloud- a network of remote servers hosted on the Internet and used to store, manage, and process data in place of local
servers or personal computers.
53. Computing- the use or operation of computers.
54. Command- an instruction or signal that causes a computer to perform one of its basic functions.
55. Compile- (of a computer) convert (a program) into a machine-code or lower-level form in which the program can be
executed.
56. Compress- alter the form of (data) to reduce the amount of storage necessary.
57. Computer- an electronic device for storing and processing data, typically in binary form, according to instructions given to it
in a variable program.
58. Program- provide (a computer or other machine) with coded instructions for the automatic performance of a particular task.
59. Configure- arrange or order (a computer system or an element of it) so as to fit it for a designated task.
60. Cookie- a packet of data sent by an Internet server to a browser, which is returned by the browser each time it subsequently
accesses the same server, used to identify the user or track their access to the server.
61. Copy- make a similar or identical version of; reproduce.
62. Data- facts and statistics collected together for reference or analysis.
63. Database- a structured set of data held in a computer, especially one that is accessible in various ways.
64. Data mining- the practice of examining large databases in order to generate new information.
65. Debug- identify and remove errors from (computer hardware or software).
66. Decompress- expand (compressed data) to its normal size so that it can be read and processed by a computer.
67. Delete- a command or key on a computer that erases text.
68. Desktop- denoting a piece of equipment such as a computer that is suitable for use at an ordinary desk.
69. Development- the computer programming, documenting, testing, and bug fixing involved in creating and maintaining
applications and frameworks involved in a software release life cycle and resulting in a software product.
70. Digital- (of signals or data) expressed as series of the digits 0 and 1, typically represented by values of a physical quantity
such as voltage or magnetic polarization.
71. Disk- an information storage device for a computer in the shape of a round flat plate that can be rotated to give access to all
parts of the surface.
72. DNS (domain name system) - is the way that Internet domain names are located and translated into Internet Protocol
addresses.
73. Document- record (something) in written, photographic, or other form.
74. Domain- a distinct subset of the Internet with addresses sharing a common suffix or under the control of a particular
organization or individual.
75. Domain name- the part of a network address that identifies it as belonging to a particular domain.
76. Download- copy (data) from one computer system to another, typically over the Internet.
77. Drag- pull (someone or something) along forcefully, roughly, or with difficulty.
78. Email- messages distributed by electronic means from one computer user to one or more recipients via a network.
79. Emoticon- a representation of a facial expression such as :-) (Representing a smile), formed by various combinations of
keyboard characters and used in electronic communications to convey the writer's feelings or intended tone.
80. Encrypt- convert (information or data) into a cipher or code, especially to prevent unauthorized access.
81. Encryption- the most effective way to achieve data security.
82. Enter- a key on a computer keyboard that is used to perform various functions, such as executing a command or selecting
options on a menu.
83. Exabyte- a unit of information equal to one quintillion (1018) bytes, or one billion gigabytes.
84. File- place (a document) in a cabinet, box, or folder in a particular order for preservation and easy reference.
85. Finder- allows users to move, copy, delete, and open files, navigate through folders, and move windows around the desktop.
86. Firewall- a system designed to prevent unauthorized access to or from a private network.
a. Firewalls can be implemented in both hardware and software, or a combination of both.
87. Firmware- Software stored in read-only memory (ROM) or programmable ROM (PROM).
88. Flaming- the act of posting or sending offensive messages over the Internet.
89. Flash- display (an image, words, or information) suddenly on a television or computer screen or electronic sign, typically
briefly or repeatedly.
90. Flash drive- a small electronic device containing flash memory that is used for storing data or transferring it to or from a
computer, digital camera, etc.
91. Floppy disk- a flexible removable magnetic disk, typically encased in hard plastic, used for storing data.
92. Flowchart- a graphical representation of a computer program in relation to its sequence of functions (as distinct from the data
it processes).
93. Folder- an icon on a computer screen that can be used to access a directory containing related files or documents.
94. Font- a set of type of one particular face and size.
95. Format- (especially in computing) arrange or put into a format.
96. Gigabyte- a unit of information equal to one billion (109) or, strictly, 230 bytes.
97. Hack- use a computer to gain unauthorized access to data in a system.
98. Hacker- a person who uses computers to gain unauthorized access to data.
99. Hardware- tools, machinery, and other durable equipment.
100. Html- Hypertext Markup Language, a standardized system for tagging text files to achieve font, color, graphic, and hyperlink
effects on World Wide Web pages.
101. Hyperlink- a link from a hypertext file or document to another location or file, typically activated by clicking on a highlighted
word or image on the screen.
102. Hypertext- a software system that links topics on the screen to related information and graphics, which are typically accessed
by a point-and-click method.
103. Integer- a datum of integral data type, a data type which represents some finite subset of the mathematical integers.
104. Interface- A boundary across which two independent systems meet and act on or communicate with each other
105. Internet- The global communication network that allows almost all computers worldwide to connect and exchange
information.
106. IP address- a unique string of numbers separated by periods that identifies each computer using the Internet Protocol to
communicate over a network.
107. Iteration- the repetition of a process or utterance.
108. Java- a high-level, object-oriented computer programming language used especially to create interactive applications running
over the Internet.
109. Kernel- a computer program that manages I/O (input/output) requests from software, and translates them into data processing
instructions for the central processing unit and other electronic components of a computer
110. Logic- a system or set of principles underlying the arrangements of elements in a computer or electronic device so as to
perform a specified task.
111. Lurking- read the postings on an Internet message board or in a chat room without making any contribution oneself.
112. Mainframe- computers used primarily by large organizations for critical applications, bulk data processing such as census,
industry and consumer statistics, enterprise resource planning and transaction processing.
113. Macro- a rule or pattern that specifies how a certain input sequence (often a sequence of characters) should be mapped to a
replacement output sequence (also often a sequence of characters) according to a defined procedure.
114. Malware- defined by its malicious intent, acting against the requirements of the computer user
115. Memory- the part of a computer in which data or program instructions can be stored for retrieval.
116. Mirror- keep a copy of some or all of the contents of (a network site) at another site, typically in order to improve
accessibility.
a. Store copies of data on (two or more hard disks) as a method of protecting it.
117. Modem- a combined device for modulation and demodulation, for example, between the digital data of a computer and the
analog signal of a telephone line.
118. Monitor- an instrument or device used for observing, checking, or keeping a continuous record of a process or quantity.
119. Motherboard- a printed circuit board containing the principal components of a computer or other device, with connectors into
which other circuit boards can be slotted.
120. Mouse- use a mouse to move a cursor on a computer screen.
121. Multimedia- the field concerned with the computer-controlled integration of text, graphics, drawings, still, and animation.
122. Open source- denoting software for which the original source code is made freely available and may be redistributed and
modified.
123. Operating- operating system is an essential component of the system software in a computer system.
124. System- system (OS) is system software that manages computer hardware and software resources and provides common
services for computer programs.
125. Path- (especially in computing and railroad contexts) allocate a path
126. Phishing- the activity of defrauding an online account holder of financial information by posing as a legitimate company.
127. Piracy- the unauthorized use or reproduction of another's work.
128. Pirate- use or reproduce (another's work) for profit without permission, usually in contravention of patent or copyright.
129. Platform a standard for the hardware of a computer system, determining what kinds of software it can run.130. Plug-in- a plug-in module or plug-in software.
131. Podcast- a digital audio file made available on the Internet.
132. Pop-up-appear or occur suddenly and unexpectedly.
133. Portal- an Internet site providing access or links to other sites
134. Process- a series of actions or steps taken in order to achieve a particular end.
135. Protocol- the official procedure or system of rules governing affairs of state or diplomatic occasions.
136. Queue- a list of data items, commands, etc., stored so as to be retrievable in a definite order, usually the order of insertion.
137. QWERTY- denoting the standard layout on English-language typewriters and keyboards, having q, w, e, r, t, and y as the first
keys from the left on the top row of letters.
138. RAM -Random Access Memory
139. Reboot- (with reference to a computer system) boot or be booted again.
140. Resolution- the quality.
141. Restore- bring back (a previous right, practice, custom, or situation); reinstate.
142. ROM (read only memory) - Computer hardware that stores programs or data that cannot be added to, modified, or deleted.
143. Root- a user account with full and unrestricted access to a system.
144. Router- a device that forwards data packets to the appropriate parts of a computer network
145. Runtime- the length of time a program takes to run.
146. Script- an automated series of instructions carried out in a specific order.
147. Search engine- a program that searches for and identifies items in a database that correspond to keywords or characters
specified by the user, used especially for finding particular sites on the World Wide Web.
148. Security- techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without
authorization
149. Server-a computer or computer program that manages access to a centralized resource or service in a network.
150. Shareware-software that is available free of charge and often distributed informally for evaluation, after which a fee may be
requested for continued use.
151. Shell-short for shell program.
152. Spam-send the same message indiscriminately to (large numbers of recipients) on the Internet.
153. Spammer-the person that sends the large numbers of recipients.
154. Spreadsheet-an electronic document in which data is arranged in the rows and columns of a grid and can be manipulated and
used in calculations.
155. Status bar-a horizontal bar, typically at the bottom of the screen or window, showing information about a document being
edited or a program running.
156. Storage-the action or method of storing something for future use.
157. Spyware-software that enables a user to obtain covert information about another's computer activities by transmitting data
covertly from their hard drive.
158. Supercomputer- particularly powerful mainframe computer.
159. Surf- to navigate the web.
160. Syntax-the arrangement of words and phrases to create well-formed sentences in a language.
161. Terabyte-a unit of information equal to one million (1012) or strictly, 240 bytes.
162. Terminal -a device at which a user enters data or commands for a computer system and that displays the received output.
163. Text editor-a system or program that allows a user to edit text.
164. Thread-a group of linked messages posted on an Internet forum that share a common subject or theme.
165. Trojan horse-a program designed to breach the security of a computer system while ostensibly performing some innocuous
function.
166. Typeface-a particular design of type.
167. UNIX-a widely used multiuser operating system.
168. Upload-an act or process of uploading data.
169. User interface-the means by which the user and a computer system interact, in particular the use of input devices and
software.
170. Username- an identification used by a person with access to a computer, network, or online service.
171. URL- is one type of Uniform Resource Identifier
172. Utility-a utility program.
173. Virtual memory-memory that appears to exist as main storage although most of it is supported by data held in secondary
storage, transfer between the two being made automatically as required.
174. Virus-a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or
destroying data.
175. Wiki-a website that allows collaborative editing of its content and structure by its users.
176. Word processor-a program or machine for storing, manipulating, and formatting text entered from a keyboard and providing
a printout.
177. Workstation-a desktop computer terminal, typically networked and more powerful than a personal computer.
178. Worm-a self-replicating program able to propagate itself across a network, typically having a detrimental effect.
179. WWW-World Wide Web.
180. XML-Extensible Markup Language
181. Zip-compress (a file) so that it takes less space in storage.