Accelerated Graphics Port/Advanced Graphics Port(AGP)
This is a graphics card extension port used to attach a graphics card to a
computer's motherboard. AGP ports run at 66 MHz and can transfer data up to 2133
MB/sec. An AGP is used with games and applications to store and retrieve larger
and better 3D shapes and textures.
Asynchronous Java Script(AJAX)
AJAX is used to create web pages that are more interactive and usable. This is
done using HTML and Cascading style sheets.
American Standard Code for Information Interchange(ASCII)
ASCII is a code which represents the alphabets in the English language as
numbers which are used for character encoding. Numbers from 0-127 are assigned
to each letter of the alphabet. Texts that we find in computers, communication
equipment and other similar devices represent ASCII Codes.
Automated Document Feeder(ADP)
As the name suggest ADP is used to automatically feed pages into the scanners
and copiers. This helps in facilitating faster work as each individual page does
not need to be fed into the copier or scanner.
The little box that pops up to inform you that the computer you are working on
is about to perform an operation which may have damaging consequences is called
the alert box. In a way, the alert box is certainly a help, especially when you
might have typed in a command absentmindedly and would not like to go through
with it! Most of the time you can make it go away by a click of the buttons
available or by using the mouse.
Advanced Technology Attachment(ATA)
Integrated Drive Electronics(IDE)is another term used to refer to ATA. The drive
controller is directly connected to the drive using ATA, which is a type of disk
drive. A specific controller is not required to support the drive as the ATA
hard drive is enough for the computer provided the motherboard supports an ATA
connection. In this case no other separate card will be required.
Audio Interchange File Format(AIFF)
AIFF is an audio format used for storing high quality sampled audio data. As an
AIFF is of a high quality it can be burned on to an audio CD,and despite being
created by Apple, the files can be read by the audio programs on the MAC and PC
Computer software that scans files,searches for and gets rid of computer viruses
and other harmful software.
Beginners' All-purpose Symbolic Instruction Code(BASIC)
BASIC is a high-level programming language which was developed in the mid 1960s
and was easy to understand and simple to use. Numbers were originally used at
the beginning of each instruction to tell the computer the order in which to
process the instruction."Loops" are now used to provide instructions.
A map of dots and pixels which are generated by a computer and are used to
represent types and images are called bitmaps.
Blind Carbon Copy(Bcc)
This command appears while an e-mail is being sent. Written after the commands
To and Cc, an e-mail address written in the Bcc box will enable the mail to be
sent to the recipient without the knowledge of the main recipient.
Bandwidth refers to the amount of data that can be transferred through either a
modem connection or network within stipulated time. BW is measured in two ways-
In analog devices, Hertz or cycles per second is used whereas in Digital Devices
it is represented in Bits per second (bps) or Bytes per second.
A blog is one's own website or space, a personal diary which is updated on a
regular basis by the individual who has created it. Blogs contain images, text,
links to other blogs or useful sites and a lot of other information related to
A program used to go look for and present pages on the web. Graphical browsers
like:Netscape navigator and Microsoft Internet Explorer display graphics as well
Binary digits take the number 0 and 1 and represent the smallest unit of
computer data. These units store information used in communication related to
digital computing and information theory.
A single character in the computer's memory is represented by 8 bits,which is
termed as a byte. File sizes, hard disk space and computer memory are measured
in bytes. Terms such as Kilobytes, megabytes,gigabytes and terabytes are used to
measure larger amounts of data.
This technology is based on radio waves and is used with a number of devices to
transfer data from one to another. As it is based on radio waves communication
is made easier. Owing to the Standard 2.4 Ghz frequency, all Bluetooth devices
are compatible with each other.
A fault in the hardware or software which results in a failure in the program. A
bug usually occurs when there are differences in software where one application
is running side by side with another.
If a page seems interesting and is needed for later reference, a good option
would be to bookmark it!This option is available in the browser's bookmark menu.
This option saves a lot of time and doesn't put stress on the memory as well.
Boot is to load the first software which is responsible for starting the
computer. In this process the start up instructions are loaded from the
computer's ROM and the operating systems is loaded from the current boot disk.
Central Processing Unit(CPU)
Processor is another word that describes the CPU. Basically the brain of the
computer,it is used to interpret computer instructions and help in the
processing of data. Simple put highly complex functions are solved by the CPU.
Configuration in computer term which refers to the technical specifications that
a computer has,this includes processor speed,amount of RAM,hard disk space and
the type of video card in the machine,other specifications can be added to the
Originally developed for storing digital audio, compact discs(CD) now store
digital data. Cds are made of polycarbonate with one or more metal layers
capable of storing digital information. About 80 minutes of audio/700 MB of data
can be stored on a compact disc. The data is represented by small notches on the
disc which is read by a laser from an optical drive.
Compact Disc-Read Only Memory(CD-ROM)
The data on a CD-ROM cannot be altered or erased once information has been
copied on to it. Large amounts of data, up to 700 MB can be stored on CD-ROMs.
CD-ROMs are used for the distribution of software,games and multimedia
Code- Division Multiple Access(CDMA)
The English allies during World War II developed the wireless transmission
technology to avoid having their transmission jammed. CDMA transmits frequency
range using a method called multiplexing in which no specific frequency is
assigned to each user on the communications network, thus making more bandwidth
available for use. CDMA operates in the frequency range of 800 MHz to 1.9 G Hz.
A moving symbol represented by a solid rectangle, a blinking underline character
or a straight vertical line which informs the user where the next character will
be displayed on the screen is called a cursor. One can also click or double
click the mouse button when the cursor is over an object to perform an action on
C++, pronounced C plus plus, is a high-level programming language developed in
the mid-1970s. It is a widely used programming language used to write
applications on a variety of platforms. Programming is more efficient and
simpler to use because of it is power and flexibility.
Cathode Ray Tube(CRT)
Used in televisions and computer display screens CRT works by using electrons
which are fired from the back of the tube to phosphorous which is placed in the
front,near the display. Once this happens, they light up and are thus projected
on the screen. RGB,that is red,green and blue are the three colors that blend to
produce the colors that are viewed on the screen.
Customer Relationship Management(CRM)
As the name suggests, CRM covers all facets linked to companies and the
relationship they share with their customers.
Computer Aided Design(CAD)
A software which is considered a blessing to all designers. It is used to create
three dimensional designs with a number of features. Designs created on CAD can
be rotated,moved and sizes can be changed in a short time.
This term refers to an individual or an organization who holds back a fee for
discussions and transactions over the Internet. The concerned organization or
individual does not take possession or own the services and goods. Real estate
brokers and online insurance are examples.
Common Business Oriented Language(COBOL)
COBOL is a third- generation programming language which though considered one of
the oldest languages is still used today. COBOL is used in the areas of
business,finance and administrative systems by the government and companies.
A DB can be compared to a filing system, the only difference being that this one
would be electronic and not manually managed. In a DB,information or data is
stored in a structured sequence like files,folders and folders in the computer.
Whenever information is required the computer program can consult it and
retrieve the required data.
This term refers to receiving or copying data from a main source to another
device. This is often practiced while copying movies,games and software from the
Removing or erasing in computer terminology is known as deleting. While working
on a computer, a word, a file, a character or even a folder is removed when the
delete key is pressed on the keyboard. Large chunks of text can be selected and
then deleted too. Deleted files are not completely erased once they have been
removed, this only happens when they are written over.
Information that has been processed and then stored in the computer is known as
data. Such information is available in the form of text documents, images,audio
clips,software programs and a range of other types of data. The information is
then processed by the computer's Central Processing Unit(CPU) and later stored
in files and folders in the hard disc of the computer.
This term is used to refer to moving an object from the display screen. Dragging
not only involves moving icons and objects,it can also be used for a number of
other functions like repositioning a window and dragging the scroll bar,to name
a few. Dragging can be done by putting the cursor over the object,then clicking
and holding the left side of the mouse till you reach the place the object needs
to be placed. This done,the mouse button can be released.
Dynamic Hyper-Text Markup Language(DHTML)
Interactive and animated websites are created with DHTML,which is a collection
Style Sheets(CSS) and the Document Object Model are used.
Digital Versatile Disc(DVD)
A high-capacity optical disc that resembles a CD but can store more information
in comparison. It is mainly used for movies,software and data backup purposes.
While a CD can store up to 700 MB of data,a single- layer,single -sided DVD can
store up to 4.7GB of data. A prerequisite for using a DVD on a computer is to
have a DVD-ROM drive.
Dots Per Inch(DPI)
It is a measure of the resolution of an image,whether on screen or in print. DPI
as the name itself implies, measures how many dots fit into a linear inch(2.4
cm) space. An image that has more dots per linear inch will produce more details
in an image.
As the name suggests this term is used to get rid of bugs which stand for errors
in programs. These errors may have minor of serious consequences. To counteract
this,programmers debug the programs,thus getting rid of as many errors as
possible before releasing the software into the market. In situations where
there is tight coupling of various subsystems,changes in one may cause bugs to
appear in another prolonging the debugging process.
Data Transfer Rate
Transfer rate or Data Transfer Rate measures the speed at which data is carried
from one device or location to another. Data Transfer Rates are measured in bits
Digital Subscriber Line(DSL)
Data transfer over regular lines is done using the DSL. A DSL circuit is faster
than a regular phone connection despite the copper wires used. DSL can be
divided into an Asymmetric DSL and a Symmetric DSL. An ADSL connection has
download speeds of 1.5 megabits per second and uploads speeds of 128 kilobits
per second. The SDCL has data transfer speeds of 384 kilobits per second in
When a message is transferred over a communication network, it is termed as an
E-mail. E-mail messages are typically sent by Simple Mail Transfer Protocol(SMTP)
and received by Post Office Protocol 3(POP3) or Internet Message Access
Electronic Data Interchange(EDI)
A standard method used for transferring data from one computer network or system
to another, is termed EDI. It is used for tracking equipment, sending orders to
warehouses,creating invoices and other E-commerce purposes.
A small piece of specialized American Standard Code For Information
Interchange(ASCII) art used in text messages as informal markup to indicate
emotions and attitudes that would be conveyed through ones' body language in
ordinary situations can be termed Emoticons. Keys on the keyboard can be used to
Excel is an application created by Microsoft that stores data in grids, rows and
columns. It is compatible with Microsoft Windows and Macintosh computers.
Calculation and graphics can be done on Excel.
Buying and selling products and services over electronic systems such as the
Internet and other computer networks, is termed as eCommerce or e-commerce. This
way of selling and purchasing has seen a drastic growth with a lot of websites
venturing into it. E-commerce is of two types-Business 2-Consumer(B2C) and
Formerly known as Internet based learning and then Web based learning,computer
-enhanced learning today is generally referred to by E-learning. In E-learning
electronic applications and process are used in the learning process, these
include Web-based learning, computer-based learning,virtual classrooms and even
Erasable Programmable Read Only Memory(EPROM)
A type of memory that retains content until exposed to ultraviolet light. When
exposed the light clears its content, this enables reprogramming of the memory
to take place. A special device called PROM Programmer or PROM Burner will be
required to write and erase an EPROM.
An effective way to keep important data a secret! This is done by coding and
scrambling in such a way that it can only be deciphered by someone who has the
appropriate decoding key. Secure websites as well as other mediums of data
transfer use the Encryption method, so that no one can tap the information.
A combination of Education and Entertainment is what results in Edutainment.
This term is used for entertainment that is designed to educate as well as amuse
the user. Edutainment uses familiar forms like television programs, computer and
video games, films and music to instruct and socialize.
A combination of typeface and other qualities such as size, pitch and spacing
comprise a font. Most word processing programs constitute a Font Menu with the
help of which the selection of font can be made.
Frequently Asked Questions(FAQ)
Common questions that are asked about a certain software program or a Website
that a new user is going through is stored in a text file. Going through
this,the user is provided with answers to his queries.
Accumulated data stored in one unit, under a filename is called a File. This
data may include a picture,an audio or video file,a library or an application.
Text files include Word documents, Rich Text Format(RTF)and layered image files.
Under the audio file category one would find-MP3s and AIFs.
Computer software that is copyrighted and made available for use free of charge
is referred to as freeware. Since freeware is copyrighted,no one can market the
software as their own. Common freeware are-program updates and small games.
First In, First Out (FIFO)
This term refers to a method of how data can be processed and retrieved. In this
system, the items that are entered first are also the first ones to be removed.
In simpler words, it would be right to say that the items are removed in the
same order that they entered by.
Hardware or software devices that have been created in such a way as to allow,
stop or proxy data through a network in which the level of trust is different
for each is called a firewall. Using firewall a network server or client machine
can be stopped from being damaged by users who are not authorized to use it.
A term coined to refer to the act of posting or sending unpleasant messages over
the Internet. These kinds of messages can be sent using e-mails, instant
messaging programs and can be posted within online discussion forums also
referred to as bulletin boards and newsgroups.
File Transfer Protocol (FTP)
FTP is a protocol used to exchange files over networks that support TCP/IP
protocol. Two computers are required in a FTP transfer-the server and the
Graphics Interchange Format(GIF)
A compressed image format is known as GIF. The images in GIF use a compression
formula,developed by CompuServe. They are based on a palette of almost 256
colors, these colors are indexed colors.
Garbage In, Garbage Out(GIGO)
This term is a computer maxim which means that if data that is invalid is
entered into the computer, the output will also be invalid.
Graphics Processing Unit(GPU)
A single-chip processor mainly used for computing 3-D functions. 3-D functions
include lighting effects,object transformations and 3-D motion. The tasks
referred to above are all mathematically-intensive,which if done on the CPU
would put a strain on it. The GPU comes into the picture here as it can help the
computer to run more efficiently.
Graphical User Interface(GUI)
The graphical Interface of a computer is something which allows users to click
and drag objects with the help of a mouse in place of text at a command line.
Windows and MAC OS are two operating systems which are popular.
A Hardware or Software which acts like an entrance from one network to another.
This is done to facilitate data transfer between a number of computers. A task
like sending an E-mail or logging into a website involves a gateway which helps
the connection take place.
Invented by the University of Minnesota,the gopher system helps users search for
and collect information using a text interface. Based on the client-server
structure where a gopher client program looks up the gopher servers, where
documents,articles,programs are stored.
This term is used to measure computer processing speeds. Previously, Megahertz
was the term used to measure computer CPU speeds,but,after the 1,000 Mhz mark
was crossed around the year 2000 Gigahertz gained prominence. 1,000
megahertz(MHz) or 1,000,000,000 Hertz (Hz) is equal to one Gigahertz.
Gnutella is derived from two words, The first is GNU, General Public License and
the second part comes from Nutella, a chocolate hazelnut spread. Gnutella is a
Peer to peer network (P2P). In other words it is a network which allows its
users to share files. To do this each user needs to be connected to an "ultrapeer,"which
is a server in which files are shared by the users who are connected.
The physical parts of a computer and other related devices are termed as
computer hardware. Hardware can be divided into two parts-Internal hardware also
referred to as components and External hardware which is referred to as
peripherals. Devices which are included under internal hardware are
motherboards, hard drives and RAM. External hardware include monitors,
keyboards,mice, scanners and printers.
A word,phrase or image that needs to be clicked to enable the user to go to a
new document or section within the current document. Nearly all web pages have
hyperlinks. The hyperlink stands out when the cursor is moved over it, usually
changing the arrow into a small hand pointing to the link. When clicked,a new
page or place is opened on the current page. Hyperlinks are also found in other
hypertext documents like encyclopedias, glossaries, dictionaries and other
material used for reference.
This term is used to refer to someone who can gain access to other computers
without permission. A simple task like figuring out someone's password to a
difficult task like writing a custom program to break another computer's
security code can be done by a hacker with ease. Software manufactures release
periodic "security updates" to minimize hacking, especially in large business
A spindle of magnetic disks, called platters,that record and store information
are called hard disks. Every time data is saved or a program is installed on the
computer, the information is written on the hard disk. The hard disk stores data
magnetically, because of which the recorded information recorded on it stays
there even when the computer is turned off.
The hard disk where all the files and folders are physically located are stored
in the hard drive. Only a little bigger than the hand the typical hard drive can
hold over 100 GB of data, this is stored on a stack of disks that are mounted
inside a solid cover. The speed (5400 or 7200RPM)at which these disks spin makes
it possible to access data immediately from anywhere in the drive.
It is a local file that loads when a web browser is started. This also happens
when the browser's "home" button is pressed. The front page, webserver directory
index or the main web page is what comprises the home page of a group, an
individual, a company or even an organization.
Hyper-Text Markup Language(HTML)
This term refers to the language that web pages are written in. A variety of
tags and attributes are used to define the structure and layout of a web
document. The rules of HTML must be kept in mind while writing web pages so that
it would be displayed correctly in the web browser.
Hyper Text Transfer Protocol(HTTP)
The protocol which is being used to transfer data over the World wide web is
called HTTP. This is the reason that all web addresses have "http://" at the
beginning of their website address. As soon as a URL is typed into the browser
and the Enter button is pressed,an http request is sent to the appropriate web
server. This server then send the page you the HTML page you have asked for.
A web, an e-mail and a FTP server are examples of a host. Host refers to a
computer that acts as a server for other computers which are on a network.
The name used while chatting online is referred to as handle. Using a handle,
one can chat online using an identity which does not give others' information
that you would not be comfortable revealing.
Any data that is entered into the computer using input devices like the
keyboard, mouse, scanner and other such devices is called Input. The data can
include text typed in a word processing document,words entered while searching
using a search engine,or even information entered into an excel sheet. Small and
simple things like clicking or moving the mouse button to scanning a document is
A code which is made up of numbers separated by three dots and used to identify
a particular computer located on the Internet is called an IP number. All
computers require an IP address to connect to the Internet. Four sets of numbers
from 0 to 255, separated by 3 dots comprise an IP address.
As the name suggests this term is used to refer to how different parts of the
Information Processing System communicate with each other. The signals received
by the unit are called Inputs and the signals sent from it are termed Outputs.
Internet Connection Firewall(ICF)
The term written above is a Windows XP feature. It is a feature that protects
computers which are connected to the Internet from unauthorized viewing. Once
ICF is enabled,incoming requests are logged on. If the information that comes in
is something that has been requested then the transmission will be passed,if
not,the transmission will be dropped.
Instant message and IMing are two other names by which Instant Messaging is
referred to. Instant Messaging means using typed text to communicate with two or
more people connected to the IM client software. This conversation differs from
an E-mail, as this happens in real-time.
A term coined to connect two words-Information and Entertainment. It refers to
any movie,software,television show,website which has content that is a perfect
blend of information and entertainment.
Millions of computers all connected by a global network,constitute the
Internet.The Internet consists of smaller domestic,academic,business and
government networks which together carry information and services.
Icons are small pictorial representations used for an object or program. They
serve as a useful tool as with the help of the mouse or the keyboard, icons can
be minimized and maximized.
Internet Service Provider(ISP)
A company or organization that provides consumers access to the Internet and
other related services for a nominal fee. Dial-up,Broadband,Cable modem
ISDN,Gigabit Ethernet,Satellite Internet Access are some of the popular options.
Pronounced as two separate letters, IT refers to anything related to
networking,hardware,software,the Internet,or even the people who work using
these technologies. IT departments whose responsibilities include managing the
computer networks,and other technical areas of the business have come into
Internet Connection Sharing(ICS)
Using ICS,several computers can connect to the Internet using the same
connection as well as IP address. For several computers in a household to
connect to the same cable or DSL modem,a router has to be used. Apart from a
router,software like Windows 98 and later as also Mac OS X, support Internet
A small electronic device made out of silicon, that possesses the ability to
hold hundreds to millions of transistors, resistors and capacitors. Though small
ICs can perform calculations and store data,using both the digital and analog
Originally called OAK,Java is a high-level programming language developed by Sun
Microsystems. As OAK was unsuccessful,it was renamed Java. Java is similar to
C++, though it has been simplified to get rid of common errors made while
A scripting language developed by Sun Microsystems together with Netscape. As
create stand-alone programs,so it is instead used to create web pages that are
dynamic and interactive.
Joint Photographic Experts Group(JPEG)
JPEG is a compression method commonly used for photographic images. JPEG itself
specifies the program code which defines how an image is compressed into bytes
and then decompressed back into images and the file format used during this
Java Runtime Environment(JRE)
Also known as J2RE, this is a software bundle created by Sun Microsystems. Using
this software allows a computer system to run a Java application,which is
necessary to view many Internet pages.
Java Server Page(JSP)
JSP is a Java technology with the help of which software developers can
dynamically generate HTML,XML or other types of documents which are created in
response to a request by a Web client. Using this technology, certain
pre-defined and Java code are allowed to be embedded into static content.
A metal connector,small in size that acts as an on/off switch and is used to
change hardware configurations,is termed a jumper. It is usually made up of two
wires and a small piece of metal. The jumper is turned on by connecting the
wires to the metal piece,and is disconnected by removing the wires. Jumper
blocks,which are made up of multiple jumpers are used to provide information to
a computer regarding the configuration of certain devices like a hard drive or a
Kilobits Per Second(Kbps)
The term written above is used to describe data transfer rates,33.6 Kbps and 56
Kbps are two modem speeds which are common.
The kernel is used to refer to the central component of most computer Operating
Systems. Managing the system's resources is one of its responsibilities.
Different kernels perform different tasks which depend on their design and
This term is used to refer to space which exists between the characters of a
font. If Kerning were not available then each character would take up a block of
space after which the next character would be printed. Using Kerning,characters
vertically overlap,meaning part of two characters take up the same vertical
space. This is useful because it allows more text to be placed within confined
Computer hardware which has been made like the typewriter keyboard. There are
three types of keys on a computer keyboard-Alphanumeric, which comprises letters
and numbers. Punctuation, which is made of the comma, punctuation and so on and
the Special keys which include function keys,control keys,arrow keys and the
Caps lock. The keyboard is used to enter data into a computer.
A set of keys that perform a function when used with some special key
combinations. Most of what is termed as keyboard shortcuts are shortcuts for
commands located in a program's Menu bar. For instance the shortcut for copying
data in Windows is "Control -C" and "Command-C" in Mac.
This term is used to refer to a character on the keyboard. A keystroke is
performed when a key is pressed. At times,keystrokes per minute is used to
measure the typing speed of an individual,instead of words per minute.
Established by the International Electrotechnical Commission in 2000, Kibibyte
is a unit of computer storage or information. The term has been coined to refer
exclusively to 1,024 bytes.
The Keyboard, Video and Mouse together constitute the KVM Switch. This is a
hardware device using which a user can control multiple computers. Though
multiple computers are connected to the KVM, a smaller number can also be
controlled at any time given.
Local Area Network(LAN)
A computer network that covers a small geographic area like a home, office or
group of buildings together make up the LAN. Largest and mid-sized business
establishments today use the LAN. This makes it easy and convenient for
employees to share information.
Portable computers that can be carried while on the move, Laptops include a
screen, keyboard and a trackpad also referred to as a trackball. Since Laptops
were created for people who are on the move, they contain a battery that allows
them to operate without being connected to a terminal. The battery can be
charged using an adapter. Most modern laptops also include a wireless networking
adapter, which makes it possible to access the Internet without wires.
Laser Printers use a laser beam to produce an image on a drum. The electrical
charge on the drum is altered whenever the light of the laser hits it. After
this the drum is rolled through a reservoir or toner,this is picked up by the
charged portions of the drum. At the end of all this,the toner is transferred to
the paper using a combination of heat and pressure.
When there is a transfer of data taking place,there is latent time,which is the
time it takes after the packet has been sent,to the time the packed is received.
This amount of inactive time is called Latency.
Liquid Crystal Display(LCD)
A thin,flat display device which is made up of a number of colors or monochrome
pixels laid out in front of a source of light or reflector. LCDs are used in
laptop computer screens and flat panel monitors. Smaller LCDs screens are used
in PDAs and portable video games.
The Leaderboard is and online advertisement which was introduced in 2003 to
change the size of conventional advertisements. The standard size of the
Leaderboard advertisement is 728 pixels wide by 90 pixels tall. Leaderboards
contain images, text or even animation. Once clicked,the user is directed to the
Here leaf refers to files which are placed at the very bottom of the
hierarchical file systems ,very much like the leaves on a tree. Directories, in
the same system can be compared to the nodes.
Last In, First Out(LIFO)
This term is used to refer to a method of processing in which the last items
entered are the first to be removed. This method is used while extracting data
from a range of available data. In cases when the most recent information has to
be accessed, the LIFO method is used.
A link is a navigation element in a document,which leads to another section. The
section referred to above may be in the same document, another document or a
specified part of another document. These links may be in the form of an
underlined, highlighted or colored word/phrase or image.
Linux is a Unix-based operating system which was created by Linus Torvalds, as
he was not happy with the currently available options in Unix. Linux is easily
customizable and new codes can be added to the operating system,thus making it a
hit with users.
A small program which automatically sends messages to multiple e-mail addresses
which are present on a mailing list make up the listserv or list server. The
address of a subscriber is automatically added to the list when the person
subscribes to it. This enable future e-mails to be sent to the new subscriber
along with the other people on the list. The listserv automatically removes the
address when the person unsubscribes from the facility.
Evenly spreading out the processing and communication activities across a
computer network to ensure that no single device is overloaded is called Load
Balancing. This is particularly useful for networks where the number of requests
that will be sent to a particular server cannot be predicted. Networks become
more efficient using the load balancing technique.
The local computer on which a program runs is called the localhost. Let us take
for instance that a web browser is being run on your computer, in this case,your
computer is considered to be the localhost.
This is a type of circuit that regulates the flow of electricity that determines
the computers use to make complex logical decisions. Microprocessors, have
millions of Logic gates while other circuits may only have a few. Highly complex
operations can be made successful by combining thousands or millions of logic
To supply the computer with information which is necessary to obtain access to
it, is the login procedure. This information could be a username and a password
or an ID number and a security code. Once this information is entered and
verified, the session will begin.
Lines Per Inch(LPI)
The resolution of images printed in halftones is measured in LPI. Halftone
images are printed as a series of dots,the higher the number of LPIs, the more
dense the dots can be,this helps in providing images with finer resolution.
LAPP is a combination of Linux, Apache,PostGreSQL and Perl and is an open source
Web development platform. Linux is used as the operating system, Apache, the web
server,PostGreSQL as the relational database management system and PHP as the
object-oriented scripting language.
A digital electrical component that is programmable and contains the functions
of the CPU on a single semi conducting integrated circuit is called a
Microprocessor. Functions like adding,subtracting,multiplying and dividing are
done by the microprocessor. Megahertz or cycles per second,is used to measure
the speed of a microprocessor.
A horizontal strip that contains lists of available menus related to a certain
program. Functions such as opening files,interacting with an application or help
are housed in the menu bar.
The main circuit board of a computer is called the motherboard. It is the basic
unit on which the whole computer works. The motherboard is what houses the
CPU,the ROM,memory expansion slots,PCI slots,serial ports. Even the hard
drive,DVD drive,keyboard and mouse are found there.
A software program that has been developed for multiple operating systems is
called multiplatform. Microsoft Word is a multiplatform application as it runs
on both Windows and Macintosh platforms.
Media Access Control Address(MAC address)
A hardware identification number that identifies each device on a network in a
unique way. Every network card whether Ethernet or Wi-Fi have MAC addresses
manufactured into them,because of this,the MAC addresses cannot be changed. Six
two digit hexadecimal numbers make up MAC addresses.
A very big and expensive computer,which is capable of supporting a large number
of users simultaneously is called a mainframe. Mainframe computers are mostly
used in large businesses and for scientific purposes.
This term is used to refer to software programs which have been created to harm
or process unwanted actions on a computer system. Viruses, worms,trojan horses
and spyware are some examples of malware.
A communication device which allows one computer to connect with another and
transfer data over telephone lines is called a modem. A modem can be either
external or internal to the computer.
This term is used to refer to open sources relational database management
system,which is based on the structure query language. This language is used for
adding,removing and modifying information in the database. Commonly found on web
servers, MySQL can be used for a variety of other applications too.
Etiquette on the net,is referred to as netiquette. Displaying good netiquette
means respecting another person's privacy and not doing anything that will
frustrate another person. Some areas where good netiquette must be displayed
are,while sending an e-mail, chatting online and in newsgroups.
Two or more computers which are connected to each other form a network, this
facilitates the sharing of files and information which can take place between a
number of systems.
Network Interface Card(NIC)
This term refers to a card which needs to be inserted into the computer to
connect it to a network. Some of these NICs are designed for particular types of
networks,while there are those which can serve multiple networks too.
Network News Transfer Protocol(NNTP)
An Internet application used mainly for reading and posting articles,as also
transferring news among news servers. A message that has been sent will go
through this protocol before being sent to the newsgroup.
Network Operations Center(NOC)
NOC,is the location where the company's servers and networking equipment are
kept,managed and monitored. This may be at an external location or within the
company premises itself.
A term which originated in the 1990s and is used to refer to a new user of a
computer or the Internet.
Half of one byte,which equals to a set of four bits,make up a nybble. Sometimes
the nybble is also known as a hexadecimal digit or "hex digit."
The time when a computer or any other device is not connected to another devices
or turned on,we would say that it is offline. Not being connected to the
Internet is another instance when one would use the term offline!
This is the term used to refer to the software that communicates with the
computer hardware. The OS is important because without it,it would not be
possible to run software programs. The allocation of memory,processing of
tasks,assessing of disks and peripherals are all tasks which are performed by
the Operating Systems(OS)
The place where an outgoing e-mail message is stored until it is successfully
sent to the recipient.
Open Shortest Path First(OSPF)
The method of finding the shortest path from one router to another in a
LAN(Local Area Network) is called OSPF. When several routers are on a network,a
table is created of the router connections,thus,when data is sent from one
location to another,the best and the most efficient option available is selected
for the data to be sent. This is done by the OSPF algorithm.
Optical Character Recognition(OCR)
The branch of computer science that involves reading text from paper and
translating the images into a form that the computer can manipulate is called
OCR. Using this system it is possible to take a magazine or book article and
feed it directly into an electronic computer file. This information is then read
using a word processing program.
Object Linking and Embedding(OLE)
OLE is used to refer to a compound document standard developed by Microsoft
Corporation which enables the user to create objects using one application and
linking or embedding them using the next. The objects that are embedded retain
their original format.
Discs that are read by a laser are called Optical media. CD-ROMs, DVD-ROMs and
their variations along with Blu-ray is included under this term. Optical discs
have a longer shelf life and are cheaper to produce.
A program in which the source code is known to the general public. This
information is divulged for use and/ or modification from its original design
which is done free of charge. The open source code is created as an effort in
which programmers work on the code and improve it and then share the changes
with the community.
Computer data sent over a network is called a packet. The amount of data sent
over a network is small and this data comes to the computer in the form of many
small packets. The address of its origin,destination and the information that
connects it to the related packets is what constitutes a packet.
A hidden series of characters that makes it possible for a user to gain access
to a file,computer or a program. Usually passwords are made up of several
characters,which may include letters,numbers,and most symbols leaving out
spaces. Passwords ensure that the computer is not accessed without permission.
A server that all the computers in large businesses,organizations and
universities are connected to before they gain access to information on the
Internet. Using a proxy server the Internet speed is improved.
A common set of rules and instructions which a computer follows while
communicating with each other is termed as Protocol. Many different types of
protocols exist because of the many methods which computers use to communicate.
This term is used to refer to a website or a service that provides a broad
spectrum of services and resources. E-mails,forums,search engines and on-line
shopping malls fall under this category.
Post Office Protocol(POP3)
A method of delivering e-mails,which is simple and standardized is called POP3.
E-mails are received by the POP3 mail server whose task it is to filter them
into the appropriate user folders. Messages are downloaded from the mail server
to the user's hard disk whenever a user connects to the mail server to check his
A number of jobs that are in sequence,waiting to be processed is what makes up a
queue. New jobs are added to the already existing line and are processed in the
order in which they were sent.
Quicktime was developed by Apple Inc. It is a multimedia framework,which can
handle various forms of digital video,media clips,sound, text and a whole range
of interactive panoramic images. It is available for operating systems like
Microsoft Windows,Classic Mac OS and Mac OS X.
Random access memory (RAM)
The space in the
computer on which information is temporarily stored while the computer is on.
The assignment of a
computer to a new task or office once it has been replaced by a newer computer.
Relational data base
A data base where
data are stored in more than one table, each one containing different types of
data. The different tables can be linked so that information from the separate
files can be used together.
An edition of a
software program released when minor changes or bug-fixes have been made.
Releases are usually shown by a whole number (denoting the version) followed by
a decimal number indicating the release number.
The act of
accessing a computer or network from a location that is removed from the
physical site of the computer or network. Remote access is often accomplished
via the use of a modem.
The clarity of the
images produced on a monitor screen. The sharpness of the image on a display
depends on the resolution and the size of the monitor.
A device that
regulates network traffic as its enters another network, and makes sure that
messages go to the correct network site.
An input device
that takes in an optical image and digitises it into an electronic image
represented as binary data. This can be used to create a computerised version of
a photo or illustration.
A computer program
that automatically displays a moving image or pattern on a monitor screen after
a pre-set period of inactivity.
searches for specific information or files on the Internet using search criteria
that you enter.
Secure Sockets Layer
SSL is a
commonly-used protocol for managing the security of a message transmission on
the Internet. SSL uses a public-and-private key encryption system, which also
includes the use of a digital certificate.
threats to the equipment, functioning and contents of a technology solution.
programs that tell the computer what to do. Software can be divided into two
groups, operating system software and application software.
offered by software that make it easy and effective to use.
(e.g. Excel, Lotus) that have efficient and accurate methods of working with
numbers. They are used to perform a wide variety of simple to complex
calculations, and offer charting and graphing capabilities.
A group of persons
who meet periodically to evaluate the progress and success of the implementation
of the technology solution.
This is a sequence
of "moving images" that are sent in compressed form over the Internet and
displayed by the viewer as they arrive. Streaming media is streaming video with
sound. With streaming video or streaming media, a Web user does not have to wait
to download a large file before seeing the video or hearing the sound. Instead,
the media is sent in a continuous stream and is played as it arrives.
A collection of
software programs that are sold together and are supposed to work together
efficiently and use similar commands.
Refers to exploring
locations and scanning the contents of WWW sites on the Internet.
A group of
elements, components, or devices that are assembled to serve a common purpose.
In a technological system, this refers to all hardware, software, networks,
cables, peripheral equipment, information, data, personnel, and procedures
(i.e., all technology resources) that comprise a computer environment.
A description of
the design and contents of a computer system. If documented, it may include
information such as a detailed inventory of current hardware, software and
networking capabilities; a description of long-range plans and priorities for
future purchases, and a plan for upgrading and/or replacing dated equipment and
A list of the
specific capabilities a system should be able to do or staff should be able to
do using the system, such as system storage and retrieval capabilities,
calculation and processing capabilities, reporting and output capabilities, and
An essential element of a computer system,a tape drive can be used to store a
large amount of information on magnetic tape cartridges. They can be used for
daily back-up of information.
The horizontal bar located at the bottom of the screen is called a task bar.
Apart from the Start button and the time,the task bar houses the programs which
Transmission Control Protocol/Internet Protocol(TCP/IP)
Developed by the U.S military,the TCP/IP was used to enable communication
between different types of computers and networks. The former is
connection-oriented and provides communication that is dependable and the latter
provides packet routing.
This term is used to refer to a text-based program which is used to directly
connect and interact with a remote host or a server.
Templates are formats which have already been designed. If required the text and
graphics can be customized according to one's own needs.
A terabyte is a unit of measurement which is equivalent to 1000 gigabytes.
A device which enable a user to be connected to a computer is called a terminal.
Usually,a terminal consists of a monitor and a keyboard. Terminals are usually
of three kinds:Intelligent, smart and dumb terminal.
Text editor is a program which can be used to input, update,delete,write or
store information on the computer. Programs,data or textual material are some of
the kinds of information.
In networking,a series of bits found on a token-ring network,is called a token.
It is used to send information to other computers.
A single element which is found in a programming language is called a token.
When we take into account security systems,token would refer to a small card
with an ID code used to log into a network.
A row,column or block of onscreen buttons or images is what a toolbar is. When a
button or an image is clicked on a toolbar,certain functions on the program are
When the mouse pointer is moved over a button on the toolbar,the name and
description about it appear in a rectangular box,this is called tooltip.
A trojan horse refers to a program that looks genuine,but performs some wrong
activity when it is run. The only difference that exists between trojan horses
and viruses is that,the former do not replicate themselves.
A set of characters like letters, numbers, punctuation marks and symbols of the
same design make up a typeface. Typefaces are vector-based, because of this,
they can be scaled very large and still appear sharp.
Unified Modeling Language(UML)
UML is a programming language used for visualizing, specifying and documenting
the artifacts of software systems. UML uses blueprints to simplify the complex
Unix is an operating system which was created in the Bell Labs in 1960s. It only
gained popularity with the consumers in the 1990s. Unix, is still considered the
most common operating system for web servers.
To upload is to send a file from a local computer to another remote computer.
Uniform Resource Locator(URL)
URL is an address that indicates where a file is located on the Internet.
Universal Serial Bus(USB)
The most common type of computer port used is the USB. Basically, USB is a
protocol which is used when there is a data transfer taking place from one
digital device to another.
A string of characters that is unique to a person and is used for identification
while attempting to gain access to the Internet or any restricted website.
Software programs that perform tasks which are very specific and are usually
related to managing system resources are called utility programs. Some of these
programs help ensure that the computer is free from unwanted software, while
other utility programs add functionality like desktop customization.
Vector images are made up of paths. A line,a square, a triangle, or a curvy
shape are what constitute a path. Using these paths, simple and complex diagrams
can be created.
Video Graphics Array(VGA)
Originally developed in 1987 by IBM, the VGA is the standard monitor interface
used in most personal computers.
A card that possess the necessary circuits to create video signals that can be
processed by the computer display.
Memory that is created when the RAM is full is called virtual memory. This is
done by using the hard disk space of the computer.
An environment created artificially using computer hardware and software. In a
virtual world, sound effects are also used along with visuals.
Viruses are tiny programs which are capable of causing harm to files and
programs on the same network. Viruses are able to duplicate themselves, attach
themselves to other programs and even travel across networks.
Voice Over Internet Protocol(VoIP)
A combination of hardware and software with the help of which people can use the
Internet to transmit telephone calls. In this case, the voice data is sent using
packets. Making calls this way is much cheaper as the user only pays for
Virtual Private Network(VPN)
A network that is connected to the Internet and uses encryption to bring into
order all data that is sent through the Internet making the entire network
Virtually private, this is called VPN.
Virtual Reality Modeling Language(VRML)
This term is used to refer to a 3D navigation specification using which
interactive 3D websites can be created. Virtual tours through malls and other
buildings as also models of cars can be viewed using VRML.
Wide Area Network(WAN)
Computer networks that are connected together over long distances using
telephone lines, fiber-optic cables or satellite links are called WANs
This term is used to refer to a service which a company provides to Internet
users with online systems which are used for storing information,images,video or
any other content using the web, web hosts also provide Internet connectivity. A
small fee is usually charged for the using this service.
A web page is used to refer to a document or file which is written in HTML and
stored on the web server. This document can be viewed over the Internet with the
help of a Web browser.
Web pages, images,sound,video and other files make up a website. A website can
be retrieved using a browser.
Windows is an operating system with a graphical user interface.
Winsock is an application Programming Interface which is used for developing
Windows programs. These programs can communicate using the TCP/IP protocol.
This term is used to refer to a computer that has been set up to perform a set
of tasks. Photo editing, audio recording, or video production are a few of those
tasks. These workstations are connected together which make it possible for
files and other information to be sent from one computer to another.
World Wide Web(WWW)
Researchers at CERN in Switzerland created the concept of the WWW. The www is a
collection of online documents which are stored in servers around the world.
These servers are connected to the Internet, using a web browser these documents
can accessed over the Internet.
Extensible Hypertext Markup Language(XHTML)
This term is used to refer to a Markup language which is written XML.
Extensible Markup Language(XML)
XML is a language that is used to define documents. This is done using a
standard format which can be read by any application that is compatible with
Extensible Stylesheet Language Transformation(XSLT)
XSML is a language which is used to change XML or XSL documents into HTML using
a set of well-defined rules. This change makes it suitable for a browser to
Yobibyte is a unit of measurement which is equal to 2 to the 80th power.
1,208,925,819,614,629,174,706,176 bytes or 1,024 zebibytes make up a yobibyte.
The largest unit of measurement used for computer data is the yottabyte, it
consists of 1,024 zettabytes.
A unit of data storage which equals to 2 to the 70th power is called a zebibyte.
It is equal to 1,024 exbibytes.
Zettabyte is a name derived from Zeta which stands for the last letter of the
Greek alphabet. A unit of used to measure data storage, a zetabyte is equal to
This term is used for a file format which is used to compress or zip files. This
is done in order to reduce storage space and time taken to transfer a file.