AIT-1 Flashcards
hardwere, that may convert electrical signals to acoustic signals or vice versa. An example is the hydrophone. which responds to waterborne sound waves and is useful in underwater sound detection
acoustictoelectric transducer
the part of a hard disk to which the read/write arm attaches which controls the movements of the read/write arm
actuator
Ecommerce is the activity of buying or selling of products on online services or over the Internet. Developer. Consequently. is the person who creates the such a sites
ecommerce developer
let you watch DVDs. play music and listen to the radio on the Internet.
media player
Browser hijacking is a form of unwanted software that modifies a web browser’s settings without a user’s permission. to inject unwanted advertising into the user’s browser. A browser hijacker may replace the existing home page. error page. or search engine with its own.
browser hijacking
The desktop consists of … such as windows. icons. menus
graphical user interfaces (GUI)
can store up to 650700 MB of data
CDs (compact discs)
is any software that brings harm to a computer system. Malware can be in the form of worms. viruses. trojans. spyware. adware and rootkits. etc.. which steal protected data. delete documents or add software not approved by a user.
malware/malicious software
defines the Internet domain name of the web server that hosts the website
Domain
a symbol that appears on the display screen and that you move to select objects and commands
cursor/pointer
a person or thing that makes partial or minor changes to something.
modifiers
a computer program used to prevent. detect. and remove malware.
antivirus program
business transactions conducted on the Internet
ecommerce
documents. pictures. sounds and even computer programs
attachments
provide little or no abstraction from a computers commands in the language map closely to processor instructions. Generally they refer to machine code.
lowlevel language
the blog administration should not be confused with the actual writing of a blog His responsibilities are adding photos is often key.Topics of the blog should be tweaked by a blog administrator. In one word it is the pesron who is respi=osible for the blogs (for example) of famous perple. They obviously have no time to post pictures. reply to commetns. promote some stock and ets
blog administrator
it such links refer to multimedia. i.e. audiovisual elements
hypermedia
a wireless technology standard for exchanging data over short distances from fixed and mobile devices. and building PANs
bluethoot
in agreement with something
in concurrence
makes a PC easier for disabled users to use
accessibility software
a microprocessor designed to supplement the capabilities of the primary processor
coprocessor/coprocessor
a small device able to be connected to and used with a computer. especially to allow access to wireless broadband or use of protected software
dongle/key
carbon copy sent to another addressee
CC
technology of very small devices made of silicon or polymer which perform nonelectronic functions such as typically sensing and actuation
microsystems
a message posted to a public Internet discussion group with the intent of provoking an angry response or argument over a topic
flamebait
a level of access above that of a normal user. … In an application environment. users with ‘superuser’ or system administratorroles and responsibilities would be considered to have Administrator Access.
administratorlevel access
makes copies of all information stored on a disk and restores either the entire disk or selected files
backup software
The delete key is a key on most computer keyboards which typically is used to delete either (in text mode) the character ahead of or beneath the cursor. or (in GUI mode) the currentlyselected object.
Delete key
military branches
.mil
is the overall size (generally height) of a font shown on a screen or printed on a page. A font is typically measured in a point (pt) size
font size
a row of items titles that. when clicked. display dropdown menus of other items or commands
menu bar
a small picture that represents an object or program
icon
a small area on a screen in which the user is prompted to provide information or select commands.
dialog box
buttons on a computer keyboard that are either programmed or designated to move the cursor in a specified direction.
arrow keys
Almost the same as a whiteboard. but it is a desk. there is no projectors only sensors
interactive table
is one of the oldest browsers predominantly used on Windows computers
Internet Explorer
Manages projects. technology and people. Takes responsibility for the maintenance of servers and installation of new software. and for staffing a helpdesk and a support group
IT Manager
the use of the Internet or other electronic means to stalk or harass an individual. group. or organization. It may include false accusations. defamation. slander and libel. It may also include monitoring. identity theft. threats. vandalism. solicitation for sex. or gathering information that may be used to threaten. embarrass or harass.
cyberstalking
Can be responsible for installation. maintenance or repair of computers and associated equipment. Installs hardware. ranging from personal computers to mainframe machines. and tests by running special software.
Computer Services Engineering Technician
small pictures that are stored on a computer and can be easily added to a document
clip art
a thirdparty entity that manages and distributes softwarebased services and solutions to customers across a wide area network from a central data center
Application Service Provider (ASP)
fixed into the surface of something: The thorn was embedded in her thumb.(встроенный)
embedded
for schools
.edu
small pieces of data sent from a website
cookies
is the brains of the computer where the actual processing data takes place
CPU
an input device consisting of a flat. pressuresensitive pad which the user draws on or points at with a special stylus. to guide a pointer displayed on the screen.
graphics tablet
the large system of connected computers around the world that allows people to share information and communicate with each other
internet
the learning or developing of a skill. habit. or quality.
acquisition
a computer hardware component that connects a computer to a computer network
Network Interface Card (NIC)
blank/blind carbon copy sent to a recipient without the recipients address appearing in the message
BCC
software that contains advertisements embedded in the application
adware/advertisingsupported software
a distinctive attribute or aspect of something
feature
Advises potential customers about available hardware and sells equipment to suit individual requirements.
Computer Salesperson
defines the domain host (default host for http is www)
Host
defines the name of a single web page
Filename
change the form. character. or function of something.
convert
is small programs that harm the computer system
carry viruses
the physical and electronic parts of a computer
hardware
conforming to the law or to rules.
legitimate
the practice of sharing computer data or space on a network
file swapping
interprets software programs written in assembly language into machine code
assembler
a central connection point in the star network topology. which does not distinguish to which port data packets should be sent
hub
press a computer mouse button twice in quick succession to select a file. program. or function.
double click
a type of broadband communications technology which is up to 24 Mbps fast
ADSL (Asymetric Digital Subscriber Line)
at the bottom. top. and/or sides of the screen–
menu
software that is specifically designed to disrupt. damage. or gain unauthorized access to a computer system.
malware
a machinereadable representation of the UPC (Universal Product Code) which is read by a scanner that passes over the code and registers the UPC
barcode
is a feature in Microsoft Excel that automatically adjusts the width or height of a cell.
AutoFit Behaviour panel
the creation of documents using page layout skills on a personal desktop computer primarily for print
desktop publishing (DTP)
is a harddisk failure that occurs when a read/write head comes in contact with its rotating platter. resulting in permanent and usually irreparable damage
head crash
a rapid transition from one phase of a business enterprise or project to another.
cutover
is the luminance of images that is measured in cd/m^2(candela per square metre)
brightness
navigation key. A keyboard key used to move the cursor (pointer) around on the screen. They include the four Arrow keys. PageUp. PageDown. Home and Endkeys.
navigation keys
a company in UK
.co.uk
Software protection and anticheat for games. against copying. piracy and illegal use. Copy protection is a system of measures aimed at countering unauthorized duplication of information. usually presented in electronic form.
anticopying software
a small device on a piece of electrical or electronic equipment which is pressed to operate it.
button
the authoring language used to create documents on the Web
HyperText Markup Language (HTML)
a device or piece of equipment designed to perform a specific task.
appliance
is an error. flaw. failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result
bug
a sheet of information in the form of a table. graph. or diagram
chart
longterm storage devices. which means the data is still saved even if the computer is turned off or unplugged
mass storage device
a key on keyboards that turns insert mode on and off
Insert key
the state of being watchful for possible danger.
alert(n)
a special type of expansion cards designed specifically for the purpose of accelerating various workloads.
acceleration card
the keyboard key that originally pushed the typewriter carriage one position backwards. and in modern computer systems moves the display cursor one position backwards. deletes the character at that position. and shifts back the text after that position by one position.
Backspace key
Will allow you to move in the begging of the string
Home key
an arrangement of text and graphics
layout
is a freeware web browser developed by Google in 2008
Chrome
Researches. designs. and develops computers. or parts of computers and the computerized element of appliances. machines. and vehicles.
Hardware Engineer/Hardware Architect
compress the contents of a disk. increasing the capacity of the disk
disk compression utilities
technology is a type of online chat that offers realtime text transmission over the Internet. A LAN messenger operates in a similar way over a local area network.
instant messaging (IM)
nonprofit organizations
.org
Input devices are devices such as cameras and scanners which are used to record an image of some physical scene. Outputdevices are devices such as displays and printers on which images are produced.
imaging device
an email utility that automatically replies to an email message with a prewritten response when that email comes into a specific email or Internet address
autoresponder
the time a program or device takes to locate a single piece of information and make it available to the computer for processing
access time/seek time
the code used to create Web pages
HTML
Function and Edit Keys. … These keys would include cursor keys and editoperation keys. and are referred to here as edit keys. Left arrow.right arrow. up arrow. down arrow. Home key. End key. Page Up.Page Down. Insert. Delete
editing keys
a measurement that indicates the diagonal distance between likecolored phosphor dots on a display screen
dot pitch/phosphor pitch (note: DPI dots per inch is a number of dots per 2.54 cm)
which examines the instructions in the users program. interprets each instruction and causes the circuits and the rest of the components disk drives. monitor. etc. to be activated to execute the functions specified
Control unit
a line or block of text that is automatically added to the bottom of every page
footer
is a mechanism that is controlled or monitored by computerbased algorithms. tightly integrated with the Internet and its users. In cyberphysical systems. physical and software components are deeply intertwined. each operating on different spatial and temporal scales. exhibiting multiple and distinct behavioral modalities. and interacting with each other in a lot of ways that change with context.
cyberphysical system
a specific geographic location in which an access point provides public wireless broadband network services to mobile visitors through a WLAN
hotspot
is a large. powerful computer that handles the processing for many users simultaneously (up to several hundred users
Mainframe
the amount of data that can be transmitted in a fixed amount of time or range within a band of frequencies or wavelengths
bandwidth
is a more active version of the word include if you _____. you are adding something to the mix.
incorporate
a published false statement that is damaging to a person’s reputation a written defamation
libel
a component designed to lower the temperature of an electronic device by dissipating heat into the surrounding air
heat sink/cooler/fan
a specialized functional area within an organization where experts in electronic communications of all kinds wor
ICT department
runs on top of the operating system and allows the user to perform a specific task. such as word processing a letter. calculating a payroll in a spreadsheet. manage a database of information. reading email messages. or manipulating digital photographs
application software
used as a teaching language
BASIC
The green line indicates a ____(in ms word)
grammatical error
a free open source operating system (OS) based on UNIX that was created in 1991
Linux
the dimensions of a display resolution the relative horizontal and vertical sizes of a display
aspect ratio
used for scientific and mathematical applications
FORTRAN
graphics processing unit built into the motherboard instead of having a separate video card
GPU
Definition Of Flat Surface. A plane horizontal surface with no depths is called a Flat Surface.
flat surface
A joystick is an input device consisting of a stick that pivots on a base and reports its angle or direction to the device it is controlling. A joystick. also known as the control column. is the principal control device in the cockpit of many civilian and military aircraft. either as a center stick or sidestick. It often has supplementary switches to control various aspects of the aircraft’s flight
joystick
A desktop publisher uses the computer and software to create visual displays of ideas and information. The desktop publisher may receive text and images from other sources or may be responsible for writing or editing text and acquiring images through digital photography. illustration. or other means
DTP operator
protects your computer from unauthorized access over a network or telecom connection
firewall
a device that forwards data packets along two or more networks
router
Delphi is an integrated development environment (IDE) for rapid application development of desktop. mobile. web. and console software.[1] developed by Embarcadero Technologies.(1995)
Delphi
is a file system cataloging structure which contains references to other computer files. and possibly other directories
directory
specialized computing to put a computer program onto a computer so that the computer can use it: Andrew. can you help me install this software?
install
quick to notice any unusual and potentially dangerous or difficult circumstances
alert
defines a path at the server the place where a web page is located
Directory Path
for company
.com
initializing a disk and preparing it to receive data
formatting
a process by which the space between the words in a line is divided evenly to make the text flush with both left and right margins.
justification
a small graphical element used to highlight or itemize a list
bullets
is a message which is written to deliberately spread fear. uncertainty and doubt
hoax (is an email chain letter)
Applications are stored on a personal computer as executable files documents are stored as …
data file
SMART Board is an interactive whiteboard developed by SMART Technologies. It is a large touchsensitive whiteboard that uses a sensor for detecting user input (e.g. scrolling interaction) that are equivalent to normal PC input devices. such as mice or keyboards. A projector is used to display a computer’s video output onto the whiteboard. which then acts as a huge touchscreen. The SMART Board usually comes with 4 digital writing utensils that use digital ink replacing the traditional whiteboard markers. The digital ink work by using an active digitizer that controls the PC input information for writing capabilities such as drawing or handwriting.
interactive smartboard/whiteboard
Microsoft Exchange Server is Microsoft’s email. calendaring. contact. scheduling and collaboration platform deployed on the Windows Server operating system for use within a business or larger enterprise
Exchange/Microsoft Exchange Server
an instance of striking or being struck.
hit
is a reference to data that readers can directly follow either by clicking or by hovering. thus enabling them easily to navigate their browsers to related resources
hyperlink
is a style sheet language used for describing the presentation of a document written in a markup language like HTML
CSS (Cascading Style Sheets)
select an option on an electronic interface in order to reach another file. website. or web page.
clicking
a computer program that records every keystroke made by a computer user. especially in order to gain fraudulent access to passwords and other confidential information.
keylogger
a special program used to find errors in other program. which allows a programmer to stop a program at any point and examine and change the values of variables
debugger
texts containing hyperlinks
hypertext
are similar in size to CDs (both are 1.2 mm thick and 120 mm in diameter). but they differ in structure and capacity
DVDs (digital versatile discs)
computer time or services. including data processing services. Internet services. electronic mail services. electronic message services. or information or data stored in connection therewith.
computer service
It’s the underlying protocol used by the World Wide Web to define how messages are formatted and transmitted
Hypertext Transfer Protocol (HTTP)
someone who provides guidance. instruction. direction and leadership to a group of individuals (the team) for the purpose of achieving a key result or group of aligned results.
Team Leader
the fraudulent practice of using another person’s name and personal information in order to obtain credit. loans. etc
identity thef
a hacker who violates computer security for little reason beyond maliciousness or for personal gain
blackhat hacker/cracker
a LAN architecture that uses a bus or star topology and supports data transfer rates of 10 Mbps
Ethernet
an object that can contain multiple documents
folder
is a device that modulates the digital signal from the computer into analogue signal that can be carried over the phone line
Modem
the portion of a market controlled by a particular company or product.
market share
something that exists apart from other things. having its own independent existence
entity
scan for computer viruses
antivirus/antivirus utility
made for a particular customer or user.
bespoke
a key on a computer keyboard which is used to perform various functions. such as executing a command or selecting options on a menu.
Enter key
a graphical control element that allows the user to choose one value from a list
dropdown/pulldown menu/list
the main transmission path within a WAN
backbones
the term used to describe any link in any part of a software system that is intended to cause security breaches or damage to a system
malicious link
an input device that allows a person to enter letters. numbers. and other symbols (these are called characters) into a computer. It is one of the most used input devices for computers. Using a keyboard to enter lots of data is called typing.
main keyboard
The process of keeping something in good(at least same)condition: Computer … is the practice of keeping computers in a good state of repair.
maintenance
is the part of the email where you write the information about the addresses and subject
header
a very small microcomputer that also sacrificed power for small size and portability
palmtop or handheld PC
is a multiuser computer that is less powerful than a mainframe
Minicomputers
blinking vertical line in the working area that shows the position on the screen
cursor
the science dealing with the development and application of devices involving flow of electrons in a vacuum. gaseous media and semiconductors
electronics
is a method of exchanging digital messages from an author to one or more recipients
is the message itself
body
a digital electronic circuit that performs arithmetic and bitwise logical operations
Arithmetic Logic Unit
an outstanding part of an event or period of time.
highlight
to perform or complete a job or activity to fulfill:
carry out
digital image is a numeric representation. normally binary. of a twodimensional image. Depending on whether the image resolution is fixed. it may be of vector or raster type
digital image
a record of the address of a website or other data made to enable quick access
bookmarks/favourites
bullying that takes place over digital devices like cell phones. computers. and tablets. Cyberbullying can occur through SMS. Text. and apps. or online in social media. forums. or gaming where people can view. participate in. or share content. Cyberbullying includes sending. posting. or sharing negative. harmful. false. or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal behavior.
cyber bullying/cyberbully
persons who have the ability to develop. operate and maintain ICT systems and for whom ICTs constitute the main part of their job
ICT specialists
the green line indicates a grammatical error (proccess)
grammarchecking
act in such a way as to have an effect on each other. communicate or be involved directly.
interact
A Digital Certificate is an electronic password that allows a person. organizaion to exchange data securely over the Internet using the public key infrastructure (PKI). Digital Certificate is also known as a public key certificate or identity certificate
digital certificate
a type of data transmission in which a single medium (coaxial cable or optical fibre) can carry several channels at once
broadband(from crossword)
the use of a computer to perform calculations on data : a dataprocessing bureau
data processing
hinder. restrain. or prevent (an action or process).
inhibit
is a security identification and authentication device. Such devices use automated methods of verifying or recognising the identity of a living person based on a physiological or behavioral characteristic.
biometric scanner
is a type of card used in digital cameras
flash memory card
a part of the systems GUI. which provides easy management and access to panel components
Control Panel
The _____ provides many of the most common options for formatting selected text. such as font style. font size. font weight. text alignment and colour.
format menu
an object or machine that has been invented for a particular purpose: a machine. for example a phone or computer. that can be used to connect to the internet
device
a camera which produces digital images that can be stored in a computer and displayed on screen
digital camera
a combination of keys that. when pressed simultaneously. perform some task that ordinarily requires use of a mouse or other input device and may take longer to do. In Windows XP . for example. pressing ControlAltDelete will bring up the task manager utility for application and system monitoring and control.
keyboard shortcuts
is two or more connected computers sharing certain resources in a relatively small geographic location. often in the same building
local area network (LAN)
showing or feeling opposition or dislike unfriendly.
hostile
preventing success or development harmful unfavourable
adverse
a type of drive that plugs into a USB port and lets you share photos and music with friend/ is a data storage device that includes flash memory with an integrated USB interface
Flash drive
is a personal computerdesigned for regular use at a single location on or near a desk or table due to its size and power requirements.
desktop computer
refers to software that creates digital media art images and illustrations/ software. such as Adobe Photoshop and Illustrator. are used to create digital media art images and illustrations. or to edit digital images from scanners or digital cameras
graphics software
the act of putting a plan into action or of starting to use something
implementation
a copy of an email message sent to a recipient without the recipients address appearing in the message
blank/blind carbon copy (BCC)
excessive and insincere praise. given especially to further one’s own interests.
Flattery
boundaries across which two independent systems meet and act on or communicate with each other
interface
the amount of vertical space between successive lines of text.
line spacing
…are closer to human languages and they use forms resembling English. which makes programming easier. Highlevel programming languages include C++. Java. FORTRAN. COBOL. PASCAL. BASIC. Visual BASIC. Python and Ruby.
highlevel language
Writes the programs which enable computer to carry out particular tasks. May write new programs or adapt existing programs. perhaps altering computer packages to meet the needs of an individual company
Applications Programmer
not authorized by the law not in accordance with accepted standards or rules.
illegitimate
is software designed to perform a group of coordinated functions. tasks. or activities for the benefit of the user
application/app
Drawed by hand. especially as opposed to by an animal or by mechanical power
handdraw image
an opening in a computer where a circuit board can be inserted to add new capabilities to the computer
expansion slot
an application. or a component of an interface. that enables a user to perform a function or access a service.
graphical control element/widget
a family of computer networking technologies commonly used in LANs and MANs
ethernet
designed to run on the Web its applets let you watch animated characters. play music and games
Java
connects a computer to the Internet via a modem and a public telephone network. It is the cheapest option. but slower than other kinds of Internet access (the maximum theoretical connection speed is 56 Kbps)
dialup connection (narrowband connection)
new and improved technology. and is used in mobile phones on which you can use the internet. watch television. is short for ‘third generation’
3G
a vulnerability used by an attacker to collect an infected user’s click
clickjacking
Design new computer hardware. creating blueprints of computer equipment to be built Test the completed models of the computer hardware they design Analyze the test results and modify the design as needed Maintain knowledge of computer engineering trends and new technology
hardware engineer/architect
popular for business applications
COBOL
are those terminal. that can interpret a limited number of control codes (CR. LF. etc.) but do not have the ability to process special escape sequences that perform functions such as clearing a line. clearing the screen. or controlling cursor position
dumb terminal
1)Designing and implementing safety measures and controls 2)Monitoring network activity to identify vulnerable points 3)Acting on privacy breaches and malware threats
computer security specialist
a collection of data or information that has a name
file
The function keys or Fkeys on a computer keyboard. labeled F1 through F12. are keys that have a special function defined by the operating system. or by a currently running program. They may be combined with the Alt or Ctrl keys.
function keys
government websites
.gov
is a heated argument between two individuals
flame war
A cordless mouse. also called a wireless mouse. is amouse that connects to a computer without the use of wires. Instead. the mouse uses some manner of wirelesstechnology. like Bluetooth.
cordless/wireless mouse
is a set of communication standards for simultaneous digital transmission of voice. video. data. and other network services over the traditional circuits of the public switched telephone network
Integrated Services Digital Network (ISDN)
is a special highspeed buffer storage mechanism which stores copy of the data from frequently used main memory locations
cache
is a data secondary storage device where the software is installed. and where documents and other files are stored.
hard disk drive
a keyboard that contains both numbers and letters on the same keys. Definition of alphanumeric. 1 : consisting of both letters and numbers and often other symbols (such as punctuation marks and mathematical symbols) an alphanumeric code also : being a character in an alphanumeric system.
alphanumeric group/keyboard
the builtin software that determines what a computer can do without accessing programs from a disk
Basic Input Output System (BIOS)
architecture. where one computer acts as the server containing the main hard disk and controlling other workstations or nodes. all the devices linked in the network
clientserver
means user has been taken offline. often for security reasons.
disabled user
is an organization that provides services for accessing. using. or participating in the Internet.
internet service provider (ISP)
A digital video camera. video camcorder. or digital camcorder is a device that records video to formats including Digital8. MiniDV. DVD. a hard drive. or solidstate flash memory.
digital camcorder
the process of combining the various versions of a file or folder
Merge
a small circuit board that has 64bit path and holds memory chips
dual inline memory module (DIMM)
the term used to describe any code in any part of a softwaresystem or script that is intended to cause undesired effects. security breaches or damage to a system.
malicious code
is a type of digital subscriber line (DSL) technology. a data communications technology that enables faster data transmission over copper telephone lines than a conventional voiceband modem can provide
Asymmetric digital subscriber line (ADSL)
causing disruption or annoyance through being unwelcome or uninvited.(назойливый)
intrusive
the intensity of light emitted from a surface per unit area in a given direction which carries information on the brightness of the image
luminance
the main graphical user interface of an operating system. usually displaying icons. windows and background wallpaper
desktop
Calculations . Preliminary assumptions
estimates (noun)(pl)
is a free and open source web browser developed in 2002 for Microsoft Windows. Mac OS X. and Linux coordinated by Mozilla Corporation and Mozilla Foundation
Firefox
Black hat refers to a hacker who breaks into a computer system or network with malicious intent. … The black hat hacker may also sell these exploits to other criminal organizations.
cracker/black hat
a monitor pattern or picture or other graphic representation that forms the background
desktop background/wallpaper
A dictionary with details about the feed image. A feed image can be a logo. banner. or a picture of the author | nahrávat (obraz)
feed (image)
an interruption in an authorized user’s access to a computer network. typically one caused with malicious intent
denial of service
a network of private computers infected with malicious software and controlled as a group without the owners’ knowledge. e.g. to send spam
BotNet
is an external unit with the drive mechanism and the media all in one sealed case
External hard drive
an interface for typing commands directly to a computer’s operating system
command line
LOCK is a function that locks part of a keyboard keys into a distinct mode of operation. depending on the lock settings selected NUMLOCK
lock keys
Caps Lock is a button on a computer keyboard that causes all letters of Latinbased scripts to be generated in capitals
Caps lock
refers to a file containing instructions and data meant for performing a sequence of tasks on a computer
executable file
is a computer that has a microprocessor chip (or multiple microprocessors) as its central processing unit (CPU).
microcomputer
used to write system software. graphics and commercial programs
C++
the software that transforms a highlevel programming language into machine code
compiler
In computer graphical user interfaces. drag and drop is a pointing device gesture in which the user selects a virtual object by grabbing it and draggingit to a different location or onto another virtual object.
drag and drop functions
A help desk. in the context of IT. is a department inside an organization that is responsible for answering the technical questions of its users.
help desk/helpdesk technician
the blue line indicates a contextual spelling error (proccess)
contextual spelling error
aggressive pressure or intimidation. behaviour that annoys or upsets someone: sexual harassment
harassment
In user interface design. a mode is a distinct setting within a computer program or any physical machine interface. in which the same user input will produce perceived results different to those that it would in other settings.(Режим)
mode
a solid or hollow spherical or eggshaped object that is kicked. thrown. or hit in a game.
ball
An input device is a hardware or peripheral device used to send data to a computer. An input device allows users to communicate and feed instructions and data to computers for processing. display. storage and/or transmission.
input device
The only language a PC can directly execute which consists of 1s and 0s
machine code
is composed of a flexible sheet of plastic. coated with ironoxide a magnetisable material
floppy disk
An electronic visual display. informally a screen. is a display device for presentation of images. text. or video transmitted electronically. without producing a permanent record.
electronic visual display/monitor
languages, that are used to create Web documents. They use instructions (markups) to format and link text files. They include HTML and VoiceXML.
markup language
is a disturbance generated by an external source that affects an electrical circuit by electromagnetic induction
electromagnetic interference
the process of giving things out to several people. or spreading or supplying something
distribution technology
broad subject concerned with technology and other aspects of managing and processing information. especially in large organizations.
Information technology (Information and Communication Technology)
register which holds the instruction that is currently being executed
Instruction Register
a highcapacity transmission technique using a wide range of frequencies. which enables a large number of messages to be communicated simultaneously
broadband
is a beginning page of web site
home page
is a method of encoding characters that is based on the order of alphabetic characters in the English language.
ASCI
consists of addressing modes. instructions. native data types. registers. memory architecture. interrupt. and exception handling. and external I/O.
coded set of instructions
is larger than a LAN. covering an area of a few city blocks to the area of an entire city. often including the surrounding areas
metropolitan area network (MAN)