Glossary Flashcards

1
Q

3G

A

3G refers to the third generation of cellular data standards. Cell phone companies often market mobile phones as “3G devices,” but there is no single 3G standard. Rather, 3G is a broad label given to cellular technologies that support data transfer rates of 14.4 Mbps or faster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ADSL

A

Stands for “Asymmetric Digital Subscriber Line.” ADSL is a type of DSL, which is a method of transferring data over copper telephone lines. While symmetrical DSL (SDSL) uploads and downloads data at the same speed, ADSL has different maximum data transfer rates for uploading and downloading data.
For example, an ADSL connection may allow download rates of 1.5Mbps, while upload speeds may only reach 256Kbps. Since most users download much more data than they upload, this difference usually does not make a noticeable impact on Internet access speeds. However, for Web servers or other computers that send a lot of data upstream, ADSL would be an inefficient choice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Anti-malware

A

A utility that searches for and removes any malware on a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Antivirus

A

A utility that searches for and removes any viruses on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Backup

A

A backup is a copy of one or more files created as an alternate in case the original data is lost or becomes unusable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bandwidth

A

Bandwidth refers to how much data you can send through a network or modem connection. It is usually measured in bits per second, or “bps.” You can think of bandwidth as a highway with cars travelling on it. The highway is the network connection and the cars are the data. The wider the highway, the more cars can travel on it at one time. Therefore more cars can get to their destinations faster. The same principle applies to computer data – the more bandwidth, the more information that can be transferred within a given amount of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Beta Testing

A

Before a commercial software program is released to the public, it usually goes through a “beta” phase. During this stage, the software is tested for bugs, crashes, errors, inconsistencies, and any other problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bitmap

A

Most images you see on your computer are composed of bitmaps. A bitmap is a map of dots, or bits (hence the name), that looks like a picture as long you are sitting a reasonable distance away from the screen. Common bitmap filetypes include BMP (the raw bitmap format), JPEG, GIF, PICT, PCX, and TIFF. Because bitmap images are made up of a bunch of dots, if you zoom in on a bitmap, it appears to be very blocky. Vector graphics (created in programs such as Freehand, Illustrator, or CorelDraw) can scale larger without getting blocky.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bitrate

A

Bitrate, as the name implies, describes the rate at which bits are transferred from one location to another. In other words, it measures how much data is transmitted in a given amount of time. Bitrate is commonly measured in bits per second (bps), kilobits per second (Kbps), or megabits per second (Mbps). For example, a DSL connection may be able to download data at 768 kbps, while a Firewire 800 connection can transfer data up to 800 Mbps.
Bitrate can also describe the quality of an audio or video file. For example, an MP3 audio file that is compressed at 192 Kbps will have a greater dynamic range and may sound slightly more clear than the same audio file compressed at 128 Kbps. This is because more bits are used to represent the audio data for each second of playback. Similarly, a video file that is compressed at 3000 Kbps will look better than the same file compressed at 1000 Kbps. Just like the quality of an image is measured in resolution, the quality of an audio or video file is measured by the bitrate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Boot program

A

The program that is used to start the computer. It is automatically loaded so that its instructions can be fetched when the computer is turned on, and it eventually loads the operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CISC

A

Stands for “Complex Instruction Set Computing.” This is a type of microprocessor design.

The CISC architecture contains a large set of computer instructions that range from very simple to very complex and specialized. Though the design was intended to compute complex instructions in the most efficient way, it was later found that many small, short instructions could compute complex instructions more efficiently. This led to a design called Reduced Instruction Set Computing (RISC), which is now the other major kind of microprocessor architecture. Intel Pentium processors are mainly CISC-based, with some RISC facilities built into them, whereas the PowerPC processors are completely RISC-based.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Client–server

A

Network in which the server computers provide services for the client workstations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Constant

A

When a constant is declared it must be given a value. The value cannot be changed while the program is running. If the value needs to be changed then only one change needs to be made (where the constant is declared) This updates the value throughout the program. Value cannot be accidentally changed in the program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Custom-written software

A

Software that has been written for a particular company and for a particular purpose. It costs more than off the shelf software. It might be needed if software doesn’t already exist that does the job satisfactorily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DBMS

A

Stands for “Database Management System.” In short, a DBMS is a database program. Technically speaking, it is a software system that uses a standard method of cataloging, retrieving, and running queries on data. The DBMS manages incoming data, organizes it, and provides ways for the data to be modified or extracted by users or other programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Device driver

A

A small program that is used by the operating system to control peripheral devices. Each device needs a driver to tell the operating system how to communicate with it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Dual-Core

A

A dual-core processor is a CPU with two processors or “execution cores” in the same integrated circuit. Each processor has its own cache and controller, which enables it to function as efficiently as a single processor. However, because the two processors are linked together, they can perform operations up to twice as fast as a single processor can.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

File allocation table

A

An index of all the files that are stored on a disk and their allocation. It also keeps a record of free space on the disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

File Extension

A

A file extension is the last part of a filename, after the dot (e.g. “.pdf”). Most file extensions are three characters long, but they can be shorter or longer as well. File extensions are used to define the file type of each file. The operating system uses this information to select which application will open the file and choose the appropriate icon for the file.

20
Q

File management software

A

Utilities that allow the user to perform common operations on files such as copying, deleting and moving.

21
Q

Flow diagram

A

A diagrammatic method of showing the structure and data flow to define a problem and its situation.

22
Q

Hub

A

A hub is a device that connects nodes together, enabling them to communicate with each other. Hubs are not intelligent, they receive packets from one node and pass it on to all other nodes connected to it. This increases network traffic.

23
Q

Indentation

A

Method of putting spaces in code to make code more readable and easier to maintain in the future. Allows programmer to clearly see where structures/blocks of code start and end.

24
Q

Installation Routine

A

Method of installing new piece of software on a system.

25
Q

Iteration

A

A loop in a program, a loop will keep repeating instructions until a condition has been met. Examples are FOr loops and While loops.

26
Q

Kernel

A

This is a term for the computing elite, so proceed at your own risk. To understand what a kernel is, you first need to know that today’s operating systems are built in “layers.” Each layer has different functions such as serial port access, disk access, memory management, and the user interface itself. The base layer, or the foundation of the operating system, is called the kernel. The kernel provides the most basic “low-level” services, such as the hardware-software interaction and memory management. The more efficient the kernel is, the more efficiently the operating system will run.

27
Q

LAN

A

Stands for “Local Area Network,” and is pronounced like “land” without the “d”. (Computer people will think you’re weird if you pronouce it “L-A-N”). A LAN is a computer network limited to a small area such as an office building, university, or even a residential home. Most mid to large-sized businesses today use LANs, which makes it easy for employees to share information. Currently, the most common type of LANs are Ethernet-based. However, with the emergence of wireless networking, wireless LANs have become a popular alternative.

28
Q

Lossless

A

Lossless compression reduces a file’s size with no loss of quality. This seemingly magical method of reducing file sizes can be applied to both image and audio files. While JPEGs and MP3s use lossy compression, newer compression algorithms, such as JPEG 2000 and Apple Lossless compression, can be used to create lossless compressed files.
Lossless compression basically rewrites the data of the original file in a more efficient way. However, because no quality is lost, the resulting files are typically much larger than image and audio files compressed with lossy compression. For example, a file compressed using lossy compression may be one tenth the size of the original, while lossless compression is unlikely to produce a file smaller than half of the original size.

29
Q

Lossy

A

Lossy file compression results in lost data and quality from the original version. Lossy compression is typically associated with image files, suchas JPEGs, but can also be used for audio files, like MP3s or AAC files. The “lossyness” of an image file may show up as jagged edges or pixelated areas. In audio files, the lossyness may produce a watery sound or reduce the dynamic range of the audio.
Because lossy compression removes data from the original file, the resulting file often takes up much less disk space than the original. For example, a JPEG image may reduce an image’s file size by more than 80%, with little noticeable effect. Similarly, a compressed MP3 file may be one tenth the size of the original audio file and may sound almost identical.
The keyword here is “almost.” JPEG and MP3 compression both remove data from the original file, which may be noticeable upon close examination. Both of these compression algorithms allow for various “quality settings,” which determine how compressed the file will be. The quality setting involves a trade-off between quality and file size. A file that uses greater compression will take up less space, but may not look or sound as good as a less compressed file. Some image and audio formats allow lossless compression, which does not reduce the file’s quality at all.

30
Q

MAC Address

A

Stands for “Media Access Control Address,” and no, it is not related Apple Macintosh computers. A MAC address is a hardware identification number that uniquely identifies each device on a network. The MAC address is manufactured into every network card, such as anEthernet card or Wi-Fi card, and therefore cannot be changed.
Because there are millions of networkable devices in existence, and each device needs to have a unique MAC address, there must be a very wide range of possible addresses. For this reason, MAC addresses are made up of six two-digit hexadecimal numbers, separated by colons. For example, an Ethernet card may have a MAC address of 00:0d:83:b1:c0:8e. Fortunately, you do not need to know this address, since it is automatically recognized by most networks.

31
Q

NIC

A

Network interface card/controller

32
Q

Peer-to-peer

A

Network in which all the computers are of equal status.

33
Q

Ping

A

This term refers to a golf equipment brand, as well as the sound made by striking your glass with a spoon at the dinner table. However, it also has a computer-related meaning. A ping is a test to see if a system on the Internet is working. “Pinging” a server tests and records the response time of the server. Pinging multiple computers can be helpful in finding Internet bottlenecks, so that data transfer paths can be rerouted a more efficient way. A good way to make sure you do not get disconnected from your dial-up ISP for being idle is to send a ping every 5 minutes or so. There are a number of shareware Ping programs that will do this for you.

34
Q

RAD

A

Rapid Application Development. Where a Prototype design with reduced functionality is produced then tested and evaluated to refine the design of the next prototype. This is repeated (with a more refined prototype each time) until final product is produced. Heavy involvement of end user in the development.

35
Q

RAM

A

RAM
Stands for “Random Access Memory,” and is pronounced like the male sheep. RAM is made up of small memory chips that form a memory module. These modules are installed in the RAM slots on the motherboard of your computer.
Every time you open a program, it gets loaded from the hard drive into the RAM. This is because reading data from the RAM is much faster than reading data from the hard drive. Running programs from the RAM of the computer allows them to function without any lag time. The more RAM your computer has, the more data can be loaded from the hard drive into the RAM, which can effectively speed up your computer. In fact, adding RAM can be more beneficial to your computer’s performance than upgrading the CPU.
To check how much RAM a Windows computer has, open the “System” Control Panel. This can be done by right-clicking “My Computer” and selecting “Properties…” To view how much RAM is installed in a Macintosh computer, select “About This Mac” from the Apple Menu.

36
Q

Resolution

A

This term can describe either how many pixels a monitor can display or how fine a printer can print.

  1. Monitors. A small monitor may have a resolution or 640 x 480, which means there are 640 pixels horizontally across the screen and 480 pixels vertically. Some other common monitor resolutions are 800 x 600, 1,024 x 768, and 1,280 x 1,024. The higher the resolution, the more that can be displayed on the screen.
  2. Printers. Printer resolution measures how fine a printer can print. This measurement is known as dots per inch, or “dpi.” The greater the dpi, the better the image clarity. Scanner resolution is also measured in dpi.
37
Q

RGB

A

Stands for “Red Green Blue.” It refers to the three hues of light (red, green, and blue, for those of you that are a little slow), that can mix together to form any color. When the highest intensity of each color is mixed together, white light is created. When each hue is set to zero intensity, the result is black. TVs and computer monitors use RGB to create the colorful images you see on the screen. In print, however, the 4 colors – cyan, yellow, magenta, and black (CYMK) – are used to create color images.

38
Q

RISC

A

Stands for “Reduced Instruction Set Computing,”and is pronounced “risk.” It is arguably the fastest and most effiecient microprocessor technology available today. The RISC architechture is an improvement upon the CISC (Complex Instruction Set Computing) architecture used in the original Intel Pentium chips. In 1974, John Cocke of IBM Research was working on making a faster version of the CISC chip and came up with a design that significantly reduced the number of instructions need for performing computations. The new design was not only faster than the CISC architecture, but the chips were also smaller and less expensive to manufacture. Motorola’s PowerPC chips (such as the G4 in Power Macs) are the most widely used RISC-based chips. Intel has slowly been integrating RISC technology into its chips, but they still are mostly CISC-based.

39
Q

ROM

A

Stands for “Read-Only Memory.” Please do not confuse this term with RAM or a hard drive, as many people already do. ROM is memory containing hardwired instructions that the computer uses when it boots up, such as the bootstrap, before the system software loads. In PCs, the instructions are read from a small program in the ROM, called the BIOS (Basic Input/Output System).

40
Q

Router

A

This is a hardware device that routes data (hence the name) from a local area network (LAN) to another network connection. A router acts like a coin sorting machine, allowing only authorized machines to connect to other computer systems. Most routers also keep log files about the local network activity.

41
Q

Stepwise Refinement

A

Each module/task is defined in simple terms and then split into a number of smaller sub-modules/sub-tasks which are successively split until each is small enough to be programmed.

42
Q

Switch

A

A switch is used to network multiple computers together. Switches made for the consumer market are typically small, flat boxes with 4 to 8 Ethernet ports. These ports can connect to computers, cable or DSL modems, and other switches. High-end switches can have more than 50 ports and often are rack mounted.
Switches are more advanced than hubs and less capable than routers. Unlike hubs, switches can limit the traffic to and from each port so that each device connected to the switch has a sufficient amount of bandwidth. For this reason, you can think of a switch as a “smart hub.” However, switches don’t provide the firewall and logging capabilities that routers do. Routers can often be configured by software (typically via a Web interface), while switches only work the way the hardware was designed.
The term “switch” can also be used to refer to a small lever or button on computer hardware. And while it has nothing to do with computers, “riding switch” means riding backwards in skateboarding and snowboarding.

43
Q

Topology

A

The layout of computers in a particular network, for example, Bus, Star and Ring topologies. It describes the way computers are connected together in a LAN.

44
Q

Virus

A

A malware program that attaches itself to files and is designed to spread within a computer and to other computers, usually causing the computer to become unreliable.

45
Q

WAN

A

Stands for “Wide Area Network.” It is similar to a Local Area Network (LAN), but it’s a lot bigger. Unlike LANs, WANs are not limited to a single location. Many wide area networks span long distances via telephone lines, fiber-optic cables, or satellite links. They can also be composed of smaller LANs that are interconnected. The Internet could be described as the biggest WAN in the world. You could even call the Internet a Super WAN BAM if you wanted to. Or maybe not.

46
Q

Worm

A

A malware program that uses the resources of the computer in which it is installed to spread to other computers and cause the computers to become unreliable. (Unlike a virus, a worm does not attach itself to files.)