Вы находитесь на странице: 1из 4

BTT1O1 Glossary

1. ASCII=ASCII (American Standard Code for Information Interchange) is the most common
format for text files in computers and on the Internet. In an ASCII file, each alphabetic, numeric,

or special character is represented with a 7-bit binary number (a string of seven 0s or 1s). 128

possible characters are defined

2. Backstage (MS Word) =Applies To: Word 2010. The Ribbon contains the set of commands
for working in a document, while the Microsoft Office Backstage view is the set of commands

you use to do things to a document. Open a document, and click the File tab to see the

backstage view.

3. Binary Number System=In mathematics and digital electronics, a binary number is a


number expressed in the binary numeral system or base-2 numeral system which represents

numeric values using two different symbols: typically 0 (zero) and 1 (one).

4. Cell=the data is usually text, a numeric value, or a formula. The entire spreadsheet is composed
of rows and columns of cells. A spreadsheet cell is analogous to a field in database management

systems. Individual cells are usually identified by a column letter and a row number.

5. Cloud Storage/One Drive=OneDrive (previously SkyDrive, Windows Live SkyDrive, and


Windows Live Folders) is a file-hosting service operated by Microsoft as part of its suite of online

services. It allows users to store files as well as other personal data like Windows settings or

BitLocker recovery keys in the cloud.

6. CPU ALU, Control Unit=Control unit. ... The control unit (CU) is a component of a computer's
central processing unit (CPU) that directs the operation of the processor. It tells the computer's

memory, arithmetic/logic unit and input and output devices on how to respond to a program's

instructions.

7. Encryption= the process of converting information or data into a code, especially to


prevent unauthorized access.

8. Ergonomics=the study of people's efficiency in their working environment


9. Exclusive language= Inclusive and exclusive language is when somebody includes or
excludes somebody else through the words that they use. The word "inclusive" means to include

somebody else, and this is exactly what inclusive language is. ... However exclusive language is

the complete opposite

10. Firewall= A firewall is a system designed to prevent unauthorized access to or from a private
network. You can implement a firewall in either hardware or software form, or a combination of

both. Firewalls prevent unauthorized Internet users from accessing private networks connected

to the Internet, especially intranets.

11. Hardware= Computer hardware is the collection of physical parts of a computer system. This
includes the computer case, monitor, keyboard, and mouse. It also includes all the parts inside

the computer case, such as the hard disk drive, motherboard, video card, and many others.

Computer hardware is what you can physically touch.

12. HTML=Hypertext Markup Language, a standardized system for tagging text files to
achieve font, color, graphic, and hyperlink effects on World Wide Web pages.

13. HTTP=The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed,
collaborative, and hypermedia information systems. HTTP is the foundation of data

communication for the World Wide Web.

14. Information processing: fetch, decode, execute=an instruction cycle (sometimes called a
fetchdecodeexecute cycle) is the basic operational process of a computer. It is the process by

which a computer retrieves a program instruction from its memory, determines what actions

the instruction dictates, and carries out those actions.

15. Netiquette= the correct or acceptable way of communicating on the Internet.

16. Packets=A piece of a message transmitted over a packet-switching network. See under packet
switching. One of the key features of a packet is that it contains the destination address in

addition to the data. In IP networks, packets are often called datagrams.


17. Phishing=the fraudulent practice of sending emails purporting to be from reputable

companies in order to induce individuals to reveal personal information, such as

passwords and credit card numbers.

18. Pinterest=Pinterest is an online service that allows you to share images through social
networking. An example of Pinterest is the website where you have a "pin board" that allows

you to post ideas that you want to remember and then share them with your friends through

Facebook.

19. Pixel=the pixel (a word invented from "picture element") is the basic unit of programmable
color on a computer display or in a computer image. Think of it as a logical - rather than a

physical - unit. The physical size of a pixel depends on how you've set the resolution for the

display screen.

20. RAM =RAM (pronounced ram) is an acronym for random access memory, a type of computer
memory that can be accessed randomly; that is, any byte of memory can be accessed without

touching the preceding bytes. RAM is the most common type of memory found in computers

and other devices, such as printers.

21. ROM=Once data has been written onto a ROM chip, it cannot be removed and can only be
read. Unlike main memory (RAM), ROM retains its contents even when the computer is turned

off. ROM is referred to as being non-volatile, whereas RAM is volatile. ... A variation of a ROM is

a PROM (programmable read-only memory).

22. Search Engine=a program that searches for and identifies items in a database that
correspond to keywords or characters specified by the user, used especially for finding

particular sites on the World Wide Web.

23. Silicon=A non-metallic chemical element in the carbon family of elements. ... Silicon is the
basic material used to make computer chips, transistors, silicon diodes and other electronic

circuits and switching devices because its atomic structure makes the element an ideal

semiconductor.
24. Social Media=websites and applications that enable users to create and share content
or to participate in social networking.

25. Trojan Horse=One of the most insidious types of Trojan horse is a program that claims
to rid your computer of viruses but instead introduces viruses onto your computer. The
term comes from the Greek story of the Trojan War, in which the Greeks give a giant

wooden horse to their foes, the Trojans, ostensibly as a peace offering.

Вам также может понравиться