Вы находитесь на странице: 1из 182

Computing Fundamentals

by Jayson Lucena
Quiz 1

It is the tangible parts of the computer that you can touch.


-Hardware

These locations are numbered, and the sequence number of a location is called?
-Address

A computer is built to carry out instructions that are written in a very simple type
of language called?
-Machine Language

It is a device inside your computer that follows a program instruction.


-CPU

It is known as a complex system consisting of many different components.


-Computer

Stanford Research Institute brought about ERMA, Electronic Recording Machine


Accounting project, which dealt with the automation of the process of bookkeeping
in banking.
-True
During Third Generation semiconductors decreased the speed and efficiency of the
computer.
-False

It is the year where the evolution of computer started.


-1930

Abacist is the term called for the user of an abacus who slides the beads of the
abacus by hand.
-True

It is the year when John V. Atanasoff devised the first digital electronic computer.
-1937

The year when Intel produced large scale integration circuits.


-1972

It is the year when the general electric corporation delivered its ERMA computing
system to the Bank of America in California.
-1959

ERMA (Electronic Recording Machine-Academy), was a pioneering computer


development project run at SRI under contract Bank of Africa in order to automate
banking bookkeeping.
-False
A computer's main memory is also known as ?
-RAM

A Vacuum tube is a device used to amplify, switch, otherwise modify, or create an


electrical signal by controlling the movement of electrons in a low-pressure space.
-True

Semiconductors are used in almost all electronic equipment in use today and have
revolutionized the world of electronics.
-False

It is simply a list of unambiguous instructions meant to be followed mechanically


by a computer.
-Programs

This is also known as intangible parts of a computer.


-Software

ENVAC was a turning-complete, digital computer capable of being reprogrammed


to solve a full range of computing problem.
-False

Punchcard or Hollerith card, is a piece of stiff paper that contains non digital
information represented by the presence or absence of holes in none predefined
positions.
-False
In First Generation computer in this generation were not expensive and bulky.
They used machine language for computing and could solve problem at a time.
Computers during this phase cannot support multitasking task.
-False

The abacus, also called a counting mechanism, is a calculating tool used primarily
in parts of Asia for performing arithmetic processes.
-True

It is the year when the development of Arpanet began with the financial backing of
the department of defense.
-1969

It is the year when Atanasoff and Berry came up with ABC prototype.
-1939

It a number is made up of just two possible digits, zero and one.


-Binary

The Z3 consisted of separate units, such as a punch tape reader, control unit,
floating-point arithmeticc unit, and input/output devices.
-True

The Abacus known as early computing tool which logarithm is invented by John
Clipper and the invention of slide rule by William Oughtred.
-False
It is the year when DEC launched the first minicomputer called the PDP-8.
-1968

It is the year when Z3 of Konrad Zuse's was a notable achievement in the evolution
of computers.
-1941

It is the year that the history of computers dates back to the invention of a
mechanical adding machine.
-1642

Computer system under fifth generation are going to be based on principles of


Artificial Intelligence and Natural Language recognition.
-True

The United States (U.S) Army's Ballistic Research Laboratory came up with the
Electronic Numerical Integrator and Calculator (ENIAC) in the year?
-1946

This is consists of a sequence of locations.


-Main Memory

Quiz 2

Decimal number system is using based 10


-True
The given binary number: 110110 if converted to octal is equal to?
66

The given decimal number: 75 if converted to octal is equal to?


113

8 raised to 2 is equal to 64
-True

The decimal value of 11 is equal to B in hexadecimal


-True

The conversion of 87 hexadecimal to binary is 11100001.


-False

The given binary number: 10110 if converted to decimal is equal to?


-22

A number system with eight possible values.


-Octal

It is a set of numbers with one or more operations.


- number system

A series of eight bit.


-byte

The given binary number: 011011111 if converted to octal is equal to?


-337

The conversion of 76 octal to hexadecimal is E3.


-False

It is represented by 0's and 1's.


-binary system

It is the fundamental system of a computer based system.


-binary numeral system

The conversion of 175 decimal to hexadecimal is AF.


-True

The given binary number: 1100 if converted to decimal is equal to?


-12

LSB is also known as?


-Least Significant Bit

The conversion of 53 hexadecimal to binary is 1100101.


-False
A number system with fifteen possible values.
-hexadecimal

The given decimal number: 55 if converted to octal is equal to?


-67
The conversion of 71 octal to binary is 111001.
-True

It is called as a bit.
-binary digit

The given decimal number: 15 if converted to binary is equal to?


-1111

The conversion of 67 decimal to hexadecimal is 43.


-True

The given decimal number: 26 if converted to binary is equal to?


-11010

The conversion of 87 hexadecimal to decimal is 135.


-True

The given binary number: 1101111 if converted to hexadecimal is equal to?


-6F

The given binary number: 110110111 if converted to hexadecimal is equal to?


-1B7

A number system with a ten possible values.


-decimal

The conversion of 54 octal to hexadecimal is C2.


-False

The conversion of 53 octal to binary is 101011.


-True

2 raised to 0 is equal to 1
-True

As binary system uses the power of?


-2

The conversion of 27 octal to decimal is 23.


-True

2 raised to 4 is equal to 8
-False
PRELIMS

The term processing is procedure where processor that transforms raw data into
useful information.
-True

It collects and stores data on sales numbers market research, logistics, linguistics,
or other behaviors
- Data Analyst

One of the limitation of computer is it do not think for you.


-True

An application that is used in presenting business proposals to clients or sales


reports in the office.
-Presentation

It is a software that allow users to produce near type-set-quality copy of newsletter,


advertisements, and other publishing jobs.
-Desktop publishing

Output devices accept data and instructions from the user or from another
computer
-False

These are tools used by application developers to develop applications.


-Programming language

It is the is the first general purpose electronic computer.


-ENIAC

A value may be unethical when it has an inadequate moral basis or causes


recognizable harm
-False

This is well-known organization for computing professionals


-ACM

It allows a computer to read PDFs.


-PDF Reader

This enables the collection, monitoring, and exchange of personal information


quickly, inexpensively
-Technology

These people are usually knowledgeable in using scripting languages such as


HTML and CSS.
-Web Developer

It is also known as "electron tube" in North America, "thermionic valve", or


"valve" in Britain
-Vacuum tube
It permits users to create and maintain several files and extract in an easy
convenient manner.
-Database

It is a first machine capable of accepting binary and floating numbers.


-Z-machine

Breaches of computer security cause harm.


-True

This means negative consequences, especially when those consequences are


significant and unjust
-Harm

It work with a company's computer network, using information technology to


make network systems for all employees to use
- Network Engineer

Part of that stewardship requires establishing policies for fair system access,
including for those who may have been excluded
-True

This principle discuss that computing professionals should not misrepresent an


organization's policies or procedures, and should not speak on behalf of an
organization unless authorized to do so.
-Be Honest and Trustworthy
It is someone who develops applications for computers.
-Application Developer

It is called to the person who uses an abacus.


-Abacist

A way of minimizing computer viruses and threats


-Anti-viruses

It collects and stores data on sales numbers market research, logistics, linguistics,
or other behaviors.
-Data Analyst

The four parts of computer is composed of hardware, software, people and data
-True

Leaders should consider the personal and professional development, accessibility


requirements, physical safety, psychological well-being, and human dignity of all
workers
-True

People—including users, customers, colleagues, and others affected directly or


indirectly—should always be the central concern in computing
-True

They bring technical expertise to ensure the quality and accuracy of that data, then
process, design and present it in ways to help people
-Data Analyst
One of the capability of computer is to perform logical operations
-True

The same with web developer but more focus on websites


-Web Developer ata
-Application Developer (wrong)

The CPU is a rigid rectangular card containing the circuitry that connects the
processor to the other hardware
-False

This principle, which concerns the quality of life of all people, affirms an
obligation of computing professionals, both individually and collectively, to use
their skills for the benefit of society, its members, and the environment
surrounding them.
-Contribute to Society and to Human Well-being, Acknowledging that all People
are Stakeholders in Computing

It is a software that allows users to enter, store, manipulate and print text.
-Word processing

It is an essential component of trustworthiness


-Honesty

A way of minimizing the use of paper in ACM


-PDF Readers
It is a software that permits users to work with numbers formatted in lines and
columns normally used for accounting jobs.
-Electronic spreadsheet

Individuals and organizations do not have the right to restrict access to their
systems
-False

A person who basically writes programming languages.


-Application Developer

A storage of all the important data and information of a company


-Database

The future of computing depends on both technical and ethical excellence


-True

It is either be a formal designation or arise informally from influence over others


-Leadership

Spreadsheet applications contain a lot of features that can help the ICT
professionals
-True
Pertaining to local, regional, national, and international laws and regulations that
professional worker must know
-code of ethics (wrong)
-policies siguro

Popular presentation software include MS PowerPoint, Keynote, and Impress.


-True

Input devices return processed data to the user or to another computer system.
-False

It is represented by a piece of paper that may contain digital information


represented by a hole in a predefined position
-Punch card

Computing professionals should not share technical knowledge with the public,
foster awareness of computing, and encourage understanding of computing.
-False

A computer can also be used for medicine


-True

WAN is also known as _______________.


-Wide Area Network

The client alone may decide to pursue the assignment with the professional after
additional time to acquire the necessary competencies
-False
An application that is used to sending messages or files electronically.
-email

When appropriate standards of care do not exist, computing professionals do not


have a duty to ensure they are developed
-False

An application such as Pages, and Writer are just some of the application used by
an ICT professional when creating documents.
-Word Processing

Two types of memory are CDROM and ROM


-False
A PDF or Portable Document Format is a file format that provides an electronic
image of text or text and graphics that looks like a printed document and can be
viewed, printed, and electronically transmitted.
-True

LAN is also known as _______________.


-Local Area Network

The more processor the computer has, the more it can do, and the faster it can
perform a certain task
-False

Leaders should not thoroughly investigate viable alternatives to removing support


for a legacy system
-False

Quiz 3!

Templates are designed documents that are blank except for preset margins, fonts,
paragraphs formats, headings, rulers, graphics, header, footers.
-False

This refers to the characteristics of the letters, symbols, and punctuation marks in
your document.
-Font

This is used to measure the font in points


- Type Size

This display the information related to the position in the documents, the page
count, and the status of keyboard keys.
- Status bar

The blinking insertion point is also known as?


-Cursor

It is an application that provides extensive tools for creating all kinds of text-based
documents.
-Word Processing Software
Which short-cut key is used to find the word organizational within the word file?
- CTRL + F

It display the list of commands and options


-Menu Bar

Document are also useful in arranging images


-False

You cannot embed sounds file in your document in much the same way that you
embed a graphic file.
-False

The amount of space between each line of the text in a paragraph.


-Line Spacing

It is a contiguous group of characters, words, lines, sentences or paragraphs in your


document that you mark for editing.
-Block

This is where we view the document


-Document Area / Document Window

When you text reaches the right edge of the screen it automatically moves the
insertion point to the next line. This feature is called word wrap.
-True
When you select text, it changes the color-becoming highlighted
-True

These are the white borders around the edge of the page. Every document has top,
bottom, left, and right margins.
- Margin

Changing an existing document is called editing the document.


-True

This determine how close each line of the paragraph comes to the margins
-Indent

Document dimension is also determined by the orientation of the paper.


-True

The process of formatting a document includes controlling the appearance of text,


the layout of text on the page, and the use of pictures and other graphic element.
-True

To deselect selected block of text click the mouse anywhere on the screen or press
any arrow key.
-True

Rows are effective formats for certain types of document.


-False

This show the position of text, tabs, margins, indents and other elements on the
page.
-Ruler

Refers to the orientation of the lines of a paragraph with respect to the margins.
-Alignment

This is a line that is drawn on one or more side of paragraph


-Border

This let the user scroll through a document that is too large to fit inside the
document area.
-scroll bar

It is known as not limited as text


-Word Processor

One single sentence is known as a paragraph.


-False
Under the INSERT menu bar, which toolbar you can find the shape tool?
Paragraph are line of text that run along the top and bottom of every page.
-False

It display the button of frequently used commands


-Toolbars

In which menu bar you can find the FONT setting in Microsoft word?
-Home

Long documents generally include header and footer or both.


-True

It is consists of pattern or color that is displayed as a background of the text in a


paragraph.
-Shading

This is used to control the appearance of the character.


-Type style
A documents are set up to fit 8 1/2 by 11 inch paper, a standard known as letter
size paper.
-True
Which formatting toolbar is used to change the line spacing of the selected
text/paragraph?

Under the INSERT menu bar, which toolbar you can find the text box?

-
Which formatting toolbar is used to change the text color to blue?
Which formatting toolbar is used to change the text/paragraph alignment to justify?

Which formatting toolbar is used to change the upper case into lower case.

Which formatting tool is used to highlight the texts?


Which formatting toolbar is used to add color to the shape?

Quiz 4

What is the new value if cell A3 is deleted


360

It is a software tool for entering, calculating, manipulating and analyzing sets of


numbers.
-Spreadsheet program

Spreadsheet programs have limited formats specifically for numbers.


-False

You can manually edit any part of a formula or a function, simply by selecting its
cell and making you changes in the formula bar.
-True

You can add new sheets to a workbook file or delete worksheets you no longer
need.
-True

This is any number you enter or number that results from a computation.
-Value

This tells you specific information about the worksheet.


-Status Bar

These are the values (often called cell reference) that the function uses in its
operation.
-Arguments
Which formatting toolbar is used to add a background color to a cell.
Which menu bar can you find the Charts?
-Insert

Spreadsheet software has no ability to generate charts based on numeric data


-False

The combination of the column letter and row number.


-Cell Address

This is used to perform specialized calculations automatically


-Function

This can be formatted in various ways


-Values and dates

This is the process of using spreadsheet to test how alternative scenarios affect
numeric results.
-Analysis

What is the cell address of number 55?


-A4

This help the user make data easier to understand.


-Charts

The intersection of row and column is known as?


-Cell

You can easily change one part of formula or a cell that it refers to see how that
changed affect the rest of the worksheets.
-True

Spreadsheets have a limited range of uses-form family budgets to corporate


earnings statements.
-False

Numbers cannot be shown with or without commas, decimal points.


-False

You add arguments within the parentheses of the functions.


-True

All spreadsheet allow you to do simple analysis.


-True

This find values for one or more cells that make the results of a formula equal to a
value you specify.
-Goal seeking

Which formatting toolbar is used merge the 1st column to the second column?
Which formatting toolbar is used a conditional formatting in excel file?

These are necessary part of most worksheets


-Dates
Which formatting toolbar is used change the alignment of the text to vertical,
horizontal etc.
A more sophisticated type of analysis is a table that automatically calculates the
results based on any number of assumptions.
-True
You cannot create a special effect by adding graphics, such as clip art, to your
worksheets.
-False

This counts many values are in a range of cells. Many functions are complex.
-COUNT

You can insert or delete rows and column


-True

This is also known as another data-analysis tool


-Sorting
Which formatting toolbar is used center the text along the cell?
Which formatting toolbar is used to add color to a selected column?

It is easier to perform calculations on the results even if not sorted.


-False

Like a word processors, a spreadsheet programs are extremely accommodating


when you want to make the desired changes.
-True
Spreadsheets do not offer a choice of fonts and type style, shadowed borders and
more.
-False

What is the formula in getting the value 450?


=SUM(A1:A5)
Worksheet can be collected into groups called?
-Workbook

A text entered in a worksheet is also known as?


-Label
This is known to be useful in analyzing data.
-Spreadsheet

MIDTERM
To navigate the worksheet, you need to understand its system of ______?
-Cell address

You cannot automate the presentation by setting a display time for each slide
-False

It is a special resizable boxes for text and graphical elements


-Special text boxes and frames

Each slide should focus on one unique topic and have no more than three to five
bullets points.
-True

This matches each word in a document against a built in dictionary containing


standard spelling.
-Spell Checker
What is the default layout of the slide when you insert/add a new slide?
-Title and Content

This can display slide to large audience


-From a Digital Projector

This bar tell the specific information about the worksheet.


-Status bar

It is easier and faster to work with one of the presentation programs many ______?
-Slide template

Spreadsheets can work with whole numbers, decimals, negative numbers,


currency, and other types of values, including scientific notation.
-True

Adding animation enables you to create a wide range of moods for your
presentation, therefore, it is important to choose colors carefully.
-False

It is a pre-designed document that already has coordinating fonts, a layout, and a


background.
-Presentation template

Images quality may suffer even if a PC-to-TV converter is used.


-True
You can move from one slide to the next slide by clicking the mouse button or by
pressing home button key.
-False

Regardless of the method you use to project your slides, navigating a slide show is
not a simple process.
-False

This is used for working with text


-Word Processor

These are small boxes (usually white or black in color) that you can drag to resize
the frame.
-Handles

The amount of space between each paragraph


-Paragraph Spacing

Formatting text in a presentation programs is not the same with formatting in word
processor.
-False

A textbox cannot hold multiple paragraphs, the paragraphs themselves are usually
quite short.
-False
Presentation programs have a built-in timing feature that you can use to determine
how long your slides are going to be on the screen
-True

Animations, sounds effects, and hyperlinks are cool, but they get annoying quickly.
-True

A special effect that causes slide to blend together when you switch from one slide
to the next.
-Transition

Presentation programs provide many of the features found in word processor (for
working with text), spreadsheet (for creating charts), and paint program (for
creating and editing simple graphics).
-True

This is an important tool for anyone who must present information to a group.
-Presentation Software

Presentation programs are used to produce slides- single screen images that contain
a combination of text, numbers, and graphics (such as charts, clip arts and
graphics), often on a colorful background.
-True

These are other common data analysis tools found in spreadsheets.


-Goal seeking and Sorting

Which short cut key is use to show the slide show in presentation mode?
-F5

Which animation type “Blinds” belongs to?


-Entrance effects

Is a predefined formula provided by the spreadsheet program.


-Functions

Work like spell checker, but they inspect you document for grammatical problems
-Grammar Checker

This can connect your computer to a standard television and view the PCs video
output on the television monitor.
-On a Television Screen.

This compare each sentence to a set of standard grammatical rules, notifies you if it
finds a potential problems, and providing grammatical correct options.
-Grammar Checker

Slides can be simple or sophisticated.


-True

This changes color as it moves from one part of the slide to another.
-Gradient fill

Which type of view where it allows the user to add a note?


-Note pages

Which formatting toolbar is use to change the color of the text?

This help you make sense of a worksheet contents.


-Labels

The text is formatted automatically, but you can easily reformat the text later, using
many of the same formatting options that are available in word processors.
-True
To add text to a textbox, simply click in the box at the place where you want to
insert text, and then type your text.
-True

This help you find errors in your spelling and grammar; they also may have tools
to help you find just the right word or avoid overusing certain words.
-Language tools

To insert clip art or another type of graphic in a slide, you can select an image from
your software collections of graphics or import an image file, such as scanned
photograph or clip art.
-True

This can include different types of text, charts, tables and graphics.
- Slide

This is used to make text pop up or crawl onto the screen, or to make your slides
"build" themselves by adding individual pieces of text that appear as you introduce
them to the audience.
-Transition (wrong)
-Animation(correct)

This is a pre-designed documents that are blank except for preset margins, fonts,
paragraphs formats, headings, rulers, graphics, header, footers.
-Template

A presentation program can contain a single slide or hundreds.


-True
This is a process of organizing the slides so that the information flows logically.
-Outlining

Paragraph in slide is usually in the form of tiles, headings, and lists.


-False

You cannot use the programs drawing tools to draw on a slide while it is being
displayed.
-False

Presentation programs do not have a built n paint tools also enable you to draw
simple graphics and add them to your slides.
-False

Which animation type “Scribble” belongs to?


-Path Animation

Which formatting tool is used to highlight the texts?


-

This is like a printed one-a source of alternatives words.


-Thesaurus

If your topic is interesting, and your presentation is crisp, your audience is more
likely to respond.
-True

This is used for creating and editing simple graphics.


-Paint Program

Rulers separate different elements and help hold the viewer attention or individual
parts of the slide.
-False

The active cell is indicated by a ______?


-Cell pointer

It is the process of combining a form letter with the contents of database


-Mail Merge

Which menu bar is used to change the design of the slide?


-Design

This provides powerful design tools that make it easy to anyone to outline, create,
edit, arrange and display complex slides presentations.
-Presentation program

Most presentation programs do not allow the user to save a set of slides as a group
in one file.
-False

This can be used to set up rows and columns of information in a document


-Table

Presentation software is an important tool for anyone who must present


information to a group.
-True

Which formatting VIEW is used to change the layout of the slides to Note pages?
-

Enable you to organize your slides content as you create them


- Outlining

This is used for creating charts.


-Spreadsheet

A set of noted added in the slide


-Annotation

The intersection of a column and row is called a _____?


-Cell

What type of layout is the first slide belongs to?


-Title Slide
You can create slides from scratch starting with _____?
-Blank slide

This can use cell references to use data in other cells.


Formula

This calculate numbers based on values or formulas in other cells.


-Formula

This can display your slides at the proper resolution and in large enough format for
a sizable audience to view comfortably.
-On a Large Format Monitor

Which formatting tool is used to change the paragraph type to numbering?

This is used to produce slides-single screen images that contain a combination of


text, numbers, and graphics (such as charts, clip arts and graphics), often on a
colorful background.
-Presentation Program

This display a definition of the selected word and a list of possible replacement.
-Thesaurus

A document area in spreadsheet is known as?


-Worksheet
This is useful in arranging images (such as clip art or photographs) on a page and
for arranging images and text in interesting ways.
-Table

These are used to perform calculations in the worksheets. Formulas can use cell
references to use data in other cells.
-Formula
2 out of 2 points

What bit pattern (base 2) does the follwing hexadecimal pattern represent 

    E1A

Selected  
Answer:
1110 0001 1010

Answers: 0110 0001 1011

0101 0001 1011

1110 0001 1010

0111 0010 11001

 Question 2

2 out of 2 points

Convert the following base 10 notation to its equivalent binary form  

28

Selected  
Answer:
11100

Answers: 11001
 

11100

11011

11011

 Question 3

2 out of 2 points

Which of the following best describes the NOR operation?

Selected  
Answer:
An OR followed by a NOT

Answers: An XOR followed by a NOT

An OR followed by a NOT

A NOT followed by an OR 

An AND followed by a NOT 

 Question 4

2 out of 2 points

Use hexadecimal notation to represent the following bit pattern 

01001001

Selected  
Answer:
49
Answers: 39

48

38

49

Response q5 p 26
Feedback:

 Question 5

2 out of 2 points

What is the result of the following addition in binary notation 

  1011.01

+   11.11

Selected  
Answer:
1111.00

Answers: 1110.00

1111.01

1111.00

1011.00

 Question 6

2 out of 2 points

Convert the following base 10 value into binary representation 


4 3/4

Selected  
Answer:
100.11

Answers: 100.10

100.01

100.11

none of the above

 Question 7

2 out of 2 points

Convert the following binary representation to its equivalent base 10 notation 

10.11

Selected  
Answer:
none of the above 

Answers: 3 1/4

3 1/2

3 1/8

none of the above 

 Question 8

2 out of 2 points

Which of the following bit patterns represents the value -9 in two's complement notation 

Selected  
Answer:

1111 0111

Answers: 0001 1010

1111 0111

1000 1001

1111 1011

 Question 9

2 out of 2 points

Convert the following binary representation to its equivalent base 10 notation 

10011

Selected  
Answer:
19

Answers: 17

18

16

19

 Question 10

2 out of 2 points

How many bits would be in memory of a computer with 2K of memory ?

Selected  
Answer:
16384

Answers: 65536

32768

16384

none of these

 Question 1
2 out of 2 points

Which of the following is not a role of a typical operating system?


 
Selected  
Answer: Assist the computer user in the task of processing digital
photographs

Answers: Control the allocation of the machine’s resources


Control access to the machine
Maintain records regarding files stored in mass storage

 
Assist the computer user in the task of processing digital
photographs

 Question 2
2 out of 2 points

Which of the following would be a concern of the file manager in a multi-user computer
system that would not be a concern in a single-user system?

Selected  
Answer:
Maintain records regarding the
ownership of files

Answers: Maintain records regarding the


location of files

 
Maintain records regarding the
ownership of files

Maintain records regarding the size of


files

None of the above


 Question 3
2 out of 2 points

Which of the following statements is true?

Selected  
Answer: neither A nor B 
Answers: A  Allowing several processes to share time in a
multiprogramming system is less efficient than  
executing each of them to completion one after the other.

B  The use of passwords provides an impenetrable safeguard 

Both A and B 

 
neither A nor B 
 Question 4
2 out of 2 points

Multitasking in a computer with only one CPU is accomplished by a technique called

Selected  
Answer: Multiprogram
ming 
Answers: Bootstrapping   

Batch
processing 
 
Multiprogram
ming 
None of the
above 
 Question 5
2 out of 2 points

Which of the following components of an operating system handles the details associated
with particular peripheral equipment?

Selected  
Answer: Device drivers  
Answers:  
Device drivers  

File manager    

Memory manager
None of the above 
 Question 6
2 out of 2 points

Which of the following is a task that is not performed by the kernel of an operating
system?

Selected  
Answer:
Communicate with the
user  

Answers:  
Communicate with the
user  

Schedule processes
Allocate resources 
Avoid deadlock 
 Question 7
2 out of 2 points

Execution of an operating system is initiated by a program called :

Selected  
Answer:
Boot loader
Answers: Window
manager 

Scheduler

 
Boot loader
None of the above 
 Question 8
2 out of 2 points

A section of a program that should be executed by at most one process at a time is


called a
Selected  
Answer: Critical region   
Answers: Utility 

 
Critical region   
Privileged
instruction
None of the
above 
 Question 9
2 out of 2 points

Which of the following components of an operating system maintains the directory


system?
Selected  
Answer: File manager 
Answers: Device drivers

 
File manager 

Memory
manager 
None of the
above 
 Question 10
2 out of 2 points

Which of the following would not require real-time processing?

Selected  
Answer:
Forecasting world-wide trend for the next five
year period

Answers: Typing a document with a word processor

Navigation of an aircraft

 
Forecasting world-wide trend for the next five
year period

Maintaining a airline reservation system

 Question 1
2 out of 2 points

Which of the following is not a role of a typical operating system?


 
Selected  
Answer: Assist the computer user in the task of processing digital
photographs

Answers: Control the allocation of the machine’s resources


Control access to the machine
Maintain records regarding files stored in mass storage

 
Assist the computer user in the task of processing digital
photographs

 Question 2
2 out of 2 points

Which of the following would be a concern of the file manager in a multi-user computer
system that would not be a concern in a single-user system?

Selected  
Answer:
Maintain records regarding the
ownership of files

Answers: Maintain records regarding the


location of files

 
Maintain records regarding the
ownership of files

Maintain records regarding the size of


files

None of the above


 Question 3
2 out of 2 points

Which of the following statements is true?

Selected  
Answer: neither A nor B 
Answers: A  Allowing several processes to share time in a
multiprogramming system is less efficient than  
executing each of them to completion one after the other.
B  The use of passwords provides an impenetrable safeguard 

Both A and B 

 
neither A nor B 
 Question 4
2 out of 2 points

Multitasking in a computer with only one CPU is accomplished by a technique called

Selected  
Answer: Multiprogram
ming 
Answers: Bootstrapping   

Batch
processing 

 
Multiprogram
ming 
None of the
above 
 Question 5
2 out of 2 points

Which of the following components of an operating system handles the details associated
with particular peripheral equipment?

Selected  
Answer: Device drivers  
Answers:  
Device drivers  

File manager    

Memory manager
None of the above 
 Question 6
2 out of 2 points

Which of the following is a task that is not performed by the kernel of an operating
system?

Selected  
Answer:
Communicate with the
user  

Answers:  
Communicate with the
user  

Schedule processes

Allocate resources 
Avoid deadlock 
 Question 7
2 out of 2 points

Execution of an operating system is initiated by a program called :

Selected  
Answer:
Boot loader
Answers: Window
manager 

Scheduler

 
Boot loader
None of the above 
 Question 8
2 out of 2 points

A section of a program that should be executed by at most one process at a time is


called a
Selected  
Answer: Critical region   
Answers: Utility 

 
Critical region   
Privileged
instruction
None of the
above 
 Question 9
2 out of 2 points

Which of the following components of an operating system maintains the directory


system?

Selected  
Answer: File manager 
Answers: Device drivers

 
File manager 

Memory
manager 
None of the
above 
 Question 10
2 out of 2 points

Which of the following would not require real-time processing?

Selected  
Answer:
Forecasting world-wide trend for the next five
year period

Answers: Typing a document with a word processor

Navigation of an aircraft

 
Forecasting world-wide trend for the next five
year period

Maintaining a airline reservation system

 Question 1
2 out of 2 points

In which of the following locations is information most readily available for manipulation
by the CPU? 

Selected  
Answer:
General-purpose
registers
Answers: Cache memory
Main memory 
Mass storage
 
General-purpose
registers
 Question 2
2 out of 2 points

Write the answer to the following logic problem.


    10101010
 OR 11110000

Selected  
Answer: 11111010
Answers:  
11111010
11011011
01011010
11011010
 Question 3
2 out of 2 points

An ARM based processor is an example of what kind of computer architecture? 

Selected  
Answer:
RISC
Answers: DSL
CISC
 
RISC
Pentiu
m
 Question 4
2 out of 2 points

Which of the following is not a form of parallel processing?


Selected  
Answer: SISD
Answers:  
SISD
MIMD
SIMD 
All are examples of parallel
processing
 Question 5
2 out of 2 points

Write the answer to the following logic problem.

    10101010
XOR 11110000

Selected  
Answer: 01011010
Answers: 01011110
 
01011010
11011010
01001010
 Question 6
2 out of 2 points

Which of the following instructions falls in the category of data transfer instructions?

Selected  
Answer:
LOAD
Answers:  
LOAD
AND
ROTAT
E
JUMP
 Question 7
2 out of 2 points

Which of the following is not an activity performed entirely within a CPU?


Selected  
Answer:
Fetch instructions
Answers:  
Fetch instructions
Perform Boolean
operations
Perform arithmetic
operations
Move data between
registers   
 Question 8
2 out of 2 points

Which of the following is not contained in a CPU?

Selected  
Answer:
Memory cell  
Answers: Instruction register
Program counter
General-purpose
register
 
Memory cell  
 Question 9
2 out of 2 points

What is the answer to the following logic problem.


    10101010
AND 11110000

Selected  
Answer: 1010 0000
Answers:  
1010 0000
1110 0001

1001 0000
1101 0010
 Question 10
2 out of 2 points

Which of the following instructions does not fall in the category of arithmetic/logic


instructions?
Selected  
Answer:
JUMP  
Answers: ROTAT
E
ADD
OR
 
JUMP  
 Question 11
2 out of 2 points

When comparing computer machines, clock speed rather than a benchmark,  is a


more reliable indicator of speed 
Selected  Disagr
Answer: ee
Answers: Agree
 Disagr
ee

 Question 1
2 out of 2 points

Which of the following is not a role of a typical operating system?


 
Selected  
Answer: Assist the computer user in the task of processing digital
photographs

Answers: Control the allocation of the machine’s resources


Control access to the machine
Maintain records regarding files stored in mass storage

 
Assist the computer user in the task of processing digital
photographs

 Question 2
2 out of 2 points

Which of the following would be a concern of the file manager in a multi-user computer
system that would not be a concern in a single-user system?

Selected  
Answer:
Maintain records regarding the
ownership of files

Answers: Maintain records regarding the


location of files

 
Maintain records regarding the
ownership of files
Maintain records regarding the size of
files

None of the above


 Question 3
2 out of 2 points

Which of the following statements is true?

Selected  
Answer: neither A nor B 
Answers: A  Allowing several processes to share time in a
multiprogramming system is less efficient than  
executing each of them to completion one after the other.

B  The use of passwords provides an impenetrable safeguard 

Both A and B 

 
neither A nor B 
 Question 4
2 out of 2 points

Multitasking in a computer with only one CPU is accomplished by a technique called

Selected  
Answer: Multiprogram
ming 
Answers: Bootstrapping   

Batch
processing 

 
Multiprogram
ming 
None of the
above 
 Question 5
2 out of 2 points
Which of the following components of an operating system handles the details associated
with particular peripheral equipment?

Selected  
Answer: Device drivers  
Answers:  
Device drivers  

File manager    

Memory manager
None of the above 
 Question 6
2 out of 2 points

Which of the following is a task that is not performed by the kernel of an operating
system?

Selected  
Answer:
Communicate with the
user  

Answers:  
Communicate with the
user  

Schedule processes

Allocate resources 
Avoid deadlock 
 Question 7
2 out of 2 points

Execution of an operating system is initiated by a program called :


Selected  
Answer:
Boot loader
Answers: Window
manager 

Scheduler

 
Boot loader
None of the above 
 Question 8
2 out of 2 points

A section of a program that should be executed by at most one process at a time is


called a
Selected  
Answer: Critical region   
Answers: Utility 

 
Critical region   
Privileged
instruction
None of the
above 
 Question 9
2 out of 2 points

Which of the following components of an operating system maintains the directory


system?

Selected  
Answer: File manager 
Answers: Device drivers

 
File manager 

Memory
manager 
None of the
above 
 Question 10
2 out of 2 points

Which of the following would not require real-time processing?

Selected  
Answer:
Forecasting world-wide trend for the next five
year period

Answers: Typing a document with a word processor

Navigation of an aircraft

 
Forecasting world-wide trend for the next five
year period

Maintaining a airline reservation system

 Question 1
2 out of 2 points

Which of the following is not a role of a typical operating system?


 
Selected  
Answer: Assist the computer user in the task of processing digital
photographs

Answers: Control the allocation of the machine’s resources


Control access to the machine
Maintain records regarding files stored in mass storage

 
Assist the computer user in the task of processing digital
photographs

 Question 2
2 out of 2 points
Which of the following would be a concern of the file manager in a multi-user computer
system that would not be a concern in a single-user system?

Selected  
Answer:
Maintain records regarding the
ownership of files

Answers: Maintain records regarding the


location of files

 
Maintain records regarding the
ownership of files

Maintain records regarding the size of


files

None of the above


 Question 3
2 out of 2 points

Which of the following statements is true?

Selected  
Answer: neither A nor B 
Answers: A  Allowing several processes to share time in a
multiprogramming system is less efficient than  
executing each of them to completion one after the other.

B  The use of passwords provides an impenetrable safeguard 

Both A and B 

 
neither A nor B 
 Question 4
2 out of 2 points

Multitasking in a computer with only one CPU is accomplished by a technique called


 

Selected  
Answer: Multiprogram
ming 
Answers: Bootstrapping   

Batch
processing 

 
Multiprogram
ming 
None of the
above 
 Question 5
2 out of 2 points

Which of the following components of an operating system handles the details associated
with particular peripheral equipment?

Selected  
Answer: Device drivers  
Answers:  
Device drivers  

File manager    

Memory manager
None of the above 
 Question 6
2 out of 2 points

Which of the following is a task that is not performed by the kernel of an operating
system?

Selected  
Answer:
Communicate with the
user  
Answers:  
Communicate with the
user  

Schedule processes

Allocate resources 
Avoid deadlock 
 Question 7
2 out of 2 points

Execution of an operating system is initiated by a program called :

Selected  
Answer:
Boot loader
Answers: Window
manager 

Scheduler

 
Boot loader
None of the above 
 Question 8
2 out of 2 points

A section of a program that should be executed by at most one process at a time is


called a
Selected  
Answer: Critical region   
Answers: Utility 

 
Critical region   
Privileged
instruction
None of the
above 
 Question 9
2 out of 2 points

Which of the following components of an operating system maintains the directory


system?

Selected  
Answer: File manager 
Answers: Device drivers

 
File manager 

Memory
manager 
None of the
above 
 Question 10
2 out of 2 points

Which of the following would not require real-time processing?

Selected  
Answer:
Forecasting world-wide trend for the next five
year period

Answers: Typing a document with a word processor

Navigation of an aircraft

 
Forecasting world-wide trend for the next five
year period

Maintaining a airline reservation system


Quiz Review – Computing Fundamentals
Binary Data: A data unit with only two possible states: 0 or 1, up or down, on or
off, etc…
Low-Level vs High-Level Programming
Low level code is closer to the language the machine understands (binary code).
Higher level languages are more abstract and
human-readable. In general, more can be accomplished with fewer lines of high-
level code.
Machine Code: The code that is actually executed by the CPU. All 0s and 1s, but
sometimes represented as a series of letters and
numbers.
Human-Readable Code: Code that can be naturally read by humans. Looks more
like English.
Microchip Transistor: Basically, a microscopic electronic switch that is the
building block of modern computers.
HTML: Hypertext Markup Language. Used to create webpages.
CSS: Cascading Style Sheets. Used to style webpages.
Motherboard: The central component of a computing system, which allows
communication between other electronic components
of the system.
CPU: Central Processing Unit. The “brain” of the computer. Performs
calculations.
RAM: Random-Access Memory. The computer’s working memory. Running
program data is stored here.
GPU: Graphics Processor Unit. A computer processor which is specialized to
accelerate the creation of images to output to a display.
Sound Card: Manages input and output of audio signals to and from a computer.
PSU: Power Supply Unit. Distributes power to all of the computer’s different
components.
Hard Drive: A data storage device. The computer’s “permanent” memory.
HDD vs SSD
Hard Disk Drives use a spinning metal disk, which Solid State Drives have no
moving parts, and store data on integrated circuits.
The 3-2-1 Rule
Have 3 copies of data that you care about, in 2 different mediums, 1 of which is in
a remote location.

Program information does not consist of


Select one:
a. Data
b. text files
c. Instructions
Which of these statements about primary memory is not true?
Select one:
a. Primary memory is also volatile
b. RAM is a primary memory
c. Primary memory transfers information at lower speed than hard
disks
d. Primary memory holds the information accessed by the CPU.
Which of these definitions are true about an instruction of a program?
Select one:
a. Each program instruction consists of an operation and operands
b. The addresses are either address names or ROM addresses only
c. Operation code of an instruction was depended on the specific
CPU.
d. Each program instruction consists of an arithmetic expression only.
C language is
Select one or more:
 a. Case-sensitive language
 b. a perfect language
c. Safe language
 d. a powerful language
 e. an English-like language
f. a simple language
(1) One byte consists of 4 nibbles.
(2) One nibble consists of 2 consecutive bits
The statement (1) is ...., (2) is .....
Select one:
a. false, false
b. true, true
c. true, false
d. false, true

 11th dimension - The 11th dimension is a characteristic of space-time that


has been proposed as a possible answer to questions that arise in superstring
theory.
 2001 - Midnight UTC on January 1, 2001 marked the beginning of the third
millennium on the Western world's Gregorian calendar.

 3-tier application architecture - A 3-tier application architecture is a


modular client-server architecture that consists of a presentation tier, an
application tier and a data tier.

 42 (h2g2, meaning of life, The Hitchhiker's Guide to the Galaxy) - In


Douglas Adams' "The Hitchhiker's Guide to the Galaxy," 42 is the number from
which all meaning ("the meaning of life, the universe, and everything") can be
derived.

 99.999 (Five nines or Five 9s) - In computers, 99.

 A-weighted decibels (dBA, or dBa, or dB(a)) - A-weighted decibels,


abbreviated dBA, or dBa, or dB(a), are an expression of the relative loudness of
sounds in air as perceived by the human ear.

 abandonware - Abandonware is computer software (such as an operating


system, word processor, interactive game, or audio file) that is no longer
marketed or distributed by the company that created it, but is obtainable from
some other source.

 absolute truth - In general, absolute truth is whatever is always valid,


regardless of parameters or context.

 access method - In computing, an access method is a program or a hardware


mechanism that moves data between the computer and an outlying device such
as a hard disk (or other form of storage) or a display terminal.

 accumulator - An accumulator is a register for short-term, intermediate


storage of arithmetic and logic data in a computer's CPU (central processing
unit).

 acronym - An acronym (pronounced AK-ruh-nihm, from Greek acro- in the


sense of extreme or tip and onyma or name) is an abbreviation of several words
in such a way that the abbreviation itself forms a word.
 Ada Lovelace (Augusta Ada King) - Augusta Ada King, Countess of
Lovelace, was an English mathematician who is credited with being the first
computer programmer.

 adaptive enterprise (or adaptive organization) - An adaptive enterprise


(or adaptive organization) is a corporation, institution, or agency in which the
business demand and the IT (information technology) supply are matched and
synchronized at all times.

 address bar - The address bar is the familiar text field at the top of a web
browser’s graphical user interface (GUI) that displays the name or the URL
(uniform resource locator) of the current web page.

 address space - Address space is the amount of memory allocated for all
possible addresses for a computational entity, such as a device, a file, a server,
or a networked computer.

 addressability - Addressability is the capacity for an entity to be targeted


and found.

 affective computing (emotion AI) - Affective computing, also known as


AC or emotion AI, is an area of study within cognitive computing and artificial
intelligence that is concerned with gathering data from faces, voices and body
language to measure human emotion.

 agentless - Agentless, in computing, refers to operations where no service,


daemon or process (AKA an agent) needs to run in the background on the
machine the action is being performed on.

 agnostic - Agnostic, in an information technology (IT) context, refers to


something that is generalized so that it is interoperable among various systems.

 AIBO (Artificial Intelligence roBOt) - AIBO (pronounced eye-bow) is an


entertainment robot designed by Sony.

 algorithm - An algorithm (pronounced AL-go-rith-um) is a procedure or


formula for solving a problem, based on conducting a sequence of specified
actions.
 alphanumeric (alphameric) - Alphanumeric, also referred to as
alphameric, is a term that encompasses all of the letters and numerals in a given
language set.

 AltaVista - AltaVista is an Internet search engine.

 anacronym - An anacronym is an acronym or an abbreviation so old or


familiar that no one remembers what its letters stand for, such as BASIC or
COBOL.

 analog computing - Analog computing is a term used by Paul Saffo of the


Institute for the Future in Palo Alto, California, to describe silicon-based
microsensors that sense and react to external (natural) stimuli in something that
approximates the rhythm of reality rather than the "artificial" binary behavior of
digital computing.

 Analytical Engine - The Analytical Engine was, or would have been, the
world's first general-purpose computer.

 angstrom (angstrom unit) - The angstrom, also known as the angstrom


unit, is a measure of displacement equal to 0.

 anisotropic filtering (AF) - Anisotropic filtering (AF) is a feature of some


video cards that sharpens the details of the fading-away part of a 3D object that
recedes into the distance.

 anode - An anode is the electrode in a polarized electrical device through


which current flows in from an outside circuit.

 anthropomorphism - Anthropomorphism (from the Greek anthrôpos, for


human, and morphé, for shape) is the tendency for people to think of other
animals or inanimate objects as having human-like characteristics.

 Antikythera mechanism (2000-year-old computer) - The Antikythera


mechanism is an analog computer that was used by the Greeks more than 2000
years ago to locate and predict the positions of celestial objects.
 antimatter - Antimatter is any substance that, when combined with an equal
amount of matter, results in the complete and direct conversion of all substance
to energy.

 any key - The phrase "any key," which frequently appears in the direction to
computer users to "Press any key," is reportedly a source of confusion to many.

 app - App is an abbreviated form of the word "application.

 Apple - Apple is a prominent hardware and software company best known


for its series of personal computers, the iPod and its innovative marketing
strategies for its products.

 application program interface (API) - An application program interface


(API) is code that allows two software programs to communicate with each
other.

 approximate equality - Approximate equality is a concept used primarily in


physics and engineering, and also occasionally in mathematics.

 arachniography - An arachniography (pronounced uh-RAK-nee-AH-gruf-


ee) is a bibliography of Web pages.

 Archie - Archie is a program that allows you to search the files of all the
Internet FTP servers that offer anonymous FTP.

 architecture - In information technology, especially computers and more


recently networks, architecture is a term applied to both the process and the
outcome of thinking out and specifying the overall structure, logical
components, and the logical interrelationships of a computer, its operating
system, a network, or other conception.

 arithmetic mean - The arithmetic mean, also called the average or average
value, is the quantity obtained by summing two or more numbers or variables
and then dividing by the number of numbers or variables.
 artificial neural network (ANN) - In information technology (IT), a neural
network is a system of hardware and/or software patterned after the operation
of neurons in the human brain.

 artificial superintelligence (ASI) - Artificial superintelligence (ASI) is


software-based intellectual powers that surpass human ability across almost all
conceivable categories and fields of endeavor.

 Asimov's Three Laws of Robotics - Science-fiction author Isaac Asimov is


often given credit for being the first person to use the term robotics in a short
story composed in the 1940s.

 ASN.1 (Abstract Syntax Notation One) - ASN.1 (Abstract Syntax


Notation One) is a standard way to describe a message (a unit of application
data) that can be sent or received in a network.

 aspect ratio - Aspect ratio is an image projection attribute that describes the
proportional relationship between the width of an image and its height.

 assembly line - An assembly line is a manufacturing process in which


interchangeable parts are assembled as they are passed in a direct line from
workstation to workstation until a final product is produced.

 assistive technology (adaptive technology) - Assistive technology is a set


of devices intended to help people who have disabilities.

 asymmetric communications - In telecommunications, the term


asymmetric (also asymmetrical or non-symmetrical) refers to any system in
which the data speed or quantity differs in one direction as compared with the
other direction, averaged over time.

 Asynchronous - In general, asynchronous -- pronounced ay-SIHN-kro-nuhs,


from Greek asyn-, meaning "not with," and chronos, meaning "time" -- is an
adjective describing objects or events that are not coordinated in time.

 attosecond - An attosecond is one quintillionth (10 -18) of a second and is a


term used in photon research.
 audio noise - In audio, noise is generally any unpleasant sound and, more
technically, any unwanted sound that is unintentionally added to a desired
sound.

 audit trail - In accounting, an audit trail is the sequence of paperwork that


validates or invalidates accounting entries.

 augmented intelligence - Augmented intelligence is an alternative


conceptualization of artificial intelligence that focuses on AI's assistive role,
emphasizing the fact that it is designed to supplement human intelligence rather
than replace it.

 automagically - Automagically is a term used when the user either doesn't


want to go into the technical details of something or doesn't know the details
but does know what the end result has to be.

 autonomic computing - Autonomic computing is a self-managing


computing model named after, and patterned on, the human body's autonomic
nervous system.

 AVI file (Audio Video Interleaved file) - An AVI (Audio Video


Interleaved) file is a sound and motion picture file that conforms to the
Microsoft Windows Resource Interchange File Format (RIFF) specification.

 azimuth and elevation - Azimuth and elevation are angles used to define
the apparent position of an object in the sky, relative to a specific observation
point.

 backslash - The backslash ( \ ) is a typographic and/or keyboard mark that is


widely used in programming languages and other computing contexts.

 backup storage device - A data storage device for backup makes copies of
data actively in use.

 balanced scorecard - The balanced scorecard is a management system


aimed at translating an organization's strategic goals into a set of performance
objectives that, in turn, are measured, monitored and changed if necessary to
ensure that the organization's strategic goals are met.
 bar code (or barcode) - A bar code (often seen as a single word, barcode) is
the small image of lines (bars) and spaces that is affixed to retail store items,
identification cards, and postal mail to identify a particular product number,
person, or location.

 barcode data (point-of-sale data, POS data) - Barcode data (sometimes


called point-of-sale data) is information from barcodes that is automatically
gathered as a consumer's purchases are put through a check-out.

 bare metal restore - In disaster recovery, a bare metal restore is the process
of reformatting a computer from scratch after a catastrophic failure.

 baseband - Describes a telecommunication system in which information is


carried in digital form on a single unmultiplexed signal channel on the
transmission medium.

 Bayesian logic - Named for Thomas Bayes, an English clergyman and


mathematician, Bayesian logic is a branch of logic applied to decision making
and inferential statistics that deals with probability inference: using the
knowledge of prior events to predict future events.

 benchmark - A benchmark is a point of reference by which something can


be measured.

 bespoke - Bespoke (pronounced bee-SPOHK) is a term used in the United


Kingdom and elsewhere for an individually- or custom-made product or
service.

 BetterWhois - BetterWhois, named after the original whois, lets you look
up registration information from all Internet domain name registrars at the same
time.

 binary - Binary describes a numbering scheme in which there are only two
possible values for each digit: 0 and 1.

 binary search (dichotomizing search) - A binary search, also called a


dichotomizing search, is a digital scheme for locating a specific object in a
large set.
 binary tree - A binary tree is a method of placing and locating files (called
records or keys) in a database, especially when all the data is known to be in
random access memory (RAM).

 binary-safe function - A binary-safe function is a function or operation that


can be performed on a binary file without modifying the contents of the file.

 biochip - A biochip is a collection of miniaturized test sites (microarrays)


arranged on a solid substrate that permits many tests to be performed at the
same time in order to achieve higher throughput and speed.

 bioinformatics - Bioinformatics is the science of developing computer


databases and algorithms for the purpose of speeding up and enhancing
biological research.

 biotechnology (biotech) - Biotechnology is the use of biological processes,


organisms, or systems to manufacture products intended to improve the quality
of human life.

 bit (binary digit) - A bit (short for binary digit) is the smallest unit of data
in a computer.

 bit map - A bit map (often spelled "bitmap") defines a display space and the
color for each pixelor "bit" in the display space.

 bit padding - Bit padding is the addition of one or more extra bits to a
transmission or storage unit to make it conform to a standard size.

 bitwise - Bitwise operations manipulate data at the bit level rather than with
bytes or larger units of data, as is more common.

 black box (black box testing) - Black box testing assesses a system solely
from the outside, without the operator or tester knowing what is happening
within the system to generate responses to test actions.

 black hole - The term "black hole" is sometimes used to refer to an


imaginary place where objects, files, or funds go when they get lost for no
apparent reason.
 bloviate - To bloviate (pronounced BLOW-vee-ayt) is to speak or write
overexpansively or with undue grandiosity.

 blue screen of death (BSOD) - The blue screen of death (BSOD), is the
informal name given by users to the Windows general protection fault (GPF)
error.

 boot - To boot (as a verb; also "to boot up") a computer is to load an
operating system into the computer's main memory or random access memory
(RAM).

 boot sector - A boot sector is a specially assigned section of a storage drive


containing the files required to start the operating system (OS) and other
bootable programs such as antivirus programs, drive partitioning software,
backup tools and diagnostic disks.

 Bootstrap - Bootstrap is a free and open source front-end development


framework for the creation of websites and web apps.

 bottleneck - A bottleneck is a stage in a process that causes the entire


process to slow down or stop.

 boustrophedon - Boustrophedon (from Greek for ox-turning) is writing that


proceeds in one direction in one line (such as from left to right) and then in the
reverse direction in the next line (such as from right to left).

 brain dump - A brain dump (sometimes spelled braindump, or brain-dump)


is a complete transfer of accessible knowledge about a particular subject from
your brain to some other storage medium, such as paper or your computer's
hard drive.

 brain-computer interface (BCI) - Brain-computer interface (BCI) is a


collaboration between a brain and a device that enables signals from the brain
to direct some external activity, such as control of a cursor or a prosthetic limb.

 brand - A brand is a product, service, or concept that is publicly


distinguished from other products, services, or concepts so that it can be easily
communicated and usually marketed.
 brick server - A brick server is a compact computer server module without
a chassis that can come in various processor, RAM, I/O, and storage
configurations and is designed to fit into rack locations similar to those for
blade servers.

 broadband - In general, broadband refers to telecommunication in which a


wide band of frequencies is available to transmit information.

 broadcast - In general, to broadcast (verb) is to cast or throw forth


something in all directions at the same time.

 broker - A broker is someone or something that acts as an intermediary


third party, managing transactions between two other entities.

 bubble help - In a computer user interface, bubble help is text information


that is displayed in a small balloon or box when a computer user moves the
mouse cursor over a selected user interface element, such as the iconic items in
a task bar.

 buffer - A buffer is a data area shared by hardware devices or program


processes that operate at different speeds or with different sets of priorities.

 burn - Burn is a colloquial term meaning to write content to a CD, DVD, or


other recordable disc.

 burn rate - In venture investing and new company development, the burn
rate is the rate at which a new company is spending its capital while waiting for
profitable operation.

 burst - Burst is a term used in a number of information technology contexts


to mean a specific amount of data sent or received in one intermittent operation.

 burst SRAM (SynchBurst SRAM) - Burst SRAM is used as the external


L1 and L2 memory for the Pentium microprocessor chipset.

 business impact analysis (BIA) - Business impact analysis (BIA) is a


systematic process to determine and evaluate the potential effects of an
interruption to critical business operations as a result of a disaster, accident or
emergency.

 business process - A business process is an activity or set of activities that


can accomplish a specific organizational goal.

 business process outsourcing (BPO) - Business process outsourcing, or


BPO, is a business practice in which one organization hires another company to
perform a process task that the hiring organization requires for its own business
to operate successfully.

 business process reengineering (BPR) - Business process reengineering


(BPR) is an approach to change management in which the related tasks required
to obtain a specific business outcome are radically redesigned.

 business service provider (BSP) - A business service provider (BSP) is a


company that rents third-party software application packages to their
customers.

 butterfly effect - The butterfly effect is the notion that a small initial factor
may have a part in determining greater and unpredictable changes in large,
complex systems.

 BYOT (bring your own technology) - Bring your own technology (BYOT)
is a policy that allows employees or students to use their own personal
electronic devices at work or scho.

 byte - In most computer systems, a byte is a unit of data that is eight binary
digits long.

 bytecode - Bytecode is computer object code that is processed by a program,


usually referred to as a virtual machine, rather than by the "real" computer
machine, the hardware processor.

 cache (computing) - A cache -- pronounced CASH -- is hardware or


software that is used to store something, usually data, temporarily in a
computing environment.
 cache memory - Cache memory, also called CPU memory, is high-speed
static random access memory (SRAM) that a computer microprocessor can
access more quickly than it can access regular random access memory (RAM).

 caching - Caching (pronounced “cashing”) is the process of storing data in a


cache.

 calculator - A calculator is a device that performs arithmetic operations on


numbers.

 calibration - In information technology and other fields, calibration is the


setting or correcting of a measuring device or base level, usually by adjusting it
to match or conform to a dependably known and unvarying measure.

 calm technology - In computing, calm technology aims to reduce the


"excitement" of information overload by letting the user select what
information is at the center of their attention and what information is peripheral.

 campus - In telecommunications, a campus is a physically contiguous


association of locations such as several adjacent office buildings.

 canonical - In programming, canonical means "according to the rules.

 capacity planning - In information technology, capacity planning is the


science and art of estimating the space, computer hardware, software and
connection infrastructure resources that will be needed over some future period
of time.

 cardinality - The term cardinality refers to the number of cardinal (basic)


members in a set.

 Cartesian coordinates (rectangular coordinates) - Cartesian coordinates,


also called rectangular coordinates, provide a method of rendering graphs and
indicating the positions of points on a two-dimensional (2D) surface or in three-
dimensional (3D) space.

 catalog - In computing, a catalog is a directory of information about data


sets, files, or a database.
 cathode - A cathode is the metallic electrode through which current flows
out in a polarized electrical device.

 cellspace - According to writer David S.

 cellular automaton (CA) - A cellular automaton (CA) is a collection of


cells arranged in a grid, such that each cell changes state as a function of time
according to a defined set of rules that includes the states of neighboring cells.

 certification - In information technology as in other fields such as teaching,


accounting, and acupuncture, certification is a formal process of making certain
that an individual is qualified in terms of particular knowledge or skills.

 change management - Change management is a systematic approach to


dealing with the transition or transformation of an organization's goals,
processes or technologies.

 chaos theory - Chaos theory is the study of nonlinear dynamics, in which


seemingly random events are actually predictable from simple deterministic
equations.

 character - In information technology, a character is a printable symbol


having phonetic or pictographic meaning and usually forming part of a word of
text, depicting a numeral, or expressing grammatical punctuation.

 Charles Babbage - If John von Neumann is the father of modern


computing, then the English mathematician and inventor Charles Babbage can
be considered its grandfather.

 cheat sheet - A cheat sheet is a piece of paper with information written


down on it that an unethical person might create if they weren't prepared for a
test.

 check digit (checksum character) - A check digit, also known as a


checksum character, is the number located on the far right side of a bar code.
 checksum - A checksum is a value that represents the number of bits in a
transmission message and is used by IT professionals to detect high-level errors
within data transmissions.

 CIO (Chief Information Officer) - A chief information officer (CIO) is the


corporate executive in charge of information technology (IT) strategy and
implementation.

 ciphertext - Ciphertext is encrypted text.

 citation style guides - A number of generally recognized authorities and


organizations offer guidance about how to cite sources when writing an
academic or journalistic paper.

 classical computing - Classical computing is the typical type of binary data


processing in traditional types of processors including x86, ARM and other bit
based computer systems.

 Claude Shannon - Claude Elwood Shannon, a mathematician born in


Gaylord, Michigan (U.

 clean electricity - Clean electricity is electrical power that is free from


voltage spikes and drops.

 clean install - A clean install is a software installation in which any previous


version is removed.

 clean room - A clean room (or cleanroom) is an enclosed space in which


airborne particulates, contaminants, and pollutants are kept within strict limits.

 click - In Web advertising, a click is an instance of a user pressing down


(clicking) on a mouse button in an ad space.

 client - A client is the requesting program or user in a client/server


relationship.
 client-server model (client-server architecture) - Client-server is a
relationship in which one program (the client) requests a service or resource
from another program (the server).

 clipboard - A clipboard is a temporary storage area for data that the user
wants to copy from one place to another.

 clock cycle - In a computer, the clock cycle is the time between two adjacent
pulses of the oscillator that sets the tempo of the computer processor.

 clock speed - In a computer, clock speed refers to the number of pulses per
second generated by an oscillator that sets the tempo for the processor.

 Clonezilla - Clonezilla is a free open source disk cloning application based


on Debian.

 closed captions - Closed captions are a text version of the spoken part of a
television, movie, or computer presentation.

 CMOS (complementary metal-oxide semiconductor) - CMOS


(complementary metal-oxide semiconductor) is the semiconductor technology
used in the transistors that are manufactured into most of today's computer
microchips.

 CMYK (cyan, magenta, yellow, key) - CMYK is a scheme for combining


primary pigments.

 co-branding - Co-branding is the practice of using multiple brand names


together on a single product or service.

 code review - Code review is a phase in the computer program development


process in which the authors of code, peer reviewers, and perhaps quality
assurance reviewers get together to review code, line by line.

 codebase (code base) - A codebase (sometimes spelled as two words, code


base) is the complete body of source code for a given software program or
application.
 coefficient - In a mathematical equation, a coefficient is a constant by which
a variable is multiplied.

 cold backup (offline backup) - Cold backups are ideal for disaster recovery
because they protect important data.

 cold buffer - In data processing, a cold buffer is a buffer (segment of


computer memory reserved for temporary data storage) that hasn't been used or
accessed recently.

 cold fusion - Not to be confused with ColdFusion, a software product, cold


fusion is a hypothetical process in which hydrogen fusion supposedly occurs at
room temperature.

 cold/warm/hot server - In the backup and recovery of a computer server, a


cold server is a backup server whose purpose is solely to be there in case the
main server is lost.

 collaborative robot (cobot) - A collaborative robot, also known as a cobot,


is a robot that is capable of learning multiple tasks so it can assist human
beings.

 combinatorial logic - Combinatorial logic is a concept in which two or


more input states define one or more output states, where the resulting state or
states are related by defined rules that are independent of previous states.

 community computing - Community computing is a resource-sharing


model in which users are provided with free or low-cost computer and Internet
access.

 community technology center (CTC) - A community technology center


(CTC) is a facility that provides free or low-cost computer access, and
sometimes training, to people lacking the resources to have a computer in their
home.

 compaction - In a data center, compaction is the reduction or consolidation


of hardware to make better use of physical floor space.
 complex system - A complex system is an arrangement of a great number of
related but various elements with intricate interconnections.

 compound - In chemistry, a compound is a substance that results from a


combination of two or more different chemical elements, in such a way that the
atoms of the different elements are held together by chemical bonds that are
difficult to break.

 compute-intensive - Compute-intensive is a term that applies to any


computer application that demands a lot of computation, such as meteorology
programs and other scientific applications.

 computer - A computer is a device that accepts information (in the form


of digitalized data) and manipulates it for some result based on a program,
software, or sequence of instructions on how the data is to be processed.

 computer forensics (cyber forensics) - Computer forensics is the


application of investigation and analysis techniques to gather and preserve
evidence from a particular computing device in a way that is suitable for
presentation in a court of law.

 computer hardware - Computer hardware is a collective term used to


describe any of the physical components of an analog or digital computer.

 computer hardware chart - This handy computer hardware quick look-up


was designed by Sonic84.

 Computer History Museum - The Computer History Museum is an


institution dedicated to the preservation of artifacts and information related to
the development of computers.

 computer operator - A computer operator is the person responsible for


monitoring and controlling computer systems especially mainframe computer
systems in a company or organization.

 computer pidgin language (CPL) - Computer pidgin language (CPL) is an


artificial language designed to facilitate speech recognition between humans
and computers.
 computer room air conditioning unit (CRAC) - A computer room air
conditioning (CRAC) unit is a device that monitors and maintains the
temperature, air distribution and humidity in a network room or data center.

 computer-based training (CBT) - Computer-based training (CBT) is any


course of instruction whose primary means of delivery is a computer.

 computer-intensive - Computer-intensive is a term that applies to any


computing application that requires the resources of a lot of computers, such as
grid computing.

 concatenation (concatenate, concatenating) - Concatenation (from Latin


concatenare, to link together) is taking two or more separately located things
and placing them side-by-side next to each other so that they can now be treated
as one thing.

 concurrent processing - Concurrent processing is a computing model in


which multiple processors execute instructions simultaneously for better
performance.

 configuration - Generally, a configuration is the arrangement - or the


process of making the arrangement - of the parts that make up a whole.

 connection - In telecommunication and computing in general, a connection


is the successful completion of necessary arrangements so that two or more
parties (for example, people or programs) can communicate at a long distance.

 connectionless - In telecommunication, connectionless describes


communication between two network end points in which a message can be
sent from one end point to another without prior arrangement.

 conservation of angular momentum - Conservation of angular momentum


is a physical property of a spinning system such that its spin remains constant
unless it is acted upon by an external torque; put another way, the speed of
rotation is constant as long as net torque is zero.
 contact center - A contact center -- also referred to as a customer interaction
center or e-contact center -- is a central point from which all customer
interactions across various channels are managed.

 container (disambiguation) - This page explains how the term container is


used in software development, storage, data center management and mobile
device management.

 content - Many people agree that on the World Wide Web, "content is King.

 content aggregator - A content aggregator is an individual or organization


that gathers Web content (and/or sometimes applications) from different online
sources for reuse or resale.

 content filtering (information filtering) - On the Internet, content filtering


(also known as information filtering) is the use of a program to screen and
exclude from access or availability Web pages or e-mail that is deemed
objectionable.

 content-addressed storage (CAS) - Content-addressed storage (CAS) is a


method of providing fast access to fixed content (data that is not expected to be
updated) by assigning it a permanent place on disk.

 contiguous - Contiguous describes two or more objects that are adjacent to


each other.

 continuation symbol - The continuation symbol is used to indicate


extension of a sequence or set, or to imply the existence of intermediate
elements in a sequence or set.

 continuous data protection (storage convergence) - Continuous data


protection (CDP), also called continuous backup, is a storage system in which
all the data in an enterprise is backed up whenever any change is made.

 controller - A controller, in a computing context, is a hardware device or a


software program that manages or directs the flow of data between two entities.
 cool - On the World Wide Web, cool has a number of meanings,
including:EngagingLaid-back, understatedIn tune with the latest thinking, even
a little ahead of itTechnically or graphically impressiveThe term "cool" seems
to have originated among jazz musicians in the 1940s.

 Coordinated Universal Time (UTC, GMT, CUT) - Coordinated Universal


Time (abbreviated as UTC, and therefore often spelled out as Universal Time
Coordinated and sometimes as Universal Coordinated Time) is the standard
time common to every place in the world.

 coordinates - Coordinates are distances or angles, represented by numbers,


that uniquely identify points on surfaces of two dimensions (2D) or in space of
three dimensions (3D).

 coprocessor - A coprocessor is a special set of circuits in a microprocessor


chip that is designed to manipulate numbers or perform some other specialized
function more quickly than the basic microprocessor circuits could perform the
same task.

 copyleft - Copyleft is the idea and the specific stipulation when distributing
software that the user will be able to copy it freely, examine and modify the
source code, and redistribute the software to others (free or priced) as long as
the redistributed software is also passed along with the copyleft stipulation.

 corollary - A corollary is a statement that follows naturally from some other


statement that has either been proven or is generally accepted as true.

 COTS, MOTS, GOTS, and NOTS - COTS, MOTS, GOTS, and NOTS are
abbreviations that describe pre-packaged software or hardware purchase
alternatives.

 counting board - Historically, a counting board was a portable flat surface,


usually of wood or stone, on which a user placed objects such as pebbles or
beads for the purpose of maintaining a count of something.

 coupling - Coupling is the act of joining two things together.


 courseware - Courseware is educational material intended as kits for
teachers or trainers or as tutorials for students, usually packaged for use with a
computer.

 Cray Inc. - Cray Inc. is a pioneering computer company that was founded as
Cray Research in 1972 by Seymour Cray, who is known as the father of the
supercomputer.

 cross section - A cross section is a cut through something (such as a coaxial


cable) at an angle perpendicular to its axis in order to view its interior structure.

 crumb - In computers, crumb is jargon for two bits (that is, two binary
digits).

 cryptographic nonce - A nonce is a random or semi-random number that is


generated for a specific use, typically related to cryptographic communication
or information technology.

 cryptography - Cryptography is a method of protecting information and


communications through the use of codes so that only those for whom the
information is intended can read and process it.

 cumulative trauma disorder (CTD) - In information technology,


cumulative trauma disorder (CTD) refers to any of several physical problems
that can result from improper or excessive use of a computer display or
terminal.

 cursor - A cursor is the position indicator on a computer display screen


where a user can enter text.

 customer data integration (CDI) - Customer data integration (CDI) is the


process of defining, consolidating and managing customer information across
an organization's business units and systems to achieve a "single version of the
truth" for customer data.

 customer lifecycle - In customer relationship management (CRM), customer


lifecycle is a term used to describe the progression of steps a customer goes
through when considering, purchasing, using and maintaining loyalty to a
product or service.

 customer-facing - Customer-facing is an adjective used to describe a


hardware or software product, technology, or anything that the customer of a
business deals with directly.

 cyber - Cyber is a prefix used to describe a person, thing, or idea as part of


the computer and information age.

 cyberburger joint - A cyberburger joint is a fast-food restaurant that


provides Internet access at a computer to its customers.

 cybercafe - A cybercafe is a cafe, coffee or espresso shop, or similar food


and/or beverage-serving place that has a number of personal computers
connected to the Internet and available for use by customers.

 cyberextortion - Cyberextortion is a crime involving an attack or threat of


an attack coupled with a demand for money or some other response in return
for stopping or remediating the attack.

 cyberpicketing - Cyberpicketing is the use of the Internet to protest a


corporation or other institution's wages, work conditions, products,
environmental policy, or other issues.

 cyberpunk - Cyberpunk is a sensibility or belief that a few outsiders, armed


with their own individuality and technological capability, can fend off the
tendencies of traditional institutions to use technology to control society.

 cyberstalking - Cyberstalking is a crime in which the attacker harasses a


victim using electronic communication, such as e-mail or instant messaging
(IM), or messages posted to a Web site or a discussion group.

 D - D is one of two programming languages, Digital Mars D, an object-


oriented metaprogramming language, or Microsoft D, a key component of the
upcoming Oslo development environment.
 dark energy (quintessence) - Dark energy, also called quintessence, is a
mysterious energy or force that has been postulated by astronomers and
cosmologists to explain recent observations suggesting that the universe is
expanding at an ever-increasing rate of speed.

 DAT (Digital Audio Tape) - DAT (Digital Audio Tape) is a standard


medium and technology for the digitalrecording of audioon tape at a
professional level of quality.

 data - In computing, data is information that has been translated into a form
that is efficient for movement or processing.

 data center - A data center (or datacenter) is a facility composed of


networked computers and storage that businesses and other organizations use to
organize, process, store and disseminate large amounts of data.

 data classification - Data classification is the process of organizing data


into categories that make it is easy to retrieve, sort and store for future use.

 data compression - Data compression is a reduction in the number of bits


needed to represent data.

 data glove - A data glove is an interactive device, resembling a glove worn


on the hand, which facilitates tactile sensing and fine-motion control in robotics
and virtual reality.

 data in motion - Data in motion, also referred to as data in transit or data in


flight, is digital information that is in the process of being transported between
locations within or between computer systems.

 data point - A data point is a discrete unit of information.

 data restore - Data restore is the process of copying backup data from
secondary storage and restoring it to its original location or a new location.

 data set - A data set is a collection of data that contains individual data units
organized (formatted) in a specific way and accessed by one or more specific
access methods based on the data set organization and data structure.
 data storage - Data storage is the collective methods and technologies that
capture and retain digital information on electromagnetic, optical or silicon-
based storage media.

 data streaming - Data streaming is the continuous transfer of data at a


steady, high-speed rate.

 data structure - A data structure is a specialized format for organizing,


processing, retrieving and storing data.

 data transfer rate (DTR) - Data transfer rate (DTR) is the amount of digital
data that is moved from one place to another in a given time.

 DB-xx (DB-9, DB-15, DB-25, DB-50, DB-68) - DB-xx is the designation


for a series of port connectors for attaching devices to computers.

 de facto standard - A de facto standard is something that is used so widely


that it is considered a standard for a given application although it has no official
status.

 de jure standard - A de jure standard is a technology, method or product


that has been officially endorsed for a given application.

 dead media - In 1995, science-fiction writer Bruce Sterling challenged a


conference of computer artists and the world at large to help identify the extinct
species in the new media taxonomy and face the fact that, for each new medium
or technology that survives, dozens fall by the wayside.

 deadlock - A deadlock is a situation in which two computer programs


sharing the same resource are effectively preventing each other from accessing
the resource, resulting in both programs ceasing to function.

 decimal - Decimal is a term that describes the base-10 number system,


probably the most commonly used number system.

 decoupled architecture - In general, a decoupled architecture is a


framework for complex work that allows components to remain completely
autonomous and unaware of each other.
 default - In computer technology, a default (noun, pronounced dee-
FAWLT) is a predesigned value or setting that is used by a computer program
when a value or setting is not specified by the program user.

 defragmentation - Defragmentation is the process of locating the


noncontiguous fragments of data into which a computer file may be divided as
it is stored on a hard disk, and rearranging the fragments and restoring them
into fewer fragments or into the whole file.

 degauss - To degauss is to demagnetize.

 demographics - Demographics is the study of the behaviors and other


characteristics of groups of human beings in terms of statistics.

 Department of Space (India) - The Department of Space (DoS) is a


department created by the Indian government to manage their space program
and oversee a number of related agencies and institutes.

 deploy - To deploy (from the French deployer) is "to spread out or arrange
strategically.

 depository - A depository is a file or set of files in which data is stored for


the purpose of safekeeping or identity authentication.

 deprecated - In dictionaries, deprecated is a term used to indicate a


pronunciation or usage that is acknowledged but discouraged.

 design by committee - Design by committee is a term sometimes used to


describe a design that is flawed because too many people provided input.

 desktop - A desktop is a computer display area that represents the kinds of


objects one might find on top of a physical desk, including documents, phone
books, telephones, reference sources, writing and drawing tools, and project
folders.

 desktop supercomputer (personal supercomputer) - A desktop


supercomputer, also called a personal supercomputer, is a term that is used to
describe any exceptionally powerful computer that can be placed at a single
workstation.

 desktop theme - A desktop theme is a customized graphical user interface


(GUI) that replaces a computer's ordinary sounds, icons, pointer, wallpaper or
screensaver with something designed to reflect the interests of the user.

 device - In general, a device is a machine designed for a purpose.

 Difference Engine - The Difference Engine, designed in the 1820s by the


English mathematician and inventor Charles Babbage, was intended to
automatically compute mathematical tables which, until that time, had been
tediously calculated by hand and were prone to error.

 digit - A digit is an element of a set that, taken as a whole, comprises a


system of numeration.

 digital accessibility - Digital accessibility is the ability of a website, mobile


application or electronic document to be easily navigated and understood by a
wide range of users, including those users who have visual, auditory, motor or
cognitive disabilities.

 digital audio broadcasting (DAB) - .

 digital cash (eCash) - Digital cash is a system of purchasing cash credits in


relatively small amounts, storing the credits in your computer, and then
spending them when making electronic purchases over the Internet.

 digital divide - The term 'digital divide' describes the fact that the world can
be divided into people who do and people who don't have access to - and the
capability to use - modern information technology, such as the telephone,
television, or the Internet.

 digital library - A digital library is a collection of documents in organized


electronic form, available on the Internet or on CD-ROM (compact-disk read-
only memory) disks.
 digital modeling and fabrication - Digital modeling and fabrication is a
design and production process that marries 3-D modeling or computing-aided
design (CAD) software with additive and subtractive manufacturing.

 digital printing - Digital printing describes the process of transferring a


document on a personal computer or other digital storage device to a printing
substrate by means of a device that accepts text and graphic output.

 digitization - Digitization is the process of converting information into a


digital format.

 digizine - A digizine is a magazine that is delivered in digital (electronic


form) on an electronic medium, such as a CD-ROM.

 Dilbert - Dilbert is a cartoon strip about the workplace that has a wide
following among millions of corporate and other workers in the United States.

 Direct Memory Access (DMA) - Direct Memory Access (DMA) is a


capability provided by some computer bus architectures that allows data to be
sent directly from an attached device (such as a disk drive) to the memory on
the computer's motherboard.

 direct-attached storage (DAS) - Direct-attached storage (DAS) is computer


storage that is connected to one computer and not accessible to other
computers.

 directory - A directory is, in general, an approach to organizing


information, the most familiar example being a telephone directory.

 disaster recovery plan (DRP) - A disaster recovery plan (DRP) is a


documented, structured approach that describes how an organization can
quickly resume work after an unplanned incident.

 discrete - Discrete (pronounced dihs-KREET, from the Latin discretus and


perhaps discernere, meaning to separate) is an adjective meaning separate and
distinct.
 disintermediation - Disintermediation is giving the user or the consumer
direct access to information that otherwise would require a mediator, such as a
salesperson, a librarian, or a lawyer.

 disk-to-disk-to-tape (D2D2T) - Disk-to-disk-to-tape (D2D2T) is an


approach to computer storage backup and archiving in which data is initially
copied to backup storage on a disk and then later on copied again to tape.

 display modes - The term display mode refers to the characteristics of a


computer display, in particular the maximum number of colors and the
maximum image resolution (in pixels horizontally by pixels vertically).

 disruptive technology - A disruptive technology is one that displaces an


established technology and shakes up the industry or a ground-breaking product
that creates a completely new industry.

 distance learning (e-learning) - Distance learning, sometimes called e-


learning, is a formalized teaching and learning system specifically designed to
be carried out remotely by using electronic communication.

 distributed - Computing is said to be "distributed" when the computer


programming and data that computers work on are spread out over more than
one computer, usually over a network.

 distribution - In marketing, distribution is the process of moving a product


from its manufacturing source to its customers.

 dithering - Dithering is the attempt by a computer program to approximate a


color from a mixture of other colors when the required color is not available.

 document - In general, a document (noun) is a record or the capturing of


some event or thing so that the information will not be lost.

 Document Type Definition (DTD) - A Document Type Definition (DTD)


is a specific document defining and constraining definition or set of statements
that follow the rules of the Standard Generalized Markup Language (SGML) or
of the Extensible Markup Language (XML), a subset of SGML.
 documentation - In computer hardware and software product development,
documentation is the information that describes the product to its users.

 dogcow - The dogcow is a drawing of a rather indiscriminate-looking animal


(it looks mostly like a dog but is said to have the spots of a cow) that is or has
been used in the Apple Macintosh operating system to help tell users about their
printing options.

 DOS (Disk Operating System) - DOS (Disk Operating System) can refer to
a computer operating system that is loaded from a disk drive or to an operating
system based on Microsoft Disk Operating System (MS-DOS).

 dot product (scalar product) - The dot product, also called the scalar
product, of two vectors is a number (scalar quantity) obtained by performing a
specific operation on the vector components.

 double factorial - The double factorial, symbolized by two exclamation


marks (!!), is a quantity defined for all integers greater than or equal to -1.

 double-slit experiment - The double-slit experiment is a nineteenth-century


investigation into the properties of light that has since been found to
demonstrate both the duality of photons and the concepts of superposition and
quantum interference.

 downsizing - In a business enterprise, downsizing is reducing the number of


employees on the operating payroll.

 drilldown - As currently used in information technology, to drill down


(verb) is to focus in on something.

 DRY principle - The DRY (don't repeat yourself) principle is a best practice
in software development that recommends software engineers to do something
once, and only once.

 duh - In general, duh (pronounced DUH, prolonging the UH, pitching the
voice a bit low, and inflecting it with an intonation of imbecility or sarcasm or
both, depending on the usage) is a colloquial comment on one's (or someone
else's) lack of knowledge or brain power.
 duty cycle - Duty cycle is the proportion of time during which a component,
device, or system is operated.

 dynamic and static - In general, dynamic means energetic, capable of


action and/or change, or forceful, while static means stationary or fixed.

 Dynamic Data Exchange (DDE) - In the Windows, OS/2, and (with third-
party development kits) other operating systems, Dynamic Data Exchange
(DDE) allows information to be shared or communicated between programs.

 e-inclusion - E-inclusion is a social movement whose goal is to end the


digital divide, a term used to describe the fact that the world can be divided into
people who do and people who don't have access to - and the capability to use -
modern information technology (IT).

 e-tailing (electronic retailing) - E-tailing (less frequently: etailing) is the


selling of retail goods on the Internet.

 e-thrombosis - E-thrombosis is a newly recognized variant of deep venous


thrombosis (DVT) caused by sitting at a computer for long periods of time.

 early adopter - An early adopter is a person who embraces new technology


before most other people do.

 Earth's mean orbital speed - Earth's mean orbital speed is the average
speed at which the Earth revolves around the sun.

 Easter Egg - An Easter Egg is an unexpected surprise -- an undocumented


procedure or unauthorized feature that's playful in nature or gives credit to the
software developer or chip designer.

 EDP (electronic data processing) - EDP (electronic data processing), an


infrequently used term for what is today usually called "IS" (information
services or systems) or "MIS" (management information services or systems),
is the processing of data by a computer and its programs in an environment
involving electronic communication.
 edu - edu is one of the top-level domain names that can be used when
choosing a domain name.

 edutainment - Edutainment is a neologism (new term coinage), similar to


infotainment, that expresses the marriage of education and entertainment in a
work or presentation such as a television program or a Web site.

 egosurfing - Egosurfing is looking to see how many places on the Web your
name appears.

 electronic discovery (e-discovery or ediscovery) - Electronic discovery


(also called e-discovery or ediscovery) refers to any process in which electronic
data is sought, located, secured, and searched with the intent of using it as
evidence in a civil or criminal legal case.

 electronic newspaper - An electronic newspaper is a self-contained,


reusable, and refreshable version of a traditional newspaper that acquires and
holds information electronically.

 electronic nose (e-nose) - An electronic nose (e-nose) is a device that


identifies the specific components of an odor and analyzes its chemical makeup
to identify it.

 electronic resume - An electronic resume is a plain text (ASCII), PDF or


HTML document that provides an employer with information regarding a job
candidate's professional experience, education and job qualifications and is
meant to be read by a computer program instead of by a human being.

 elegant solution - The word elegant, in general, is an adjective meaning of


fine quality.

 email - Email (electronic mail) is the exchange of computer-stored messages


by telecommunication.

 embedded system - An embedded system is a combination of computer


hardware and software, either fixed in capability or programmable, designed for
a specific function or functions within a larger system.
 enantiomorph - An enantiomorph (pronounced en-ANT-i-o-morf) is a
mirror image of something, an opposite reflection.

 encoding and decoding - Encoding is the process of putting a sequence of


characters (letters, numbers, punctuation, and certain symbols) into a
specialized digital format for efficient transmission or transfer.

 end user - In information technology, the term end user is used to


distinguish the person for whom a hardware or software product is designed
from the developers, installers, and servicers of the product.

 enhancement - In an information technology product, an enhancement is a


noteworthy improvement to the product as part of a new version of it.

 ENIAC - ENIAC (Electronic Numerical Integrator And Computer) was the


world’s first general-purpose computer.

 entanglement - Entanglement is a term used in quantum theory to describe


the way that particles of energy/matter can become correlated to predictably
interact with each other regardless of how far apart they are.

 enterprise - In the computer industry, an enterprise is an organization that


uses computers.

 enterprise architecture (EA) - An enterprise architecture (EA) is a


conceptual blueprint that defines the structure and operation of an organization.

 entity - In general, an entity (pronounced N-tih-tee) is an existing or real


thing.

 entrepreneur (entrepreneurship) - An entrepreneur is an individual who


identifies a need in the marketplace and works to fulfill it.

 enviromatics (environmental informatics) - Enviromatics is the use of


computer modeling to analyze the Earth's environment and to predict future
trends.
 environment - In computers, the term environment when unqualified
usually refers to the combination of hardware and software in a computer.

 ergonomics - Ergonomics (from the Greek word "ergon" meaning work, and
"nomoi" meaning natural laws), is the science of refining the design of products
to optimize them for human use.

 euro - The euro (pronounced YUR-oh) is now the official monetary unit of
12 member nations of the European Union.

 event - An event, in a computing context, is an action or occurrence that can


be identified by a program and has significance for system hardware or
software.

 event handler - An event handler is a callback routine that operates


asynchronously and handles inputs received into a program.

 executable - In computers, to execute a program is to run the program in the


computer, and, by implication, to start it to run.

 EXL Service (EXL Services) - EXL Service, also known as EXL Services
(NASDAQ: EXLS), provides business process outsourcing services to global
corporations.

 expanded memory - Expanded memory, also know as EMS (Expanded


Memory Specification) was a method used to increase the 640KB upper limit of
MS-DOS to 1MB using a gated memory riser card.

 exponent - An exponent is a quantity representing the power to which some


other quantity is raised.

 exponential assembly - In nanotechnology, exponential assembly is a form


of self-replication in which tiny devices called nanorobots repeatedly construct
copies of themselves.

 exponential function - An exponential function is a mathematical function


of the following form:f (x) = a xwhere x is a variable, and a is a constant called
the base of the function.
 extended memory - Extended memory, also known as XMS (eXtended
Memory Specification) is a technology that enables capacity above the 640KB
standard MS-DOS limit of main memory.

 extension - In computer operating systems, a file name extension is an


optional addition to the file name in a suffix of the form ".

 eye candy - Eye candy is a term used in information technology for visual
elements displayed on computer monitors that are aesthetically appealing or
attention-compelling.

 fabric - In information technology, fabric is a synonym for the words


framework or platform.

 factorial - The factorial, symbolized by an exclamation mark (!), is a


quantity defined for all integers greater than or equal to 0.

 failover - Failover is a backup operational mode in which the functions of a


system component (such as a processor, server, network, or database, for
example) are assumed by secondary system components when the primary
component becomes unavailable through either failure or scheduled down time.

 fair use - Fair use is a legal concept that allows the reproduction of
copyrighted material for certain purposes without obtaining permission and
without paying a fee or royalty.

 falsifiability - Falsifiability is the capacity for some proposition, statement,


theory or hypothesis to be proven wrong.

 FAQ (frequently-asked questions) - The FAQ (pronounced FAK) or list of


"frequently-asked questions" (and answers) has become a feature of the
Internet.

 Fast Guide to Helpful Tips - Explore the categories below for recently
submitted and archived tips.

 fault-tolerant - Systems with integrated fault tolerance are designed to


withstand multiple hardware failures to ensure continuous availability.
 FCC (Federal Communications Commission) - The FCC (Federal
Communications Commission) is the government body responsible for
maintaining laws, censorship and broadcast licensing pertaining to interstate
and international communications in the United States.

 FDISK - WARNING: Use caution when repartitioning a hard disk drive that
contains data.

 feature creep - Feature creep (sometimes known as requirements creep or


scope creep) is a tendency for product or project requirements to increase
during development beyond those originally foreseen, leading to features that
weren't originally planned and resulting risk to product quality or schedule.

 femtosecond - A femtosecond is one millionth of a nanosecond or 10 -15 of


a second and is a measurement sometimes used in laser technology.

 Fermat prime - A Fermat prime is a Fermat number that is also a prime


number.

 Fermat's Last Theorem (FLT) - Fermat's Last Theorem (FLT), a


significant hypothesis in number theory, was first stated by Pierre de Fermat, a
17th-Century laywer and amateur mathematician.

 ferret - In a computer or a network, a ferret is a program that searches


through selected files, databases, or search engine indexes for information that
meets specified search criteria.

 field - A field is an area in a fixed or known location in a unit of data such as


a record, message header, or computer instruction that has a purpose and
usually a fixed size.

 file format - In a computer, a file format is the layout of a file in terms of


how the data within the file is organized.

 file transfer - File transfer is the movement of one or more files from one
location to another.
 Finacle - Finacle is a core banking suite developed and marketed by India's
Infosys Technologies.

 finite state machine - Finite state machine (FSM) is a term used by


programmers, mathematicians and other professionals to describe a
mathematical model for any system with a limited number of conditional states
of being.

 firehose effect - A firehose effect occurs in a network when the source


(transmitting) computer or terminal sends data too fast for a destination
(receiving) computer or terminal to deal with it.

 first call resolution (FCR) - In customer relationship management (CRM),


first call resolution is properly addressing the customer's need the first time they
call, thereby eliminating the need for the customer to follow up with a second
call.

 first-order logic - First-order logic is symbolized reasoning in which each


sentence, or statement, is broken down into a subject and a predicate.

 flaming - On the Internet, flaming is giving someone a verbal lashing in


public.

 flash memory card - Flash storage memory cards use nonvolatile


semiconductor memory to store pictures, audio and video data on portable and
remote devices.

 flash storage - Flash storage is any type of drive, repository or system that
uses flash memory to keep data for an extended period of time.

 FlashMob supercomputer - A FlashMob supercomputer is a group of


computer enthusiasts who gather together in one physical location for a brief
time period in order to function as a supercomputer and work on a single
problem.

 flat address space - 1. A flat address space is a set of addresses arranged on


a single level.
 flexography (surface printing) - Flexography, sometimes referred to as
"surface printing," is a method commonly used for printing on packaging and
other uneven surfaces.

 FLOPS (floating-point operations per second) - In computers, FLOPS are


floating-point operations per second.

 flowchart - A flowchart is a formalized graphic representation of a logic


sequence, work or manufacturing process, organization chart, or similar
formalized structure.

 fnord - Certain words are intended to be undefinable and "fnord" is one of


them.

 folder - In the Windows, Macintosh, and some other operating system s, a


folder is a named collection of related files that can be retrieved, moved, and
otherwise manipulated as one entity.

 Foo Camp - Foo Camp was a gathering of about 200 computer and Internet
thinkers and inventors who were invited by publisher O'Reilly and Associates
to spend a week-end brainstorming, collaborating, and otherwise advancing
progress in information technology.

 footprint - In information technology, a footprint is the amount of space a


particular unit of hardware or software occupies.

 forensic - Forensic, in a general sense, means "related to or used in courts of


law" or "used for formal public debate or discussion.

 form factor - In computers, the form factor is the size, configuration, or


physical arrangement of a computing device.

 format - A format (noun, pronounced FOHR-mat ) is a preestablished


layout for data.

 Fourier analysis - Fourier analysis is a method of defining periodic


waveforms in terms of trigonometric function s.
 Fourier series - A Fourier (pronounced foor-YAY) series is a specific type
of infinite mathematical series involving trigonometric functions.

 foxed - A fan club Web site can be said to have been "foxed" when it has
received a letter of warning about copyright violations from the owners of
images or other copyrighted material it is using.

 FQA (frequently questioned answers) - FQA (frequently questioned


answers) are conventions or mandates scrutinized by individuals or groups who
doubt their validity.

 fragmentation - In some operating system's file systems, a data file over a


certain size is stored in several "chunks" or fragments rather than in a single
contiguous sequence of bits in one place on the storage medium, a process that
is called fragmentation.

 framework - In computer systems, a framework is often a layered structure


indicating what kind of programs can or should be built and how they would
interrelate.

 framing effect - Framing effect is a form of cognitive bias which causes


people to focus more on the positive or negative aspects of a decision, situation
or information based on the way it is presented.

 free software - Free software is software that can be freely used, modified,
and redistributed with only one restriction: any redistributed version of the
software must be distributed with the original terms of free use, modification,
and distribution (known as copyleft).

 freeware - Freeware (not to be confused with free software) is programming


that is offered at no cost and is a common class of small applications available
for downloading and use in most operating systems.

 FUD (Fear, Uncertainty, and Doubt) - FUD (Fear, Uncertainty, and


Doubt) is the term for any strategy intended to make a company's customers
insecure about future product plans with the purpose of discouraging them from
adopting competitors' products.
 full-stack developer - A full-stack developer is a type of programmer that
has a functional knowledge of all techniques, languages and systems
engineering concepts required in software development.

 function - In information technology, the term function (pronounced


FUHNK-shun) has a number of meanings.

 functionality - In information technology, functionality (from Latin functio


meaning "to perform") is the sum or any aspect of what a product, such as a
software application or computing device, can do for a user.

 Furby - Furby (pronounced FURR-bee) is the name of an electronic toy,


five inches tall, that is covered with simulated fur, has big eyes and ears, a
vocabulary of over 200 words, and a limited ability to react to its environment.

 futzing (or futzing around) - Futzing or "futzing around" is unstructured,


playful, often experimental interaction between a human being and a computer,
product, or any technology, sometimes but not always with a productive
purpose in mind.

 fuzzy number - A fuzzy number is a quantity whose value is imprecise,


rather than exact as is the case with "ordinary" (single-valued) numbers.

 fuzzy search - A fuzzy search is a process that locates Web pages that are
likely to be relevant to a search argument even when the argument does not
exactly correspond to the desired information.

 game theory - Game theory is the study of mathematical models of


negotiation, conflict and cooperation between individuals, organizations and
governments.

 garbage - In computers, garbage has two related meanings: From a user's


perceptual point-of-view, garbage is often used to mean anything on your
display screen that looks unreadable or unviewable.

 geek - In computers and the Internet, a geek is a person who is inordinately


dedicated to and involved with technology.
 geekosphere - The geekosphere is the physical ambiance around you and
your workstation.

 general-purpose computer - A general-purpose computer is one that, given


the appropriate application and required time, should be able to perform most
common computing tasks.

 genetic engineering - Genetic engineering is the deliberate, controlled


manipulation of the genes in an organism with the intent of making that
organism better in some way.

 geocaching (GPS stash hunting) - Geocaching, also referred to as GPS


stash hunting, is a recreational activity in which someone "buries" something
for others to try to find using a Global Positioning System (GPS) receiver.

 George Boole - George Boole (1815-1864) was a British mathematician and


is known as the founder of mathematical logic.

 geospatial analysis - Geospatial analysis is the gathering, display, and


manipulation of imagery, GPS, satellite photography and historical data,
described explicitly in terms of geographic coordinates or implicitly, in terms of
a street address, postal code, or forest stand identifier as they are applied to
geographic models.

 ghost site - A ghost site is a Web site that is no longer maintained but that
remains available for viewing.

 gibibyte (GiB) - A gibibyte (GiB) is a unit of measure of capacity used in


computing.

 gigabit - In data communications, a gigabit is one billion bits, or


1,000,000,000 (that is, 10^9) bits.

 gigaflop - As a measure of computer speed, a gigaflop is a billion floating-


point operations per second (FLOPS).

 glass house - Glass house is a term for centralized computing in an


enterprise and the mindset of those who plan and administer it.
 glitch - In several usages in information technology, a glitch (pronounced
GLIHTCH) is a sudden break in function or continuity, sometimes of a
transient nature, with a varying degree of seriousness.

 globbing - Globbing is the process of expanding a non-specific file name


containing a wildcard character into a set of specific file names that exist in
storage on a computer, server, or network.

 glocalization - Glocalization is the concept that in a global market, a product


or service is more likely to succeed when it is customized for the locality or
culture in which it is sold.

 going forward - Going forward is a relatively new and apparently


convenient way to indicate a progression in time from the present.

 googol and googolplex - A googol is 10 to the 100th power (which is 1


followed by 100 zeros).

 Gopher - From about 1992 through 1996, Gopher was an Internet


application in which hierarchically-organized text files could be brought from
servers all over the world to a viewer on your computer.

 gopherspace - Gopherspace is a term used to describe the aggregate of all


the information on the thousands of Gopher servers in the world.

 GPGPU (general purpose graphics processing unit) - A general-purpose


GPU (GPGPU) is a graphics processing unit (GPU) that performs non-
specialized calculations that would typically be conducted by the CPU (central
processing unit).

 GPU (graphics processing unit) - A graphics processing unit (GPU) is a


computer chip that performs rapid mathematical calculations, primarily for the
purpose of rendering images.

 GPU supercomputer - A GPU supercomputer is a networked group of


computers with multiple graphics processing units working as general-purpose
GPUs (GPGPUs) in tandem on a single task.
 Grace Hopper nanosecond - A Grace Hopper nanosecond is a visual aid
that represents how fast electricity can travel in one billionth of a second.

 graph theory - Graph theory is the study of points and lines.

 gravesite - In the context of the World Wide Web, a gravesite is either: A


Web site that has been abandoned or forgotten by its originators that is
nevertheless still accessible on a server.

 gravity (or gravitation) - Gravity, also called gravitation, is a force that


exists among all material objects in the universe, attracting objects with non-
zero mass toward each other.

 gravity wave (or gravitational wave) - A gravity wave (or gravitational


wave) is a ripple in the curvature of the space-time continuum (the enmeshed
combination of our three perceived physical dimensions, plus time) created by
the movement of matter.

 gravure - Gravure is a printing method in which an image is applied to a


printing substrate by use of a metal plate mounted on a cylinder.

 gray goo (or grey goo) - Gray goo (in British spelling, "grey goo") is a term
used to describe what life on our planet might become if self-replicating robots
or nanomachines got out of control and began to use up life forms for their own
energy needs in some unstoppable way.

 grayscale - Grayscale is a range of shades of gray without apparent color.

 greedy algorithm - A greedy algorithm is a mathematical process that looks


for simple, easy-to-implement solutions to complex, multi-step problems by
deciding which next step will provide the most obvious benefit.

 Greeking - Greeking is the use of unreadable dummy text in places reserved


for text when prototyping the design or general layout of pages in magazines,
books, brochures, advertisements, Web pages, and other visual media.

 Gregorian calendar - The Gregorian calendar is the calendar in current use


in the Western world, both as the civil and Christian ecclesiastical calendar.
 gremlin - A gremlin is an imaginary creature that causes trouble in devices
and systems of all kinds.

 grid computing - Grid computing uses small, distributed resources from


servers and PCs to solve big problems.

 GUI (graphical user interface) - A GUI (usually pronounced "GOO-ee") is


a graphical (rather than purely textual) user interface to a computer.

 gyroscope - A gyroscope is a device with a spinning disc or wheel


mechanism that harnesses the principle of conservation of angular momentum:
the tendency for the spin of a system to remain constant unless subjected to
external torque.

 H.264 (MPEG-4 AVC) - H.264, also known as MPEG-4 AVC (Advanced


Video Coding), is a video compression standard that offers significantly greater
compression than its predecessors.

 half-life - In science, a half-life (also, as a noun, spelled half life) is the


amount of time it takes for half of a substance or entity to undergo some
specified process.

 hangup (or hang) - A hangup, also called a hang, is a condition that


sometimes occurs when computer programs conflict or do not run properly.

 haptics - Haptics (pronounced HAP-tiks) is the science of applying touch


(tactile) sensation and control to interaction with computer applications.

 hard copy (printout) - A hard copy (or "hardcopy") is a printed copy of


information from a computer.

 hard drive shredder - A hard drive shredder is a mechanical device that


physically destroys old hard drives in such a way that the data they contain
cannot be recovered.

 hard error - A hard error is an issue in RAM that results from a permanent
physical flaw in the module caused by a hardware failure or defect.
 hard reset (factory reset; master reset) - A hard reset, also known as a
factory reset or master reset, is the restoration of a device, such as a smartphone
or tablet, to its state when it left the factory.

 header - In information technology, a header is, in general, something that


goes in front of something else and is usually repeated as a standard part of the
units of something else.

 Herman Hollerith - Born in 1860 in Buffalo, NY, Herman Hollerith was


the creator of the Hollerith Electric Tabulating System, the ancestor to
computers as we know them today.

 heterogeneous - Heterogeneous (pronounced HEH-tuh-roh-DJEEN-ee-uhs,


from the Greek heteros or "other" and genos or "kind") is the characteristic of
containing dissimilar constituents.

 heuristic - As an adjective, heuristic (pronounced hyu-RIS-tik and from the


Greek "heuriskein" meaning "to discover") pertains to the process of gaining
knowledge or some desired result by intelligent guesswork rather than by
following some preestablished formula.

 hexadecimal - Hexadecimal describes a base-16 number system.

 hibernation - Hibernation is a mode in which a computer is turned off but


saves its state to resume when it is turned on again.

 hiccup - In information technology, hiccup is an informal term for a non-


recurring problem of indeterminate cause that usually does not cause a
significant disruption of work or activity.

 hierarchy - A hierarchy is an organizational structure in which items are


ranked according to levels of importance.

 high-performance computing (HPC) - High-performance computing


(HPC) is the use of parallel processing for running advanced application
programs efficiently, reliably and quickly.
 histogram - A histogram is a display of statistical information that uses
rectangles to show the frequency of data items in successive numerical intervals
of equal size.

 holographic print - A holographic print is a rendition of a hologram on a


flat surface, producing 3-D (three-dimensional) effects when viewed.

 holographic storage (holostorage) - Holographic storage is computer


storage that uses laser beams to store computer-generated data in three
dimensions.

 home server - A home server is a computer that functions as a server in a


client-server home network.

 host (in computing) - A host (also known as "network host") is a computer


or other device that communicates with other hosts on a network.

 hotfix - A hotfix is code (sometimes called a patch) that fixes a bug in a


product.

 htm - htm is sometimes used as a short form of the file name suffix for an
HTML file.

 human factors (ergonomics) - In industry, human factors (also known as


ergonomics) is the study of how humans behave physically and psychologically
in relation to particular environments, products, or services.

 Human Genome Project - The Human Genome Project is a global, long-


term research effort to identify the estimated 30,000 genes in human DNA
(deoxyribonucleic acid) and to figure out the sequences of the chemical bases
that make up human DNA.

 humanware - Humanware is hardware and software that emphasizes user


capability and empowerment and the design of the user interface.

 hybrid application (hybrid app) - A hybrid application (hybrid app) is one


that combines elements of both native and Web applications.
 hyper - As an adjective, hyper is slang for "keyed up" or "overwrought.

 hyperspace - Hyperspace is a term that describes the total number of


individual locations and all of their interconnections in a hypertext
environment.

 hypervisor - A hypervisor is a function that abstracts -- isolates -- operating


systems (OSes) and applications from the underlying computer hardware.

 hypothesis - A hypothesis (plural: hypotheses) is a statement that may be


tested and proven to be either true or false.

 hysteresis - Hysteresis is the tendency for a system to change or react based


on a trend of how it has already transformed leading up to a specific point in
time.

 ICT (information and communications technology, or technologies) -


ICT, or information and communications technology (or technologies), is the
infrastructure and components that enable modern computing.

 ICT4D (Information and Communications Technologies for


Development) - ICT4D (Information and Communications Technologies for
Development) is an initiative aimed at bridging the digital divide (the disparity
between technological "have" and "have not" geographic locations or
demographic groups) and aiding economic development by ensuring equitable
access to up-to-date communications technologies.

 identity management (ID management) - Identity management (ID


management) is the organizational process for identifying, authenticating and
authorizing individuals or groups of people to have access to applications,
systems or networks by associating user rights and restrictions with established
identities.

 idoru - An idoru is a virtual (computer-created) media star.

 IFrame (Inline Frame) - The IFrame HTML element is often used to insert
content from another source, such as an advertisement, into a Web page.
 image compression - Image compression is minimizing the size in bytes of
a graphics file without degrading the quality of the image to an unacceptable
level.

 image of the early universe - An image of the early universe, showing


irregularities in its brightness 380,000 years after its birth, has been produced
by a device called the Wilkinson Microwave Anisotropy Probe (WMAP).

 imaginary number - An imaginary number is a quantity of the form ix,


where x is a real number and i is the positive square root of -1.

 IMHO (in my humble opinion) - Like FYI (for your information), IMHO
(in my humble opinion) is an abbreviation for a phrase sometimes used in
online chatting and e-mail.

 implementation - Implementation is the execution of any idea, model, or


method; in IT, it refers to the process of setting up new software or hardware
after a purchase is made.

 Incompleteness Theorem - The Incompleteness Theorem is a pair of


logical proofs that revolutionized mathematics.

 increment - An increment is a small, unspecified, nonzero change in the


value of a quantity.

 incubator - In the business world, an incubator is an enterprise that is set up


to provide office space, equipment, and sometimes mentoring assistance and
capital to new businesses that are just getting started.

 indemnification - In service level agreements (SLAs) and other legal


contracts such as end-user license agreements (EULAs), indemnification is the
part of an agreement that provides for one party to bear the monetary costs,
either directly or by reimbursement, for losses incurred by a second party.

 indempotency - Based on our inferences about the only three uses of this
term that we have discovered on the Internet, indempotency (pronounced ihn-
dehm-POH-tuhns-ee, from Latin indemnis or "unharmed") is the ability to
preserve the integrity of a thing or action no matter how much it is used or
accessed by another thing or action.

 industrial strength - In information technology, industrial strength is a


characteristic sometimes ascribed to a hardware or software product or a system
to describe its ability to work capably and dependably in the operational world
of business.

 inertia - Inertia is a property of matter that causes it to resist changes in


velocity (speed and/or direction).

 infinite sequence - An infinite sequence is a list or string of discrete objects,


usually numbers, that can be paired off one-to-one with the set of positive
integers {1, 2, 3,.

 infinity - In general, infinity is the quality or state of endlessness or having


no limits in terms of time, space, or other quantity.

 infomercial - On television, an infomercial is a short or regular-length


television program that combines information presentation with an integrated
suggestion to buy a particular product or service.

 infonesia - Infonesia is an inability to remember where you saw or heard an


item of information.

 information - Information is stimuli that has meaning in some context for


its receiver.

 information architecture - In technical writing, information architecture is


the set of ideas about how all information in a given context should be treated
philosophically and, in a general way, how it should be organized.

 information design - Information design is the detailed planning of specific


information that is to be provided to a particular audience to meet specific
objectives.

 information technology (IT) - Information technology (IT) is the use of any


computers, storage, networking and other physical devices, infrastructure and
processes to create, process, store, secure and exchange all forms of electronic
data.

 information theory - Information theory is a branch of mathematics that


overlaps into communications engineering, biology, medical science, sociology,
and psychology.

 infotainment - Infotainment, combining information with entertainment, is


a fairly recent neologism for a television program, Web site feature, or other
presentation that combines information with entertainment.

 input/output (I/O) - I/O (input/output), pronounced "eye-oh," describes any


operation, program, or device that transfers data to or from a computer.

 instruction - An instruction is an order given to a computer processor by a


computer program.

 instruction set - An instruction set is a group of commands for a CPU in


machine language.

 integer - An integer (pronounced IN-tuh-jer) is a whole number (not a


fractional number) that can be positive, negative, or zero.

 integer overflow - Integer overflow is the result of trying to place into


computer memory an integer (whole number) that is too large for the integer
data type in a given system.

 integration - Integration is the act of bringing together smaller components


into a single system that functions as one.

 Intel 8086 - The Intel 8086 was Intel’s first x86 processor.

 intelligent device - An intelligent device is any type of equipment,


instrument, or machine that has its own computing capability.

 intelligent system - An intelligent system is a machine with an embedded,


Internet-connected computer that has the capacity to gather and analyze data
and communicate with other systems.
 interactivity - In computers, interactivity is the dialog that occurs between a
human being (or possibly another live creature) and a computer program.

 interface - As a noun, an interface is either:A user interface, consisting of


the set of dials, knobs, operating system commands, graphical display formats,
and other devices provided by a computer or a program to allow the user to
communicate and use the computer or program.

 interlaced GIF - An interlaced GIF (Graphics Interchange Format) is a GIF


image that seems to arrive on your display like an image coming through a
slowly-opening Venetian blind.

 intermediary - In general, an intermediary is a person or service that is


involved as a third party between two or more end points in a communication
or transaction.

 internationalization (I18N) - Internationalization (sometimes shortened to


"I18N, meaning "I - eighteen letters -N") is the process of planning and
implementing products and services so that they can easily be adapted to
specific local languages and cultures, a process called localization.

 Internet problems - Here are:Three rules-of-thumb for dealing with Internet


problemsA table showing the most common codes and messages you're likely
to see on your Web browser (HTTP), when accessing Usenet, using e-mail, or
using the FTP protocol to upload or download files Three Rules-of-Thumb for
Dealing with Internet ProblemsIf you get a message saying the domain name
server (DNS) can't find your page and you're sure you've typed it in correctly or
clicked on a valid link, try it again - TWO more times! (Sometimes packets
don't get there!)If you get a "Not found" message, the page may be temporarily
missing because of miscoding at the target site.

 interoperability - Interoperability (pronounced IHN-tuhr-AHP-uhr-uh-


BIHL-ih-tee) is the ability of different systems, devices, applications or
products to connect and communicate in a coordinated way, without effort from
the end user.
 interrupt latency - Interrupt latency, also called interrupt response time, is
the length of time that it takes for a computer interrupt to be acted on after it has
been generated.

 intersection symbol - The intersection symbol denotes the intersection of


two sets.

 IPP (Internet presence provider) - An Internet presence provider (IPP) is a


company that provides the disk space, high-speed Internet connection, and
possibly the Web site design and other services for companies, organizations, or
individuals to have a visible presence (meaning Web site) on the Internet.

 IRQ (interrupt request) - An IRQ (interrupt request) value is an assigned


location where the computer can expect a particular device to interrupt it when
the device sends the computer signals about its operation.

 irrational number - An irrational number is a real number that cannot be


reduced to any ratio between an integer p and a natural number q.

 IS (information system or information services) - An information system


(IS) is the collection of technical and human resources that provide the storage,
computing, distribution, and communication for the information required by all
or some part of an enterprise.

 iSCSI switch (Internet Small Computer System Interface switch) - An


iSCSI switch is an appliance that processes and channels data between an iSCSI
initiator and target on a storage device.

 isotope - An isotope is a form of a chemical element whose atomic nucleus


contains a specific number of neutron s, in addition to the number of protons
that uniquely defines the element.

 ISRS (information storage and retrieval system) - An information storage


and retrieval system (ISRS) is a network with a built-in user interface that
facilitates the creation, searching, and modification of stored data.
 ISV (independent software vendor) - An ISV (independent software
vendor) makes and sells software products that run on one or more computer
hardware or operating system (OS) platforms.

 IT Survival Kits - We've gathered a collection of resources to help you


explore an IT topic you might not know much about.

 iterative development - Iterative development is a way of breaking down


the software development of a large application into smaller chunks.

 Jack Kilby - Jack Kilby is generally credited with being the inventor of the
integrated circuit (IC).

 JBoss - JBoss is a division of Red Hat that provides support for the JBoss
open source application server program and related middleware services
marketed under the JBoss Enterprise Middleware brand.

 jiffy - The term jiffy refers to a brief, usually unspecified, interval of time.

 job - In certain computer operating systems, a job is the unit of work that a
computer operator gives to the operating system.

 job step - In certain computer operating systems, a job step is part of a job, a
unit of work that a computer operator (or a program called a job scheduler)
gives to the operating system.

 John von Neumann - John von Neumann was the scientist who conceived a
fundamental idea that serves all modern computers - that a computer's program
and the data that it processes do not have to be fed into the computer while it is
working, but can be kept in the computer's memory - a notion generally referred
to as the stored-program computer.

 jolt - On the Internet, jolt is a denial of service (DoS) attack caused by a


very large ICMP packet that is fragmented in such a way that the targeted
machine is unable to reassemble it for use.
 K-12 - K-12, a term used in education and educational technology in the
United States, Canada, and possibly other countries, is a short form for the
publicly-supported school grades prior to college.

 Kbps (kilobits per second) - In the U.S.

 keitai - Keitai (pronounced k-tie) is a Japanese word meaning "portable.

 kelvin (K) - The kelvin (abbreviation K), less commonly called the degree
Kelvin (symbol, o K), is the Standard International (SI) unit of thermodynamic
temperature.

 keyboard shortcut - A keyboard shortcut is a combination of keys that,


when pressed simultaneously, perform some task that ordinarily requires use of
a mouse or other input device and may take longer to do.

 kilobit - In data communications, a kilobit is a thousand (103) bits.

 kilogram (kg) - The kilogram (abbreviation, kg) is the Standard


International (SI) System of Units unit of mass.

 kinetic energy - Kinetic energy is the energy of motion, observable as the


movement of an object, particle, or set of particles.

 kiosk - A kiosk (pronounced KEE-ahsk ) is a small, free-standing physical


structure that displays information or provides a service.

 KISS Principle (Keep It Simple, Stupid) - The KISS Principle (Keep It


Simple, Stupid) is self-descriptive and recognizes two things: 1.

 kludge - In information technology, a kludge (pronounced KLOOdzh) is an


awkward or clumsy (but at least temporarily effective) solution to a
programming or hardware design or implementation problem.

 knowledge - In information technology, knowledge is, to an enterprise or an


individual, the possession of information or the ability to quickly locate it.
 knowledge base - In general, a knowledge base is a centralized repository
for information: a public library, a database of related information about a
particular subject, and whatis.

 knowledge worker - A knowledge worker is anyone who works for a living


at the tasks of developing or using knowledge.

 Kryder's Law - Kryder's Law describes the rate at which former Seagate
CTO Mark Kryder predicted disk drive density would grow.

 L1 and L2 - L1 and L2 are levels of cache memory in a computer.

 lambda - Lambda, the 11th letter of the Greek alphabet, is the symbol for
wavelength.

 lambda (general definition) - Lambda, the 11th letter of the Greek


alphabet, is used as a symbol in optical fiber networking, in mathematics and in
computer programming.

 landscape - In printing from a computer, landscape refers to a mode in


which content is printed for reading on the longer length of the sheet of paper.

 laser - A laser is a coherent and focused beam of photons; coherent, in this


context, means that it is all one wavelength, unlike ordinary light which
showers on us in many wavelengths.

 laser diode (injection laser or diode laser) - A laser diode, also known as
an injection laser or diode laser, is a semiconductor device that produces
coherent radiation (in which the waves are all at the same frequency and phase)
in the visible or infrared (IR) spectrum when current passes through it.

 latent data (ambient data) - Latent data, also known as ambient data, is the
information in computer storage that is not referenced in file allocation tables
and is generally not viewable through the operating system (OS) or standard
applications.

 latitude and longitude - Latitude and longitude are angles that uniquely
define points on a sphere.
 layering - In computer programming, layering is the organization of
programming into separate functional components that interact in some
sequential and hierarchical way, with each layer usually having an interface
only to the layer above it and the layer below it.

 lead generation - Lead generation is the use of a computer program, a


database, the Internet, or a specialized service to obtain or receive information
for the purpose of expanding the scope of a business, increasing sales revenues,
looking for a job or for new clients, or conducting specialized research.

 lean manufacturing (lean production) - Lean manufacturing is a


methodology that focuses on minimizing waste within manufacturing systems
while simultaneously maximizing productivity.

 learning curve - Learning curves are a visualization of the difficulty


estimated in learning a subject over a period of time as well as relative progress
throughout the process of learning.

 learning management system (LMS) - A learning management system


(LMS) is a software application or web-based technology used to plan,
implement and assess a specific learning process.

 Learning Path: Electronics - So that you can give yourself a quick tutorial
on electronics, we've arranged our definitions in this Learning Path in a
sequence, with more basic building block topics placed at the beginning.

 Learning Paths - We call the idea "Learning paths.

 legacy application - A legacy application (legacy app) is a software


program that is outdated or obsolete.

 lemniscate - A lemniscate is a plane curve with a characteristic shape,


consisting of two loops that meet at a central point as shown below.

 Leonardo da Vinci's car - Da Vinci's car is a vehicle developed from the


Renaissance artist/engineer/architect's drawings.
 level of support (support level) - Level of support indicates a specific
extent of technical assistance in the total range of assistance that is provided by
an information technology product (such as a software product) to its
customers.

 leverage - In the physical sense, leverage is an assisted advantage.

 library - In computing, a library is a collection of similar objects that are


stored for occasional use - most frequently, programs in source code or object
code form, data files, scripts, templates, fonts, and physical storage units such
as tape cartridges.

 lights-out management (LOM) - Lights-out management (LOM) is the


ability for a system administrator to monitor and manage servers by remote
control.

 lightweight - In information technology, the term lightweight is sometimes


applied to a program, protocol, device, or anything that is relatively simpler or
faster or that has fewer parts than something else.

 limit - In mathematics, a limit is a value toward which an expression


converges as one or more variables approach certain values.

 linearity - Linearity is the behavior of a circuit, particularly an amplifier, in


which the output signal strength varies in direct proportion to the input signal
strength.

 linkrot - Linkrot is the tendency of hypertext links from one Web site to
another site to become useless as other sites cease to exist or remove or
reorganize their Web pages.

 Linus Torvalds - Linus Torvalds, the creator of the Linux kernel, was born
in Helsinki, Finland, on December 28, 1969.

 Linux freeware and shareware guide - Here you'll find a number of useful
tools that can be used as is or customized to create your own tools.
 load balancing - Load balancing is a technique used to distribute workloads
uniformly across servers or other compute resources to optimize network
efficiency, reliability and capacity.

 localization - Localization (sometimes shortened to "L10n") is the process


of adapting a product or service to a particular language, culture and desired
local "look-and-feel.

 lock - A lock is a mechanism for controlling access to something.

 logarithm (logarithmic) - A logarithm is an exponent used in mathematical


calculations to depict the perceived levels of variable quantities such as visible
light energy, electromagnetic field strength, and sound intensity.

 logical AND symbol - For a practical application, see logic gate.

 logical block addressing (LBA) - Logical block addressing is a technique


that allows a computer to address a hard disk larger than 528 megabytes.

 logical equivalence - Logical equivalence is a type of relationship between


two statements or sentences in propositional logic or Boolean algebra.

 logical implication - Logical implication is a type of relationship between


two statements or sentences.

 logical negation symbol - The logical negation symbol is used in Boolean


algebra to indicate that the truth value of the statement that follows is reversed.

 logical OR symbol - For a practical application, see logic gate.

 logon (or login) - In general computer usage, logon is the procedure used to
get access to an operating system or application, usually in a remote computer.

 longitudinal time code (LTC) - Longitidinal time code (LTC) is a timing


signal that is part of an audio tape recording.
 look-to-book ratio - The look-to-book ratio is a figure used in the travel
industry that shows the percentage of people who visit a travel Web site
compared to those who actually make a purchase.

 lossless and lossy compression - Lossless and lossy compression are terms
that describe whether or not, in the compression of a file, all original data can
be recovered when the file is uncompressed.

 lowerCamelCase - lowerCamelCase (part of CamelCase) is a naming


convention in which a name is formed of multiple words that are joined
together as a single word with the first letter of each of the multiple words
(except the first one) capitalized within the new word that forms the name.

 Luddite - A Luddite is a person who dislikes technology, especially


technological devices that threaten existing jobs or interfere with personal
privacy.

 lurking - Lurking is the very common practice of reading an online or e-


mail discussion without taking part in the discussion.

 LZW compression - LZW compression is the compression of a file into a


smaller file using a table-based lookup algorithm invented by Abraham Lempel,
Jacob Ziv, and Terry Welch.

 m-commerce (mobile commerce) - M-commerce (mobile commerce) is the


buying and selling of goods and services through wireless handheld devices
such as smartphones and tablets.

 M-theory - M-theory (the "M" stands for the mother of all theories, magic,
mystery, or matrix, depending on the source) is an adaptation of superstring
theory developed by Ed Witten of Princeton and Paul Townsend of Cambridge.

 Mac mini - The Mac mini from Apple is a low-cost and very compact
personal computer that runs the Mac OS X operating system and is sold without
a display, keyboard, or mouse.

 machine code (machine language) - Machine code, also known as machine


language, is the elemental language of computers.
 Macintosh - The Macintosh (often called "the Mac") was the first widely-
sold personal computer with a graphical user interface (GUI) and a mouse.

 magnetic stripe reader (magstripe reader) - A magnetic stripe reader, also


called a magstripe reader, is a hardware device that reads the information
encoded in the magnetic stripe located on the back of a plastic badge.

 marcom (or marcomm) - Marcom (sometimes spelled "marcomm") is an


abbreviation for "marketing communications.

 Master Boot Record (MBR) - The Master Boot Record (MBR) is the
information in the first sector of any hard disk or diskette that identifies how
and where an operating system is located so that it can be boot (loaded) into the
computer's main storage or random access memory.

 master/slave - In computer networking, master/slave is a model for a


communication protocol in which one device or process (known as the master)
controls one or more other devices or processes (known as slaves).

 Mathematical Symbols - This table contains mathematical symbols and


links to definitions of what they represent.

 matrix - Apart from information technology, matrix (pronounced MAY-


triks) has a number of special meanings.

 matter - Matter is a substance that has inertia and occupies physical space.

 Mbps (megabits per second) - Megabits per second (Mbps) are a unit of
measurement for bandwidth and throughput on a network.

 mebibyte (MiB) - A mebibyte (MiB) is a unit of measurement used in


computer data storage.

 medium - A medium is a third-party or element through which a message is


communicated.

 megabit - In data communications, a megabit is a million binary pulses, or


1,000,000 (that is, 106) pulses (or "bits").
 megabyte (MB) - As a measure of computer processor storage and real and
virtual memory, a megabyte (abbreviated MB) is 2 to the 20th power bytes, or
1,048,576 bytes in decimal notation.

 megabytes per second (MBps) - Megabytes per second (MBps) describes a


unit of data transfer to and from a computer storage device.

 megatransfer - On a Small Computer System Interface (SCSI) computer


bus, a megatransfer is one million data transfers.

 meme - A meme is an idea that is passed on from one human generation to


another.

 memory map - A memory map is a massive table, in effect a database, that


comprises complete information about how the memory is structured in a
computer system.

 memory read error - A memory read error is a malfunction that occurs


when data is being accessed from memory for use by a program, or when a
value read from RAM fails to match an expected value.

 Mersenne prime (or Marsenne prime) - A Mersenne (also spelled


Marsenne) prime is a specific type of prime number.

 message - (Using e-mail, a message is an individual piece of mail.

 message-driven processing - Message-driven processing is an approach


used within the client/server computing model in which a client (for example,
your Web browser) sends a service request in the form of a specially-formatted
message to a program that acts as a request broker, handling messages from
many clients intended for many different server applications.

 meta - Metadata is a description of data.

 metabolomics - Metabolomics is a term sometimes used to describe the


emerging science of measurement and analysis of metabolites, such as sugars
and fats, in the cells of organisms at specific times and under specific
conditions.
 metacharacter - A metacharacter (sometimes spelled meta character or
meta-character) is a special character in a program or data field that provides
information about other characters.

 metasyntactic variable - In programming, a metasyntactic (which derives


from meta and syntax) variable is a variable (a changeable value) that is used to
temporarily represent a function.

 meter - The meter (abbreviation, m; the British spelling is metre) is the


International System of Units (SI) unit of displacement or length.

 meter per second squared - The meter per second squared (symbolized m/s
2 or m/sec 2) is the Standard International (SI) unit of acceleration vector
magnitude.

 metered services (pay-per-use) - Metered services (also called pay-per-use)


is any type of payment structure in which a customer has access to potentially
unlimited resources but only pays for what they actually use.

 metric system - The metric system is considered almost synonymous with


the Standard International System of Units (SI) and is sometimes called the
meter-kilogram-second (MKS or mks) system.

 micro fuel cell - A micro fuel cell is a power source for electronic devices
that converts chemical energy into electrical energy.

 microdata - Microdata is a type of specification language that is embedded


within HTML content to improve machine readability, annotate elements and
analyze web pages.

 microrobot - A microrobot is a miniaturized, sophisticated machine


designed to perform a specific task or tasks repeatedly and with precision.

 microsecond - A microsecond (us or Greek letter mu plus s) is one millionth


(10 -6) of a second.

 Microsoft Remote Desktop Web Access (Microsoft RD Web Access) -


Microsoft Remote Desktop Web Access (Microsoft RD Web Access) is a
feature in Windows Server 2008 R2 and Windows Server 2012 that allows
users to access RemoteApp and Desktop Connection through the Start menu or
a Web browser.

 Microsoft TechNet - Microsoft TechNet is an online resource site that


offers IT professionals free access to learning content and discussion forums.

 Microsoft Windows Control Panel - The Microsoft Windows Control


Panel is a management tool for the Windows operating system (OS) that allows
end users to change settings and manage tasks within the OS.

 Microsoft Windows Defender - Windows Defender is Microsoft's


antimalware software.

 middleware - Middleware is software that is used to bridge the gap between


applications and other tools or databases.

 MIDI (Musical Instrument Digital Interface) - MIDI (Musical Instrument


Digital Interface) is a protocol designed for recording and playing back music
on digital synthesizers that is supported by many makes of personal computer
sound cards.

 midrange - In general, midrange refers to computers that are more powerful


and capable than personal computers but less powerful and capable than
mainframe computers.

 millennium - A millennium is a period of one thousand years.

 Millennium Simulation - The Millennium Simulation is a computer


program that uses the laws of physics and initial conditions at the time the
universe was formed to simulate the structure and the evolution of the universe,
and in particular, the evolution of black hole s, galaxies, and quasar s.

 millimeter (mm, millimetre) - A millimeter (abbreviated as mm and


sometimes spelled as millimetre) is a small unit of length/distance in the metric
system, one-thousandth of a meter (which is similar in length to a yard in the
Imperial system of measurement).
 millisecond - (This definition follows U.

 Mini-ITX 2.0 - Mini-ITX 2.0 is a motherboard designed for use in small


form factor personal computers (PCs).

 MIPS (million instructions per second) - The number of MIPS (million


instructions per second) is a general measure of computing performance and, by
implication, the amount of work a larger computer can do.

 MIS (management information systems) - MIS, or management


information systems, is the software and hardware to support critical business
applications.

 mobile device - A mobile device is essentially a handheld computer.

 mobo (motherboard) - Mobo is a short form for motherboard that is


sometimes used in Usenet newsgroups and Web forum discussions.

 modeling and simulation (M&S) - Modeling and simulation (M&S) is the


use of a physical or logical representation of a given system to generate data
and help determine decisions or make predictions about the system.

 mole per meter cubed (Avogadro constant) - The mole per meter cubed
(mol / m 3) is the International Unit of amount-of-substance concentration.

 molecule - A molecule is the smallest particle in a chemical element or


compound that has the chemical properties of that element or compound.

 monolithic - Monolithic, in information technology, means either very large


or composed all in one piece, depending on the particular context.

 Monte Carlo method or Monte Carlo analysis - The Monte Carlo method,
also called Monte Carlo analysis, is a means of statistical evaluation of
mathematical functions using random samples.

 moof monster - The moof monster is a vague and indefinable source of


trouble for users of information technology.
 Morse code - Morse code is a method of sending text messages by keying in
a series of electronic pulses, usually represented as a short pulse (called a "dot")
and a long pulse (a "dash").

 Mortimer - A Mortimer is a person who knows a lot about computers or the


Internet but would rather ridicule those who know less than share some
knowledge.

 Mosaic - Mosaic was the first widely-distributed graphical browser or


viewer for the World Wide Web.

 most significant bit or byte - The most significant bit (MSB) is the bit in a
multiple-bit binary number with the largest value.

 motherboard - A motherboard is the main printed circuit board (PCB) in a


computer.

 motive power - Motive power is a term in thermodynamics referring to the


harnessed energy or force that is used to power a mechanical device or system.

 mouse miles - "Mouse miles" is slang for user time at the computer (as in "I
travelled a lot of mouse miles this week") and also an actual measure of how
much activity a computer mouse has had over time.

 MP3 (MPEG-1 Audio Layer-3) - MP3 (MPEG-1 Audio Layer-3) is a


standard technology and format for a sound sequence into a very small file
(about one-twelfth the size of the original file) while preserving the original
level of sound quality when it is played.

 MPEG (Moving Picture Experts Group) - MPEG (pronounced EHM-


pehg), the Moving Picture Experts Group, develops standards for digital video
and digital audio compression.

 mu - The lowercase Greek letter mu is used to represent the prefix multiplier
0.

 multi-core processor - A multi-core processor is an integrated circuit (IC)


to which two or more processors have been attached for enhanced performance,
reduced power consumption, and more efficient simultaneous processing of
multiple tasks.

 MultiMediaCard (MMC) - A MultiMediaCard (MMC) is a tiny memory


card that uses flash memory to make storage portable among various devices,
such as car navigation systems, cellular phones, eBooks, PDAs, smartphones,
and digital cameras, music players, and video camcorders, and personal
computers.

 multiprocessing - Multiprocessing is the coordinated processing of


programs by more than one computer processor.

 multitasking - Multitasking, in an operating system, is allowing a user to


perform more than one computer task (such as the operation of an application
program) at a time.

 multithreading - It is easy to confuse multithreading with multitasking or


multiprogramming, which are somewhat different ideas.

 Murphy's Law - The original Murphy's Law was "If there are two or more
ways to do something, and one of those ways can result in a catastrophe, then
someone will do it.

 NAK (negative acknowledgment or not acknowledged) - NAK is an


abbreviation for negative acknowledgment or not acknowledged.

 nanobiomechanics (nanoscale biomechanics) - Nanobiomechanics, also


called nanoscale biomechanics, is a field of biomedical technology that
involves measurement of the mechanical characteristics of individual living
cells.

 nanocomputer - A nanocomputer is a computer whose physical dimensions


are microscopic.

 nanomachine (nanite) - A nanomachine, also called a nanite, is a


mechanical or electromechanical device whose dimensions are measured in
nanometers (millionths of a millimeter, or units of 10 -9 meter).
 nanometer - A nanometer is a unit of spatial measurement that is 10-9
meter, or one billionth of a meter.

 nanosecond (ns or nsec) - (This definition follows U.

 nanotransistor - A nanotransistor is a transistor - the component that acts as


an electronic signal switch or amplifier - that is near the scale of a billionth of a
meter (or nanometer) in size.

 nanotube (carbon nanotube) - A carbon nanotube (CNT) is a miniature


cylindrical carbon structure that has hexagonal graphite molecules attached at
the edges.

 native - In computer systems, native means "original" or "basic.

 native app - A native application is a software program that is developed for


use on a particular platform or device.

 nerd - A nerd is a technically bright but socially inept person.

 net - "net" is a top-level domain name.

 net metering - Net metering is a utility resource usage and payment scheme
in which a customer who generates their own power is compensated
monetarily.

 network availability - Network availability is the amount of uptime in a


network system over a specific time interval.

 network protocols - Network protocols are sets of established rules that


dictate how to format, transmit and receive data so computer network devices --
from servers and routers to endpoints -- can communicate regardless of the
differences in their underlying infrastructures, designs or standards.

 network socket - Sockets are created and used with a set of programming
requests or "function calls" sometimes called the sockets application
programming interface (API).
 neuromarketing - Neuromarketing is the study of how people's brains
respond to advertising and other brand-related messages by monitoring
brainwave activity, eye-tracking and skin response.

 neutrino - A neutrino is a sub atom ic particle with no electric charge.

 newbie - A newbie (pronounced NOO-bee) is a novice or neophyte: anyone


who is new to any particular type of endeavor, such as a sport or a technology.

 newton - The newton is the Standard International (SI) unit of force.

 nibble - In computers and digital technology, a nibble (pronounced NIHB-


uhl; sometimes spelled nybble) is four binary digits or half of an eight-bit byte.

 Nikola Tesla - Nikola Tesla was a Serbian-American scientist, electrical


engineer, and inventor whose research laid much of the groundwork for modern
electrical and communication systems.

 nil - In general use, nil (a contraction of Latin "nihil") means "nothing" or


the absence of something.

 nomadicity - Nomadicity is the tendency of a person, or group of people, to


move with relative frequency.

 non-geographic number - A non-geographic number, also called a virtual


number, is a telephone number associated with a country, but not to any single
geographic location within that country.

 norm - A norm (from norma, Latin for carpenter's square) is a model of


what should exist or be followed, or an average of what currently does exist in
some context, such as an average salary among members of a large group.

 normative - In general, normative - pertaining to a norm - has two related


meanings: (a prescriptive meaning (for example, the rules specified in a
standard or guideline), and (2) a descriptive meaning (for example, the median
salary range in an particular occupation).
 nuclear fusion - Nuclear fusion is an atomic reaction in which multiple
atoms combine to create a single, more massive atom.

 null set - In mathematical sets, the null set, also called the empty set, is the
set that does not contain anything.

 number theory (higher arithmetic) - Number theory, also known as higher


arithmetic, is a branch of mathematics concerned with the properties of integer
s, rational number s, irrational number s, and real number s.

 OA&M (operations, administration, and management) - OA&M


(operations, administration, and management) is a general term used to describe
the costs, tasks involved, or other aspects of operating, administering, and
managing something such as a computer network.

 object code - Source code and object code refer to the "before" and "after"
versions of a computer program that is compiled (see compiler) before it is
ready to run in a computer.

 object ID (OID) - An object identifier (OID) is an unambiguous, long-term


name for any type of object or entity.

 obliquity - In systems engineering, obliquity is a theory that proposes the


best way to achieve a goal when you are working with a complex system is to
take an indirect approach instead of a direct one.

 Ockham's razor (Occam's razor) - Ockham's razor (also spelled Occam's


razor, pronounced AHK-uhmz RAY-zuhr) is the idea that, in trying to
understand something, getting unnecessary information out of the way is the
fastest way to the truth or to the best explanation.

 octal - Octal (pronounced AHK-tuhl, from Latin octo or "eight") is a term


that describes a base-8 number system.

 octet - In computers, an octet (from the Latin octo or "eight") is a sequence


of eight bit s.
 OEM (original equipment manufacturer) - OEM, or original equipment
manufacturer, is a broad term that describes a web of relationships among IT
hardware vendors, hardware component makers, software vendors and channel
partners such as resellers and distributors.

 office cubicle - An idea that is now over 40 years old, the office cubicle is a
somewhat partitioned space for one or several workers in what is otherwise an
unpartitioned and open building space for offices.

 offline - Offline is the condition of being capable of but currently not


connected to a network of computers or other devices.

 offshore outsourcing - Offshore outsourcing, a type of business process


outsourcing (BPO), is the exporting of IT-related work from the United States
and other developed countries to areas of the world where there is both political
stability and lower labor costs or tax savings.

 ohnosecond - An ohnosecond is that very short moment in time during


which you realize that you have pressed the wrong key and deleted hours, days,
or weeks of work.

 OK - OK (pronounced oh-KAY and occasionally spelled okay) is a short


way to say "I agree.

 on the fly - In relation to computer technology, "on the fly" describes


activities that develop or occur dynamically rather than as the result of
something that is statically predefined.

 on-demand computing - On-demand (OD) computing is an increasingly


popular enterprise model in which computing resources are made available to
the user as needed.

 one-banana problem - A one-banana problem is an easily resolved issue.

 online - Online is the condition of being connected to a network of


computers or other devices.
 onshore outsourcing (domestic outsourcing) - Onshore outsourcing (also
called domestic outsourcing) is the obtaining of services from someone outside
a company but within the same country.

 ontology - In general, ontology (pronounced ahn-TAH-luh-djee) is the study


or concern about what kinds of things exist - what entities there are in the
universe.

 ooblick - According to Eric Raymond, compiler of The New Hacker's


Dictionary, "ooblick" derives from the Dr.

 open - In information technology, a product or system is described as open


when its workings are exposed to the public and capable of being modified or
improved by anyone.

 open system - In a computing context, an open system is an open source


operating system, typically composed of coordinated modular components from
a number of sources and not reliant upon any proprietary elements.

 operand - In computers, an operand is the part of a computer instruction that


specifies data that is to be operating on or manipulated and, by extension, the
data itself.

 operation - An operation, in mathematics and computer science, is an action


that is carried out to accomplish a given task.

 operations research (OR) - Operations research (OR) is an analytical


method of problem-solving and decision-making that is useful in the
management of organizations.

 order of magnitude - An order of magnitude is an exponential change of


plus-or-minus 1 in the value of a quantity or unit.

 Our Favorite Technology Quotations - These are some of our favorite


quotations about computers, the Internet, and technology in general.

 out of the box - "Out of the box" is an expression that describes


nonconformal, creative thinking.
 outsourcing - Outsourcing is a business practice in which a company hires
another company or an individual to perform tasks, handle operations or
provide services that are either usually executed or had previously been done by
the company's own employees.

 overhead - In business accounting, overhead is general operating expenses,


including such items as heat and electricity for the premises, that have no direct
relationship to the production or selling of a company's goods and services.

 packet-switched - Packet-switched describes the type of network in which


relatively small units of data called packets are routed through a network based
on the destination address contained within each packet.

 page - On the World Wide Web, a page is a file notated with the Hypertext
Markup Language (HTML).

 pagefile - In storage, a pagefile is a reserved portion of a hard disk that is


used as an extension of random access memory (RAM) for data in RAM that
hasn't been used recently.

 paper and binding sizes - Standard weights and measures provided by S.

 para-site - A para-site is a Web site that frames other Web sites or pages
within its own site.

 paradigm - A paradigm (pronounced PEHR-uh-daim, from Greek


paradeiknyai - to show side by side) is a pattern or an example of something.

 paradox - A paradox is a statement or concept that contains conflicting


ideas.

 parallel - In the context of the Internet and computing, parallel means more
than one event happening at a time.

 parallel processing - Parallel processing is a method in computing of


running two or more processors (CPUs) to handle separate parts of an overall
task.
 parallel processing software - Parallel processing software manages the
execution of a program on parallel processing hardware with the objectives of
obtaining unlimited scalability (being able to handle an increasing number of
interactions at the same time) and reducing execution time.

 PARC (Palo Alto Research Center) - PARC is Xerox's Palo Alto Research
Center, located in Palo Alto, California, in the high-tech area that has become
known as Silicon Valley.

 parity - Parity is a method of detecting errors in data transmissions between


computers, while parity bit and parity checking are used in RAID technology to
guard against data loss.

 PC Card - A PC Card (previously known as a PCMCIA card) is a credit


card-size memory or I/O device that fits into a personal computer, usually a
notebook or laptop computer.

 PC philanthropy - PC philanthropy is sharing some of the unused resources


of your personal computer, especially unused computer cycles, to benefit a
social cause.

 Pepys' weblog - The famous diary that Samuel Pepys (pronounced PEEPS),
once the head of England's Navy, kept during the years 1660-1669 is being
made available online in the form of a weblog.

 performance - Performance seems to have two meanings: The speed at


which a computer operates, either theoretically (for example, using a formula
for calculating Mtops - millions of theoretical instructions per second) or by
counting operations or instructions performed (for example, (MIPS) - millions
of instructions per second) during a benchmark test.

 personal operating space (POS) - A personal operating space (POS) is a


roughly spherical region that surrounds a portable or handheld digital wireless
device operated by a person.

 personality profile - A personality profile is a knowledge management tool


used to provide an evaluation of an employee's personal attributes, values and
life skills in an effort to maximize his or her job performance and contribution
to the company.

 pervasive computing (ubiquitous computing) - Pervasive computing, also


called ubiquitous computing, is the growing trend of embedding computational
capability (generally in the form of microprocessors) into everyday objects to
make them effectively communicate and perform useful tasks in a way that
minimizes the end user's need to interact with computers as computers.

 petaflop - A petaflop is a measure of a computer's processing speed and can


be expressed as a quadrillion (thousand trillion) floating point operations per
second (FLOPS).

 pharming - Pharming is a scamming practice in which malicious code is


installed on a personal computer or server, misdirecting users to fraudulent
Web sites without their knowledge or consent.

 phase-change memory (PCM) - Phase-change memory (PCM) is a form of


computer RAM (random-access memory) that stores data by altering the state
of the matter from which the device is fabricated.

 phenomenon - A phenomenon, in a scientific context, is something that is


observed to occur or to exist.

 photometric stereo - Photometric stereo is a computer vision method of


analyzing and detailing the contour and reflectivity of a surface in 3D (three-
dimensional) space.

 photonic ink (P-Ink) - Photonic ink (P-Ink) is a substance that can change
color electronically.

 photonics - Photonics is an area of study that involves the use of radiant


energy (such as light), whose fundamental element is the photon.

 physical security - Physical security is the protection of people and systems


from damage or loss due to physical events such as fire, flood, disasters, crimes
or accidents.
 pi - Pi is a numerical constant that represents the ratio of a circle's
circumference to its diameter on a flat plane surface.

 picosecond - A picosecond is one trillionth (10 -12) of a second, or one


millionth of a microsecond.

 pictograph - In graph theory, a pictograph is a graph that shows numerical


information by using picture symbols or icons to represent data sets.

 pie graph (or pie chart) - A pie graph (or pie chart) is a specialized graph
used in statistics.

 pin or PIN - A pin is a pronged contact as part of a signal interface in a


computer or other communications device.

 ping strangeness - Ping strangeness is a term used in troubleshooting to


describe the incidence of an unusual pattern of ICMP ECHO_REQUEST
packets being sent to a specific network node or an unusual number of error
messages returning.

 pipelining - In computers, a pipeline is the continuous and somewhat


overlapped movement of instruction to the processor or in the arithmetic steps
taken by the processor to perform an instruction.

 pixel - The pixel (a word invented from "picture element") is the basic unit
of programmable color on a computer display or in a computer image.

 pixilated - Pixilated, an adjective derived from pixie (a fairy elf), describes


someone who is whimsical or bemused, slightly drunk (tipsy), or, according to
Webster's, "somewhat unbalanced mentally.

 placeshifting - Placeshifting (or place shifting) is a technology that allows


anyone with a broadband Internet connection to have video streams from their
home television set or personal video recorder (PVR) forwarded for viewing at
any location where they have a computer display and a high-speed Internet
connection.
 platform - A computer platform is an underlying computer system on which
application programs can run, or, in general, any base of technologies on which
other technologies or processes are built.

 plesiochronous - Plesiochronous (pronounced plee-see-AH-krun-us, from


Greek plesos, meaning close, and chronos, meaning time) is an adjective that
describes operations that are almost, but not quite, in synchronization - in other
words, almost synchronous.

 plug-in - Plug-in applications are programs that can easily be installed and
used as part of your Web browser.

 polar coordinates - Polar coordinates provide a method of rendering graphs


and indicating the positions of points on a two-dimensional (2D) surface.

 Polish notation (prefix notation) - Polish notation, also known as prefix


notation, is a symbolic logic invented by Polish mathematician Jan Lukasiewicz
in the 1920's.

 polled interrupt - In a computer, a polled interrupt is a specific type of I/O


interrupt that notifies the part of the computer containing the I/O interface that a
device is ready to be read or otherwise handled but does not indicate which
device.

 polynomial - A polynomial is a mathematical expression consisting of a


sum of terms, each term including a variable or variables raised to a power and
multiplied by a coefficient.

 portal - Portal is a term, generally synonymous with gateway, for a World


Wide Web site that is or proposes to be a major starting site for users when they
get connected to the Web or that users tend to visit as an anchor site.

 portrait - In computer printing, portrait is a mode in which the printer


orients content for reading across the shorter length (the width) of the sheet of
paper.

 positional assembly - Positional assembly is a technique that has been


suggested as a means to build objects, devices, and systems on a molecular
scale using automated processes in which the components that carry out the
construction process would follow programmed paths.

 POST (Power-On Self-Test) - When power is turned on, POST (Power-On


Self-Test) is the diagnostic testing sequence that a computer's basic input/output
system (or "starting program") runs to determine if the computer keyboard,
random access memory, disk drives, and other hardware are working correctly.

 pounds per square inch (PSI) - PSI is commonly used to measure the
pressure of gasses (pneumatic pressure) or liquids (hydraulic pressure).

 power user - A power user, also called a super user, is someone whose
computer skills are better than those of an organization's average end user.

 predictive technology - Predictive technology is a body of tools capable of


discovering and analyzing patterns in data so that past behavior can be used to
forecast likely future behavior.

 printed circuit board (PCB) - A printed circuit board (PCB) is the board
base for physically supporting and wiring surface-mounted and socketed
components in most electronics.

 probability - Probability is a branch of mathematics that deals with


calculating the likelihood of a given event's occurrence, which is expressed as a
number between 1 and 0.

 problem program - Now seldom used, the term problem program is used to
distinguish a computer program that directly supports a user application from
an operating system, a utility, or any other underlying support programming.

 product - In information technology, a product is something (for example, a


software application) that is created and then made available to customers,
usually with a distinct name or order number.

 program - In computing, a program is a specific set of ordered operations


for a computer to perform.
 project management - Project management is the discipline of using
established principles, procedures and policies to successfully guide a project
from conception through completion.

 project planning - Project planning is a discipline for stating how to


complete a project within a certain timeframe, usually with defined stages, and
with designated resources.

 propagation delay - Propagation delay, symbolized tpd, is the time required


for a digital signal to travel from the input(s) of a logic gate to the output.

 propeller head (or propellor head, prop head, prophead) - A propeller


head (also spelled propellor head, and sometimes shortened to prop head or
prophead) is jargon for someone who is exceptionally, perhaps weirdly bright
or knowledgeable, especially in some technical field.

 proper subset symbol - The proper subset symbol indicates a specific


relationship between two set s.

 proportionality - In mathematics, proportionality indicates that two


quantities or variables are related in a linear manner.

 prototype - In software development, a prototype is a rudimentary working


model of a product or information system, usually built for demonstration
purposes or as part of the development process.

 pseudo-random number generator (PRNG) - A pseudo-random number


generator (PRNG) is a program written for, and used in, probability and
statistics applications when large quantities of random digits are needed.

 public domain software - Programs that are uncopyrighted because their


authors intended to share them with everyone else are in the public domain.

 public sector - The public sector is the segment of an economic system that
is controlled by government; it contrasts with the private sector, which is run by
private citizens.
 pulse amplitude modulation (PAM) - Pulse amplitude modulation (PAM)
is the transmission of data by varying the amplitudes (voltage or power levels)
of the individual pulses in a regularly timed sequence of electrical or
electromagnetic pulses.

 Q format - Q (number) format is a fixed-point method of coding fractional


and whole integers for processing by a computer’s CPU or a digital signal
processor (DSP).

 quality - In an information technology product or service, quality is


sometimes defined as "meeting the requirements of the customer.

 quantum - Quantum is the Latin word for amount and, in modern


understanding, means the smallest possible discrete unit of any physical
property such as energy or matter.

 quantum computer - A quantum computer is a machine, as-yet


hypothetical, that performs calculations based on the behavior of particles at the
sub-atomic level.

 quantum computing - Quantum computing is the area of study focused on


developing computer technology based on the principles of quantum theory,
which explains the nature and behavior of energy and matter on the quantum
(atomic and subatomic) level.

 quantum internet - The quantum internet is a theoretical system of


interconnected quantum computers that uses quantum signals to send
information rather than radio waves.

 quantum microphone - A quantum microphone is an extremely device that


detects the smallest particles of sound, such as packets of vibrational energy
called phonons.

 quantum supremacy - Quantum supremacy is the experimental


demonstration of a quantum computer's dominance and advantage over classic
computers by performing calculations that were previously impossible at
unmatched speeds.
 quantum theory - Quantum theory is the theoretical basis of modern
physics explaining the nature and behavior of matter and energy on the atomic
and subatomic level, sometimes called quantum mechanics or quantum physics.

 quark - A quark is one of two currently recognized groups of fundamental


particles, which are subatomic, indivisible (at least as far as we know today)
particles that represent the smallest known units of matter.

 qubit - A qubit is a quantum bit, the counterpart in quantum computing to


the binary digit or bit of classical computing.

 queries-per-second (QPS) - Queries-per-second (QPS) (or the query-per-


second rate) is a measure of how much traffic a particular query server is
handling at a given time.

 queue - In general, a queue is a line of people or things waiting to be


handled, usually in sequential order starting at the beginning or top of the line
or sequence.

 queueing theory - In computer science, queueing theory is the study of


queues as a technique for managing processes and objects in a computer.

 quiet zone - In barcode technology, a quiet zone is the blank margin on


either side of a bar code that's used to tell the barcode reader where a barcode's
symbology starts and stops.

 Quiz: Talkin' tech turkey - A quiz full of tasty tech terms.

 Quiz: Who Done IT? A Murder Mystery - How to take the quiz: - After
reading the question, click on the answer that you think is correct.

 radian - The radian is the Standard International (SI) unit of plane angular
measure.

 radian per second (rad/s or rad/sec) - The radian per second (symbolized
rad/s or rad/sec) is the Standard International (SI) unit of angular (rotational)
speed.
 radian per second squared - The radian per second squared is the unit of
angular (rotational) acceleration magnitude in the International System of Units
(SI).

 random numbers - Random numbers are numbers that occur in a sequence


such that two conditions are met: ( the values are uniformly distributed over a
defined interval or set, and (2) it is impossible to predict future values based on
past or present ones.

 raster graphics - Raster graphics are digital images created or captured (for
example, by scanning in a photo) as a set of samples of a given space.

 ratio - In general, a ratio is a way of concisely showing the relationship


between two quantities of something.

 rational number - A rational number is a number determined by the ratio of


some integer p to some nonzero natural number q.

 raw data (source data or atomic data) - Raw data (sometimes called
source data or atomic data) is data that has not been processed for meaningful
use.

 read-only - Read-only is a file attribute which only allows a user to view a


file, restricting any writing to the file.

 read-only memory (ROM) - Read-only memory, or ROM, is a type of


computer storage containing non-volatile, permanent data that, normally, can
only be read, not written to.

 real number - A real number is any element of the set R, which is the union
of the set of rational numbers and the set of irrational numbers.

 real time - Real time is a level of computer responsiveness that a user senses
as sufficiently immediate or that enables the computer to keep up with some
external process (for example, to present visualizations of the weather as it
constantly changes).
 real-time monitoring - Real-time monitoring is the streaming of
continuously updated zero to low latency information.

 Rear Admiral Grace Murray Hopper - Grace Murray Hopper (1906-


1992) was a pioneer in computer science.

 reboot (warm boot, cold boot) - To reboot is to restart a computer and


reload the operating system.

 refresh - In a computer display, to refresh is to redraw the image


information from memory.

 reliability - Reliability is an attribute of any computer-related component


(software, or hardware, or a network, for example) that consistently performs
according to its specifications.

 reload - In computers, to reload is to start a program over again, usually


because it has crashed or because it has begun to display aberrant behavior.

 remote-control software - Remote-control software is programming in a


central or server computer that is used to control other computers (or their
users) at a distance, either under the control of an administrator or at the request
of the user.

 replicator - A replicator is an object or organism that can make copies of


itself.

 request for quotation (RFQ) - A request for quotation (RFQ) is a


document that an organization submits to one or more potential suppliers
eliciting quotations for a product or service.

 reseller - In information technology, a reseller is a company that typically


purchases IT products or services from a product manufacturer, distributor or
service provider and then markets them to customers.

 resolution - In computers, resolution is the number of pixels (individual


points of color) contained on a display monitor, expressed in terms of the
number of pixels on the horizontal axis and the number on the vertical axis.
 response time - According to the IBM Dictionary of Computing (which
cites International Organization for Standardization Information Technology
Vocabulary as the source), response time is: The elapsed time between the end
of an inquiry or demand on a computer system and the beginning of a response;
for example, the length of the time between an indication of the end of an
inquiry and the display of the first character of the response at a user terminal.

 return merchandise authorization (RMA) - An RMA (return merchandise


authorization) is a numbered authorization provided by a mail-order merchant
to permit the return of a product.

 reverse engineering - Reverse engineering is taking apart an object to see


how it works in order to duplicate or enhance the object.

 RGB (red, green, and blue) - RGB (red, green, and blue) refers to a system
for representing the colors to be used on a computer display.

 RISC (reduced instruction set computer) - RISC (reduced instruction set


computer) is a microprocessor that is designed to perform a smaller number of
types of computer instructions so that it can operate at a higher speed (perform
more millions of instructions per second, or MIPS).

 Riven - Riven is the sequel to Myst, the best-selling puzzle-and-exploration


computer game on CD-ROM from Broderbund.

 Robokoneko (robot kitten) - The Robokoneko was a proposed robot kitten


(robot + Japanese ko for "child" + neko for "cat") that was intended to have a
remote computer brain containing "neural net" modules that could evolve their
intelligence based on experience and prearranged rules.

 robot - A robot is a machine designed to execute one or more tasks


automatically with speed and precision.

 robotics - Robotics is a branch of engineering that involves the conception,


design, manufacture, and operation of robots.
 RoC (restart on crash) - RoC (restart on crash) is a functionality built into
Windows that automatically restarts an operating system or application when it
hangs, freezes or crashes.

 rogue - In general, a rogue is someone who strays from the accepted path, is
mischievous, or is a cheat.

 ROI (return on investment) - For a given use of money in an enterprise,


the ROI (return on investment) is how much profit or cost saving is realized as
a result.

 ROM emulation - ROM emulation is the process of copying data from a


ROM (read-only memory) chip to a storage medium such as a hard disk or flash
memory.

 root cause analysis - Root cause analysis is a way to determine how a


problematic event occurred by examining why, how and when the casual
factors happened after the fact.

 rotoscoping - For either broadcast video or Internet streaming video,


rotoscoping is the rotated projection of a sequence of usually photographed
action image frames so that the artist can trace from the frame or create an
image to superimpose on it.

 run book - In a computer system or network, a run book is a written set of


procedures for the routine and exceptional operation of the system or network
by an administrator or operator.

 runt - In networks, a runt is a packet that is too small.

 runtime system - A runtime system is an engine that translates a given


programming language or languages into machine code.

 S-Video (Super-Video, Y/C Video, component video) - S-Video (Super-


Video, sometimes referred to as Y/C Video, or component video) is a video
signal transmission in which the luminance signal and the chrominance signal
are transmitted separately to achieve superior picture clarity.
 sample rate - In developing an audio sound for computers or
telecommunication, the sample rate is the number of samples of a sound that
are taken per second to represent the event digitally.

 Sarbanes-Oxley Act (SOX) - The Sarbanes-Oxley Act of 2002 is a federal


law that established sweeping auditing and financial regulations for public
companies.

 satellite constellation (satellite swarm) - A satellite constellation, also


called a satellite swarm, is a system of satellites that work together to achieve a
single purpose.

 scalability - It is the ability of a computer application or product (hardware


or software) to continue to function well as it (or its context) is changed in size
or volume in order to meet a user need.

 Schrodinger's cat - Schrödinger's cat is a famous hypothetical experiment


designed to point out a flaw in the Copenhagen interpretation of superposition
as it applies to quantum theory.

 scientific method - Scientific method is a logical approach to seeking


knowledge that involves forming and testing a hypothesis.

 scientific notation (power-of-10 notation) - Scientific notation, also called


power-of-10 notation, is a method of writing extremely large and small
numbers.

 search neutrality - Search neutrality is the direct conducting of transparent


search processes that do not discriminate between users or favor specific sites.

 search operator - A search operator (sometimes referred to as a search


parameter) is a character or string of characters used in a search engine query to
narrow the focus of the search.

 searching - On the Internet, searching is just trying to find the information


you need.
 seat - In a networked computer system, a seat is a workstation that can be
operated by one user at a time.

 seat management - Seat management is a method of coordinating all the


workstations in an enterprise network by overseeing the installation, operation,
and maintenance of hardware and software at each workstation.

 second (s or sec) - The second (abbreviation,s or sec) is the Standard


International (SI) unit of time.

 segmented memory - Segmented memory is a system of addressing


computer memory, which may be physical or virtual and may be operating in
real or protected mode.

 self-assembly - Self-assembly is a branch of nanotechnology in which


objects, devices, and systems form structures without external prodding.

 self-healing - In information technology, self-healing describes any device


or system that has the ability to perceive that it is not operating correctly and,
without human intervention, make the necessary adjustments to restore itself to
normal operation.

 Self-Monitoring Analysis & Reporting Technology (S.M.A.R.T.) - Self-


Monitoring Analysis and Reporting Technology (S.

 self-replication - In nanotechnology, self-replication is a process in which


devices whose diameters are of atomic scale, on the order of nanometers, create
copies of themselves.

 sensor - A sensor is a device that detects and responds to some type of input
from the physical environment.

 sequential logic - Sequential logic is a form of binary circuit design that


employs one or more inputs and one or more outputs, whose states are related
by defined rules that depend, in part, on previous states.

 serendipity - In general, serendipity is the act of finding something valuable


or delightful when you are not looking for it.
 serial - Serial means one event at a time.

 serial presence detect (SPD) - When a computer is booted (started), serial


presence detect (SPD) is information stored in anelectrically erasable
programmable read-only memory (EEPROM) chip on a synchronous dynamic
random access memory (SDRAM) memory module that tells thebasic
input/output system (BIOS) the module's size, data width, speed, and voltage.

 server - A server is a computer program or device that provides a service to


another computer program and its user, also known as the client.

 server stack - A server stack is the collection of software that forms the
operational infrastructure on a given machine.

 server virtualization - Server virtualization is a process that creates and


abstracts multiple virtual instances on a single server.

 server-side include (SSI) - A server-side include is a variable value (for


example, a file "Last modified" date) that a server can include in an HTML file
before it sends it to the requestor.

 service-level management - Service-level management is the monitoring


and management of the quality of service(QoS) of an entity's key performance
indicators(KPIs).

 service-oriented architecture (SOA) - Service-oriented architecture (SOA)


is a software development model that allows services to communicate across
different platforms and languages to form applications.

 service-oriented integration (SOI) - SOI is also an abbreviation for


Silicon-On-Insulator.

 service-oriented management (SOM) - Service-oriented management


(SOM) is the operational management of service delivery within a service-
oriented architecture (SOA).
 session - In telecommunication, a session is a series of interactions between
two communication end points that occur during the span of a single
connection.

 set - A set is a group or collection of objects or numbers, considered as an


entity unto itself.

 Shannon's Law - Shannon's Law, formulated by Claude Shannon, a


mathematician who helped build the foundations for the modern computer, is a
statement in information theory that expresses the maximum possible data
speed that can be obtained in a data channel.

 shebang (#!) - Among UNIX shell (user interface) users, a shebang is a term
for the "#!" characters that must begin the first line of a script.

 shift register - A shift register is a digital memory circuit found in


calculators, computers, and data-processing systems.

 shovelware - Shovelware is content taken from any source and put on the
Web as fast as possible with little regard for appearance and usability.

 Siebel - Siebel Systems is a prominent vendor of interoperable e-business


software.

 significant figures - The term significant figures refers to the number of


important single digits (0 through 9 inclusive) in the coefficient of an
expression in scientific notation.

 silicon (Si) - Silicon is a chemical element (its symbol in chemical formula


expressions is "Si") that is present in sand and glass and which is the best
known semiconductor material in electronic components.

 Silicon Alley - Silicon Alley is the growing community of Internet and


computer-oriented businesses, mainly startup companies, in the New York
metropolitan area, particularly Manhattan's downtown.
 simplicity - In information technology, simplicity is a quality that is
frequently sought by both users and technologists, although, as users frequently
attest, it is not always found.

 single-system image (SSI) - Single-system image (SSI) is the idea that the
resources provided by cluster computing or in any system which aggregates
resources should present a single interface to the user.

 site map - A site map is a visual or textually organized model of a Web


site's content that allows the users to navigate through the site to find the
information they are looking for, just as a traditional geographical map helps
people find places they are looking for in the real world.

 six degrees of separation - Six degrees of separation is the theory that any
person on the planet can be connected to any other person on the planet through
a chain of acquaintances that has no more than five intermediaries.

 Six Sigma - Six Sigma is an approach to data-driven management that seeks


to improve quality by measuring how many defects there are in a process and
systematically eliminating them until there are as close to zero defects as
possible.

 SKU (stockkeeping unit) - SKU (stockkeeping unit, sometimes spelled


"Sku") is an identification, usually alphanumeric, of a particular product that
allows it to be tracked for inventory purposes.

 SkunkWorks project (Skunk Works) - A SkunkWorks project (also


known as Skunk Works) is an innovative undertaking, involving a small group
of people, that is outside the normal research and development channels within
an organization.

 slack space (file slack space) - Slack space is the difference between its
logical and physical size.

 Slashdot Effect - The Slashdot Effect is the sudden, relatively temporary


surge in traffic to a Web site that occurs when a high-traffic Web site or other
source posts a story that refers visitors to another Web site.
 sleep mode - Sleep mode, sometimes called standby or suspend mode, is a
power-sparing state that a computer can enter when not in use.

 slice and dice - To slice and dice is to break a body of information down
into smaller parts or to examine it from different viewpoints so that you can
understand it better.

 slow-scan television (SSTV) - Slow-scan television (SSTV) is a mode of


video communications in which a sequence of fixed images is sent and received
at intervals of several seconds.

 slowness movement - The slowness movement is a grassroots reaction to


the hectic pace, overwork, and lack of leisure typical of modern life.

 Small Office Home Office (SOHO) - In information technology, SOHO is


a term for the small office or home office environment and business culture.

 smart machines - A smart machine is a device embedded with machine-to-


machine (M2M) and/or cognitive computing technologies such as artificial
intelligence (AI), machine learning or deep learning, all of which it uses to
reason, problem-solve, make decisions and even, ultimately, take action.

 SMB (small and medium-sized business or small and midsized


business) - SMB is an abbreviation for small and medium-sized business,
sometimes seen as small and midsized business.

 smiley - In Internet e-mail messages and Web discussions, a smiley is a


sequence of typed characters that graphically produces the sideways image of
someone smiling, like this::-)The first use of a smiley is currently attributed to
Scott E.

 SNAFU (situation normal, all f***ed up) - SNAFU is an acronym for


"situation normal, all f***ed up.

 snap-in - Snap-in, in general, refers to an object that can be attached to


another object and that will then function as part of the whole.
 sneakernet - Sneakernet is a jargon term for the method of transmitting
electronic information by personally carrying it from one place to another on
floppy disk or other removable medium.

 Sniglet - Words that should be in the dictionary (but aren't) - A sniglet is


a word that should be in the dictionary but isn't.

 snoopware - In mobile computing, snoopware is malware that is capable of


monitoring activity on a smartphone.

 soft copy - A soft copy (sometimes spelled "softcopy") is an electronic copy


of some type of data, such as a file viewed on a computer's display or
transmitted as an e-mail attachment.

 soft error - A soft error is an issue that causes a temporary condition in


RAM that alters stored data in an unintended way.

 soft reset - A soft reset is a restart of a device, such as a smartphone, tablet,


laptop or personal computer (PC).

 software - Software is a set of instructions, data or programs used to operate


computers and execute specific tasks.

 software package - A software package is an assemblage of files and


information about those files.

 sound card - A sound card (also referred to as an audio card) is a peripheral


device that attaches to the ISA or PCI slot on a motherboard to enable the
computer to input, process, and deliver sound.

 sound wave - A sound wave is the pattern of disturbance caused by the


movement of energy traveling through a medium (such as air, water, or any
other liquid or solid matter) as it propagates away from the source of the sound.

 space - In mathematics, space is an unbounded continuum (unbroken set of


points) in which exactly three numerical coordinates are necessary to uniquely
define the location of any particular point.
 spaghetti code - Spaghetti code is a derogatory term for computer
programming that is unnecessarily convoluted, and particularly programming
code that uses frequent branching from one section of code to another.

 spam for life (S4L) - S4L is an online chat acronyms for "spam for life," the
possible result of subscribing to an online service or becoming anyone's
customer or client.

 spamdexing - Spamdexing, coined from spam and index, is the practice of


including information in a Web page that causes search engines to index it in
some way that produces results that satisfy the spamdexer but usually
dissatisify the search engine providers and users.

 spectrum analyzer - A spectrum analyzer is a device that displays signal


amplitude (strength) as it varies by signal frequency.

 speech synthesis - Speech synthesis is the computer-generated simulation of


human speech.

 speed of gravity - The speed of gravity is the rate, in meters per second or
other standard units, at which gravitational fields or effects propagate through
space.

 spin (angular momentum) - Spin, in physics, is the velocity of rotation of


something around a particular axis.

 splash page (splash screen) - A splash page (or splash screen) is: An initial
Web site page used to capture the user's attention for a short time as a
promotion or lead-in to the site home page or to tell the user what kind of
browser and other software they need to view the site.

 spod - On the Internet in the United Kingdom, a spod is a person who


frequents chat rooms or discussion groups a little too frequently.

 square root symbol - The square root symbol () is used to indicate the
quantity or quantities which, when multiplied by itself or themselves, results in
the quantity encompassed by the symbol.
 Squid proxy server - Squid is a Unix-based proxy server that caches
Internet content closer to a requestor than its original point of origin.

 SRAM (static random access memory) - SRAM (static RAM) is random


access memory (RAM) that retains data bits in its memory as long as power is
being supplied.

 stack - TCP/IP is frequently referred to as a "stack.

 standard - A standard is a generally agreed-upon technology, method or


format for a given application.

 standards organization - A standards organization, sometimes referred to


as a standards body, is an organization with authority to endorse official
standards for given applications.

 standby power - Standby power is electrical power that a device consumes


when not in present use, but plugged in to a source of power and ready to be
used.

 state machine - In general, a state machine is any device that stores the
status of something at a given time and can operate on input to change the
status and/or cause an action or output to take place for any given change.

 statistical mean, median, mode and range - Calculating the mean, median,
mode and range of a set of numbers allows you to track changes over time and
set acceptable ranges and variance.

 STEM (science, technology, engineering, and mathematics) - STEM is an


educational program developed to prepare primary and secondary students for
college and graduate study in the fields of science, technology, engineering, and
mathematics (STEM).

 steradian - The steradian (symbolized sr) is the Standard International (SI)


unit of solid angular measure.
 stereoscopy (stereoscopic imaging) - Stereoscopy, sometimes called
stereoscopic imaging, is a technique used to enable a three-dimensional effect,
adding an illusion of depth to a flat image.

 stickiness - Stickiness is anything about a Web site that encourages a visitor


to stay longer.

 storage consolidation - Storage consolidation, also called storage


convergence is a method of centralizing data storage among multiple servers.

 storage filer - A storage filer is a file server designed and programmed for
high-volume data storage, backup, and archiving.

 storage medium (storage media) - In computers, a storage medium is any


technology -- including devices and materials -- used to place, keep and retrieve
electronic data.

 storage utilization - Storage utilization is a measure of how well the


available data storage space in an enterprise is used.

 storage volume - A definition of volume must include a comparison of the


unit of data storage to a partition, as well as insight into logical volume
management, a form of storage virtualization.

 straw man - In general, a straw man is an object, document, person, or


argument that temporarily stands in for and is intended to be "knocked down"
by something more substantial.

 streaming media - Streaming media is video or audio content sent in


compressed form over the Internet and played immediately, rather than being
saved to the hard drive.

 subset symbol - The subset symbol indicates a specific relationship between


two sets.

 suffix - A suffix is something added at the end of a word that conditions its
usage or meaning.
 summation (sum) - A summation, also called a sum, is the result of
arithmetically adding numbers or quantities.

 Sun Microsystems - Sun Microsystems (often just called "Sun"), the


leading company in computers used as Web servers, also makes servers
designed for use as engineering workstations, data storage products, and related
software.

 supercomputer - The first commercially successful supercomputer, the


CDC (Control Data Corporation) 6600 was designed by Seymour Cray.

 supercomputer center - In general, a supercomputer center is a site with a


supercomputer that is shared by a number of other sites, usually research sites.

 superposition - Superposition is the ability of a quantum system to be in


multiple states at the same time until it is measured.

 superstring theory (string theory, Theory of Everything) - Superstring


theory - known less formally as "string theory" - is sometimes called the Theory
of Everything (TOE), because it is a unifying physics theory that reconciles the
differences between quantum theory and the theory of relativity to explain the
nature of all known forces and matter.

 support - In information technology, support refers to functionality that is


provided between or among products, programs, devices, modes, or
accessories.

 surd - A surd is a number or quantity that cannot be expressed as the ratio of


two integer s.

 surf - In using the World Wide Web, to surf is to either: Explore a sequence
of Web sites in a random, unplanned way, or2) Simply use the Web to look for
something in a questing way.

 symbology - A symbology is a protocol for arranging the bars and spaces


that make up a particular kind of bar code.

 symmetric communications - Compare asymmetric communications.


 synchronicity - Synchronicity is a concept developed by psychologist Carl
Jung to describe a perceived meaningful coincidence.

 synchronous - In general, synchronous (pronounced SIHN-kro-nuhs, from


Greek syn-, meaning "with," and chronos, meaning "time") is an adjective
describing objects or events that are coordinated in time.

 system - A system is a collection of elements or components that are


organized for a common purpose.

 system administrator (sysadmin) - In information technology (IT), a


system administrator (sysadmin) is a person who supports a multi-user
computing environment and ensures continuous, optimal performance of IT
services and support systems.

 system software - System software is a type of computer program that is


designed to run a computer’s hardware and application programs.

 systems thinking - Systems thinking is a holistic approach to analysis that


focuses on the way that a system's constituent parts interrelate and how systems
work over time and within the context of larger systems.

 table - In computer programming, a table is a data structure used to organize


information, just as it is on paper.

 Table of Physical Constants - Quick look-up chart.

 talk time - In customer relationship management (CRM), talk time is the


amount of time a call center agent spends with a caller during a transaction.

 Tamagotchi - A Tamagotchi (pronounced "tom-ah-GOT-chee") is a


relatively inexpensive toy containing a small liquid crystal display display, a
few touch-sensitive user controls, and a program in which the image of a small
creature is visible.

 taxonomy - Taxonomy is the science of classification according to a


predetermined system, with the resulting catalog being used to provide a
conceptual framework for discussion or analysis.
 TCO (total cost of ownership) - Total cost of ownership is a calculation to
assess direct and indirect expenses and benefits related to the purchase of a
product or infrastructure component.

 teach box - A teach box is a device that registers and memorizes mechanical
motions or processes for later recall and execution by an electronic or computer
system.

 tebibyte (TiB) - A tebibyte (TiB) is a unit of measure used to describe


computing capacity.

 technical requirements - Technical requirements, in the context of software


development and systems engineering, are the factors required to deliver a
desired function or behavior from a system to satisfy a user’s standards and
needs.

 techno-fiend - In information technology, a techno-fiend is someone who is


addicted to finding out and knowing how things work in one or more aspects of
cyberspace.

 technobabble - In information technology and other specialized areas,


technobabble is the use of technical or "insider" terms that, to the uninitiated,
have no meaning.

 technological convergence - Technological convergence is a term that


describes the layers of abstraction that enable different technologies to
interoperate efficiently as a converged system.

 telecommuting - Telecommuting is an arrangement to work outside the


traditional office or workplace, usually at home or in a mobile situation.

 telepresence - Telepresence is a sophisticated form of robotic remote


control in which a human operator has a sense of being in a remote location so
that the experience resembles virtual reality (VR).

 Terabyte (TB) - A Terabyte (TB) is a measure of computer storage capacity


that is approximately 2 to the 40th power, or 10 to the 12th power, which equals
approximately a trillion bytes.
 teraflop - A teraflop is a measure of a computer's speed and can be
expressed as: A trillion floating point operations per second 10 to the 12th
power floating-point operations per second 2 to the 40th power flops Today's
fastest parallel computing operations are capable of teraflop speeds.

 term boosting - Term boosting is the ability to assign higher importance to


specific words in a search engine query.

 text - In information technology, text is a human-readable sequence of


characters and the words they form that can be encoded into computer-readable
formats such as ASCII.

 thang - A thang, a jargon variant of "thing" based on regional U.

 The speed of end-user and backbone transmission technologies - This


table shows the stated data rates for the most important end-user and backbone
transmission technologies.

 theory of relativity - Albert Einstein's theory of relativity is actually two


separate theories: his special theory of relativity, postulated in the 1905 paper,
The Electrodynamics of Moving Bodies and his theory of general relativity, an
expansion of the earlier theory, published as The Foundation of the General
Theory of Relativity in 1916.

 thin-film transistor (TFT) - A display screen made with TFT (thin-film


transistor) technology is a liquid crystal display (LCD), common in notebook
and laptop computers, that has a transistor for each pixel (that is, for each of the
tiny elements that control the illumination of your display).

 thing (in the Internet of Things) - A thing, in the context of the Internet of
things (IoT), is an entity or physical object that has a unique identifier, an
embedded system and the ability to transfer data over a network.

 thread-safe - In computer programming, thread-safe describes a program


portion or routine that can be called from multiple programming threads
without unwanted interaction between the threads.
 throughput - Throughput is a term used in information technology that
indicates how many units of information can be processed in a set amount of
time.

 TIFF (Tag Image File Format) - TIFF (Tag Image File Format) is a
common format for exchanging raster graphics (bitmap) images between
application programs, including those used for scanner images.

 tilde - A tilde (pronounced TILL-duh or TILL-dee) looks like this: ~.

 Tim Berners-Lee - Tim Berners-Lee is the creator of the World Wide Web
and director of the coordinating body for Web development, the W3C.

 time - Time is an observed phenomenon, by means of which human beings


sense and record changes in the environment and in the universe.

 timeshifting - Timeshifting is the process of recording and storing data for


later viewing, listening, or reading.

 tipping point - The tipping point is the critical point in an evolving situation
that leads to a new and irreversible development.

 token - In general, a token is an object that represents something else, such


as another object (either physical or virtual), or an abstract concept as, for
example, a gift is sometimes referred to as a token of the giver's esteem for the
recipient.

 toolbar - In the graphical user interface (GUI) for a computer, a toolbar is a


horizontal row or vertical column of selectable image "buttons" that give the
user a constantly visible reminder of and an easy way to select certain desktop
or other application functions, such as saving or printing a document or moving
pages forwards or backwards within a Web browser.

 torque - Torque is a twisting or turning force that tends to cause rotation


around an axis; it can also be thought of as the ability of something that is
rotating, such as a gear or a shaft, to overcome turning resistance.
 Total Quality Management (TQM) - Total Quality Management is a
management framework based on the belief that an organization can build long-
term success by having all its members, from low-level workers to its highest
ranking executives, focus on quality improvement and, thus, delivering
customer satisfaction.

 transcendental number - A transcendental number is a real number that is


not the solution of any single-variable polynomial equation whose coefficients
are all integers.

 transcription error - A transcription error is a specific type of data entry


error that is commonly made by human operators or by optical character
recognition (OCR) programs.

 transition ad - A transition ad is a Web page containing a commercial


message that appears temporarily between two other Web pages.

 transparent - In computers, transparent means something a little different


than its general meaning of having the quality of being easily seen through,
coming closer to meaning invisible or undetectable.

 transparent computing - Transparent computing is a characteristic of


pervasive computing, the possible future state in which we will be surrounded
by computers everywhere in the environment that respond to our needs without
our conscious use.

 transparent GIF - A transparent GIF (Graphics Interchange Format) is an


image file that has one color assigned to be "transparent" so that the assigned
color will be replaced by the browser's background color, whatever it may be.

 tree network - In telecommunication networks, a tree network is a


combination of two or more star networks connected together.

 trigraph - A trigraph is a three-character replacement for a special or


nonstandard character in a text file.

 trinary - Trinary logic is three-level digital logic, with states represented by


the numbers -1, 0, and 1.
 true multitasking - True multitasking is the capacity of an operating system
to carry out two or more tasks simultaneously rather than switching from one
task to another.

 trusted execution environment (TEE) - A trusted execution environment


(TEE) is an area on the main processor of a device that is separated from the
system’s main operating system (OS) to ensure that sensitive data can be stored
and managed in a secure environment.

 truth table - A truth table is a breakdown of a logic function by listing all


possible values the function can attain.

 Turing Test - A Turing Test is a method of inquiry in artificial intelligence


(AI) for determining whether or not a computer is capable of thinking like a
human being.

 turnkey - Turnkey is a product or service that is designed, supplied, built, or


installed fully complete and ready to operate.

 twip (twentieth of a point) - A twip (twentieth of a point) is a measure used


in laying out space or defining objects on a page or other area that is to be
printed or displayed on a computer screen.

 ultra-mobile personal computer (UMPC or Ultra-mobile PC) - Ultra-


mobile PC (UMPC) is a design specification for a hand-held computer that is
larger than a PDA but smaller than a laptop.

 ultrabook - An ultrabook is a category of thin and light laptop computers


designed to bridge the market gap between tablets and premium notebook PCs.

 unary - The term unary defines operators in Boolean (binary) algebra,


trinary algebra, arithmetic, and set theory.

 uncertainty principle - The uncertainty principle is the concept that precise,


simultaneous measurement of some complementary variables -- such as the
position and momentum of a subatomic particle -- is impossible.
 uncompressing (or decompressing) - Uncompressing (or decompressing)
is the act of expanding a compression file back into its original form.

 Undernet - For terms frequently used in online keyboard chatting, see chat
acronyms/IRC/BBS.

 unified field theory or Theory of Everything (TOE) - Unified field theory


is sometimes called the Theory of Everything (TOE, for short): the long-sought
means of tying together all known phenomena to explain the nature and
behavior of all matter and energy in existence.

 union symbol - The union symbol () denotes the union of two set s.

 unique identifier (UID) - A unique identifier (UID) is a numeric or


alphanumeric string that is associated with a single entity within a given
system.

 universal constructor - A universal constructor is a device that can self-


replicate - that is, make copies of itself.

 unzipping - Unzipping is the act of extracting the files from a zipped single
file or similar file archive.

 upgrade - In computers, an upgrade is a new version of or addition to a


hardware or, more often, software product that is already installed or in use.

 UpperCamelCase - UpperCamelCase (part of CamelCase) is a naming


convention in which a name is formed of multiple words that are joined
together as a single word with the first letter of each of the multiple words
capitalized within the new word that forms the name.

 uptime and downtime - Uptime is a computer industry term for the time
during which a computer is operational.

 URL shortening - URL shortening is the translation of a long Uniform


Resource Locator (URL) into an abbreviated alternative that redirects to the
longer URL.
 URL-minder - URL-minder is an agent or robot program (bot) that notifies
you when a particular Web page has changed.

 usability - Also see human-computer interaction and graphical user


interface.

 user group - In personal or business computing, a user group is a set of


people who have similar interests, goals, or concerns.

 UTF-16 (16- bit Unicode Transformation Format) - UTF-16 (16- bit


Unicode Transformation Format) is a standard method of encoding Unicode
character data.

 utility - In computers, a utility is a small program that provides an addition


to the capabilities provided by the operating system.

 utility computing - Utility computing is a service provisioning model in


which a service provider makes computing resources and infrastructure
management available to the customer as needed, and charges them for specific
usage rather than a flat rate.

 UXGA (Ultra Extended Graphics Array) - UXGA (Ultra Extended


Graphics Array) is a display modein which the resolutionis 1600 pixels
horizontally by 1200 pixels vertically (1600 x 1200).

 value chain - A value chain is "a string of companies working together to


satisfy market demands.

 value-added reseller (VAR) - A value-added reseller (VAR) is a company


that resells software, hardware and networking products and provides value
beyond order fulfillment.

 valve - A valve is a mechanism that opens and closes to control the flow of
fluids.

 vandal - A vandal is an executable file, usually an applet or an ActiveX


control, associated with a Web page that is designed to be harmful, malicious,
or at the very least inconvenient to the user.
 vanilla - In information technology, vanilla (pronounced vah-NIHL-uh) is
an adjective meaning plain or basic.

 Vannevar Bush - An electrical engineer by training, Vannevar Bush is


credited with having the idea of hypertext or "instant cross-referencing,"
decades before the term itself was conceived by Ted Nelson and before the
concept was widely implemented on the World Wide Web.

 vaporware - Vaporware is software or hardware that is announced publicly


and actively promoted by a vendor even though it does not yet exist.

 varicode - Varicode is a method of binary character encoding in which the


number of bits for each character is not fixed, but varies for each character
depending on how often that character occurs in general usage.

 vector - A vector is a quantity or phenomenon that has two independent


properties: magnitude and direction.

 vector graphics rendering (VML) - Vector graphics rendering, sometimes


abbreviated VML, refers to scalable vector graphics (SVG) used in Web pages.

 vectored interrupt - In a computer, a vectored interrupt is an I/O interrupt


that tells the part of the computer that handles I/O interrupts at the hardware
level that a request for attention from an I/O device has been received and and
also identifies the device that sent the request.

 vendor - A vendor is an individual or company that sells goods or services


to somone else in the economic production chain.

 Venn diagram - A Venn diagram is an illustration of the relationships


between and among sets, groups of objects that share something in common.

 vertical cavity surface emitting laser (VCSEL) - A vertical cavity surface


emitting laser (VCSEL) is a specialized laser diode that promises to
revolutionize fiber optic communications by improving efficiency and
increasing data speed.
 video card (graphics card) - A video adapter (alternate terms include
graphics card, display adapter, video card, video board and almost any
combination of the words in these terms) is an integrated circuit card in a
computer or, in some cases, a monitor that provides digital-to-analog
conversion, video RAM, and a video controller so that data can be sent to a
computer's display.

 Vint Cerf (Vinton Gray Cerf) - Vint Cerf (Vinton Gray Cerf) is an
American computer scientist best known as an Internet pioneer.

 virtual - In computing, virtual is a digitally replicated version of something


real.

 virtual commerce (vCommerce, v-commerce, or vCom) - Virtual


commerce (sometimes known as vCommerce, v-commerce, or vCom) is a type
of application, service, or product feature that helps enterprises implement
strategies and design Web sites for e-commerce (the buying and selling of
goods and services using the Internet).

 virtual learning environment (VLE) or managed learning environment


(MLE) - A virtual learning environment (VLE) is a set of teaching and learning
tools designed to enhance a student's learning experience by including
computers and the Internet in the learning process.

 virtual reality - Virtual reality is an artificial environment that is created


with software and presented to the user in such a way that the user suspends
belief and accepts it as a real environment.

 virtual reality sickness (VR motion sickness) - Virtual reality sickness


(VR motion sickness) is the physical discomfort that occurs when an end user's
brain receives conflicting signals about self-movement in a digital environment.

 viseme - A viseme is a generic facial image that can be used to describe a


particular sound.

 vocoder - A vocoder is an audio processor that captures the characteristic


elements of an an audio signal and then uses this characteristic signal to affect
other audio signals.
 voice morphing - Voice morphing is the software-generated alteration of a
person's natural voice.

 volatile - In general, volatile (from the Latin "volatilis" meaning "to fly")is
an adjective used to describe something unstable or changeable.

 volatile memory - Volatile memory is computer storage that only maintains


its data while the device is powered.

 von Neumann bottleneck - The von Neumann bottleneck is a limitation on


throughput caused by the standard personal computer architecture.

 wall time (real-world time or wall-clock time) - Wall time, also called
real-world time or wall-clock time, refers to elapsed time as determined by a
chronometer such as a wristwatch or wall clock.

 warchalking (war chalking) - Warchalking is a grass roots effort to create a


standard iconography for public Wi-Fi access.

 warez - Warez (pronounced as though spelled "wares" or possibly by some


pronounced like the city of "Juarez") is a term used by software "pirates" to
describe software that has been stripped of its copy-protection and made
available on the Internet for downloading.

 Waste Electrical and Electronic Equipment Regulation (WEEE) - Waste


Electrical and Electronic Equipment Regulation (WEEE) is a directive in the
European Union that designates safe and responsible collection, recycling and
recovery procedures for all types of electronic waste.

 Wave file - A Wave file is an audio file format, created by Microsoft, that
has become a standard PC audio file format for everything from system and
game sounds to CD-quality audio.

 wave number - The term wave number refers to the number of complete
wave cycles of an electromagnetic field (EM field) that exist in one meter (1 m)
of linear space.
 waving a dead chicken - Waving a dead chicken is a slang expression for
an effort to solve a problem even when the effort is expected to be futile.

 Web application (Web app) - A Web application (Web app) is an


application program that is stored on a remote server and delivered over the
Internet through a browser interface.

 Web ring (Webring) - A Web ring (or Webring) is a way of interlinking


related Web sites so that you can visit each site one after the other, eventually
(if you keep going) returning to the first Web site.

 Web slate - A Web slate is a wireless Internet appliance that consists of a


liquid crystal display (LCD) with a touch screen that allows the user to view
and interact with Web pages.

 Web year - A Web year is the length of time it takes for Internet technology
to evolve as much as technology in another environment might evolve in a
calendar year.

 Web-Braille - Web-Braille is a delivery system that allows content to be


read on a Braille display or transmitted to a Braille embosser.

 Webification - Webification (sometimes seen with a lower case w) is the act


of converting content from its original format into a format capable of being
displayed on the World Wide Web.

 Webify - The act of converting content from its original format into a format
capable of being displayed on the World Wide Web.

 webmaster - A webmaster is a person who creates and manages the content


and organization of a website, manages the computer server and technical
programming aspects of a website or does both.

 WebTV - WebTV, now owned by Microsoft, was one of the first entries in
the much publicized convergence of the World Wide Web with television.

 weenie - On bullet board systems (BBS) and in Internet chatting groups, a


weenie is an avid but immature participant who disrupts orderly conversation.
 Werner Heisenberg - Werner Heisenberg (1901 - 1976), one of the greatest
physicists of the twentieth century, is best known for his contributions to
quantum mechanics, specifically for the uncertainty principle in quantum
theory.

 white paper - A white paper is an article that states an organization's


position or philosophy about a social, political, or other subject, or a not-too-
detailed technical explanation of an architecture, framework, or product
technology.

 white space device (WSD) - A white space device is an FCC-certified


wireless device that can be used without an exclusive broadcast license in the
RF spectrum below 700 MHz: underutilized, unlicensed portions of the
spectrum called white space.

 winner's curse - In negotiation, winner's curse is an offer that is


immediately accepted by the other party.

 wipe - Wipe, in a computing context, means to erase all data on a hard drive
to render it unreadable.

 word - In computer architecture, a word is a unit of data of a defined


bitlength that can be addressed and moved between storageand the computer
processor.

 Words-to-Go: Voice over IP - Internet Protocol (IP) - method or protocol


by which data is sent from one computer to another on the Internet.

 workaround - A workaround is a method, sometimes used temporarily, for


achieving a task or goal when the usual or planned method isn't working.

 workload - In computing, the workload is the amount of processing that the


computer has been given to do at a given time.

 WPAN (wireless personal area network) - A WPAN (wireless personal


area network) is a personal area network - a network for interconnecting
devices centered around an individual person's workspace - in which the
connections are wireless.
 X dimension - In barcode technology, the X dimension is the narrowest part
of a barcode's symbology.

 X-engineering (cross-engineering) - X-engineering (sometimes called


cross-engineering) is a collaborative and process-oriented approach to change
management in the business world.

 x86-64 - x86-64 is a 64-bit processing technology developed by AMD that


debuted with the Opteron and Athlon 64 processor.

 Y2K (year 2000) - Y2K is an abbreviation for "year 2000.

 yottabyte (YB) - A yottabyte is a measure of theoretical storage capacity


and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 zettabytes,
a trillion terabytes or a million trillion megabytes.

 zap - In general usage, zap (noun) is spiciness, kick, or a powerful force.

 zero (0) - In mathematics, zero, symbolized by the numeric character 0, is


both a place indicator meaning "no units of this multiple" in a positional
number system, and an independent value midway between +1 and -1.

 zettabyte - A zettabyte is a measure of storage capacity and is 2 to the 70th


power bytes, also expressed as 1021 or 1 sextillion bytes.

 Zettabyte Era - The Zettabyte Era is the current age in terms of digital data.

 zettaflops - Zettaflop or (ZFlop) is a processing power of one septillion


floating point operations per second (FLOPS).

 zoetrope - The zoetrope (pronounced ZOH-uh-trohp), invented in 1834 by


William George Horner, was an early form of motion picture projector that
consisted of a drum containing a set of still images, that was turned in a circular
fashion in order to create the illusion of motion.

 Zulu (Zulu time) - Zulu (short for "Zulu time") is used in the military and in
navigation generally as a term for Universal Coordinated Time (UCT),
sometimes called Universal Time Coordinated (UTC) or Coordinated Universal
Time (but abbreviated UTC), and formerly called Greenwich Mean Time.

Вам также может понравиться