Criado por Mr Mckinlay
aproximadamente 10 anos atrás
|
||
Questão | Responda |
Browser | A web browser is a software application that provides a way to view and interact with pages on the World Wide Web. |
Byte | Computer storage space is measured in bytes.This is the basis of sizing all types of memory from the most humble microprocessor in a washing machine to the most gigantic supercomputers. |
CC | A carbon copy or "cc" are those people who are not directly involved with the email but they need to see it for information purposes. For example, you may send an email to a colleague using the 'To' field, then you may 'cc' a copy for your manager for reference. |
CD-Rom | A short term for Compact-Disk Read only. It can store about 680 Mb of data. |
CGI | Short for 'Common Gate Interface'.CGI is a protocol that allows data to be processed on a server. The CGI bin is the folder where the CGI program is stored and allowed to run.CGI 'scripts' are computer programs within the CGI bin that process data in some way. |
Chip and Pin | PIN stands for Personal Identity Number. Credit and Debit cards now include 'chip and PIN' technology. This means there is a microchip embedded within the card that can check if the PIN number you enter into the card reader is correct. |
Client | A very common form of network is called client / server architecture.A client computer allows you to log on to the network, then you will see one or more network drives available to you. These are folders stored on a file server somewhere on the network. |
Codec | "There are two halves to this. 'Encode' and 'Decode'. You 'encode' data by applying a set of rules to convert it to another form. For example, there is an ASCII standard to 'encode' letters of the alphabet into a set of binary numbers.On the other hand, there is a set of rules to 'decode' these binary numbers back into alphabet letters. |
Computer Misuse Act | The Computer Misuse Act enables people to be prosecuted if they commit one of the following offences: 1. Unauthorised access to computer material. 2. Unauthorised access with intent to commit or facilitate a crime. 3. Unauthorised modification of computer material. This mainly relates to hacking and distributing viruses although other computer related crimes can be tried under this Act. |
Computer Virus | A computer virus is a piece of program code that, like a biological virus, makes copies of itself by attaching itself to another program. The virus can waste the host's resources, and sometimes destroy or change files. |
Cookies | A cookie is a small text file that is stored on your computer when you visit some websites. A cookie is used to remember settings from your last visit to a website. For example Amazon use cookies to help identify you when you revisit the site. The website reads the cookie and can then look up details such as you name, address, credit card number from their database. This saves you from having to re-enter your data every time you visit. |
Copyright | This is the legal recognition that a creative work belongs to you if you are the 'copyright' owner. This means that anyone wishing to make use of the work for non-personal use will need to get your agreement. |
CPU | A CPU (Central Processing Unit) is the core of every Personal Computer. Without it, no PC can function. The CPU is a microchip that is installed on a motherboard and acts as the computer’s brain - performing calculations and coordinating the hardware components. |
Creative Commons License | A 'creative commons' licence was developed to allow 'Open Source' software to be distributed freely but with the provisio that you do not sell it on, as if it was your own property. The licence also insists that if you modify the source code to suit your own requirements, then that software must also be covered by the creative commons licence. The idea is to allow anyone to use / modify open source software and then pass on the improvements to the rest of the Open source community so it benefits everyone. |
Data Centre | The name given to a building dedicated to housing data processing computers. For example a large Internet Service Provider has a 'data centre' containing thousands of web servers. These servers are rented to clients who want to run a web site. |
Data Protection Act | This is a piece of U.K. legislation that has been passed to protect your rights as an individual to have your personal data collected, stored and used in a suitable manner. |
Desktop | This is what you call the working space you see on your monitor when the computer has booted up. |
Dial-Up | Dial-up means connecting to the Internet or the World-Wide-Web by using an old-fashioned analogue modem. Dial-up connection is not the best choice these days as the connection is a very slow 56kbs compared to broadband 512kb and more. |
Digital Divide | Not everyone has equal access to the internet. This is called the 'Digital Divide' or 'Social Exclusion'. Factors that cause a divide are: Money - access is not free, Language - a large part of the internet is written in English, Literacy - most of the internet includes text, Age - older generations generally find new technology harder to use and Physical - many people have diablilities that make using the internet more difficult than it should be. |
Disk Drive | A disk drive is a device which contains motors and electronics for storing (writing) and retrieving (reading) data on a disk. There are two main types, floppy-disk drives and hard-disk drives. |
Quer criar seus próprios Flashcards gratuitos com GoConqr? Saiba mais.