Guest User

Untitled

a guest
May 5th, 2017
1,335
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
JSON 85.27 KB | None | 0 0
  1. [{"term":"network engineer",
  2. "def":"The job title of professionals who design and implement computer networks.",
  3. "example":"Unlike network administrators, who perform day-to-day support, the network engineer, or network architect, focuses on high-level design and planning. Network engineers select the appropriate data communications components and configure them to meet user and corporate needs.",
  4. "termtag":"\"5f5e-4c92d00aea740\"",
  5. "deftag":"\"e6be-4c92d19a81600\"",
  6. "extag":"\"380b4-4c92d18f0fb00\"",
  7. "imagetag":null,
  8. "acro":""
  9. },
  10. {  
  11. "term":"licence",
  12. "def":"A legally binding agreement in which one party grants certain rights and privileges to another.",
  13. "example":"In the computer field, a software publisher will typically grant a non-exclusive right - a licence - to a user to use one copy of its software and prohibit further copying and distribution of that software to another user.",
  14. "termtag":"\"4a15-4c92d0e91f380\"",
  15. "deftag":"\"133fe-4c92cf00d7380\"",
  16. "extag":"\"2eaf2-4c92d29fcfe80\"",
  17. "imagetag":null,
  18. "acro":""
  19. },
  20. {  
  21. "term":"computer-aided design",
  22. "def":"A combination of hardware and software that enables engineers and architects to design objects.",
  23. "example":"CAD systems are high-speed workstations or desktop computers with CAD software. \n<br>CAD software is available for generic design or specialized uses, such as architectural, electrical and mechanical.",
  24. "termtag":"\"54b5-4c92cdab6ce00\"",
  25. "deftag":"\"10777-4c92d0c7be4c0\"",
  26. "extag":"\"25789-4c92cf1201c00\"",
  27. "imagetag":"\"16afd-4a62680a35b00\"",
  28. "acro":""
  29. },
  30. {  
  31. "term":"hypertext transfer protocol",
  32. "def":"A protocol used to request and transmit files, especially webpages and webpage components, over the Internet or other computer network.",
  33. "example":"Any Web browser is an HTTP client, sending requests to server machines. \n<br>When the browser user enters file requests by either 'opening' a Web file (typing in a uniform resource locator) or clicking on a hypertext link, the browser creates an HTTP request and sends it to the IP address indicated by the URL.",
  34. "termtag":"\"6bd2-4c92ce1fc6080\"",
  35. "deftag":"\"1a58c-4c92ce7782f80\"",
  36. "extag":"\"44246-4c92d2bc6c200\"",
  37. "imagetag":"\"38348-4aa27dbce00c0\"",
  38. "acro":""
  39. },
  40. {  
  41. "term":"open source",
  42. "def":"Free software the source code of which is available to the general public for use, modification and/or re-distribution.",
  43. "example":"Open source software is usually supported by communities of developers. This means, users can expect future enhancements, and they are not dependent on a particular author or organization, as with freeware or shareware.\n<br>The distribution terms of open-source software must comply with 10 criteria, as defined by the Open Source Initiative.",
  44. "termtag":"\"4088-4c92d2b98fb40\"",
  45. "deftag":"\"14dc2-4c92d18492240\"",
  46. "extag":"\"3f34c-4c92ccd5cd600\"",
  47. "imagetag":"\"cdee-4adc0c9a1e8c0\"",
  48. "acro":""
  49. },
  50. {  
  51. "term":"pixel",
  52. "def":"A single point in a graphic image.",
  53. "example":"Graphics monitors display pictures by dividing the display screen into thousands (or millions) of pixels, arranged in rows and columns. \n<br>The pixels are so close together that they appear connected.",
  54. "termtag":"\"3767-4c92d18862b40\"",
  55. "deftag":"\"852b-4c92d018446c0\"",
  56. "extag":"\"27b40-4c92ce78771c0\"",
  57. "imagetag":"\"4e47-4bb81da17a2c0\"",
  58. "acro":""
  59. },
  60. {  
  61. "term":"engineering",
  62. "def":"The discipline, art and profession of acquiring and applying scientific, mathematical, economic, social, and practical knowledge to design and build structures, machines, devices, systems, materials and processes that safely realise solutions to the needs of society.",
  63. "example":"Engineering is often characterized as having four main branches: chemical engineering, civil engineering, electrical engineering and mechanical engineering. Modern fields sometimes referred to as additional branches include industrial engineering and software engineering.",
  64. "termtag":"\"4479-4c92ce58fe780\"",
  65. "deftag":"\"2d48b-4c92ccaeb39c0\"",
  66. "extag":"\"2f43f-4c92d2c9c6180\"",
  67. "imagetag":null,
  68. "acro":""
  69. },
  70. {  
  71. "term":"cache",
  72. "def":"A small, but high-speed, storage buffer that is used to speed up access to main memory.",
  73. "example":"Reading data from cache, or cache memory, is much faster than reading it from RAM.",
  74. "termtag":"\"2922-4c92d06583d00\"",
  75. "deftag":"\"e913-4c92cf9f26900\"",
  76. "extag":"\"ef6f-4c92d13ef3e00\"",
  77. "imagetag":"\"e4e4-4adf0289d5b00\"",
  78. "acro":""
  79. },
  80. {  
  81. "term":"social media",
  82. "def":"Various activities and attempts to integrate technology, social interaction and the construction of words, pictures, videos and audio.",
  83. "example":"'Social media' is an umbrella term, which describes web-based platforms and tools such as Twitter, Facebook, Youtube, Flickr, blogs and other.\n<br>Without content, there is no need for social media. Without social media, how will anyone find your content?",
  84. "termtag":"\"4f84-4c92cfdc2f900\"",
  85. "deftag":"\"1bfe4-4c92cfa2f7200\"",
  86. "extag":"\"39bb2-4c92d34c6d5c0\"",
  87. "imagetag":"\"b69e-4adc72a61eb00\"",
  88. "acro":""
  89. },
  90. {  
  91. "term":"operating system",
  92. "def":"The most basic computer program that provides file, task, and job management.",
  93. "example":"Operating systems provide a software platform on top of which other programs, called application programs, can run. The application programs must be written to run on top of a particular operating system. Your choice of operating system, therefore, determines to a great extent the applications or apps you can run.",
  94. "termtag":"\"5fdf-4c92d04146780\"",
  95. "deftag":"\"10b7b-4c92d279aa480\"",
  96. "extag":"\"40544-4c92cde2bd080\"",
  97. "imagetag":"\"7e79-4adc11fc2dc00\"",
  98. "acro":"OS"
  99. },
  100. {  
  101. "term":"phishing",
  102. "def":"The act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information, which will then be used for identity theft.",
  103. "example":"The word phishing comes from the analogy that Internet scammers are using email lures to fish for passwords and financial data from the sea of Internet users. \n<br>The term was coined in 1996 by hackers who were stealing AOL Internet accounts by scamming passwords from unsuspecting AOL users. Since hackers have a tendency to replacing <em>f</em> with <em>ph</em>, the term phishing was derived.",
  104. "termtag":"\"45db-4c92cc6a097c0\"",
  105. "deftag":"\"2a644-4c92d075ba340\"",
  106. "extag":"\"5d817-4c92d33589fc0\"",
  107. "imagetag":"\"d6ff-47f82f784e380\"",
  108. "acro":""
  109. },
  110. {  
  111. "term":"to swap",
  112. "def":"To replace pages or segments of data in memory from disk.",
  113. "example":"Swapping is a convenient technique that enables a computer to execute programs and manipulate data files larger than main memory. In UNIX systems, swapping refers to moving entire processes in and out of main memory.",
  114. "termtag":"\"4bb6-4c92ce674c940\"",
  115. "deftag":"\"d799-4c92cfcde1740\"",
  116. "extag":"\"3006d-4c92cf04a7c80\"",
  117. "imagetag":null,
  118. "acro":""
  119. },
  120. {  
  121. "term":"firewall",
  122. "def":"A system designed to prevent unauthorized access to a private network.",
  123. "example":"Firewalls are widely used to separate a company's internal network from the Internet.\n<br>In practice, many firewalls have default settings that provide little or no security unless specific policies are implemented.",
  124. "termtag":"\"3645-4c92ceb2a3b00\"",
  125. "deftag":"\"db6c-4c92d05cee8c0\"",
  126. "extag":"\"266c8-4c92d05271000\"",
  127. "imagetag":"\"89c0-4a9fa73596840\"",
  128. "acro":""
  129. },
  130. {  
  131. "term":"server appliance",
  132. "def":"A specialized server that is designed for ease of installation and maintenance.",
  133. "example":"Server appliances have their hardware and software bundled in the product, so all applications are pre-installed.\n<br>Server appliances provide Internet sharing, FTP services, e-mail, VPN connections, firewall services, print and file serving. Access to the server appliance is through a Web browser.",
  134. "termtag":"\"65fc-4c92cdfb88b00\"",
  135. "deftag":"\"10789-4c92d2b6b3480\"",
  136. "extag":"\"470c4-4c92d2eb27040\"",
  137. "imagetag":null,
  138. "acro":""
  139. },
  140. {  
  141. "term":"session",
  142. "def":"A series of interactions between two communication end points that occur during the span of a single connection.",
  143. "example":"The session begins when the connection is established at both ends and terminates when the connection is ended. \n<br>Some connections and sessions last only long enough to send a message in one direction. However, other sessions may last longer, usually with one or both of the communicating parties able to terminate it.",
  144. "termtag":"\"42e4-4c92d0080e080\"",
  145. "deftag":"\"161dc-4c92cfdd23b40\"",
  146. "extag":"\"3ceae-4c92d2e93ebc0\"",
  147. "imagetag":null,
  148. "acro":""
  149. },
  150. {  
  151. "term":"encryption",
  152. "def":"Methods of translating data using secret codes in order to prevent the data from being read by unauthorized parties.",
  153. "example":"SSL uses a combination of public-key encryption and symmetric-key encryption. Symmetric-key encryption is faster than public-key encryption, but public-key encryption provides more effective authentication techniques. \n<br>Encrypted data needs to be decrypted before it can be read.",
  154. "termtag":"\"359a-4c92d0f5850c0\"",
  155. "deftag":"\"1548e-4c92d195bcac0\"",
  156. "extag":"\"36661-4c92cdc8fd3c0\"",
  157. "imagetag":"\"8da4-4adc58d434040\"",
  158. "acro":""
  159. },
  160. {  
  161. "term":"information technology",
  162. "def":"The technology involved with the transmission and storage of information, especially the development, installation, implementation, and management of computer systems within companies, universities, and other organizations.",
  163. "example":"Information technology (IT) is at the centre of everyday life and can be found in almost all other industries. \n<br>IT underpins many organisations and pastimes, from shopping to watching television, and it is at the core of every business. \n<br>IT will continue to be the key element that enables businesses to grow.",
  164. "termtag":"\"58e7-4c92cf9a61dc0\"",
  165. "deftag":"\"257f1-4c92d010a34c0\"",
  166. "extag":"\"395bd-4c92d1ef61e40\"",
  167. "imagetag":null,
  168. "acro":"IT"
  169. },
  170. {  
  171. "term":"streaming",
  172. "def":"A technique for transferring data so that it can be processed as a steady and continuous flow.",
  173. "example":"With streaming, the client browser or plug-in can start displaying the data before the entire file has been transmitted. \n<br>Streaming technologies became increasingly important with the growth of file sizes offered on the Web.",
  174. "termtag":"\"3e02-4c92d1487d480\"",
  175. "deftag":"\"131d8-4c92cfa3eb440\"",
  176. "extag":"\"2cb0e-4c92d12904a40\"",
  177. "imagetag":null,
  178. "acro":""
  179. },
  180. {  
  181. "term":"graphical user interface",
  182. "def":"A computer environment allowing users to communicate with the computer by using graphical symbols rather than text commands.",
  183. "example":"In graphical user interfaces, information and commands are presented through icons or menus.\n<br>The most important tool for using a GUI is the mouse, which is used to click on the icons, and to resize or move windows.",
  184. "termtag":"\"5e33-4c92d33b42d40\"",
  185. "deftag":"\"1615b-4c92cc888dfc0\"",
  186. "extag":"\"280ea-4c92d26e38980\"",
  187. "imagetag":"\"11c90-4aa22603c09c0\"",
  188. "acro":""
  189. },
  190. {  
  191. "term":"programming language",
  192. "def":"A vocabulary and set of grammatical rules for instructing a computer to perform specific tasks.",
  193. "example":"There are different types of programming languages, such as object-oriented and functional programming languages.\n<br>Apparently, there seems to be no clear-cut borderline between low-level and high-level programming languages. Alan Perlis said: \"A programming language is low-level when its programs require attention to the irrelevant\".",
  194. "termtag":"\"641f-4c92d05271000\"",
  195. "deftag":"\"1378d-4c92ce2767280\"",
  196. "extag":"\"45583-4c92d1f332740\"",
  197. "imagetag":"\"a926-4abe191537640\"",
  198. "acro":""
  199. },
  200. {  
  201. "term":"virtual private network",
  202. "def":"An access controlled network that is constructed by using public wires to connect nodes.",
  203. "example":"VPNs use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.",
  204. "termtag":"\"7fd0-4c92d035d4c80\"",
  205. "deftag":"\"12b8c-4c92d275d9b80\"",
  206. "extag":"\"24b45-4c92d2eef7940\"",
  207. "imagetag":"\"83a0-4ac4149737e00\"",
  208. "acro":""
  209. },
  210. {  
  211. "term":"computer science",
  212. "def":"An academic field which is focussed on theory and selected applications of algorithms, data structures, programming languages, networks, operating systems, compilers, databases, software architecture, artificial intelligence, robotics, graphics etc. It is also described as the study of the theoretical foundations of information and computation, and of practical techniques for their implementation and application in computer systems.",
  213. "example":"Computer science has many sub-fields; some, such as computer graphics, emphasize the computation of specific results, while others, such as computational complexity theory, study the properties of computational problems. Still others focus on the challenges in implementing computations.",
  214. "termtag":"\"4748-4c92d273f1700\"",
  215. "deftag":"\"4ee4e-4c92cdc52cac0\"",
  216. "extag":"\"35903-4c92d1a8cf7c0\"",
  217. "imagetag":null,
  218. "acro":"CS / comp-sci"
  219. },
  220. {  
  221. "term":"Wi-Fi",
  222. "def":"A trademarked term used to promote certified WLAN devices, which comply with the IEEE 802.11x standards.",
  223. "example":"The Wi-Fi Alliance, the organization that owns the registered trademark Wi-Fi defines it as any wireless local area network (WLAN) product that is based on the IEEE 802.11 standards.\n<br>A common misconception is that Wi-Fi is short for wireless fidelity. Actually, this is not the case. Wi-Fi is simply a trademarked term meaning IEEE 802.11x.",
  224. "termtag":"\"4227-4c92ce3c62400\"",
  225. "deftag":"\"1f497-4c92cefeeef00\"",
  226. "extag":"\"5ddc7-4c92ce810c600\"",
  227. "imagetag":"\"53d6-4add9d1ba5240\"",
  228. "acro":""
  229. },
  230. {  
  231. "term":"driver",
  232. "def":"A small piece of software that provides an interface between an operating system and a peripheral device, such as a printer or a mouse.",
  233. "example":"Drivers contain commands in machine language necessary to activate functions of the device.\n<br>The operating system uses drivers to control hardware devices. \n<br>Drivers provide the opportunity of upgrading a system with new hardware even though the operating system has no means of communicating with the new device.",
  234. "termtag":"\"34d4-4c92cf69beb00\"",
  235. "deftag":"\"14c8c-4c92cefb1e600\"",
  236. "extag":"\"35b80-4c92cf6ab2d40\"",
  237. "imagetag":"\"18c6c-4a688f29d49c0\"",
  238. "acro":""
  239. },
  240. {  
  241. "term":"Moving Picture Experts Group",
  242. "def":"A family of digital video compression standards and file formats named after their developers, a working group of the International Organization for Standardization.",
  243. "example":"MPEG achieves high compression rates by storing only the changes from one frame to another, instead of each entire frame.\n<br>MPEG's compression type is referred to as lossy compression, since some data is removed in the compression. However, the difference is generally negligible to the user.",
  244. "termtag":"\"8a49-4c92ccaeb39c0\"",
  245. "deftag":"\"208a4-4c92d00aea740\"",
  246. "extag":"\"3e5fe-4c92d1d3b9d00\"",
  247. "imagetag":null,
  248. "acro":""
  249. },
  250. {  
  251. "term":"class",
  252. "def":"In object-oriented programming, a category of objects.",
  253. "example":"For example, there might be a class called shape that contains objects which are circles, rectangles, and triangles. The class defines all the common properties of the different objects that belong to it.",
  254. "termtag":"\"3a85-4c92d0cc83000\"",
  255. "deftag":"\"d34a-4c92cf4a460c0\"",
  256. "extag":"\"28e15-4c92d1356a780\"",
  257. "imagetag":null,
  258. "acro":""
  259. },
  260. {  
  261. "term":"object",
  262. "def":"An item that can be individually selected and manipulated.",
  263. "example":"Objects include shapes and pictures that appear on a display screen as well as less tangible software entities.\n<br>In object-oriented programming, for example, an object is a self-contained entity that consists of both data and procedures to manipulate the data.",
  264. "termtag":"\"3914-4c92d164255c0\"",
  265. "deftag":"\"b8d3-4c92ccbb19700\"",
  266. "extag":"\"37b75-4c92d0afe6c80\"",
  267. "imagetag":null,
  268. "acro":""
  269. },
  270. {  
  271. "term":"Linux",
  272. "def":"A popular open source version of UNIX that runs on a wide variety of hardware platforms.",
  273. "example":"As for the pronunciation of the word, if you live in Finland, you would say 'lee-nooks,' because the name Linus is pronounced 'lee-noose.' Since the English pronunciation of Linus is 'line-us,' some call it 'line-ucks.' Very common is 'lin-ucks,' which is somewhere in between. \n<br>No matter how you pronounce it, Linux is growing rapidly.",
  274. "termtag":"\"3e88-4c92d34007880\"",
  275. "deftag":"\"11f5e-4c92d0ff0e740\"",
  276. "extag":"\"556ad-4c92d17b08bc0\"",
  277. "imagetag":"\"de98-4adfc80cb17c0\"",
  278. "acro":""
  279. },
  280. {  
  281. "term":"changeset",
  282. "def":"A uniquely named collection of program changes that may include textual edits to file contents, modifications to tree structure, or tweaks to metadata. In short, a patch or fix with a name you can refer to.",
  283. "example":"If you use an issue tracker to manage bugs, you can use the revision numbers to refer to particular patches that fix bugs -- for example, \"this issue was fixed by r9238.\" Somebody can then run <span class=\"precode\">svn log -r 9238</span> to read about the exact changeset that fixed the bug, and run <span class=\"precode\">svn diff -c 9238</span> to see the patch itself.",
  284. "termtag":"\"4f39-4c92cc7763740\"",
  285. "deftag":"\"2f5d7-4c92cdcfaa380\"",
  286. "extag":"\"635d9-4c92d20368d80\"",
  287. "imagetag":null,
  288. "acro":""
  289. },
  290. {  
  291. "term":"communications",
  292. "def":"Electronic transfer of information from a source to one or many destinations.",
  293. "example":"The way data communications systems 'talk' to each other is defined in a set of standards called protocols. \n<br>One of the world's largest communications systems is the telephone network, which is a mix of analog and digital communications.",
  294. "termtag":"\"3f63-4c92ce6287e00\"",
  295. "deftag":"\"de27-4c92cfc4580c0\"",
  296. "extag":"\"291f5-4c92d2ab41980\"",
  297. "imagetag":"\"119e7-4adb3a3d15980\"",
  298. "acro":""
  299. },
  300. {  
  301. "term":"source code",
  302. "def":"Program instructions in their original form.",
  303. "example":"Initially, a programmer writes a program in a particular programming language. This form of the program is called the source code.\n<br>Source code is the only format that is readable by humans.",
  304. "termtag":"\"51b9-4c92d289e0ac0\"",
  305. "deftag":"\"99c3-4c92d23f7db40\"",
  306. "extag":"\"2635c-4c92cff312f00\"",
  307. "imagetag":"\"93d0-4adc78f2c87c0\"",
  308. "acro":""
  309. },
  310. {  
  311. "term":"webserver",
  312. "def":"A computer that delivers (serves up) webpages.Alternatively, the term may refer to just the software and not the entire computer system.",
  313. "example":"Every webserver has an IP address and possibly a domain name.\n<br>Any computer can be turned into a web server by installing server software and connecting the machine to the Internet. \n<br>There are numerous Web server software applications, including public domain software from Apache, and commercial packages.",
  314. "termtag":"\"3552-4c92d22f47500\"",
  315. "deftag":"\"1c173-4c92cfb051180\"",
  316. "extag":"\"384fe-4c92d211b6f40\"",
  317. "imagetag":"\"4516-4add9f2de3540\"",
  318. "acro":""
  319. },
  320. {  
  321. "term":"systems software",
  322. "def":"Programs which manage computer resources at an elementary level. Examples include operating systems, compilers, and utilities for managing computer resources.",
  323. "example":"Systems software includes compilers, loaders, linkers, and debuggers.",
  324. "termtag":"\"6c0d-4c92d1a03a380\"",
  325. "deftag":"\"2455f-4c92cca9eee80\"",
  326. "extag":"\"11eea-4c92cf3cec140\"",
  327. "imagetag":null,
  328. "acro":""
  329. },
  330. {  
  331. "term":"central processing unit",
  332. "def":"The 'brain' of the computer. Also called the processor.",
  333. "example":"The CPU consists of a number of components: the control unit, the arithmetic-logic unit (ALU), one or more buses, and registers.\n<br>The CPU contains millions of transistors which are etched onto a tiny square silicon.",
  334. "termtag":"\"5550-4c92d289e0ac0\"",
  335. "deftag":"\"aa56-4c92d25661140\"",
  336. "extag":"\"2bd40-4c92d20fceac0\"",
  337. "imagetag":"\"e5a3-4abcacc68b400\"",
  338. "acro":""
  339. },
  340. {  
  341. "term":"bus",
  342. "def":"A set of lines which devices are connected to.",
  343. "example":"There is a bus inside the CPU connecting the control unit, ALU and registers. Buses may be interconnected.",
  344. "termtag":"\"2b0d-4c92d1af7c780\"",
  345. "deftag":"\"8960-4c92cc6ece300\"",
  346. "extag":"\"151d2-4c92d2f975200\"",
  347. "imagetag":"\"787d-4adf024807fc0\"",
  348. "acro":""
  349. },
  350. {  
  351. "term":"applet",
  352. "def":"A small program written in Java and designed to run within a World Wide Web page.",
  353. "example":"Java programs that are run from the browser are known as applets.\n<br>When a Java-enabled browser encounters an APPLET tag inside an HTML document, it will load and begin executing the specified applet within the context of the Web page.",
  354. "termtag":"\"2f37-4c92d1c753fc0\"",
  355. "deftag":"\"dd5b-4c92d086e4bc0\"",
  356. "extag":"\"29759-4c92d1a7db580\"",
  357. "imagetag":null,
  358. "acro":""
  359. },
  360. {  
  361. "term":"octal",
  362. "def":"The base-8 number system, which uses just eight unique symbols (0, 1, 2, 3, 4, 5, 6, and 7).",
  363. "example":"Programs often display data in octal format because it is relatively easy for humans to read and can easily be translated into binary format, which is the most relevant format for computers. \n<br>In octal format, each digit represents three binary digits.",
  364. "termtag":"\"39a7-4c92cefeeef00\"",
  365. "deftag":"\"24b71-4c92ce759ab00\"",
  366. "extag":"\"371f3-4c92d05735b40\"",
  367. "imagetag":"\"56c6-4adc05c608c80\"",
  368. "acro":""
  369. },
  370. {  
  371. "term":"debugger",
  372. "def":"A special program used to find errors (bugs) in other programs.",
  373. "example":"A debugger allows a programmer to stop a program at any point during its execution and to examine and to change the values of variables.\n<br>Debuggers are effective tools for detecting logical errors such as endless loops.",
  374. "termtag":"\"3837-4c92cc7d1c4c0\"",
  375. "deftag":"\"d7d8-4c92d0ad0a5c0\"",
  376. "extag":"\"25ae5-4c92d020d9b00\"",
  377. "imagetag":"\"d936-4ad0a6a53d600\"",
  378. "acro":""
  379. },
  380. {  
  381. "term":"Java",
  382. "def":"A general-purpose, object-oriented programming language designed to produce programs that will run on any computer system.",
  383. "example":"Compiled Java code can run on most computers because Java interpreters and runtime environments, known as Java Virtual Machines, exist for most operating systems, including UNIX, Mac OS, and Windows.",
  384. "termtag":"\"2f2a-4c92cf42a4ec0\"",
  385. "deftag":"\"148c3-4c92ce82f4a80\"",
  386. "extag":"\"27b68-4c92d0fe1a500\"",
  387. "imagetag":"\"4b00-4ad11eca30ac0\"",
  388. "acro":""
  389. },
  390. {  
  391. "term":"cloud services ",
  392. "def":"A general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructure-as-a Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS).",
  393. "example":"Reasons for cloud services include the desire to outsource the maintenance burden of servers and applications, the need to scale systems up or down on demand, the benefit of being able to access your data from anywhere with an Internet connection, and the ability to replace occasional heavy expenditure on IT with regular and predictable operation expenditure.",
  394. "termtag":"\"4181-4c92ce9bc0500\"",
  395. "deftag":"\"3228d-4c92cfae68d00\"",
  396. "extag":"\"41248-4c92d24be3880\"",
  397. "imagetag":"\"4c0b-4abcaffc9c780\"",
  398. "acro":""
  399. },
  400. {  
  401. "term":"hypertext markup language",
  402. "def":"The set of markup symbols, often referred to as tags, that are used to code files intended for display on the web.",
  403. "example":"HTML is not a programming language like Java or JavaScript, rather it could be considered a 'presentation language.' HTML describes how information is to be presented and formatted so that humans can view it in a web browser.\n<br>HTML is a formal recommendation by the World Wide Web Consortium (W3C) and is generally adhered to by major browsers.",
  404. "termtag":"\"687a-4c92d33866680\"",
  405. "deftag":"\"15980-4c92d2c501640\"",
  406. "extag":"\"4a93a-4c92cf7dc5a40\"",
  407. "imagetag":"\"570f-4ad1164bd00c0\"",
  408. "acro":""
  409. },
  410. {  
  411. "term":"loop",
  412. "def":"In computer programming, a sequence of instructions that is continually repeated until a certain condition is reached.",
  413. "example":"A loop is a fundamental programming idea that is commonly used in writing programs.\n<br>An infinite loop may occur when an assumed condition that would eventually terminate the loop failed to happen.",
  414. "termtag":"\"44ef-4c92d129f8c80\"",
  415. "deftag":"\"15a6e-4c92d2cf7ef00\"",
  416. "extag":"\"2a847-4c92d2b5bf240\"",
  417. "imagetag":"\"13de6-4aa886daa63c0\"",
  418. "acro":""
  419. },
  420. {  
  421. "term":"information systems",
  422. "def":"An academic field which encompasses two broad areas: <ul><li>acquisition, deployment, and management of information technology resources and services (the information systems function) and \n</li><li>development and evolution of infrastructure and systems for use in organization processes (system development).</li></ul>",
  423. "example":"The information systems function has a broad responsibility to develop, implement, and manage an infrastructure of information technology (computers and communications), data (both internal and external), and organization-wide systems. \n<br>If you are interested in the implementation of computer-based information systems within business, study information systems.",
  424. "termtag":"\"4fb0-4c92d18a4afc0\"",
  425. "deftag":"\"3bb1f-4c92ce580a540\"",
  426. "extag":"\"44fcb-4c92d1b71d980\"",
  427. "imagetag":null,
  428. "acro":"IS"
  429. },
  430. {  
  431. "term":"to boot",
  432. "def":"To start-up a computer by executing basic instructions and loading the operating system.",
  433. "example":"A computer knows how to boot because instructions for booting are built into one of its chips, the BIOS.\n<br>Some operating systems come with utilities that allow you to choose, at boot time, which partition to boot.",
  434. "termtag":"\"4c72-4c92cfca10e40\"",
  435. "deftag":"\"1298f-4c92cc794bbc0\"",
  436. "extag":"\"2c8ad-4c92d16bc67c0\"",
  437. "imagetag":null,
  438. "acro":""
  439. },
  440. {  
  441. "term":"informatics",
  442. "def":"A special field which can be roughly described as the intersection of technology, people, and business.",
  443. "example":"Not quite hard-core IT, far from liberal arts, informatics blends a mishmash of different technical concepts together. Some schools have sub-specialties in community informatics, medical informatics, or information management. Effectively, all of these informatics domains are siblings, and they are all distant cousins of their grandfather, computer science.",
  444. "termtag":"\"41c8-4c92d17ed94c0\"",
  445. "deftag":"\"12d9a-4c92cf13ea080\"",
  446. "extag":"\"449f2-4c92cc8982200\"",
  447. "imagetag":null,
  448. "acro":""
  449. },
  450. {  
  451. "term":"motherboard",
  452. "def":"The most important circuit board of a microcomputer.",
  453. "example":"Typically, the motherboard contains the CPU, BIOS, memory, mass storage interfaces, serial and parallel ports, expansion slots, and all the controllers required to control standard peripheral devices.\n<br>On most PCs, it is possible to add memory chips directly to the motherboard.",
  454. "termtag":"\"44e0-4c92d15a9bf40\"",
  455. "deftag":"\"ae3e-4c92d2b7a76c0\"",
  456. "extag":"\"43e3b-4c92d1708b300\"",
  457. "imagetag":"\"17914-4aa9ff2de0080\"",
  458. "acro":""
  459. },
  460. {  
  461. "term":"router",
  462. "def":"A protocol-bound device that forwards data packets from one LAN or WAN to another.",
  463. "example":"Routers can only route a message that is transmitted by a routable protocol such as IP, or IPX.\n<br>Most routers are specialized computers that are optimized for communications. However, router functions can also be implemented by adding routing software to a file server.",
  464. "termtag":"\"98c5-4c92d2f5a4900\"",
  465. "deftag":"\"13701-4c92d22c6ae40\"",
  466. "extag":"\"3d7b3-4c92ce257ee00\"",
  467. "imagetag":"\"1002a-4ac1e8ff46ec0\"",
  468. "acro":""
  469. },
  470. {  
  471. "term":"Android",
  472. "def":"A widespread open-source mobile operating system the updates of which have been developed under dessert-inspired code names, with each new version arriving in alphabetical order with new enhancements and improvements to the software development kit.",
  473. "example":"The Android platform is Google Inc.'s open and free software stack that includes an operating system, middleware and key applications for use on mobile devices, including smartphones. Android is an Open Handset Alliance Project.\n<br>Science fiction described androids, automatons or golems as robots with a human appearance.",
  474. "termtag":"\"32a3-4c92d21e1cc80\"",
  475. "deftag":"\"2a40a-4c92cfb8e65c0\"",
  476. "extag":"\"42246-4c92d157bf880\"",
  477. "imagetag":"\"37b8-4abc90fff2c00\"",
  478. "acro":""
  479. },
  480. {  
  481. "term":"client/server",
  482. "def":"A communication model in which one program, the client, makes a service request from another program, the server, which fulfills the request.",
  483. "example":"In a network, the client/server model provides a convenient way to interconnect programs that are distributed across different locations.\n<br>In the usual client/server model, servers are activated and then awaiting client requests.",
  484. "termtag":"\"3e51-4c92cf1c7f4c0\"",
  485. "deftag":"\"182d2-4c92d0ce6b480\"",
  486. "extag":"\"29f06-4c92d15b90180\"",
  487. "imagetag":"\"ad1e-4a62639785c80\"",
  488. "acro":""
  489. },
  490. {  
  491. "term":"to back up",
  492. "def":"To copy files or databases so that they will be preserved in case of equipment failure or other catastrophe.",
  493. "example":"The retrieval of files you backed up is called restoring them.\n<br>Backup procedures are routine parts of the operation of business computing systems.",
  494. "termtag":"\"50fb-4c92cf9785700\"",
  495. "deftag":"\"148ff-4c92d01568000\"",
  496. "extag":"\"1d7ee-4c92d0f76d540\"",
  497. "imagetag":"\"cd04-4adc7ea9b8340\"",
  498. "acro":""
  499. },
  500. {  
  501. "term":"algorithm",
  502. "def":"A step-by-step problem-solving procedure, especially an established, recursive computational procedure for solving a problem in a finite number of steps.",
  503. "example":"Inventing elegant algorithms, i.e. algorithms that are simple and require the fewest steps possible, is one of the principal challenges in programming.\n<br>Flowcharts are often used to represent algorithms graphically.",
  504. "termtag":"\"3237-4c92d10002980\"",
  505. "deftag":"\"1c50b-4c92d21a4c380\"",
  506. "extag":"\"253e8-4c92d2e662500\"",
  507. "imagetag":"\"53ae-4abc8f8ee0540\"",
  508. "acro":""
  509. },
  510. {  
  511. "term":"domain name",
  512. "def":"An easy-to-remember string of alphanumeric characters which is used to identify one or more IP addresses.",
  513. "example":"Within the Internet, domains are not defined by domain names, but by IP addresses. Therefore, every Web server requires a Domain Name System (DNS) server to translate domain names into IP addresses. \n<br>Domain names are used in URLs to identify particular Web pages. For example, in the URL https://webcourses.htwk-leipzig.de/start/, the domain name is htwk-leipzig.de.",
  514. "termtag":"\"3f9e-4c92ce6934dc0\"",
  515. "deftag":"\"12fc3-4c92d02e33a80\"",
  516. "extag":"\"5f0ca-4c92d332ad900\"",
  517. "imagetag":"\"6042-4ad0f1ad31b40\"",
  518. "acro":""
  519. },
  520. {  
  521. "term":"authentication",
  522. "def":"To pass a security procedure, which protects a network against acceptance of a fraudulent transmission or simulation by establishing the validity of a transmission, message, or originator.",
  523. "example":"Logically, authentication, which is the process of determining whether someone or something is who or what it is declared to be, precedes authorization although they may often seem to be combined.\n<br>The use of digital certificates issued and verified by a certificate authority as part of a public key infrastructure has become a standard way to perform authentication on the Internet. \n<br>Please note that the noun 'authenti<strong><em>fi</em></strong>cation' is not an English word and, consequently, not used by native speakers.",
  524. "termtag":"\"6440-4c92d28057440\"",
  525. "deftag":"\"274cd-4c92d2b2e2b80\"",
  526. "extag":"\"72b54-4c92d278b6240\"",
  527. "imagetag":null,
  528. "acro":""
  529. },
  530. {  
  531. "term":"uniform resource locator",
  532. "def":"An object's global address on the Web, the first part of which indicates what protocol to use, whereas the second part specifies the IP address or the domain name where the resource is located.",
  533. "example":"The two URLs below point to two different files at the domain htwk-leipzig.de. ftp://www.htwk-leipzig.de/rzstuff.exe specifies an executable file that should be fetched using the FTP protocol; http://www.htwk-leipzig.de/index.html specifies a Web page that should be fetched using the HTTP protocol.",
  534. "termtag":"\"6767-4c92d168ea100\"",
  535. "deftag":"\"20140-4c92d1d1d1880\"",
  536. "extag":"\"7225e-4c92ceedc4680\"",
  537. "imagetag":"\"627e-4addb576c48c0\"",
  538. "acro":""
  539. },
  540. {  
  541. "term":"client",
  542. "def":"The computer or program which is utilizing functions provided by a server.",
  543. "example":"A web browser is effectively issuing client requests for pages from web servers. \n<br>Each client program is designed to work with one or more specific kinds of server programs.",
  544. "termtag":"\"3016-4c92d2b89b900\"",
  545. "deftag":"\"cead-4c92cf02bf800\"",
  546. "extag":"\"1ff9d-4c92d19899180\"",
  547. "imagetag":"\"7da2-4a626329d99c0\"",
  548. "acro":""
  549. },
  550. {  
  551. "term":"information science",
  552. "def":"A broad, interdisciplinary field, incorporating not only aspects of computer science, but often diverse fields such as cognitive science, commerce, communications, law, library science, management, mathematics, public policy, and the social sciences.",
  553. "example":"Information science is an interdisciplinary science primarily concerned with the collection, classification, manipulation, storage, retrieval and dissemination of information. Practitioners within the field of information science study the application and usage of knowledge in organizations, along with the interaction between people, organizations and any existing information systems, with the aim of creating, replacing or improving information systems.",
  554. "termtag":"\"5437-4c92d237dc940\"",
  555. "deftag":"\"2f112-4c92d27b92900\"",
  556. "extag":"\"50fb8-4c92d1bebeb80\"",
  557. "imagetag":null,
  558. "acro":""
  559. },
  560. {  
  561. "term":"editor",
  562. "def":"A software tool for inserting or removing characters in a data block.",
  563. "example":"There are various different editors, probably the best known ones are text editors allowing for manipulation of text files.",
  564. "termtag":"\"3904-4c92d2a959500\"",
  565. "deftag":"\"cb20-4c92d302fe880\"",
  566. "extag":"\"154a9-4c92cc7763740\"",
  567. "imagetag":"\"da4b-4ad0fb7a4fb00\"",
  568. "acro":""
  569. },
  570. {  
  571. "term":"local-area network",
  572. "def":"A communications network that serves users within a single building or complex. It is made up of servers, workstations, a communications link, and a network operating system.",
  573. "example":"Local area networks can be small, linking as few as three computers, or large, linking hundreds of computers used by thousands of people.",
  574. "termtag":"\"6e01-4c92cf69beb00\"",
  575. "deftag":"\"22434-4c92ce8b89ec0\"",
  576. "extag":"\"1a8fb-4c92cfe0f4440\"",
  577. "imagetag":"\"7e72-4aa884f53aa80\"",
  578. "acro":""
  579. },
  580. {  
  581. "term":"function",
  582. "def":"A special part of a program that contains routines which are required frequently by the main part of the program.",
  583. "example":"Functions are supported by many modern programming languages.\n<br>Parameters can be used to generalize the code in functions, and make them applicable more widely.",
  584. "termtag":"\"34e9-4c92d173679c0\"",
  585. "deftag":"\"1155d-4c92d212ab180\"",
  586. "extag":"\"1b328-4c92cd61fe0c0\"",
  587. "imagetag":"\"48e1-4ad13f4546c80\"",
  588. "acro":""
  589. },
  590. {  
  591. "term":"hexadecimal",
  592. "def":"The number system using base-16.",
  593. "example":"The hexadecimal numbers are 0-9 and then use the letters A-F.\n<br>Hexadecimal is a convenient way to express binary numbers in modern computers in which a byte is defined as containing eight binary digits.",
  594. "termtag":"\"3c64-4c92d33a4eb00\"",
  595. "deftag":"\"7d06-4c92d0f76d540\"",
  596. "extag":"\"2e3cb-4c92d2e756740\"",
  597. "imagetag":"\"15c2c-4aa2291688a00\"",
  598. "acro":""
  599. },
  600. {  
  601. "term":"top-level domain",
  602. "def":"The final and most general part of a domain name, such as .com, .org, .eu or .de.",
  603. "example":"There are two common types of top-level domains: generic top-level domains (gTLDs), such as .com, .net, .org. and country code top-level domains (ccTLDs) which are assigned to countries and continents, such as .uk, .de, .eu and .asia. New top-level domains (nTLDs) include the names of towns, regions and a wide range of commercial key words, such as .nyc, .bayern, .hotel, .med and .music.",
  604. "termtag":"\"4d9d-4c92d32b0c700\"",
  605. "deftag":"\"16f05-4c92d03e6a0c0\"",
  606. "extag":"\"735ea-4c92cdb219dc0\"",
  607. "imagetag":"\"5e2d-4addb5a673940\"",
  608. "acro":"TLD"
  609. },
  610. {  
  611. "term":"binary",
  612. "def":"A numbering system which consists of just two unique numbers, 0 and 1.",
  613. "example":"The decimal equivalent of a binary number can be found by summing all the digits. For example, the binary 10101 is equivalent to the decimal 1 + 4 + 16 = 21.",
  614. "termtag":"\"42b6-4c92d084fc740\"",
  615. "deftag":"\"11226-4c92d26973e40\"",
  616. "extag":"\"2d4ab-4c92cf28e5200\"",
  617. "imagetag":"\"d3c7-4adb32063b840\"",
  618. "acro":""
  619. },
  620. {  
  621. "term":"database",
  622. "def":"A collection of information organized in such a way that a computer program can quickly select desired pieces of data.",
  623. "example":"Database and file structures are determined by the software using the data.",
  624. "termtag":"\"361e-4c92d332ad900\"",
  625. "deftag":"\"134d8-4c92ceaed3200\"",
  626. "extag":"\"c6b1-4c92ceaa0e6c0\"",
  627. "imagetag":"\"abb4-4a627505c3c40\"",
  628. "acro":"DB"
  629. },
  630. {  
  631. "term":"app",
  632. "def":"A term which has been used as shorthand for \"application (program)\" in the IT community for decades but became newly popular for mobile applications.",
  633. "example":"As compared to widgets, apps need to be touched and opened to update and display the required information.",
  634. "termtag":"\"26d1-4c92d2823f8c0\"",
  635. "deftag":"\"1e973-4c92d17fcd700\"",
  636. "extag":"\"12639-4c92cdd46eec0\"",
  637. "imagetag":"\"c907-4abc9d70444c0\"",
  638. "acro":""
  639. },
  640. {  
  641. "term":"widget",
  642. "def":"A program that performs some simple function, such as providing a weather report or stock quote. It offers a GUI on the home screen of a mobile device or a website, which is periodically updated and, consequently, may cause lag due to automatic updates, which use CPU power and battery resources.",
  643. "example":"As compared to apps, widgets do not need to be touched to display the information they are designed for. \n<br>The main difference between a web widget and a desktop widget is that a web widget requires the user to be on a certain website while a desktop widget can always be displayed on the device.",
  644. "termtag":"\"2bb4-4c92ce430f3c0\"",
  645. "deftag":"\"3a236-4c92cd9e12e80\"",
  646. "extag":"\"344b0-4c92ce2b37b80\"",
  647. "imagetag":null,
  648. "acro":""
  649. },
  650. {  
  651. "term":"copyright",
  652. "def":"The legal rights of an author to control thereproduction, distribution, adaptation, and performance of his/her work, including software.",
  653. "example":"The copying of a copyrighted work without the permission of its author may subject the copier to both civil and criminal penalties.\n<br>There is usually a copyright notice attached to open-source programs, which is just to prevent anyone taking an application and trying to sell it.",
  654. "termtag":"\"46e1-4c92d225bde80\"",
  655. "deftag":"\"1e386-4c92d0a65d600\"",
  656. "extag":"\"34557-4c92d220f9340\"",
  657. "imagetag":"\"4525-4ad9cea0bfc00\"",
  658. "acro":""
  659. },
  660. {  
  661. "term":"systems administrator",
  662. "def":"The job title of professionals who install, maintain, and support an organization's information technology systems.",
  663. "example":"Systems administrators test system components to ensure that computers, software, and network equipment function seamlessly together. Sysadmins may be in charge of the company's LAN, WAN, intranet or Internet systems. Some administrators focus on specialist roles such as network security, IT audit, or system upgrade research.",
  664. "termtag":"\"6f31-4c92d28bc8f40\"",
  665. "deftag":"\"17fbd-4c92cfae68d00\"",
  666. "extag":"\"4d568-4c92d302fe880\"",
  667. "imagetag":null,
  668. "acro":"sysadmin"
  669. },
  670. {  
  671. "term":"to restrict",
  672. "def":"To keep or confine within certain limits or specified bounds.",
  673. "example":"If you have web pages that you do not wish to be publicly available to anyone in the world, you can take steps to restrict who can access them.",
  674. "termtag":"\"3c44-4c92ceab02900\"",
  675. "deftag":"\"c1b8-4c92d18c33440\"",
  676. "extag":"\"194fc-4c92ceefacb00\"",
  677. "imagetag":"\"7f94-4addb91f46a40\"",
  678. "acro":""
  679. },
  680. {  
  681. "term":"BitTorrent",
  682. "def":"A popular peer-to-peer technology for sharing media files over the Internet, which was developed and released by Bram Cohen in 2001.",
  683. "example":"BitTorrent does not use a centralized server to store the files. When you download a 'torrent,' you are also uploading a part of the file to another user. \n<br>BitTorrent balances the load on the computer, because broadband download speeds are faster than upload speeds.",
  684. "termtag":"\"408e-4c92cea361700\"",
  685. "deftag":"\"17d4d-4c92d304e6d00\"",
  686. "extag":"\"2dff7-4c92d0bc4c9c0\"",
  687. "imagetag":"\"649b-4abca1ceed400\"",
  688. "acro":""
  689. },
  690. {  
  691. "term":"user experience design",
  692. "def":"The application of user-centered design methods, user research data and process management techniques to affect and influence users of an interactive system in a predictable and measured way, in order to meet both their own goals and measures of success and enjoyment, as well as the objectives of the providing organization.",
  693. "example":"One of the fundamentals of User Experience Design is simply incorporating user feedback in to the design evolution process. \n<br>This conference track focuses on technologies and techniques for building more compelling user experiences, which includes design, performance, and the \"wow\" needed to draw users into your application and keep them coming back. \n<br>One of the key facets of Ajax and rich Web technologies is to deliver a substantial improvement in user experience over traditional Web applications.",
  694. "termtag":"\"6a3b-4c92ce22a2740\"",
  695. "deftag":"\"37900-4c92cf15d2500\"",
  696. "extag":"\"5ebb6-4c92cf7348180\"",
  697. "imagetag":null,
  698. "acro":"UXD"
  699. },
  700. {  
  701. "term":"to encrypt",
  702. "def":"To translate data by means of a secret key and thus preventing the information from being read by unauthorized parties.",
  703. "example":"Encrypted data needs to be decrypted before it can be read.\n<br>Public key encryption and symmetric key encryption are two ways of encrypting data.\n<br>Personal information sent over the Internet should always be encrypted.",
  704. "termtag":"\"3e0b-4c92cee9f3d80\"",
  705. "deftag":"\"1538a-4c92ccbeea000\"",
  706. "extag":"\"28447-4c92d2167ba80\"",
  707. "imagetag":"\"8da4-4addb95a675c0\"",
  708. "acro":""
  709. },
  710. {  
  711. "term":"overclocking",
  712. "def":"A method of forcing a computer component to run at a higher clock rate than designed or designated by the manufacturer.",
  713. "example":"Overclocking is commonly practiced by PC enthusiasts in order to increase the performance of their computer components such as processors, video cards, motherboard chipsets, or RAM.",
  714. "termtag":"\"3a4f-4c92cfc0877c0\"",
  715. "deftag":"\"15855-4c92d10897dc0\"",
  716. "extag":"\"244e9-4c92cf8843300\"",
  717. "imagetag":"\"253b2-47f82f784e380\"",
  718. "acro":""
  719. },
  720. {  
  721. "term":"to defrag",
  722. "def":"To reorganize the way information is stored on a computer disk so that all of the information belonging to a file is stored in a single, contiguous area of the disk.",
  723. "example":"Before you defrag your computer there are a number of steps you must take first. Read this entire procedure before you use the defrag utility.",
  724. "termtag":"\"3ae1-4c92cc9c94f00\"",
  725. "deftag":"\"1f5f6-4c92d088cd040\"",
  726. "extag":"\"19f72-4c92d20cf2400\"",
  727. "imagetag":"\"2f844-47f82f784e380\"",
  728. "acro":""
  729. },
  730. {  
  731. "term":"backbone",
  732. "def":"A larger transmission line that carries data gathered from smaller lines that interconnect with it.",
  733. "example":"On the Internet or other wide area network, a backbone is a set of paths that local or regional networks connect to for long-distance interconnection.",
  734. "termtag":"\"2edc-4c92d0128b940\"",
  735. "deftag":"\"f9b4-4c92ced4f8c00\"",
  736. "extag":"\"1aa95-4c92d10d5c900\"",
  737. "imagetag":"\"7efb-4a6251464e540\"",
  738. "acro":""
  739. },
  740. {  
  741. "term":"Serial Advanced Technology Attachment",
  742. "def":"A common computer bus interface for connecting host bus adapters to mass storage devices such as hard disk drives and optical drives.",
  743. "example":"As the name suggests, SATA is simply a serial link or interface standard used to control and transfer data and information from a server or storage appliance to a client application.",
  744. "termtag":"\"79d4-4c92d0fe1a500\"",
  745. "deftag":"\"1abf2-4c92cc6afda00\"",
  746. "extag":"\"2046f-4c92d08ba9700\"",
  747. "imagetag":"\"8915-47f82f784e380\"",
  748. "acro":""
  749. },
  750. {  
  751. "term":"object-oriented programming",
  752. "def":"A type of programming in which programmers define not only the data type of a data structure, but also the types of operations (functions) that can be applied to the data structure.",
  753. "example":"Object-oriented programming techniques facilitate the creation of modules that do not need to be changed when a new object is added. Furthermore, new objects can inherit many of their features from existing objects, which allows for quick and easy program modifications.",
  754. "termtag":"\"7c01-4c92d3531a580\"",
  755. "deftag":"\"231df-4c92cf1e67940\"",
  756. "extag":"\"3395d-4c92d12fb1a00\"",
  757. "imagetag":"\"695e-4ab50259381c0\"",
  758. "acro":""
  759. },
  760. {  
  761. "term":"binaries",
  762. "def":"An executable program in machine language.",
  763. "example":"When downloading, a fully functional program without any installer is often called binary file, program binary, or binaries (as opposed to the source code).",
  764. "termtag":"\"3eee-4c92d05365240\"",
  765. "deftag":"\"97b3-4c92cf51e72c0\"",
  766. "extag":"\"26bb5-4c92cffc9c580\"",
  767. "imagetag":"\"d1a2-4ae54841076c0\"",
  768. "acro":""
  769. },
  770. {  
  771. "term":"access point",
  772. "def":"A base station in a wireless LAN.",
  773. "example":"Access points are typically stand-alone devices that plug into an Ethernet hub or server.\n<br>This article describes how to configure a PC running FreeBSD to serve as an access point (AP) for your wireless network.",
  774. "termtag":"\"41da-4c92d0d147b40\"",
  775. "deftag":"\"7005-4c92d107a3b80\"",
  776. "extag":"\"27745-4c92d18d27680\"",
  777. "imagetag":"\"87ab-4a624db8802c0\"",
  778. "acro":"AP"
  779. },
  780. {  
  781. "term":"IT manager",
  782. "def":"The job title of professionals who are responsible for implementing and maintaining an organization's technology infrastructure.",
  783. "example":"Businesses rely on a central information processing system to support efficient data management and communications. The IT manager monitors the organization's operational requirements, researches strategies and technology solutions, and builds the most cost-effective and efficient system to achieve those goals.",
  784. "termtag":"\"5fac-4c92cf3086400\"",
  785. "deftag":"\"16efb-4c92d2ea32e00\"",
  786. "extag":"\"3f910-4c92cdb031940\"",
  787. "imagetag":null,
  788. "acro":""
  789. },
  790. {  
  791. "term":"digital signature",
  792. "def":"A mechanism used in public key cryptography to prevent a document from being changed by an unauthorized party. It contains a digest of the information encrypted using the private key of the sender.",
  793. "example":"Digital signatures can be decrypted by any party having access to the public key of the issuer, but cannot be changed as this would require the private key of the issuer.",
  794. "termtag":"\"485d-4c92cede82280\"",
  795. "deftag":"\"239e9-4c92d258495c0\"",
  796. "extag":"\"1cb25-4c92cea085040\"",
  797. "imagetag":"\"25182-4adf0316fa800\"",
  798. "acro":""
  799. },
  800. {  
  801. "term":"what you see is what you get",
  802. "def":"A system in which content displayed during editing appears very similar to the final output.",
  803. "example":"WYSIWYG implies the ability to directly manipulate the layout of a document without having to type or remember names of layout commands.\n<br>In former times, WYSIWYG referred to any word processor that could accurately show line breaks on the display screen. Present-day word processors must be able to display graphics and many different font sizes and typefaces to be considered WYSIWYG.",
  804. "termtag":"\"65d1-4c92d0ac16380\"",
  805. "deftag":"\"10578-4c92cdbba3440\"",
  806. "extag":"\"4b392-4c92cfc91cc00\"",
  807. "imagetag":null,
  808. "acro":""
  809. },
  810. {  
  811. "term":"IP address",
  812. "def":"A unique identifier for a computer or device, such as a printer, on a network.",
  813. "example":"The format of a conventional IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be zero to 255. \n<br>Increasing the IP address pool was a key factor in the development of IPv6, which complements the IPv4 32-bit address scheme with a much longer 128-bit address scheme. While IPv6 allows for a total of 2^128 total addresses, the IPv4 32-bit address scheme allows for a mere 2^32 addresses.",
  814. "termtag":"\"4ce4-4c92d300221c0\"",
  815. "deftag":"\"10638-4c92d26d44740\"",
  816. "extag":"\"7527f-4c92cf6035480\"",
  817. "imagetag":"\"5edc-4adfc6635ac40\"",
  818. "acro":""
  819. },
  820. {  
  821. "term":"antialiasing",
  822. "def":"The process of smoothing edges in images or sound roughness.",
  823. "example":"With sound, antialiasing removes frequencies above half the sampling frequencies.",
  824. "termtag":"\"450e-4c92d3367e200\"",
  825. "deftag":"\"ad87-4c92ceb768640\"",
  826. "extag":"\"10144-4c92d3245f740\"",
  827. "imagetag":"\"3d13-4abc94b1fe400\"",
  828. "acro":""
  829. },
  830. {  
  831. "term":"Apache",
  832. "def":"The most popular web server on the Internet since April 1996.",
  833. "example":"Apache HTTP Server (aka Apache Web Server or Apache httpd) originally evolved as a set of patches that Brian Behlendorf collated to improve NCSA HTTPd, hence a name that implies that it is a collection of patches -- 'A PAtCHy server'. The httpd wiki on the project's official site states that \"the name 'Apache' was chosen from respect for the Native American Indian tribe of Apache\". However, the 'a patchy server' explanation was initially given on the project's website.",
  834. "termtag":"\"44f3-4c92cfd48e700\"",
  835. "deftag":"\"118b1-4c92ce9e9cbc0\"",
  836. "extag":"\"a73a4-4c92cee346dc0\"",
  837. "imagetag":"\"4b7f-4adb34843d980\"",
  838. "acro":""
  839. },
  840. {  
  841. "term":"geek",
  842. "def":"A person who is inordinately dedicated to and involved with technology.",
  843. "example":"Being a geek implies a high level of literacy with the technology of computing. \n<br>A person from Greece is referred to as a Greek, whereas a computer enthusiast may be called a geek.",
  844. "termtag":"\"25ed-4c92d2b1ee940\"",
  845. "deftag":"\"ea99-4c92d00faf280\"",
  846. "extag":"\"2205f-4c92d1e113c80\"",
  847. "imagetag":"\"184eb-4aa12512ed6c0\"",
  848. "acro":""
  849. },
  850. {  
  851. "term":"topology",
  852. "def":"The shape of a local-area network (LAN) or other communications system.",
  853. "example":"Topologies are either physical or logical. \n<br>A network's topology (e.g. bus, star or ring) determines how different nodes in a network are connected to each other and how they communicate.",
  854. "termtag":"\"3ed7-4c92cc6450a40\"",
  855. "deftag":"\"dd7c-4c92d1b535500\"",
  856. "extag":"\"2ba2e-4c92ceb768640\"",
  857. "imagetag":"\"997b-4ac33f1918cc0\"",
  858. "acro":""
  859. },
  860. {  
  861. "term":"fiber optic",
  862. "def":"A cable technology for the transmission of data which consists of a bundle of glass threads, each of which is capable of transmitting messages modulated onto light waves.",
  863. "example":"The main disadvantage of fibre optic cables is that they are expensive to install.\n<br>Fiber optics is a particularly popular technology for local-area networks. In the future, almost all communications will employ fiber optics.",
  864. "termtag":"\"48b6-4c92cde0d4c00\"",
  865. "deftag":"\"1f01d-4c92cde96a040\"",
  866. "extag":"\"2a00a-4c92d1fcbbdc0\"",
  867. "imagetag":"\"2f297-4a6760e882dc0\"",
  868. "acro":""
  869. },
  870. {  
  871. "term":"structured query language",
  872. "def":"The most widely used database language for the management of information in relational database management systems (RDBMS).",
  873. "example":"The Structured Query Language (SQL) forms the backbone of all relational databases. \n<br>SQL offers a flexible interface for databases of all shapes and sizes and is used as the basis for all user and administrator interactions with the database.",
  874. "termtag":"\"7d1b-4c92d3540e7c0\"",
  875. "deftag":"\"1455a-4c92ce1360340\"",
  876. "extag":"\"31af7-4c92ce2673040\"",
  877. "imagetag":"\"888a-4ad9f1c5b6680\"",
  878. "acro":""
  879. },
  880. {  
  881. "term":"World Wide Web Consortium",
  882. "def":"An international community founded by Web inventor Tim Berners-Lee, the work of which revolves around the standardization of Web technologies.",
  883. "example":"The mission of the World Wide Web Consortium (W3C) is to lead the World Wide Web to its full potential by developing common protocols that promote its evolution and ensure its interoperability. \n<br>W3C standards define an Open Web Platform for application development that has the unprecedented potential to enable developers to build rich, interactive experiences, powered by vast data stores that are available on any device.",
  884. "termtag":"\"8a4e-4c92d29cf37c0\"",
  885. "deftag":"\"1d443-4c92ce20ba2c0\"",
  886. "extag":"\"5dcca-4c92d1e7c0c40\"",
  887. "imagetag":"\"63a7-4add98d6bbfc0\"",
  888. "acro":"W3C"
  889. },
  890. {  
  891. "term":"response time",
  892. "def":"The time a system or functional unit takes to react to a given input.",
  893. "example":"In a data system, the system response time is the interval between the receipt of the end of transmission of an inquiry message and the beginning of the transmission of a response message to the station originating the inquiry.\n<br>In terms of display technologies, response time is the amount of time a pixel takes to go from one value to another and back again, which is measured in milliseconds (ms).",
  894. "termtag":"\"46da-4c92d03204380\"",
  895. "deftag":"\"cd74-4c92d2aa4d740\"",
  896. "extag":"\"45c44-4c92d23ab9000\"",
  897. "imagetag":null,
  898. "acro":""
  899. },
  900. {  
  901. "term":"big data",
  902. "def":"A buzzword used to describe a massive volume of both structured and unstructured data that is so large that it is difficult to process by means of traditional database and software techniques.",
  903. "example":"An example of big data might be petabytes (1,024 terabytes) or exabytes (1,024 petabytes) of data consisting of billions to trillions of records of millions of people -- all from different sources.\n<br>Big data is particularly a problem in business analytics because standard tools and procedures are not designed to search and analyze massive datasets.\n<br>The term big data, especially when used by vendors, may also refer to the tools and processes that an organization requires to handle the large amounts of data and storage facilities.",
  904. "termtag":"\"4886-4c92d19e51f00\"",
  905. "deftag":"\"262c4-4c92ce9f90e00\"",
  906. "extag":"\"807d3-4c92d00255300\"",
  907. "imagetag":null,
  908. "acro":""
  909. },
  910. {  
  911. "term":"authorization",
  912. "def":"The process of granting or denying authenticated entities such as users or servers the right to perform privileged operations.",
  913. "example":"Authorization controls the access rights of the user while authentication merely ensures that the individual is who he or she claims to be.\n<br>Authorization can also refer to the right itself, as in \"Simon has the authorization to run that program.\"\n<br>If you're sure the page you're trying to reach shouldn't need authorization, the 401 Unauthorized error message may be a mistake.",
  914. "termtag":"\"4af6-4c92ce5716300\"",
  915. "deftag":"\"1cabd-4c92d28427d40\"",
  916. "extag":"\"55840-4c92cf51e72c0\"",
  917. "imagetag":null,
  918. "acro":""
  919. },
  920. {  
  921. "term":"network adaptor",
  922. "def":"An expansion circuit board to be inserted into the mainboard allowing the computer to be connected to a network.",
  923. "example":"Most network adaptors are designed for a particular type of network, protocol, and media, although some can serve multiple networks.",
  924. "termtag":"\"61f2-4c92d27115040\"",
  925. "deftag":"\"1577f-4c92d22005100\"",
  926. "extag":"\"19f74-4c92cc6bf1c40\"",
  927. "imagetag":"\"8315-4adc029980f80\"",
  928. "acro":""
  929. },
  930. {  
  931. "term":"shortcut",
  932. "def":"A combination of keystrokes that provides easier access to a command or operation. Alternatively, a symbolic file link, or symlink, usually displayed as an icon only containing the location of another file in the computer.",
  933. "example":"A keyboard shortcut is a finite set of one or more keys that invoke a software or operating system operation when triggered by the user. Ctrl-C and Ctrl-V seem to belong to the shortcuts that have become most common.\n<br>A file shortcut in Microsoft Windows is a small file containing a target URI or GUID, or the name of a target program file that the shortcut represents.",
  934. "termtag":"\"3aff-4c92d18d27680\"",
  935. "deftag":"\"2f4c8-4c92cfc640540\"",
  936. "extag":"\"486b7-4c92d00ebb040\"",
  937. "imagetag":"\"c7ae-4adc69d2dd8c0\"",
  938. "acro":""
  939. },
  940. {  
  941. "term":"machine code",
  942. "def":"Computer program instructions that are understood by the CPU.",
  943. "example":"Programs written in high-level languages are translated into assembly code or machine code by a compiler. Assembly programs are translated into machine code by a program called assembler. \n<br>Every type of CPU has a different set of machine code instructions.",
  944. "termtag":"\"53be-4c92ce7a5f640\"",
  945. "deftag":"\"cc7f-4c92ce7d3bd00\"",
  946. "extag":"\"361a1-4c92cd50d3840\"",
  947. "imagetag":"\"ad27-4ad9dba3eef40\"",
  948. "acro":""
  949. },
  950. {  
  951. "term":"proxy server",
  952. "def":"A server which sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.",
  953. "example":"Proxy servers have two main purposes: firstly, to improve performance and secondly, to filter requests.\n<br>A company might use a proxy server to prevent its employees from accessing a specific set of Web sites.",
  954. "termtag":"\"5c23-4c92d09903680\"",
  955. "deftag":"\"34631-4c92d1b9fa040\"",
  956. "extag":"\"2e856-4c92cdfc7cd40\"",
  957. "imagetag":"\"8619-4abe22cc66240\"",
  958. "acro":""
  959. },
  960. {  
  961. "term":"secure sockets layer",
  962. "def":"A leading security protocol on the Internet, originally developed by Netscape for creating a secure connection between a client and a server. Current upgrades partly operate under the name Transport Layer Security (TLS).",
  963. "example":"By convention, URLs that require an SSL or TLS connection start with https: instead of http:.\n<br>What happens when a browser tries to connect to a Web site secured with SSL? The browser requests the web server to identify itself. The server sends the browser a copy of its SSL certificate. The browser checks whether it trusts the SSL certificate. If so, it sends a message to the server. The server sends a digitally signed acknowledgement back to start an SSL encrypted session. Encrypted data is shared between the browser and the server.",
  964. "termtag":"\"6d6d-4c92cdc344640\"",
  965. "deftag":"\"2e493-4c92d0c4e1e00\"",
  966. "extag":"\"8899d-4c92cf94a9040\"",
  967. "imagetag":null,
  968. "acro":""
  969. },
  970. {  
  971. "term":"transmission control protocol",
  972. "def":"The transport layer protocol that enables two hosts to establish a connection, and exchange streams of data. It guarantees delivery of data in the same order in which it was sent.",
  973. "example":"TCP provides transport functions, which ensures that the total amount of bytes sent is received correctly at the other end.\n<br>UDP, which is part of the TCP/IP suite, is an alternate transport that does not guarantee delivery. It is widely used for real-time voice and video transmissions.",
  974. "termtag":"\"8750-4c92cf9e326c0\"",
  975. "deftag":"\"26389-4c92d0591dfc0\"",
  976. "extag":"\"4133a-4c92d15d78600\"",
  977. "imagetag":null,
  978. "acro":""
  979. },
  980. {  
  981. "term":"Ethernet",
  982. "def":"One of the most widely implemented local-area network technologies. Its specification served as a basis for the IEEE 802.3 standard, which specifies the physical and lower software layers.",
  983. "example":"Xerox, DEC and Intel developed the Ethernet architecture in 1976.\n<br>Meanwhile, the Ethernet physical layer evolved, and now it encompasses quite a few physical media interfaces and several magnitudes of speed. The most common forms used are 10BASE-T, 100BASE-TX, and 1000BASE-T. All three utilize twisted pair cables and run at 10 Mbits, 100 Mbits, and 1 Gbits, respectively. Fiber optic variants of Ethernet may offer high performance, electrical isolation and distance.",
  984. "termtag":"\"41d4-4c92d05735b40\"",
  985. "deftag":"\"2a42a-4c92cca52a340\"",
  986. "extag":"\"7cb35-4c92cefdfacc0\"",
  987. "imagetag":null,
  988. "acro":""
  989. },
  990. {  
  991. "term":"compression/decompression",
  992. "def":"A technology for compressing and decompressing data. It can be implemented in software, hardware, or a combination of both.",
  993. "example":"Telephone companies use codecs to convert binary signals transmitted on digital networks to analog signals suitable for audio playing.",
  994. "termtag":"\"5573-4c92d0f679300\"",
  995. "deftag":"\"17095-4c92d21a4c380\"",
  996. "extag":"\"192df-4c92d145a0dc0\"",
  997. "imagetag":null,
  998. "acro":""
  999. },
  1000. {  
  1001. "term":"random-access memory",
  1002. "def":"A type of computer memory that allows every byte to be accessed without touching the preceding bytes.The computer's working memory.",
  1003. "example":"The 'random' in RAM means that the contents of each byte of storage in the chip can be directly accessed without regard to the bytes before or after it. \n<br>When personal computers first came on the market in the late 1970s, 64 kilobytes of RAM was the upper limit.",
  1004. "termtag":"\"6d23-4c92cdcccdcc0\"",
  1005. "deftag":"\"19f4c-4c92cf3827600\"",
  1006. "extag":"\"38e47-4c92ce5ccf080\"",
  1007. "imagetag":"\"18a2e-4abe2968379c0\"",
  1008. "acro":""
  1009. },
  1010. {  
  1011. "term":"Internet protocol",
  1012. "def":"The network layer protocol that routes data packets from one computer to another on the Internet.",
  1013. "example":"The Internet protocol is something like the postal system. \n<br>IP accepts packets from TCP or UDP, adds its own header and delivers a 'datagram' to the data link layer protocol.",
  1014. "termtag":"\"4fc4-4c92d05271000\"",
  1015. "deftag":"\"131e9-4c92d25e02340\"",
  1016. "extag":"\"29e71-4c92cedd8e040\"",
  1017. "imagetag":null,
  1018. "acro":"IP"
  1019. },
  1020. {  
  1021. "term":"protocol",
  1022. "def":"An agreed set of procedures for transmitting data between two devices. It determines (1) the type of error checking to be used, (2) the data compression method, if applied, (3) how the sending device will indicate that it has finished sending a message, and (4) how the receiving device will indicate that it has received a message.",
  1023. "example":"While there is no universally accepted formal definition of \"protocol\" in computer science, an informal definition, based on the previous, could be \"a set of procedures to be followed when communicating\". In computer science, the word algorithm is a synonym for the word procedure, so a protocol is to communications what an algorithm is to mathematics.",
  1024. "termtag":"\"4855-4c92d01568000\"",
  1025. "deftag":"\"4a62d-4c92cf2514900\"",
  1026. "extag":"\"4d45e-4c92ce552de80\"",
  1027. "imagetag":null,
  1028. "acro":""
  1029. },
  1030. {  
  1031. "term":"fault-tolerant",
  1032. "def":"Computer systems that continue to work correctly despite errors occurring in calculations or communications.",
  1033. "example":"Many fault-tolerant computer systems mirror all operations. That is, every operation is performed on two or more duplicate systems, if one fails the others can take over.",
  1034. "termtag":"\"48f2-4c92d28704400\"",
  1035. "deftag":"\"11fdd-4c92d021cdd40\"",
  1036. "extag":"\"20b27-4c92d12ebd7c0\"",
  1037. "imagetag":"\"67bd-4a9f9cd783280\"",
  1038. "acro":""
  1039. },
  1040. {  
  1041. "term":"virtual local-area network",
  1042. "def":"A group of hosts with a common set of requirements that communicate as if they were attached to the same wire, or broadcast domain, regardless of their physical location.",
  1043. "example":"A VLAN has the same attributes as a physical local area network (LAN), but it allows for end stations to be grouped together even if they are not located on the same network switch. VLAN membership can be configured through software instead of physically relocating devices or connections.",
  1044. "termtag":"\"8b78-4c92d1c753fc0\"",
  1045. "deftag":"\"21ea5-4c92d0eed8100\"",
  1046. "extag":"\"41828-4c92ce31e4b40\"",
  1047. "imagetag":"\"bc0c-4ac3ffc521ec0\"",
  1048. "acro":""
  1049. },
  1050. {  
  1051. "term":"data type",
  1052. "def":"In programming, a classification that identifies concepts such as floating-point, integer, Boolean, or alphabetic. It states possible values, the operations that can be done on them, and the way the values are stored.",
  1053. "example":"Most programming languages require the programmer to declare the data type of data objects, and most database systems require the user to specify the type of each data field. The available data types vary from one programming language to another, and from one database application to another, but integer, floating point and character commonly occur in one form or another.",
  1054. "termtag":"\"4f63-4c92d29a17100\"",
  1055. "deftag":"\"2ec1c-4c92cf996db80\"",
  1056. "extag":"\"4c5af-4c92ccd108ac0\"",
  1057. "imagetag":"\"a55c-4adefe9043a40\"",
  1058. "acro":""
  1059. },
  1060. {  
  1061. "term":"patch",
  1062. "def":"A number of changes to an application program, distributed separately, to add features or fix bugs.",
  1063. "example":"A patch, service patch or changeset, is an up-to-date piece of object code that is inserted into (patched into) an executable program. A patch is designed to fix problems with, or update a computer program or its supporting data. \n<br>Patches typically are available as downloads over the Internet.",
  1064. "termtag":"\"2e89-4c92cf0b54c40\"",
  1065. "deftag":"\"12a73-4c92ce06fa600\"",
  1066. "extag":"\"3de76-4c92d0f5850c0\"",
  1067. "imagetag":null,
  1068. "acro":""
  1069. },
  1070. {  
  1071. "term":"Really Simple Syndication",
  1072. "def":"A family of web feed formats used to publish frequently updated digital content, such as blogs, news feeds or podcasts.",
  1073. "example":"Most commonly used to update news articles and other content that changes quickly, RSS feeds may also include audio files (PodCasts) or video files (VodCasts). \n<br>The user 'subscribes' to a feed by entering the link of the RSS feed into their RSS feed reader, which then checks the subscribed feeds to see if any have new content since the last time it checked, and if so, retrieves the new content and presents it to the user. \n<br>RSS also stood for 'Rich Site Summary' and 'RDF Site Summary.'",
  1074. "termtag":"\"5f51-4c92cf6035480\"",
  1075. "deftag":"\"17ad2-4c92ce515d580\"",
  1076. "extag":"\"68a1c-4c92d09bdfd40\"",
  1077. "imagetag":"\"4e60-47f82f784e380\"",
  1078. "acro":""
  1079. },
  1080. {  
  1081. "term":"plaintext",
  1082. "def":"In cryptography, ordinary readable text before being encrypted into ciphertext or after being decrypted.",
  1083. "example":"Digital certificates contain both plaintext and encrypted text.",
  1084. "termtag":"\"5590-4c92d08220080\"",
  1085. "deftag":"\"1926f-4c92d0f2a8a00\"",
  1086. "extag":"\"ead7-4c92cc6ce5e80\"",
  1087. "imagetag":"\"a1ca-4adc58f594f00\"",
  1088. "acro":""
  1089. },
  1090. {  
  1091. "term":"to broadcast",
  1092. "def":"To transmit data to every station connected to the network or network segment.",
  1093. "example":"In networking, a distinction is made between broadcasting and multicasting. Broadcasting sends a message to everyone on the network, whereas multicasting sends a message to a select list of recipients.",
  1094. "termtag":"\"527a-4c92cddeec780\"",
  1095. "deftag":"\"108e0-4c92d2425a200\"",
  1096. "extag":"\"2b9a3-4c92d0fa49c00\"",
  1097. "imagetag":null,
  1098. "acro":""
  1099. },
  1100. {  
  1101. "term":"secure shell",
  1102. "def":"A program to log into another computer over a network, allowing it to execute commands on a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels.",
  1103. "example":"SSH protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing.\n<br>When using SSH's login, the entire login session, including the transmission of the password, is encrypted. Therefore it is almost impossible for an outsider to collect passwords.",
  1104. "termtag":"\"69a8-4c92d2298e780\"",
  1105. "deftag":"\"320b4-4c92cf68ca8c0\"",
  1106. "extag":"\"42414-4c92cc80ecdc0\"",
  1107. "imagetag":null,
  1108. "acro":""
  1109. },
  1110. {  
  1111. "term":"semantic web",
  1112. "def":"A man-made woven web of data which enables machines to understand the semantics, or meaning, of information, and to comprehensively respond to complex human information requests.",
  1113. "example":"The term was coined by Tim Berners-Lee, who defines the Semantic Web as \"a web of data that can be processed directly and indirectly by machines.\" It builds upon the concept of the Semantic Network Model as a form to represent semantically structured knowledge. \n<br>The semantic web extends the network of hyperlinked human-readable web pages by inserting machine-readable metadata about pages and how they are related to each other, enabling automated agents to access the web more intelligently and perform tasks on behalf of users.",
  1114. "termtag":"\"64e8-4c92d0259e640\"",
  1115. "deftag":"\"26cc2-4c92ce35b5440\"",
  1116. "extag":"\"6e319-4c92cf9e326c0\"",
  1117. "imagetag":"\"4001-4ad9ecb97bdc0\"",
  1118. "acro":""
  1119. },
  1120. {  
  1121. "term":"mirror",
  1122. "def":"An exact copy of a data set, especially a website.",
  1123. "example":"Please find a list of mirrors of this website below. If you want to add your mirror to the list, see our Mass Mirroring WikiLeaks page.",
  1124. "termtag":"\"29ee-4c92d071e9a40\"",
  1125. "deftag":"\"b6d2-4c92d05cee8c0\"",
  1126. "extag":"\"18679-4c92d164255c0\"",
  1127. "imagetag":null,
  1128. "acro":""
  1129. },
  1130. {  
  1131. "term":"Asynchronous JavaScript and XML",
  1132. "def":"A group of interrelated web development techniques used on the client-side to create interactive web applications.",
  1133. "example":"AJAX is the art of exchanging data with a server, and update parts of a web page - without reloading the whole page.",
  1134. "termtag":"\"85a4-4c92cd9c2aa00\"",
  1135. "deftag":"\"13803-4c92d05088b80\"",
  1136. "extag":"\"15cd5-4c92d0301bf00\"",
  1137. "imagetag":null,
  1138. "acro":""
  1139. },
  1140. {  
  1141. "term":"unstructured data",
  1142. "def":"Any data that has no identifiable structure. Within a dataset or folder, a collection of images, videos, email and other text documents is considered to represent this kind of data.",
  1143. "example":"Data can be designated as unstructured or structured data for classification within an organization. \n<br>While each individual document may contain its own specific structure or formatting that is based on the software used to create the data, unstructured data may also be considered 'loosely structured data' because the data sources do have a structure, but all data within a dataset will not contain the same structure.",
  1144. "termtag":"\"60f4-4c92cfd953240\"",
  1145. "deftag":"\"2a3c8-4c92d347a8a80\"",
  1146. "extag":"\"57f43-4c92ce932b0c0\"",
  1147. "imagetag":null,
  1148. "acro":""
  1149. },
  1150. {  
  1151. "term":"jumper",
  1152. "def":"A plug that closes an electrical circuit.",
  1153. "example":"Jumpers are often used to configure expansion boards.\n<br>By placing a jumper plug over a different set of pins, the board's parameters are changed.",
  1154. "termtag":"\"3603-4c92d009f6500\"",
  1155. "deftag":"\"8e4c-4c92d289e0ac0\"",
  1156. "extag":"\"1c83f-4c92cf55b7bc0\"",
  1157. "imagetag":"\"21dbd-4aa7873e49400\"",
  1158. "acro":""
  1159. },
  1160. {  
  1161. "term":"redundant array of independent disks",
  1162. "def":"A system of storing the same data in different places on multiple hard disks to increase fault-tolerance and performance.",
  1163. "example":"A RAID appears to the operating system to be a single logical hard disk.\n<br>There are a number of RAID levels defined. However, contrary to common perception, a higher numbered RAID level is not necessarily superior to a lower numbered one.",
  1164. "termtag":"\"9440-4c92cf64f9fc0\"",
  1165. "deftag":"\"189ea-4c92d070015c0\"",
  1166. "extag":"\"37a64-4c92cdc344640\"",
  1167. "imagetag":"\"5743-4abe2de8417c0\"",
  1168. "acro":""
  1169. },
  1170. {  
  1171. "term":"compiler",
  1172. "def":"A program which translates a program written in a programming language into machine code, which is executable by the CPU.",
  1173. "example":"A compiler will find lexical errors. However, finding logical errors during compilation is impossible.",
  1174. "termtag":"\"3197-4c92d306cf180\"",
  1175. "deftag":"\"1615b-4c92d0b693c40\"",
  1176. "extag":"\"144e8-4c92ce0141880\"",
  1177. "imagetag":"\"5354-4a6266e84af00\"",
  1178. "acro":""
  1179. },
  1180. {  
  1181. "term":"memory-resident",
  1182. "def":"The characteristic of a program which is permanently kept in main memory.",
  1183. "example":"Certain programs can be marked as being memory-resident, which means that the operating system is not permitted to swap them out to a storage device; they will always remain in memory. \n<br>The programs and data used most frequently are the ones that should be memory resident.",
  1184. "termtag":"\"5bd1-4c92d2167ba80\"",
  1185. "deftag":"\"e41a-4c92d20739680\"",
  1186. "extag":"\"36995-4c92d046ff500\"",
  1187. "imagetag":null,
  1188. "acro":""
  1189. },
  1190. {  
  1191. "term":"cryptography",
  1192. "def":"The study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, and access authentication.The art of protecting information by transforming it into an unreadable format, called cipher text.",
  1193. "example":"Cryptography is used to protect e-mail messages, credit card information, and corporate data.\n<br>Cryptography systems can be broadly classified into symmetric-key systems that use a single key that both the sender and recipient have, and public-key systems that use two keys, a public key known to everyone and a private key that only the recipient of messages uses.",
  1194. "termtag":"\"3e8a-4c92d073d1ec0\"",
  1195. "deftag":"\"2d79d-4c92d0d60c680\"",
  1196. "extag":"\"45883-4c92cfa5d38c0\"",
  1197. "imagetag":"\"eb43-4adf02a1ad340\"",
  1198. "acro":""
  1199. },
  1200. {  
  1201. "term":"Joint Photographic Experts Group",
  1202. "def":"A standard algorithm for the compression of digital images, making it easy to store and transmit them.",
  1203. "example":"Unfortuntely, JPEG image compression reduces image quality by disposing of redundant pixels.",
  1204. "termtag":"\"72b5-4c92d143b8940\"",
  1205. "deftag":"\"13b6b-4c92cf8d07e40\"",
  1206. "extag":"\"13832-4c92cec79ec80\"",
  1207. "imagetag":"\"1a2ad-4a67771c68fc0\"",
  1208. "acro":""
  1209. },
  1210. {  
  1211. "term":"cascading style sheets",
  1212. "def":"A simple mechanism for adding style (e.g. fonts, colors, and spacing) to Web documents. It allows to adapt the presentation to different types of devices, such as large screens, small screens, or printers.",
  1213. "example":"CSS is independent of HTML and can be used with any XML-based markup language. The separation of HTML from CSS facilitates maintaining sites, sharing style sheets across pages, and tailoring pages to different environments. This is referred to as the separation of structure (or: content) from presentation.",
  1214. "termtag":"\"81f4-4c92cc7857980\"",
  1215. "deftag":"\"2cd39-4c92d22f47500\"",
  1216. "extag":"\"53408-4c92d30c87f00\"",
  1217. "imagetag":"\"d672-4adb37525b7c0\"",
  1218. "acro":""
  1219. },
  1220. {  
  1221. "term":"domain",
  1222. "def":"A group of computers and devices on a network that are administered as a unit with common rules and procedures.",
  1223. "example":"Within the Internet, domains are defined by IP addresses. All devices sharing a common part of an IP address are said to be in the same domain.",
  1224. "termtag":"\"3889-4c92cfc640540\"",
  1225. "deftag":"\"13a0c-4c92cfdb3b6c0\"",
  1226. "extag":"\"1a192-4c92d31334ec0\"",
  1227. "imagetag":null,
  1228. "acro":""
  1229. },
  1230. {  
  1231. "term":"bandwidth",
  1232. "def":"The amount of data that can be transmitted in a fixed amount of time.",
  1233. "example":"For digital devices, the bandwidth is usually expressed in bits per second (bps) or bytes per second (Bps).\n<br>If the required bandwidth of an application is large, it means that the application sends a large amount of data.",
  1234. "termtag":"\"31e4-4c92d1a8cf7c0\"",
  1235. "deftag":"\"b3a9-4c92d24fb4180\"",
  1236. "extag":"\"292dc-4c92d2b0fa700\"",
  1237. "imagetag":"\"790f-4adf01599cd40\"",
  1238. "acro":""
  1239. },
  1240. {  
  1241. "term":"application",
  1242. "def":"Any data entry, update, query or report program that processes data for the user. It includes office software (spreadsheets, word processors, database programs, etc.) as well as custom and packaged programs for various purposes.",
  1243. "example":"An application thus differs from an operating system (which runs a computer), a utility (which performs maintenance or general-purpose chores), and a programming language (with which computer programs are created).",
  1244. "termtag":"\"5a4b-4c92cc8e46d40\"",
  1245. "deftag":"\"37992-4c92d0eb07800\"",
  1246. "extag":"\"2cb0d-4c92ccc2ba900\"",
  1247. "imagetag":null,
  1248. "acro":""
  1249. },
  1250. {  
  1251. "term":"High-Speed Downlink Packet Access",
  1252. "def":"An enhanced 3G (third generation) mobile telephony communications protocol in the HSPA family which allows networks based on UMTS to support higher data transfer speeds and capacity.",
  1253. "example":"Current HSDPA deployments support down-link speeds of up to 14.4 Mbit/s. Further speed increases are available with HSPA+, which provides speeds of up to 42 Mbit/s down-link and 84 Mbit/s with Release 9 of the 3GPP standards.",
  1254. "termtag":"\"9108-4c92d13846e40\"",
  1255. "deftag":"\"28862-4c92cc9ba0cc0\"",
  1256. "extag":"\"3d80a-4c92ccb378500\"",
  1257. "imagetag":null,
  1258. "acro":""
  1259. },
  1260. {  
  1261. "term":"cloud app",
  1262. "def":"A program that is never installed on a local computer. Instead, it is accessed and used via the Internet.",
  1263. "example":"Short for cloud application, the term 'cloud app' describes application programs that can be directly accessed and used by means of a web browser.",
  1264. "termtag":"\"4072-4c92cca9eee80\"",
  1265. "deftag":"\"135f8-4c92ce674c940\"",
  1266. "extag":"\"19568-4c92d2973aa40\"",
  1267. "imagetag":"\"2f8a-4abcadda27e40\"",
  1268. "acro":""
  1269. },
  1270. {  
  1271. "term":"PHP (Hypertext Preprocessor)",
  1272. "def":"An open source, server-side, cross-platform, HTML-embedded scripting language used to create dynamic web pages.",
  1273. "example":"PHP is commonly used to extract data out of a database and present it on the web page.\n<br>The major Linux and Windows Web servers support PHP, and it is widely used with the mySQL database.",
  1274. "termtag":"\"b856-4c92cd9f070c0\"",
  1275. "deftag":"\"1e150-4c92d0dad11c0\"",
  1276. "extag":"\"2ecba-4c92cf59884c0\"",
  1277. "imagetag":"\"1cd56-4abde1b2f0b80\"",
  1278. "acro":""
  1279. },
  1280. {  
  1281. "term":"file sharing",
  1282. "def":"A network application allowing users to view, modify, copy, or print computer data with various levels of access privilege.",
  1283. "example":"While files can be easily shared outside a network, the term file sharing refers to sharing files in a network.\n<br>Any multi-user operating system will provide some form of file sharing.",
  1284. "termtag":"\"3c9b-4c92cc6821340\"",
  1285. "deftag":"\"17660-4c92ce430f3c0\"",
  1286. "extag":"\"234d0-4c92d1e4e4580\"",
  1287. "imagetag":"\"57d3-4a9fa0a34e740\"",
  1288. "acro":""
  1289. },
  1290. {  
  1291. "term":"software engineering",
  1292. "def":"The application of a systematic, disciplined, quantifiable approach to the development, operation and maintenance of software, and to the study of these approaches. In other words, the application of computer science, mathematics and engineering practices to software.",
  1293. "example":"Software engineering applies the scientific knowledge acquired in the foundations of computer science to the development, operation, and maintenance of different systems, such as operating systems, micro-controllers for automobile engines, flight attendance systems, power station controls, ATM software systems, and e-commerce applications.",
  1294. "termtag":"\"4d50-4c92d222e17c0\"",
  1295. "deftag":"\"2f885-4c92cf4769a00\"",
  1296. "extag":"\"3dbf8-4c92cc6450a40\"",
  1297. "imagetag":null,
  1298. "acro":"SE"
  1299. },
  1300. {  
  1301. "term":"hash function",
  1302. "def":"An algorithm that turns a variable-sized amount of data into a fixed-sized output.",
  1303. "example":"Hash functions are used for creating digital signatures.",
  1304. "termtag":"\"4003-4c92d116e5f80\"",
  1305. "deftag":"\"1086c-4c92d274e5940\"",
  1306. "extag":"\"99e0-4c92ce7a5f640\"",
  1307. "imagetag":null,
  1308. "acro":""
  1309. },
  1310. {  
  1311. "term":"structured programming",
  1312. "def":"A subset of procedural programming that enforces a logical structure on the program being written.",
  1313. "example":"With structured programming, large routines are broken down into small, modular routines. The use of the GOTO statement is discouraged in structured programming.\n<br>Edsger Dijkstra's article, 'Go To Statement Considered Harmful' was instrumental in the trend towards structured programming.",
  1314. "termtag":"\"6a5e-4c92d2c9c6180\"",
  1315. "deftag":"\"1401e-4c92d24dcbd00\"",
  1316. "extag":"\"3a202-4c92cf3086400\"",
  1317. "imagetag":null,
  1318. "acro":""
  1319. },
  1320. {  
  1321. "term":"connectivity",
  1322. "def":"A computer buzzword which describes the ability of programs and or devices to link with other programs and devices.",
  1323. "example":"For example, a program that can import data from a wide variety of other programs and can export data in many different formats is said to have good connectivity. On the other hand, computers that have difficulty linking into a network have poor connectivity. \n<br>802.11n is the standard implementation for wireless connectivity.",
  1324. "termtag":"\"4b4a-4c92cfc0877c0\"",
  1325. "deftag":"\"1968b-4c92ce9513540\"",
  1326. "extag":"\"4a4d8-4c92d2519c600\"",
  1327. "imagetag":null,
  1328. "acro":""
  1329. },
  1330. {  
  1331. "term":"SOAP",
  1332. "def":"A lightweight XML-based messaging protocol used to encode the information in Web service request and response messages before sending them over a network.",
  1333. "example":"SOAP specifies exactly how to encode an HTTP header and an XML file so that a program in one computer can call a program in another computer and pass it information. It also specifies how the called program can return a response.\n<br>SOAP messages are independent of any operating system or protocol and may be transported using a variety of Internet protocols.",
  1334. "termtag":"\"1f8b-506bc14f879c0\"",
  1335. "deftag":"\"22995-4c92cf3a0fa80\"",
  1336. "extag":"\"53ced-4c92ce71ca200\"",
  1337. "imagetag":"\"a76e-4adc6d8e72740\"",
  1338. "acro":""
  1339. },
  1340. {  
  1341. "term":"registered jack 45",
  1342. "def":"An eight-wire connector commonly used to connect computers onto local-area networks (LANs), especially Ethernets.",
  1343. "example":"RJ45 connectors look similar to the ubiquitous RJ11 connectors used for connecting telephone equipment, but they are somewhat wider.",
  1344. "termtag":"\"81f2-4c92ce08e2a80\"",
  1345. "deftag":"\"16802-4c92d2a771080\"",
  1346. "extag":"\"1df59-4c92cf90d8740\"",
  1347. "imagetag":"\"16e6f-4abe2f89f7140\"",
  1348. "acro":""
  1349. },
  1350. {  
  1351. "term":"simple mail transfer protocol",
  1352. "def":"A standard protocol for sending email messages between servers or from a mail client to a mail server.",
  1353. "example":"Most email systems, which send mail over the Internet, use SMTP to transfer messages from one server to another one. Furthermore, SMTP is generally used to send messages from a mail client to a mail server. This is why you need to specify both the POP or IMAP server and the SMTP server when you configure your email application.",
  1354. "termtag":"\"840c-4c92d258495c0\"",
  1355. "deftag":"\"138f5-4c92ce85d1140\"",
  1356. "extag":"\"44528-4c92d089c1280\"",
  1357. "imagetag":null,
  1358. "acro":""
  1359. },
  1360. {  
  1361. "term":"jitter",
  1362. "def":"An abrupt and unwanted variation of one or more signal characteristics, such as the interval between successive pulses, the amplitude of successive cycles, or the frequency or phase of successive cycles.",
  1363. "example":"Jitter may be specified in qualitative terms (e.g. amplitude, phase, pulse width or pulse position), or quantitative terms (e.g. mean, RMS, or peak-to-peak displacement). \n<br>Inside digital to analog converters jitter causes unwanted high-frequency distortion, which can be suppressed with high fidelity clock signal usage.",
  1364. "termtag":"\"3f43-4c92cf865ae80\"",
  1365. "deftag":"\"246f0-4c92ce6840b80\"",
  1366. "extag":"\"46bd5-4c92d1b34d080\"",
  1367. "imagetag":"\"a78f-4adb3e524fb80\"",
  1368. "acro":""
  1369. },
  1370. {  
  1371. "term":"common gateway interface",
  1372. "def":"An interface between a web server and applications, which allows for the web server to interact with the applications and thus to offer extended functionality.",
  1373. "example":"The versatility of CGI gives programmers the opportunity to write gateway programs in almost any language.",
  1374. "termtag":"\"6c70-4c92cf8843300\"",
  1375. "deftag":"\"1f783-4c92d0bd40c00\"",
  1376. "extag":"\"18cbe-4c92d1a4feec0\"",
  1377. "imagetag":"\"59a1-4a6264676c700\"",
  1378. "acro":""
  1379. },
  1380. {  
  1381. "term":"Internet control message protocol",
  1382. "def":"An integral part of the internet protocol used for transferring control messages between hosts.",
  1383. "example":"ICMP supports packets containing error, control, and informational messages. \n<br>The ping command, for example, uses ICMP to test an Internet connection.",
  1384. "termtag":"\"79fc-4c92cfb6fe140\"",
  1385. "deftag":"\"12950-4c92d194c8880\"",
  1386. "extag":"\"23abb-4c92d224c9c40\"",
  1387. "imagetag":null,
  1388. "acro":""
  1389. },
  1390. {  
  1391. "term":"remote procedure call",
  1392. "def":"A type of protocol that allows a program on a client to execute a program on a server. The client program sends a message to the server with appropriate arguments, and the server returns a message containing the results of the program executed.",
  1393. "example":"Each remote procedure call has two sides: an active client side that makes the call to a server side, which sends a reply back to the client.\n<br>Sun Microsystems developed the first widely used RPC protocol as part of their Open Network Computing architecture in the early 1980s.",
  1394. "termtag":"\"78ad-4c92d2c3191c0\"",
  1395. "deftag":"\"30431-4c92d12534140\"",
  1396. "extag":"\"43207-4c92d0c111500\"",
  1397. "imagetag":null,
  1398. "acro":"RPC"
  1399. },
  1400. {  
  1401. "term":"post-processing",
  1402. "def":"A term which collectively denotes the methods and processes of editing images, sound and video recordings.",
  1403. "example":"Depending on the media, programmers, media professionals, photographers and artists can choose from a wide variety of methods and tools for digital post-processing purposes. Post-processing is all about changing the perceived quality of media while minimizing the size of files and programs.\n<br>It is important to understand that video post-processing always involves a trade-off between speed, smoothness and sharpness.",
  1404. "termtag":"\"5f68-4c92d08f7a000\"",
  1405. "deftag":"\"169b0-4c92ce7b53880\"",
  1406. "extag":"\"5a05e-4c92cdd83f7c0\"",
  1407. "imagetag":null,
  1408. "acro":""
  1409. },
  1410. {  
  1411. "term":"frame synchronization",
  1412. "def":"The process of synchronizing display pixel scanning to a synchronization source.",
  1413. "example":"Frame synchronization involves two main processes:\n<br><ul><li>Frame lock and swap - synchronizing applications across multiple displays or windows\n</li><li>Genlock - synchronizing one or more systems to a common sync source</li></ul>",
  1414. "termtag":"\"5939-4c92d29de7a00\"",
  1415. "deftag":"\"e90e-4c92cdad55280\"",
  1416. "extag":"\"29e55-4c92d16331380\"",
  1417. "imagetag":null,
  1418. "acro":""
  1419. },
  1420. {  
  1421. "term":"ZeuS",
  1422. "def":"The most widespread botnet in history. A trojan with more than 50,000 variants that infiltrate computers in order to steal banking information and other sensitive data by logging keystrokes and grabbing forms.",
  1423. "example":"In May, 2011, source code of ZeuS was published as public domain. Since that time, several mobile botnet variants of ZeuS have surfaced, targeting all popular mobile phone systems, such as Google Android, Blackberry, Symbian, or Windows Mobile. They&nbsp;are designed to steal the mobile transaction authentication numbers that banks use to strengthen security for logging in to online accounts.",
  1424. "termtag":"\"3eec-4c92d332ad900\"",
  1425. "deftag":"\"2e50a-4c92d03c81c40\"",
  1426. "extag":"\"51086-4c92cff4fb380\"",
  1427. "imagetag":null,
  1428. "acro":""
  1429. },
  1430. {  
  1431. "term":"traffic meter",
  1432. "def":"A router feature that monitors the data consumption (upload and download) of all the devices on a network and notifies the administrator when a predefined threshold is approached.",
  1433. "example":"A traffic meter is useful if your ISP is enforcing a maximum monthly data transfer allocation.",
  1434. "termtag":"\"531f-4c92d0a5693c0\"",
  1435. "deftag":"\"226df-4c92d34d61800\"",
  1436. "extag":"\"176c2-4c92ce85d1140\"",
  1437. "imagetag":"\"5bb7-4addbc76b8c80\"",
  1438. "acro":""
  1439. }
  1440. ]"
Add Comment
Please, Sign In to add comment