Guest User

english webcourse

a guest
Jun 25th, 2017
71
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 159.63 KB | None | 0 0
  1. {
  2. "term":"access point",
  3. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/91c120dfc68a292dcd6d634e40415f8a.ogg",
  4. "def":"A base station in a wireless LAN.",
  5. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/9d1afa101913b8bf4573e65d8daa085b.ogg",
  6. "example":"Access points are typically stand-alone devices that plug into an Ethernet hub or server.\n<br>This article describes how to configure a PC running FreeBSD to serve as an access point (AP) for your wireless network.",
  7. "termId":"2086",
  8. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/27c044bb8d10040b0b5493ce134ce305.jpg",
  9. "acro":"AP",
  10. "trans":"Zugangspunkt"
  11. }{
  12. "term":"accounting",
  13. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/60b46b5f9657fcc003dd1a2ad9ff462e.ogg",
  14. "def":"In information technology, the process of keeping track of a user's activity while accessing a network's resources, including the amount of time spent in the network, the services accessed while there and the amount of data transferred during the session.",
  15. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/d21e1f265244a5637aec07cedc26d58b.ogg",
  16. "example":"Accounting systems measure the resources a user consumes during access. \n<br>Accounting is carried out by logging of session statistics and usage information. Accounting data is used for cost allocation, billing, trend analysis, resource utilization, and capacity planning activities.",
  17. "termId":"2192",
  18. "imageUrl":"",
  19. "acro":"",
  20. "trans":""
  21. }{
  22. "term":"agile software development",
  23. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/fe3d176d08ec59371668988750122520.ogg",
  24. "def":"A group of software development methodologies based on iterative and incremental development, where requirements and solutions evolve through collaboration between self-organizing, cross-functional teams.",
  25. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/5343b60936d4485633d5abaf3acd4dc2.ogg",
  26. "example":"The Manifesto for Agile Software Development states: \"We are uncovering better ways of developing software by doing it and helping others do it. Through this work we have come to value: Individuals and interactions over processes and tools, working software over comprehensive documentation, customer collaboration over contract negotiation, and responding to change over following a plan. That is, while there is value in the items on the right, we value the items on the left more.\"",
  27. "termId":"2054",
  28. "imageUrl":"",
  29. "acro":"",
  30. "trans":""
  31. }{
  32. "term":"algorithm",
  33. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/9ba9b7c5c68b68c9d8d64e30338e2e46.ogg",
  34. "def":"A step-by-step problem-solving procedure, especially an established, recursive computational procedure for solving a problem in a finite number of steps.",
  35. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/cd2f1caf8266807299fc701a57581f71.ogg",
  36. "example":"Inventing elegant algorithms, i.e. algorithms that are simple and require the fewest steps possible, is one of the principal challenges in programming.\n<br>Flowcharts are often used to represent algorithms graphically.",
  37. "termId":"2055",
  38. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/b2d3bed9f9eeb2e3b5885a4b2c3973eb.jpg",
  39. "acro":"",
  40. "trans":"Algorithmus, Rechenregel"
  41. }{
  42. "term":"Android",
  43. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/cdc2f7f0f530b551e7471f0e6700679a.ogg",
  44. "def":"A widespread open-source mobile operating system the updates of which have been developed under dessert-inspired code names, with each new version arriving in alphabetical order with new enhancements and improvements to the software development kit.",
  45. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/61b16f6e39bf53ae24f84b2c42ea66f4.ogg",
  46. "example":"The Android platform is Google Inc.'s open and free software stack that includes an operating system, middleware and key applications for use on mobile devices, including smartphones. Android is an Open Handset Alliance Project.\n<br>Science fiction described androids, automatons or golems as robots with a human appearance.",
  47. "termId":"2056",
  48. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/4ffbcb7dc1925e5711586f1a8c6b8fed.jpg",
  49. "acro":"",
  50. "trans":""
  51. }{
  52. "term":"antialiasing",
  53. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/f9145fe972408050768b69cc597a39d7.ogg",
  54. "def":"The process of smoothing edges in images or sound roughness.",
  55. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/3daf20c01529ae589a3798007cb928b1.ogg",
  56. "example":"With sound, antialiasing removes frequencies above half the sampling frequencies.",
  57. "termId":"2087",
  58. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/37a1bc6154ade9cdc55cabe588209f16.jpg",
  59. "acro":"",
  60. "trans":"Treppeneffektglättung, Kantenglättung"
  61. }{
  62. "term":"Apache",
  63. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/668dce94bf3c3cf80ef76c84ba6835c6.ogg",
  64. "def":"The most popular web server on the Internet since April 1996.",
  65. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/3a2a779874e5bc26cdce0dbe99dd837a.ogg",
  66. "example":"Apache HTTP Server (aka Apache Web Server or Apache httpd) originally evolved as a set of patches that Brian Behlendorf collated to improve NCSA HTTPd, hence a name that implies that it is a collection of patches -- 'A PAtCHy server'. The httpd wiki on the project's official site states that \"the name 'Apache' was chosen from respect for the Native American Indian tribe of Apache\". However, the 'a patchy server' explanation was initially given on the project's website.",
  67. "termId":"2228",
  68. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/b769c0546224f5a474a0e3b919928959.jpg",
  69. "acro":"",
  70. "trans":""
  71. }{
  72. "term":"app",
  73. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/dce60ab0e54dee2d89cfa78878a8228b.ogg",
  74. "def":"A term which has been used as shorthand for \"application (program)\" in the IT community for decades but became newly popular for mobile applications.",
  75. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/b27c0750e55a5207d424578dce2bd669.ogg",
  76. "example":"As compared to widgets, apps need to be touched and opened to update and display the required information.",
  77. "termId":"2108",
  78. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/a827c742154b04995a933bfb942c2f9d.jpg",
  79. "acro":"",
  80. "trans":""
  81. }{
  82. "term":"applet",
  83. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/bedee2fa35432598643e11d4fdb25844.ogg",
  84. "def":"A small program written in Java and designed to run within a World Wide Web page.",
  85. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/8608eb36fde09337a60425bbf8260972.ogg",
  86. "example":"Java programs that are run from the browser are known as applets.\n<br>When a Java-enabled browser encounters an APPLET tag inside an HTML document, it will load and begin executing the specified applet within the context of the Web page.",
  87. "termId":"2088",
  88. "imageUrl":"",
  89. "acro":"",
  90. "trans":""
  91. }{
  92. "term":"application",
  93. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/081e27dafe96474a6fd3e8e38dd2a0b8.ogg",
  94. "def":"Any data entry, update, query or report program that processes data for the user. It includes office software (spreadsheets, word processors, database programs, etc.) as well as custom and packaged programs for various purposes.",
  95. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/9787bb11f81f468cc453a274c9a4a3f1.ogg",
  96. "example":"An application thus differs from an operating system (which runs a computer), a utility (which performs maintenance or general-purpose chores), and a programming language (with which computer programs are created).",
  97. "termId":"2301",
  98. "imageUrl":"",
  99. "acro":"",
  100. "trans":"Anwendung"
  101. }{
  102. "term":"application programming interface",
  103. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/9464314eb214b3ea21c35c52cdab1815.ogg",
  104. "def":"A language and message format used by an application program to communicate with the operating system or some other control program such as a database management system (DBMS) or communications protocol.",
  105. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/f0dee75f657a72891ba6e81cec973c0f.ogg",
  106. "example":"APIs are implemented by writing function calls in the program, which provide the linkage to the required subroutine for execution. Thus, an API implies that some program module is available in the computer to perform the operation or that it must be linked into the existing program to perform the tasks.",
  107. "termId":"2259",
  108. "imageUrl":"",
  109. "acro":"API",
  110. "trans":""
  111. }{
  112. "term":"application sharing",
  113. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/7796d8c00ec4754e0c86ce940963482a.ogg",
  114. "def":"A feature of videoconferencing systems that allows conference participants to run the same program simultaneously, even if they do not have it on their own computers.",
  115. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/7a6ea25b1586f97c7b1fbc097949cf6c.ogg",
  116. "example":"Application sharing uses the Internet to remotely view and control a program on someone else's computer.\n<br>The greatest benefit of application sharing is that a remote user can run software that is not installed on his computer, even software that is not compatible with his operating system, or that requires much more processing power than his computer can usually handle.",
  117. "termId":"2199",
  118. "imageUrl":"",
  119. "acro":"",
  120. "trans":""
  121. }{
  122. "term":"Asynchronous JavaScript and XML",
  123. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/138ea083d9eee01f95972ea6d8025c54.ogg",
  124. "def":"A group of interrelated web development techniques used on the client-side to create interactive web applications.",
  125. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/7c3eb5921122030849fa4ec9b3b4e043.ogg",
  126. "example":"AJAX is the art of exchanging data with a server, and update parts of a web page - without reloading the whole page.",
  127. "termId":"2046",
  128. "imageUrl":"",
  129. "acro":"AJAX",
  130. "trans":""
  131. }{
  132. "term":"authentication",
  133. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/dc9daa865ece8f8f6417e8e8c4277078.ogg",
  134. "def":"To pass a security procedure, which protects a network against acceptance of a fraudulent transmission or simulation by establishing the validity of a transmission, message, or originator.",
  135. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/e5c3bd9eb6beade4aac2983c22c7756f.ogg",
  136. "example":"Logically, authentication, which is the process of determining whether someone or something is who or what it is declared to be, precedes authorization although they may often seem to be combined.\n<br>The use of digital certificates issued and verified by a certificate authority as part of a public key infrastructure has become a standard way to perform authentication on the Internet. \n<br>Please note that the noun 'authenti<strong><em>fi</em></strong>cation' is not an English word and, consequently, not used by native speakers.",
  137. "termId":"2195",
  138. "imageUrl":"",
  139. "acro":"",
  140. "trans":""
  141. }{
  142. "term":"authentication, authorization and accounting",
  143. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/e91ff79f2d1ca8f2b267fbf73c89db1c.ogg",
  144. "def":"A framework of combined processes that are considered vital for effective network management and security. It includes intelligent access control, enforcement of policies, audit of usage, and provision of information for billing purposes.",
  145. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/8f32babe57d6f998070640e075aebcff.ogg",
  146. "example":"Authentication, authorization, and accounting services are often provided by a dedicated AAA server, a program that performs these functions. A current standard by which network access servers interface with the AAA server is the Remote Authentication Dial-In User Service (RADIUS).",
  147. "termId":"2193",
  148. "imageUrl":"",
  149. "acro":"AAA",
  150. "trans":""
  151. }{
  152. "term":"authorization",
  153. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/2dfdab755a4ab808915b3f2fa8af1afa.ogg",
  154. "def":"The process of granting or denying authenticated entities such as users or servers the right to perform privileged operations.",
  155. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/dd534678fef89d98015c7d885ba90327.ogg",
  156. "example":"Authorization controls the access rights of the user while authentication merely ensures that the individual is who he or she claims to be.\n<br>Authorization can also refer to the right itself, as in \"Simon has the authorization to run that program.\"\n<br>If you're sure the page you're trying to reach shouldn't need authorization, the 401 Unauthorized error message may be a mistake.",
  157. "termId":"2198",
  158. "imageUrl":"",
  159. "acro":"",
  160. "trans":""
  161. }{
  162. "term":"backbone",
  163. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/6fcee786f75be45ec8cda448d99bceea.ogg",
  164. "def":"A larger transmission line that carries data gathered from smaller lines that interconnect with it.",
  165. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/4218a7e077674180e7f1cfb118ead57f.ogg",
  166. "example":"On the Internet or other wide area network, a backbone is a set of paths that local or regional networks connect to for long-distance interconnection.",
  167. "termId":"2089",
  168. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/6338bf7e2a39d6a90a35bbf4a6e246f4.jpg",
  169. "acro":"",
  170. "trans":"Datenübertragungsleitung, Basisnetz"
  171. }{
  172. "term":"bandwidth",
  173. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/bb1cc0a4d9692447812e83bd8079408c.ogg",
  174. "def":"The amount of data that can be transmitted in a fixed amount of time.",
  175. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/d47857a4d208362ef70ec538c2973b08.ogg",
  176. "example":"For digital devices, the bandwidth is usually expressed in bits per second (bps) or bytes per second (Bps).\n<br>If the required bandwidth of an application is large, it means that the application sends a large amount of data.",
  177. "termId":"2401",
  178. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/91b81a41aadc69a7829259609e1769fd.jpg",
  179. "acro":"",
  180. "trans":"Bandbreite"
  181. }{
  182. "term":"bare die",
  183. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/2093c6c330debe510330fa9d4f3c0958.ogg",
  184. "def":"An integrated circuit (IC) that has been cut out from the wafer, and is ready for packaging.",
  185. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/9fd503db2a0a35a1cf5e99ebb30dfb20.ogg",
  186. "example":"Chip-on-board is the most mature and largest part of the bare die market. \n<br>In the wire bond method, the bare die faces up and is attached to the package via wires while the flip chip faces down and is typically attached via solder bumps.",
  187. "termId":"2168",
  188. "imageUrl":"",
  189. "acro":"",
  190. "trans":"Nacktchip"
  191. }{
  192. "term":"basic input/output system",
  193. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/d06f3e0165cb7f0b2a53f11099c4805d.ogg",
  194. "def":"An essential set of routines that sets up the hardware in a PC and boots the operating system.",
  195. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/6c3db40cc5d3477bc9e643064ecb7827.ogg",
  196. "example":"Prior to loading the operating system, the BIOS provides basic software drivers for all peripheral technologies that are part of the PC's motherboard, including the keyboard, mouse, monitor and hard disk.",
  197. "termId":"2090",
  198. "imageUrl":"",
  199. "acro":"BIOS",
  200. "trans":""
  201. }{
  202. "term":"big data",
  203. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/b940b60987f9f9a4b7fdd8d96b107ee4.ogg",
  204. "def":"A buzzword used to describe a massive volume of both structured and unstructured data that is so large that it is difficult to process by means of traditional database and software techniques.",
  205. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/3a764404e46e11db2141b6cc6822d697.ogg",
  206. "example":"An example of big data might be petabytes (1,024 terabytes) or exabytes (1,024 petabytes) of data consisting of billions to trillions of records of millions of people -- all from different sources.\n<br>Big data is particularly a problem in business analytics because standard tools and procedures are not designed to search and analyze massive datasets.\n<br>The term big data, especially when used by vendors, may also refer to the tools and processes that an organization requires to handle the large amounts of data and storage facilities.",
  207. "termId":"2210",
  208. "imageUrl":"",
  209. "acro":"",
  210. "trans":""
  211. }{
  212. "term":"binaries",
  213. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/7d409c0c90d3c4a443e1c6cc9cfd8f3c.ogg",
  214. "def":"An executable program in machine language.",
  215. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/5410dce307dfe408696c13d3972a67e6.ogg",
  216. "example":"When downloading, a fully functional program without any installer is often called binary file, program binary, or binaries (as opposed to the source code).",
  217. "termId":"2178",
  218. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/8e55c51604d30aa9b95b0101edb54d11.jpg",
  219. "acro":"",
  220. "trans":""
  221. }{
  222. "term":"binary",
  223. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/85df70c820d5a9d183111d107eaccb67.ogg",
  224. "def":"A numbering system which consists of just two unique numbers, 0 and 1.",
  225. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/d9c6d450c987d866b2f172da87ae38f3.ogg",
  226. "example":"The decimal equivalent of a binary number can be found by summing all the digits. For example, the binary 10101 is equivalent to the decimal 1 + 4 + 16 = 21.",
  227. "termId":"2179",
  228. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/af5a02f32f1019d26f7f1d0429b94421.jpg",
  229. "acro":"",
  230. "trans":"binär, dual"
  231. }{
  232. "term":"BitTorrent",
  233. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/3b16128dbe95dad59c5e2d89dd970f1d.ogg",
  234. "def":"A popular peer-to-peer technology for sharing media files over the Internet, which was developed and released by Bram Cohen in 2001.",
  235. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/f218cfa2f83d49dc975912a57bd565dc.ogg",
  236. "example":"BitTorrent does not use a centralized server to store the files. When you download a 'torrent,' you are also uploading a part of the file to another user. \n<br>BitTorrent balances the load on the computer, because broadband download speeds are faster than upload speeds.",
  237. "termId":"2047",
  238. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/30eb2fd7df4c5085ab53f73d37068903.jpg",
  239. "acro":"",
  240. "trans":""
  241. }{
  242. "term":"bump mapping",
  243. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/cc08e71d1b87f2202592fb34b6e88683.ogg",
  244. "def":"A technique to make a rendered surface look more realistic. It simulates roughness on the surface of an object without changing its geometry. This is achieved by applying a greyscale texture to a model.",
  245. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/bd839e47802b272a089c2000b90c6b44.ogg",
  246. "example":"Bump mapping is a light trick to give surfaces of rendered objects texture. It changes the brightness of the pixels on the surface in response to a heightmap that is specified for each surface. \n<br>Bump mapping is used to add detail to an image without increasing the number of polygons.",
  247. "termId":"2091",
  248. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/9e525259d534b5fb756afc607c45a982.jpg",
  249. "acro":"",
  250. "trans":"Reliefzuordnung"
  251. }{
  252. "term":"bus",
  253. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/bc0c48a69c20ee7c958e7dd0778b6351.ogg",
  254. "def":"A set of lines which devices are connected to.",
  255. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/021c268da127db5835b2d81239c3eadd.ogg",
  256. "example":"There is a bus inside the CPU connecting the control unit, ALU and registers. Buses may be interconnected.",
  257. "termId":"2402",
  258. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/20b62cddce06ec63e08b1103341f10b2.jpg",
  259. "acro":"",
  260. "trans":""
  261. }{
  262. "term":"cache",
  263. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/808e37765b5e171575d768fe0c6d7cfe.ogg",
  264. "def":"A small, but high-speed, storage buffer that is used to speed up access to main memory.",
  265. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/5f3b5fdc8dea32a08b950bab7d78856e.ogg",
  266. "example":"Reading data from cache, or cache memory, is much faster than reading it from RAM.",
  267. "termId":"2403",
  268. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/0a22145448e9244d230c452f2045f5d5.jpg",
  269. "acro":"",
  270. "trans":"Puffer(speicher)"
  271. }{
  272. "term":"cascading style sheets",
  273. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/0433dce94406ce273ce25365105d0b4c.ogg",
  274. "def":"A simple mechanism for adding style (e.g. fonts, colors, and spacing) to Web documents. It allows to adapt the presentation to different types of devices, such as large screens, small screens, or printers.",
  275. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/d02251bb31539314a6baaab1759d6a76.ogg",
  276. "example":"CSS is independent of HTML and can be used with any XML-based markup language. The separation of HTML from CSS facilitates maintaining sites, sharing style sheets across pages, and tailoring pages to different environments. This is referred to as the separation of structure (or: content) from presentation.",
  277. "termId":"2257",
  278. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/6b7947d1768a8243d32d3beb5a022a45.jpg",
  279. "acro":"CSS",
  280. "trans":""
  281. }{
  282. "term":"central processing unit",
  283. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/dfaaf63195e7cc0449134ef20e8b26fd.ogg",
  284. "def":"The 'brain' of the computer. Also called the processor.",
  285. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/d569830740a07058dfccf03203b867b0.ogg",
  286. "example":"The CPU consists of a number of components: the control unit, the arithmetic-logic unit (ALU), one or more buses, and registers.\n<br>The CPU contains millions of transistors which are etched onto a tiny square silicon.",
  287. "termId":"2093",
  288. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/41c8eea07fd213aa92e4e281d2c312c8.jpg",
  289. "acro":"CPU",
  290. "trans":""
  291. }{
  292. "term":"changeset",
  293. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/03e4e47e02f3f520763eb3946c1db183.ogg",
  294. "def":"A uniquely named collection of program changes that may include textual edits to file contents, modifications to tree structure, or tweaks to metadata. In short, a patch or fix with a name you can refer to.",
  295. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/1bb2891d4f3a754fffe3586a774ea6b7.ogg",
  296. "example":"If you use an issue tracker to manage bugs, you can use the revision numbers to refer to particular patches that fix bugs -- for example, \"this issue was fixed by r9238.\" Somebody can then run <span class=\"precode\">svn log -r 9238</span> to read about the exact changeset that fixed the bug, and run <span class=\"precode\">svn diff -c 9238</span> to see the patch itself.",
  297. "termId":"2230",
  298. "imageUrl":"",
  299. "acro":"",
  300. "trans":""
  301. }{
  302. "term":"ciphertext",
  303. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/32169d938692ab928957b08b9012e01c.ogg",
  304. "def":"Data that has been encrypted for security purposes.",
  305. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/61fc820fd49f55c5855715896c37d48d.ogg",
  306. "example":"Using cipher text allows for more secure communication.\n<br>Cryptography is the art of protecting information by encrypting it into an unreadable format, called cipher text.",
  307. "termId":"2103",
  308. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/7c7d897cbc1fdb8643dd1d470da360b9.jpg",
  309. "acro":"",
  310. "trans":"chiffrierter Text"
  311. }{
  312. "term":"class",
  313. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/916522ab5d453370de0a302ce8081dcc.ogg",
  314. "def":"In object-oriented programming, a category of objects.",
  315. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/52a0e2721c865c8ed516ef479293da9a.ogg",
  316. "example":"For example, there might be a class called shape that contains objects which are circles, rectangles, and triangles. The class defines all the common properties of the different objects that belong to it.",
  317. "termId":"2220",
  318. "imageUrl":"",
  319. "acro":"",
  320. "trans":"Klasse"
  321. }{
  322. "term":"client",
  323. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/e70ed042123e4c19151424cf87935867.ogg",
  324. "def":"The computer or program which is utilizing functions provided by a server.",
  325. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/47a81b285e30e3c8df9c923d770e9a77.ogg",
  326. "example":"A web browser is effectively issuing client requests for pages from web servers. \n<br>Each client program is designed to work with one or more specific kinds of server programs.",
  327. "termId":"2094",
  328. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/f1819f4f91018332de81b3b7d4f79db6.jpg",
  329. "acro":"",
  330. "trans":""
  331. }{
  332. "term":"client/server",
  333. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/4ae4129f3e9955df8c0ef7db213323c6.ogg",
  334. "def":"A communication model in which one program, the client, makes a service request from another program, the server, which fulfills the request.",
  335. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/916cf27987fbfbe01a5159d634bfa7b7.ogg",
  336. "example":"In a network, the client/server model provides a convenient way to interconnect programs that are distributed across different locations.\n<br>In the usual client/server model, servers are activated and then awaiting client requests.",
  337. "termId":"2095",
  338. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/ef9637e455a629b07c214c7ad8e765d7.jpg",
  339. "acro":"",
  340. "trans":""
  341. }{
  342. "term":"cloud app",
  343. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/0c5671bb3a63a729ec507c921d621c33.ogg",
  344. "def":"A program that is never installed on a local computer. Instead, it is accessed and used via the Internet.",
  345. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/3140d865747077efea6c11713b26d391.ogg",
  346. "example":"Short for cloud application, the term 'cloud app' describes application programs that can be directly accessed and used by means of a web browser.",
  347. "termId":"2107",
  348. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/80c4a93005dc8f36e8940e552c2443bf.jpg",
  349. "acro":"",
  350. "trans":"Cloud-Anwendung"
  351. }{
  352. "term":"cloud services",
  353. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/3918669c703ada83df05866e32b48b40.ogg",
  354. "def":"A general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructure-as-a Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS).",
  355. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/60d6730079932694a50c54f8d1e797c4.ogg",
  356. "example":"Reasons for cloud services include the desire to outsource the maintenance burden of servers and applications, the need to scale systems up or down on demand, the benefit of being able to access your data from anywhere with an Internet connection, and the ability to replace occasional heavy expenditure on IT with regular and predictable operation expenditure.",
  357. "termId":"1986",
  358. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/b5bdefe84f3f41b84ae3ef475fca503e.jpg",
  359. "acro":"",
  360. "trans":""
  361. }{
  362. "term":"common gateway interface",
  363. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/5c0cff2fbc46967ea79550aeeab0eb14.ogg",
  364. "def":"An interface between a web server and applications, which allows for the web server to interact with the applications and thus to offer extended functionality.",
  365. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/8f5e69453daf2737db5010bcac297592.ogg",
  366. "example":"The versatility of CGI gives programmers the opportunity to write gateway programs in almost any language.",
  367. "termId":"2096",
  368. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/cb9c4fedf33110df9992524e82cbbe75.jpg",
  369. "acro":"CGI",
  370. "trans":"Allgemeine Vermittlungsrechner-Schnittstelle"
  371. }{
  372. "term":"communications",
  373. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/3044ecee8d45b7829cdfdf393916cfe5.ogg",
  374. "def":"Electronic transfer of information from a source to one or many destinations.",
  375. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/636d425283640294be3b3e34141e1626.ogg",
  376. "example":"The way data communications systems 'talk' to each other is defined in a set of standards called protocols. \n<br>One of the world's largest communications systems is the telephone network, which is a mix of analog and digital communications.",
  377. "termId":"2097",
  378. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/973af20368ff8990f7013543760d03a3.jpg",
  379. "acro":"",
  380. "trans":"Kommunikationswesen, Fernmeldewesen"
  381. }{
  382. "term":"compiler",
  383. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/f2579843cef3a5f320e4c4d8cfc64a6d.ogg",
  384. "def":"A program which translates a program written in a programming language into machine code, which is executable by the CPU.",
  385. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/8ef26fc192ca95e2c9a86bac6708e958.ogg",
  386. "example":"A compiler will find lexical errors. However, finding logical errors during compilation is impossible.",
  387. "termId":"2098",
  388. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/a8b3d95a4aeb8276f49a7b6e124b5a09.jpg",
  389. "acro":"",
  390. "trans":""
  391. }{
  392. "term":"compression/decompression",
  393. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/9a21e5c39148e610010c9d2e3a34a8c6.ogg",
  394. "def":"A technology for compressing and decompressing data. It can be implemented in software, hardware, or a combination of both.",
  395. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/cd30439231007c3f006b68b94d2493c0.ogg",
  396. "example":"Telephone companies use codecs to convert binary signals transmitted on digital networks to analog signals suitable for audio playing.",
  397. "termId":"2099",
  398. "imageUrl":"",
  399. "acro":"codec",
  400. "trans":""
  401. }{
  402. "term":"computer science",
  403. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/db22b90a50e7ef13d5075a9668f529d8.ogg",
  404. "def":"An academic field which is focussed on theory and selected applications of algorithms, data structures, programming languages, networks, operating systems, compilers, databases, software architecture, artificial intelligence, robotics, graphics etc. It is also described as the study of the theoretical foundations of information and computation, and of practical techniques for their implementation and application in computer systems.",
  405. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/1a4cb50c7827502ab0d456bdefa77364.ogg",
  406. "example":"Computer science has many sub-fields; some, such as computer graphics, emphasize the computation of specific results, while others, such as computational complexity theory, study the properties of computational problems. Still others focus on the challenges in implementing computations.",
  407. "termId":"2049",
  408. "imageUrl":"",
  409. "acro":"CS / comp-sci",
  410. "trans":""
  411. }{
  412. "term":"computer-aided design",
  413. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/15fa58dbb8e657861c8d58a7efc15e0b.ogg",
  414. "def":"A combination of hardware and software that enables engineers and architects to design objects.",
  415. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/90e90cda7c9e069c3bd94d0111bc9174.ogg",
  416. "example":"CAD systems are high-speed workstations or desktop computers with CAD software. \n<br>CAD software is available for generic design or specialized uses, such as architectural, electrical and mechanical.",
  417. "termId":"2100",
  418. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/72a5b91630c4cc6c43f89ddc75ccb041.jpg",
  419. "acro":"CAD",
  420. "trans":"rechnergestützte Konstruktion"
  421. }{
  422. "term":"connectivity",
  423. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/6309d951658685dd09d7cc14105dc2d7.ogg",
  424. "def":"A computer buzzword which describes the ability of programs and or devices to link with other programs and devices.",
  425. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/383b7735616bfd8c480428de04b5f50d.ogg",
  426. "example":"For example, a program that can import data from a wide variety of other programs and can export data in many different formats is said to have good connectivity. On the other hand, computers that have difficulty linking into a network have poor connectivity. \n<br>802.11n is the standard implementation for wireless connectivity.",
  427. "termId":"2183",
  428. "imageUrl":"",
  429. "acro":"",
  430. "trans":"Verbindungsfähigkeit, Konnektivität"
  431. }{
  432. "term":"cooked",
  433. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/05f7a55d1423c32372b3a80ad8b4544c.ogg",
  434. "def":"The term refers to data that is processed before being passed to the I/O device.",
  435. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/66fe9e62ffa01ab743c5c04ff22baade.ogg",
  436. "example":"In cooked mode, special characters, such as erase and kill are processed by the device driver before being sent to the output device.",
  437. "termId":"2101",
  438. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/7a4334418665f8a4e33d456b4fae05db.jpg",
  439. "acro":"",
  440. "trans":""
  441. }{
  442. "term":"copyright",
  443. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/cf1359568ee376cb8b434435710eb5e4.ogg",
  444. "def":"The legal rights of an author to control the\n<br>reproduction, distribution, adaptation, and performance of his/her work, including software.",
  445. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/8c5f930ddca349da200a06883eca42a4.ogg",
  446. "example":"The copying of a copyrighted work without the permission of its author may subject the copier to both civil and criminal penalties.\n<br>There is usually a copyright notice attached to open-source programs, which is just to prevent anyone taking an application and trying to sell it.",
  447. "termId":"2172",
  448. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/a990e33c87c56d3ebf4193d507ac5699.jpg",
  449. "acro":"",
  450. "trans":"Urheberrecht, Urheberschutz"
  451. }{
  452. "term":"cryptography",
  453. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/83a917b6f2c2e06e3732462959db23ad.ogg",
  454. "def":"The study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, and access authentication.\n<br>The art of protecting information by transforming it into an unreadable format, called cipher text.",
  455. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/9295a6fb1546cd6ecc2b348e252014bf.ogg",
  456. "example":"Cryptography is used to protect e-mail messages, credit card information, and corporate data.\n<br>Cryptography systems can be broadly classified into symmetric-key systems that use a single key that both the sender and recipient have, and public-key systems that use two keys, a public key known to everyone and a private key that only the recipient of messages uses.",
  457. "termId":"2102",
  458. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/506dc7485794d99cf9b2ebf7d9691152.jpg",
  459. "acro":"",
  460. "trans":"Kryptografie"
  461. }{
  462. "term":"data type",
  463. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/e298ab387a48a5a75f9ac82c74478a39.ogg",
  464. "def":"In programming, a classification that identifies concepts such as floating-point, integer, Boolean, or alphabetic. It states possible values, the operations that can be done on them, and the way the values are stored.",
  465. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/5e902d075bd89102861bc141ec6fd4db.ogg",
  466. "example":"Most programming languages require the programmer to declare the data type of data objects, and most database systems require the user to specify the type of each data field. The available data types vary from one programming language to another, and from one database application to another, but integer, floating point and character commonly occur in one form or another.",
  467. "termId":"2223",
  468. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/ef3db288e72818984cfaf4f9a6393cb7.jpg",
  469. "acro":"",
  470. "trans":""
  471. }{
  472. "term":"database",
  473. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/f8271b4975797a7142d978da2fd452e8.ogg",
  474. "def":"A collection of information organized in such a way that a computer program can quickly select desired pieces of data.",
  475. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/3c3609d647fff5f94c1e2c9b3b6e45b9.ogg",
  476. "example":"Database and file structures are determined by the software using the data.",
  477. "termId":"2105",
  478. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/d8c9906c8715fe92e4896818d134b051.jpg",
  479. "acro":"DB",
  480. "trans":"Datenbank"
  481. }{
  482. "term":"debugger",
  483. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/056f726449a2cef46e11e9a36d585530.ogg",
  484. "def":"A special program used to find errors (bugs) in other programs.",
  485. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/8d68844bebe13cb08f29bc43dceb14c1.ogg",
  486. "example":"A debugger allows a programmer to stop a program at any point during its execution and to examine and to change the values of variables.\n<br>Debuggers are effective tools for detecting logical errors such as endless loops.",
  487. "termId":"2106",
  488. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/4a8f41875cfa258699f34b2c7bd37554.jpg",
  489. "acro":"",
  490. "trans":""
  491. }{
  492. "term":"denial-of-service attack",
  493. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/a0dc145e9d38bfc4be164f46cac04e46.ogg",
  494. "def":"An attempt to make a computer resource unavailable to its intended users.",
  495. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/a0fd71dc710888db9197cca5d8e38415.ogg",
  496. "example":"Twitter was inaccessible for several hours on Thursday morning, followed by a period of slowness and sporadic time-outs (and more outright downtime). The company is blaming an \"ongoing\" denial-of-service attack but has not said anything further. \n<br>Facebook has also confirmed that it was targeted by a DoS attack that rendered some of its features slow or non-functional.",
  497. "termId":"2057",
  498. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/1c3297c5b3b748843ef8ba927f187054.jpg",
  499. "acro":"DoS attack",
  500. "trans":""
  501. }{
  502. "term":"digital rights management",
  503. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/b3d9b04b2c1df94eeb6b4fe0ff31d0b8.ogg",
  504. "def":"An effective means of preserving copyright, combating piracy and thwarting industrial espionage.",
  505. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/ed64bad49b48ea3d45244535e7d53f0d.ogg",
  506. "example":"DRM is an attempt to control use of digital media by preventing access, copying or conversion to other formats by end users. \n<br>Digital rights management techniques include restrictive licensing agreements and encryption, scrambling of expressive material, and embedding of tags.",
  507. "termId":"1754",
  508. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/6452e246108a3ea6859a65baf43e8da4e5ee0ac0.jpg",
  509. "acro":"DRM",
  510. "trans":""
  511. }{
  512. "term":"digital signature",
  513. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/42fe88ed46c9e63489019cf650e0dff6.ogg",
  514. "def":"A mechanism used in public key cryptography to prevent a document from being changed by an unauthorized party. It contains a digest of the information encrypted using the private key of the sender.",
  515. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/d66fe79b0874203cb2568560398106c4.ogg",
  516. "example":"Digital signatures can be decrypted by any party having access to the public key of the issuer, but cannot be changed as this would require the private key of the issuer.",
  517. "termId":"2110",
  518. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/9a5c525026104f55ea8d559652576cb6.jpg",
  519. "acro":"",
  520. "trans":"digitale Unterschrift"
  521. }{
  522. "term":"dirty data",
  523. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/ade37a733b1fdb3697fed78e72c0a8ce.ogg",
  524. "def":"Inaccurate data that may contain errors such as spelling or punctuation, incorrect data associated with a field, incomplete or outdated data or even data that is duplicated in the database.",
  525. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/955eac010605c6f9a2cde4dd31ffbd77.ogg",
  526. "example":"Although many large companies now use software to clean up their internal data, they still lose a ton of money because of dirty data, according to a recent Gartner Research Inc. survey.",
  527. "termId":"2212",
  528. "imageUrl":"",
  529. "acro":"",
  530. "trans":""
  531. }{
  532. "term":"divide and conquer",
  533. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/c34d9bafb2339ce4eed8c986e165e9cb.ogg",
  534. "def":"An algorithm or strategy to solve a problem by splitting it recursively into smaller problems until all of the remaining problems are trivial.",
  535. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/ea9ee411c2ecce0a24ce8003553e5906.ogg",
  536. "example":"In computer science, divide and conquer (D&amp;C) represents a fundamental algorithm design paradigm based on multi-branched recursion. \n<br>A divide and conquer algorithm works by recursively breaking down a problem into two or more sub-problems of the same (or related) type, until these become simple enough to be solved directly. The solutions to the sub-problems are then combined to give a solution to the original problem.",
  537. "termId":"2058",
  538. "imageUrl":"",
  539. "acro":"D&amp;C",
  540. "trans":"teilen und herrschen"
  541. }{
  542. "term":"domain",
  543. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/640f7c9db1708aefe4474707957a8cd0.ogg",
  544. "def":"A group of computers and devices on a network that are administered as a unit with common rules and procedures.",
  545. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/6799c2b89bd1f0c1e954cc7c92a5d140.ogg",
  546. "example":"Within the Internet, domains are defined by IP addresses. All devices sharing a common part of an IP address are said to be in the same domain.",
  547. "termId":"2085",
  548. "imageUrl":"",
  549. "acro":"",
  550. "trans":"Domäne"
  551. }{
  552. "term":"domain name",
  553. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/317aa47be15f430901d08b11f3415c76.ogg",
  554. "def":"An easy-to-remember string of alphanumeric characters which is used to identify one or more IP addresses.",
  555. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/755aa843155a2d9dd05ead979565a6b4.ogg",
  556. "example":"Within the Internet, domains are not defined by domain names, but by IP addresses. Therefore, every Web server requires a Domain Name System (DNS) server to translate domain names into IP addresses. \n<br>Domain names are used in URLs to identify particular Web pages. For example, in the URL https://webcourses.htwk-leipzig.de/start/, the domain name is htwk-leipzig.de.",
  557. "termId":"2113",
  558. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/f5c0d9565932c2dd721903d5a9b16ad1.jpg",
  559. "acro":"",
  560. "trans":""
  561. }{
  562. "term":"driver",
  563. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/5782f983806ac013ca651f32650c7d31.ogg",
  564. "def":"A small piece of software that provides an interface between an operating system and a peripheral device, such as a printer or a mouse.",
  565. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/469f4c038085d650a7bb88c3dccf9782.ogg",
  566. "example":"Drivers contain commands in machine language necessary to activate functions of the device.\n<br>The operating system uses drivers to control hardware devices. \n<br>Drivers provide the opportunity of upgrading a system with new hardware even though the operating system has no means of communicating with the new device.",
  567. "termId":"2129",
  568. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/bd928d45aa51315cdcee33a03b487e10.jpg",
  569. "acro":"",
  570. "trans":"Treiber"
  571. }{
  572. "term":"dual in-line package",
  573. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/c5e86b2844a693c7a70382c8b8282ff1.ogg",
  574. "def":"A type of chip housed in a rectangular casing with two rows of connecting pins on either side.",
  575. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/e113030cb44509a3b2f62dc9164ca20e.ogg",
  576. "example":"A dual in-line memory package, or DIP, is usually referred to as a DIPn, where n is the total number of pins. \n<br>Dual in-line memory modules, or DIMMs, usually contain eight or nine DIPs on a single side, as well as hundreds of tiny gold pins arrayed across the bottom edge.",
  577. "termId":"2130",
  578. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/5dfd7328401b82b89565802633c9923b.jpg",
  579. "acro":"DIP",
  580. "trans":"DIL-Gehäuse, IC-Gehäuse mit zwei Kontaktreihen"
  581. }{
  582. "term":"dynamic host configuration protocol",
  583. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/9c301cf62d5462896291f3a5bbc2743d.ogg",
  584. "def":"An auto configuration protocol used on IP networks.",
  585. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/8076ed5bfc5ac13c2b49e11b2a885c54.ogg",
  586. "example":"DHCP allows a computer to be configured automatically, eliminating the need for intervention by a network administrator.",
  587. "termId":"2114",
  588. "imageUrl":"",
  589. "acro":"DHCP",
  590. "trans":""
  591. }{
  592. "term":"editor",
  593. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/e51978396d13e3340adb94853ac1745b.ogg",
  594. "def":"A software tool for inserting or removing characters in a data block.",
  595. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/f1d02c96959afc9638a6a40e7abc9f84.ogg",
  596. "example":"There are various different editors, probably the best known ones are text editors allowing for manipulation of text files.",
  597. "termId":"2131",
  598. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/d7f008704c7f0f032a283c457619444d.jpg",
  599. "acro":"",
  600. "trans":""
  601. }{
  602. "term":"emulation",
  603. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/cf877ef22c2fbb928ca678459178b7cb.ogg",
  604. "def":"The ability of a program or device to imitate another program or device.",
  605. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/0935c3e59fd2070be78e3e2944a4ac30.ogg",
  606. "example":"Many printers are designed to emulate Hewlett-Packard LaserJet printers because many applications support HP printers. \n<br>The emulation of another type of computer is also possible. For example, there are programs, so called emulators that enable Apple computers to emulate Windows PCs.",
  607. "termId":"2132",
  608. "imageUrl":"",
  609. "acro":"",
  610. "trans":""
  611. }{
  612. "term":"engineering",
  613. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/2e773a0464632fca5848e5bb25778d76.ogg",
  614. "def":"The discipline, art and profession of acquiring and applying scientific, mathematical, economic, social, and practical knowledge to design and build structures, machines, devices, systems, materials and processes that safely realise solutions to the needs of society.",
  615. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/0ceab4f5fe9d721c3068d19766b4d121.ogg",
  616. "example":"Engineering is often characterized as having four main branches: chemical engineering, civil engineering, electrical engineering and mechanical engineering. Modern fields sometimes referred to as additional branches include industrial engineering and software engineering.",
  617. "termId":"2059",
  618. "imageUrl":"",
  619. "acro":"",
  620. "trans":"Ingenieurwesen, Technik"
  621. }{
  622. "term":"Ethernet",
  623. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/7e15353fb377c4b7410499cd48ca047f.ogg",
  624. "def":"One of the most widely implemented local-area network technologies. Its specification served as a basis for the IEEE 802.3 standard, which specifies the physical and lower software layers.",
  625. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/0bed5c3f1a5166517e2f43852f911a89.ogg",
  626. "example":"Xerox, DEC and Intel developed the Ethernet architecture in 1976.\n<br>Meanwhile, the Ethernet physical layer evolved, and now it encompasses quite a few physical media interfaces and several magnitudes of speed. The most common forms used are 10BASE-T, 100BASE-TX, and 1000BASE-T. All three utilize twisted pair cables and run at 10 Mbits, 100 Mbits, and 1 Gbits, respectively. Fiber optic variants of Ethernet may offer high performance, electrical isolation and distance.",
  627. "termId":"1200",
  628. "imageUrl":"",
  629. "acro":"",
  630. "trans":""
  631. }{
  632. "term":"extensible firmware interface",
  633. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/6fdc39cc28870196cb96f60c48b84fcc.ogg",
  634. "def":"A specification which defines a software interface between an operating system and platform firmware. It is supposed to be a substitute for the traditional BIOS firmware interface in PCs.",
  635. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/628ec3b9f3e7912805317174d6056473.ogg",
  636. "example":"The interface, which has been defined by the Unified EFI (UEFI) Specification (previously known as the EFI Specification), consists of data tables that contain platform-related information, boot service calls, and runtime service calls that are available to the operating system and its loader. These provide a standard environment for booting an operating system and running pre-boot applications.",
  637. "termId":"2233",
  638. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/a873347d785e6d57f1f52488df042dd5.jpg",
  639. "acro":"EFI",
  640. "trans":""
  641. }{
  642. "term":"extensible markup language",
  643. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/5a1bd261de0469768cec51719d7fbccb.ogg",
  644. "def":"A simple, flexible text format derived from SGML. Originally designed to meet the challenges of large-scale web publishing, it is now playing an important role in the exchange of a wide variety of data on the web and elsewhere.",
  645. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/d34c174afb9070a19020496823eac93c.ogg",
  646. "example":"XML allows designers to create their own customized tags, enabling the definition, transmission, validation, and interpretation of data between applications and between organizations. \n<br>XML is not a replacement for HTML. In most web applications, XML is used to describe contents and transport data, while HTML is used to format and display data.",
  647. "termId":"2136",
  648. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/95d428694516b89cac4163e1e75548d2.jpg",
  649. "acro":"XML",
  650. "trans":""
  651. }{
  652. "term":"fault-tolerant",
  653. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/debb338803e846f20ea04b1bac305a38.ogg",
  654. "def":"Computer systems that continue to work correctly despite errors occurring in calculations or communications.",
  655. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/72dd65ab0a4dae608902188c9ab4baa3.ogg",
  656. "example":"Many fault-tolerant computer systems mirror all operations. That is, every operation is performed on two or more duplicate systems, if one fails the others can take over.",
  657. "termId":"2138",
  658. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/557ccf007ae3172e00d208430e87c8a9.jpg",
  659. "acro":"",
  660. "trans":"fehlertolerant"
  661. }{
  662. "term":"fiber optic",
  663. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/1e080a50d434d16be26930264743dfca.ogg",
  664. "def":"A cable technology for the transmission of data which consists of a bundle of glass threads, each of which is capable of transmitting messages modulated onto light waves.",
  665. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/1f179d490d946cf274453b8340051179.ogg",
  666. "example":"The main disadvantage of fibre optic cables is that they are expensive to install.\n<br>Fiber optics is a particularly popular technology for local-area networks. In the future, almost all communications will employ fiber optics.",
  667. "termId":"2115",
  668. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/4cad71b60c169b22e02281e260a53531.jpg",
  669. "acro":"",
  670. "trans":"Glasfaser-"
  671. }{
  672. "term":"file sharing",
  673. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/00c84e7bc04c7e4e419dccab3968d324.ogg",
  674. "def":"A network application allowing users to view, modify, copy, or print computer data with various levels of access privilege.",
  675. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/2bccb50c44ad213b958737250dedebe8.ogg",
  676. "example":"While files can be easily shared outside a network, the term file sharing refers to sharing files in a network.\n<br>Any multi-user operating system will provide some form of file sharing.",
  677. "termId":"2139",
  678. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/016b87450268dff7767a88ab7cb3150e.jpg",
  679. "acro":"",
  680. "trans":"gemeinsamer Dateizugriff"
  681. }{
  682. "term":"firewall",
  683. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/3d2409596d6ab5bc911e73e0ae87832e.ogg",
  684. "def":"A system designed to prevent unauthorized access to a private network.",
  685. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/7edf248e32bd8fa05f466eef7937e848.ogg",
  686. "example":"Firewalls are widely used to separate a company's internal network from the Internet.\n<br>In practice, many firewalls have default settings that provide little or no security unless specific policies are implemented.",
  687. "termId":"2141",
  688. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/50260431f81d326c47ec4466c3498687.jpg",
  689. "acro":"",
  690. "trans":""
  691. }{
  692. "term":"floating point operations per second",
  693. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/4b291bde7d97e40f436797042ebd9910.ogg",
  694. "def":"A benchmark measurement for rating a microprocessor's computing power, which indicates how many mathematical operations involving fractional numbers the processor can handle in one second.",
  695. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/9686e8cf779e6f12c4c2052502170a3a.ogg",
  696. "example":"For PCs, it is measured in millions of flops (megaflops), for mainframe computers in billions of flops (gigaflops), and for super computers in trillions of flops (teraflops). \n<br>Many experts feel that FLOPS is not a relevant measurement because it fails to take into account factors such as the condition under which the microprocessor is running (e.g., heavy or light loads) and which exact operations are included as floating point operations.",
  697. "termId":"2152",
  698. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/bf5409f07e1f33c1e1fc820d5f58c800.jpg",
  699. "acro":"flops",
  700. "trans":"Gleitkommaoperationen pro Sekunde"
  701. }{
  702. "term":"floating point unit",
  703. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/be0eef80be5dff3aa70693a690431fee.ogg",
  704. "def":"A specialized coprocessor that manipulates numbers more quickly than the basic microprocessor circuitry.",
  705. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/b3fafbd24cd3d8b02d4c896245d3669d.ogg",
  706. "example":"In the early years of personal computing, the FPU was physically separate from the main microprocessor. Starting with the Intel Pentium and Motorola 68000 series in the late 1990s, the FPU became a physical part of the microprocessor chip.",
  707. "termId":"2142",
  708. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/0fba0d73e2c7c4ebb9dfba32f7b9982d.jpg",
  709. "acro":"FPU",
  710. "trans":"Gleitkommaprozessor"
  711. }{
  712. "term":"frame synchronization",
  713. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/e370e9ef3e891ac9f512380815ea1327.ogg",
  714. "def":"The process of synchronizing display pixel scanning to a synchronization source.",
  715. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/166fa97847a05e76c8a4107d282a283c.ogg",
  716. "example":"Frame synchronization involves two main processes:\n<br><ul><li>Frame lock and swap - synchronizing applications across multiple displays or windows\n</li><li>Genlock - synchronizing one or more systems to a common sync source</li></ul>",
  717. "termId":"2151",
  718. "imageUrl":"",
  719. "acro":"",
  720. "trans":""
  721. }{
  722. "term":"frames per second",
  723. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/62a9528a651beaa7422a48682ad57c07.ogg",
  724. "def":"The rate at which a video card is drawing frames to its frame buffer.",
  725. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/cf83205c3f9a916f55eb11ddc701b55a.ogg",
  726. "example":"Each frame is a still image; displaying frames in quick succession creates the illusion of motion. The more frames per second (fps), the smoother the motion appears.\n<br>If the FPS is higher than the refresh rate, then the extra frames are lost, and tearing could occur.",
  727. "termId":"2145",
  728. "imageUrl":"",
  729. "acro":"fps",
  730. "trans":""
  731. }{
  732. "term":"function",
  733. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/b035ec83fba3d4053b9a2e8fd79efee0.ogg",
  734. "def":"A special part of a program that contains routines which are required frequently by the main part of the program.",
  735. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/cc283e737c90b4ad52f78d644455d397.ogg",
  736. "example":"Functions are supported by many modern programming languages.\n<br>Parameters can be used to generalize the code in functions, and make them applicable more widely.",
  737. "termId":"2149",
  738. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/9f8f4b7afeaaee4cca16f1305f1b0256.jpg",
  739. "acro":"",
  740. "trans":""
  741. }{
  742. "term":"geek",
  743. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/e5c178c176154b4ccdc1437d83a7f66f.ogg",
  744. "def":"A person who is inordinately dedicated to and involved with technology.",
  745. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/6f1b36d8ca08e0826dbf31eb36e4087f.ogg",
  746. "example":"Being a geek implies a high level of literacy with the technology of computing. \n<br>A person from Greece is referred to as a Greek, whereas a computer enthusiast may be called a geek.",
  747. "termId":"2150",
  748. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/d8f03c935cbfd5ba198015b31c46e2ee.jpg",
  749. "acro":"",
  750. "trans":""
  751. }{
  752. "term":"graphical user interface",
  753. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/fa07e9fd7ec19f4370a4b2b30fbdc499.ogg",
  754. "def":"A computer environment allowing users to communicate with the computer by using graphical symbols rather than text commands.",
  755. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/07315f074c1846783c2a00b2d596370d.ogg",
  756. "example":"In graphical user interfaces, information and commands are presented through icons or menus.\n<br>The most important tool for using a GUI is the mouse, which is used to click on the icons, and to resize or move windows.",
  757. "termId":"2153",
  758. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/e5930d9afbc7455e40bbc01c57b984d4.jpg",
  759. "acro":"GUI",
  760. "trans":"grafische Benutzeroberfläche"
  761. }{
  762. "term":"group of pictures",
  763. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/fabe6f7068c3d1f0e8ca1d5640a827d9.ogg",
  764. "def":"The repeated pattern of I, P and B frames in an MPEG stream.",
  765. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/8bcc8022b65f74f6ee75dbb466def335.ogg",
  766. "example":"Video compression is based on related groups of pictures each consisting of one initial I frame and a sequence of P (predicted) and B (bi-directional) frames. \n<br>The GOP length is the number of frames in each sequence.",
  767. "termId":"2064",
  768. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/d35d1dfcc06aac83eaa48a5ae3344a0c.jpg",
  769. "acro":"GOP",
  770. "trans":""
  771. }{
  772. "term":"handshaking",
  773. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/07a6603af33052201692b92d968726a0.ogg",
  774. "def":"The process when a computer informs another one that it wants to communicate with it.",
  775. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/47fb1821722dddc3fcbe15c24805bc8f.ogg",
  776. "example":"Handshaking often concerns the exchange of messages or packets of data between two systems with limited buffers. \n<br>A simple handshaking protocol might only involve the receiver sending a message meaning 'I received your last message and I am ready for you to send me another one.'",
  777. "termId":"2154",
  778. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/07e32c2eafd188edb1ecd8f5ec599767.jpg",
  779. "acro":"",
  780. "trans":""
  781. }{
  782. "term":"hash function",
  783. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/a0a8e72a1910836a7bb2c9968a2c7ef4.ogg",
  784. "def":"An algorithm that turns a variable-sized amount of data into a fixed-sized output.",
  785. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/db30b0d4b2f91daf5008dfd6edc9d1ae.ogg",
  786. "example":"Hash functions are used for creating digital signatures.",
  787. "termId":"2155",
  788. "imageUrl":"",
  789. "acro":"",
  790. "trans":""
  791. }{
  792. "term":"hexadecimal",
  793. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/f9e2ddc3b0938a38eb74738b0805a2b7.ogg",
  794. "def":"The number system using base-16.",
  795. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/9a3d94ddc83aaddb638ae584ac896900.ogg",
  796. "example":"The hexadecimal numbers are 0-9 and then use the letters A-F.\n<br>Hexadecimal is a convenient way to express binary numbers in modern computers in which a byte is defined as containing eight binary digits.",
  797. "termId":"2157",
  798. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/dc4faa291311da449ba6614a0b99e218.jpg",
  799. "acro":"",
  800. "trans":""
  801. }{
  802. "term":"High-Speed Downlink Packet Access",
  803. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/a6f046417ed6ed4001a761d1b7a83c00.ogg",
  804. "def":"An enhanced 3G (third generation) mobile telephony communications protocol in the HSPA family which allows networks based on UMTS to support higher data transfer speeds and capacity.",
  805. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/0a1bfcc790df0f76e1065309a1637aed.ogg",
  806. "example":"Current HSDPA deployments support down-link speeds of up to 14.4 Mbit/s. Further speed increases are available with HSPA+, which provides speeds of up to 42 Mbit/s down-link and 84 Mbit/s with Release 9 of the 3GPP standards.",
  807. "termId":"2065",
  808. "imageUrl":"",
  809. "acro":"HSDPA",
  810. "trans":""
  811. }{
  812. "term":"hypertext markup language",
  813. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/f95476298cab77fa6f16e295c3500b2e.ogg",
  814. "def":"The set of markup symbols, often referred to as tags, that are used to code files intended for display on the web.",
  815. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/e8f49986d31bc470174e748c02725163.ogg",
  816. "example":"HTML is not a programming language like Java or JavaScript, rather it could be considered a 'presentation language.' HTML describes how information is to be presented and formatted so that humans can view it in a web browser.\n<br>HTML is a formal recommendation by the World Wide Web Consortium (W3C) and is generally adhered to by major browsers.",
  817. "termId":"2159",
  818. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/a99821d2fbeaa67fc615b205748074fb.jpg",
  819. "acro":"HTML",
  820. "trans":""
  821. }{
  822. "term":"hypertext transfer protocol",
  823. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/2634ae3b1b44a3661030b440980350ef.ogg",
  824. "def":"A protocol used to request and transmit files, especially webpages and webpage components, over the Internet or other computer network.",
  825. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/331d8f14a1030a223aed3c15b938f962.ogg",
  826. "example":"Any Web browser is an HTTP client, sending requests to server machines. \n<br>When the browser user enters file requests by either 'opening' a Web file (typing in a uniform resource locator) or clicking on a hypertext link, the browser creates an HTTP request and sends it to the IP address indicated by the URL.",
  827. "termId":"2160",
  828. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/e3c9650f690c4f7deacf01db090d9445.jpg",
  829. "acro":"HTTP",
  830. "trans":""
  831. }{
  832. "term":"informatics",
  833. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/b22665c04d009812fb6d8ae947e90cce.ogg",
  834. "def":"A special field which can be roughly described as the intersection of technology, people, and business.",
  835. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/491b91ec082b38b699d5624a0656a654.ogg",
  836. "example":"Not quite hard-core IT, far from liberal arts, informatics blends a mishmash of different technical concepts together. Some schools have sub-specialties in community informatics, medical informatics, or information management. Effectively, all of these informatics domains are siblings, and they are all distant cousins of their grandfather, computer science.",
  837. "termId":"2050",
  838. "imageUrl":"",
  839. "acro":"",
  840. "trans":""
  841. }{
  842. "term":"information science",
  843. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/d1ccf87186f57e380de232cc1b9fe8b0.ogg",
  844. "def":"A broad, interdisciplinary field, incorporating not only aspects of computer science, but often diverse fields such as cognitive science, commerce, communications, law, library science, management, mathematics, public policy, and the social sciences.",
  845. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/dc10bb52985355fa56d9a4bb834f2269.ogg",
  846. "example":"Information science is an interdisciplinary science primarily concerned with the collection, classification, manipulation, storage, retrieval and dissemination of information. Practitioners within the field of information science study the application and usage of knowledge in organizations, along with the interaction between people, organizations and any existing information systems, with the aim of creating, replacing or improving information systems.",
  847. "termId":"2051",
  848. "imageUrl":"",
  849. "acro":"",
  850. "trans":""
  851. }{
  852. "term":"information systems",
  853. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/b515463e32f6694c5ff85eb415917d0f.ogg",
  854. "def":"An academic field which encompasses two broad areas: \n<br><ul><li>acquisition, deployment, and management of information technology resources and services (the information systems function) and \n</li><li>development and evolution of infrastructure and systems for use in organization processes (system development).</li></ul>",
  855. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/2e086362c27873fd057641cbaac69a6c.ogg",
  856. "example":"The information systems function has a broad responsibility to develop, implement, and manage an infrastructure of information technology (computers and communications), data (both internal and external), and organization-wide systems. \n<br>If you are interested in the implementation of computer-based information systems within business, study information systems.",
  857. "termId":"2052",
  858. "imageUrl":"",
  859. "acro":"IS",
  860. "trans":""
  861. }{
  862. "term":"information technology",
  863. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/5ed34455435d7fd3ee9a915148cb0d8b.ogg",
  864. "def":"The technology involved with the transmission and storage of information, especially the development, installation, implementation, and management of computer systems within companies, universities, and other organizations.",
  865. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/6f716d116c05bb45385d082e4bd547a3.ogg",
  866. "example":"Information technology (IT) is at the centre of everyday life and can be found in almost all other industries. \n<br>IT underpins many organisations and pastimes, from shopping to watching television, and it is at the core of every business. \n<br>IT will continue to be the key element that enables businesses to grow.",
  867. "termId":"2053",
  868. "imageUrl":"",
  869. "acro":"IT",
  870. "trans":"Informationstechnik"
  871. }{
  872. "term":"Institute of Electrical and Electronics Engineers",
  873. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/356d54b441607bfcc5e5c0cdab4b5088.ogg",
  874. "def":"A non-profit, technical professional association of more than 377,000 individual members in 150 countries that is best known for developing standards for the computer and electronics industry.",
  875. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/e738b3ca712109dc4db871f990bae989.ogg",
  876. "example":"The IEEE (pronounced Eye-triple-E) produces 30 percent of the world's published literature in electrical engineering, computers and control technology, holds annually more than 300 major conferences, and has nearly 900 active standards with 700 under development.\n<br>In particular, the IEEE 802 standards for local-area networks are widely followed.",
  877. "termId":"2163",
  878. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/a8a54253d40de021f7809623fe3e1dda.jpg",
  879. "acro":"IEEE",
  880. "trans":""
  881. }{
  882. "term":"integrated development environment",
  883. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/a7a3339a36a1bce0af7ed8a9b4fdcdc5.ogg",
  884. "def":"A software application which provides comprehensive facilities for software development to computer programmers. It usually includes a source code editor, a compiler and/or an interpreter.",
  885. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/a666f9eb40cba51f1ffb2384a63fce5a.ogg",
  886. "example":"Eclipse is the base IDE, but there are many Java-related plugins for Eclipse, and several commercial IDEs built on top of Eclipse.",
  887. "termId":"2066",
  888. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/e9cc0058dc03cb42c819d960a6fc82bf.jpg",
  889. "acro":"IDE",
  890. "trans":""
  891. }{
  892. "term":"Internet control message protocol",
  893. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/61af1194a607af964c99968950a180bf.ogg",
  894. "def":"An integral part of the internet protocol used for transferring control messages between hosts.",
  895. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/b74daed9d32845fb5240a9fa8efbcbaa.ogg",
  896. "example":"ICMP supports packets containing error, control, and informational messages. \n<br>The ping command, for example, uses ICMP to test an Internet connection.",
  897. "termId":"2164",
  898. "imageUrl":"",
  899. "acro":"ICMP",
  900. "trans":""
  901. }{
  902. "term":"Internet Engineering Task Force",
  903. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/a980c0bcea8076231b6b4ac8162423a9.ogg",
  904. "def":"An open international standards organization for the Internet, the mission of which is to make the Internet work better by producing high quality, relevant technical documents that influence the way people design, use, and manage the Internet.",
  905. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/f61b8cafa2f04f45886a5ab1d6f2ebb9.ogg",
  906. "example":"The Internet Engineering Task Force (IETF) develops and promotes Internet standards, cooperating closely with the W3C and ISO/IEC standards bodies and dealing in particular with standards of the TCP/IP and Internet protocol suite. \n<br>Technical specifications and policy documents, produced by the IETF, are commonly published in the Request for Comments (RFC) series.",
  907. "termId":"2255",
  908. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/57b7c8ee000fe30f64f63911be5f4086.jpg",
  909. "acro":"IETF",
  910. "trans":""
  911. }{
  912. "term":"Internet message access protocol",
  913. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/5b8a1b5d7cdf85d34b63f8ccdbd3106c.ogg",
  914. "def":"One of the two most prevalent Internet standard protocols for email retrieval, the other being the Post Office Protocol (POP).",
  915. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/c4767c78b719eb36efd70d91293f655e.ogg",
  916. "example":"IMAP is ideal for people who need to access e-mail from multiple computers since IMAP stores your e-mail on the mail server.",
  917. "termId":"2165",
  918. "imageUrl":"",
  919. "acro":"IMAP",
  920. "trans":""
  921. }{
  922. "term":"Internet protocol",
  923. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/7cdafae212060f8bca91cb4637573f5c.ogg",
  924. "def":"The network layer protocol that routes data packets from one computer to another on the Internet.",
  925. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/d795baa19a3b91ff71c27cd95a2e13c7.ogg",
  926. "example":"The Internet protocol is something like the postal system. \n<br>IP accepts packets from TCP or UDP, adds its own header and delivers a 'datagram' to the data link layer protocol.",
  927. "termId":"2118",
  928. "imageUrl":"",
  929. "acro":"IP",
  930. "trans":""
  931. }{
  932. "term":"IP address",
  933. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/f123eb00538a2b448f18772958f4c323.ogg",
  934. "def":"A unique identifier for a computer or device, such as a printer, on a network.",
  935. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/da21c8b0207a47e19518ab8f3b7a555c.ogg",
  936. "example":"The format of a conventional IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be zero to 255. \n<br>Increasing the IP address pool was a key factor in the development of IPv6, which complements the IPv4 32-bit address scheme with a much longer 128-bit address scheme. While IPv6 allows for a total of 2^128 total addresses, the IPv4 32-bit address scheme allows for a mere 2^32 addresses.",
  937. "termId":"2404",
  938. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/31674331e223000c64ca1955cdab2cb1.jpg",
  939. "acro":"",
  940. "trans":""
  941. }{
  942. "term":"IT manager",
  943. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/4dc5304fcc966bab75221b0bc85ebfaf.ogg",
  944. "def":"The job title of professionals who are responsible for implementing and maintaining an organization's technology infrastructure.",
  945. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/edb50a502a1474354a56d6598d0b6674.ogg",
  946. "example":"Businesses rely on a central information processing system to support efficient data management and communications. The IT manager monitors the organization's operational requirements, researches strategies and technology solutions, and builds the most cost-effective and efficient system to achieve those goals.",
  947. "termId":"2188",
  948. "imageUrl":"",
  949. "acro":"",
  950. "trans":""
  951. }{
  952. "term":"Java",
  953. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/5174ca7562941845cd54bd64a4ae1584.ogg",
  954. "def":"A general-purpose, object-oriented programming language designed to produce programs that will run on any computer system.",
  955. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/3543948071fa65f0098b52b17b71c0ee.ogg",
  956. "example":"Compiled Java code can run on most computers because Java interpreters and runtime environments, known as Java Virtual Machines, exist for most operating systems, including UNIX, Mac OS, and Windows.",
  957. "termId":"2067",
  958. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/9f05408089f9771810088068b4f9dc32.jpg",
  959. "acro":"",
  960. "trans":""
  961. }{
  962. "term":"JavaServer Pages",
  963. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/b11ea0b06336aff286c6d47a9f5d9ee4.ogg",
  964. "def":"A technology which provides a simplified, fast way to create web pages that display dynamically-generated content.",
  965. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/17a1e8e6c2451fd2cfd258e184385e15.ogg",
  966. "example":"JSP technology was designed to make it easier and faster to build web-based applications that work with a wide variety of web servers, application servers, browsers and development tools.",
  967. "termId":"2083",
  968. "imageUrl":"",
  969. "acro":"JSP",
  970. "trans":""
  971. }{
  972. "term":"jitter",
  973. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/5b9642f9f150fdfa178f36147016c477.ogg",
  974. "def":"An abrupt and unwanted variation of one or more signal characteristics, such as the interval between successive pulses, the amplitude of successive cycles, or the frequency or phase of successive cycles.",
  975. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/315784057b90dbe5012afd4ce94251e9.ogg",
  976. "example":"Jitter may be specified in qualitative terms (e.g. amplitude, phase, pulse width or pulse position), or quantitative terms (e.g. mean, RMS, or peak-to-peak displacement). \n<br>Inside digital to analog converters jitter causes unwanted high-frequency distortion, which can be suppressed with high fidelity clock signal usage.",
  977. "termId":"2068",
  978. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/01e0035f32e209a8e4f79beecb214fb0.jpg",
  979. "acro":"",
  980. "trans":""
  981. }{
  982. "term":"Joint Photographic Experts Group",
  983. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/a89c3964ea5799e7061b3e9cd426985c.ogg",
  984. "def":"A standard algorithm for the compression of digital images, making it easy to store and transmit them.",
  985. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/5cc1d2d00c4ce6b84a9f42a0527515ac.ogg",
  986. "example":"Unfortuntely, JPEG image compression reduces image quality by disposing of redundant pixels.",
  987. "termId":"2120",
  988. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/28379b2b44e310216f7dca9dc785afe3.jpg",
  989. "acro":"JPEG",
  990. "trans":""
  991. }{
  992. "term":"jumper",
  993. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/6e434194db6aef89f25929dd9b6c80b3.ogg",
  994. "def":"A plug that closes an electrical circuit.",
  995. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/df37875e6026c8809fbe0b7098825ac1.ogg",
  996. "example":"Jumpers are often used to configure expansion boards.\n<br>By placing a jumper plug over a different set of pins, the board's parameters are changed.",
  997. "termId":"2170",
  998. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/cdc23b28ef79bed79b988dfe6154c8ce.jpg",
  999. "acro":"",
  1000. "trans":""
  1001. }{
  1002. "term":"latency",
  1003. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/2d80e89b90cd7bc99b2e1b04ae0357e7.ogg",
  1004. "def":"The time delay experienced in a system when one component is 'spinning its wheels' waiting for another one to complete an operation.",
  1005. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/1b6cf4dd8e4e4d50b4f04e3b10bac340.ogg",
  1006. "example":"In accessing data on a disk, latency is defined as the time it takes to position the proper sector under the read/write head.\n<br>In networking, latency refers to the amount of time it takes a packet to travel from source to destination. Together, latency and bandwidth define the speed and capacity of a network.",
  1007. "termId":"2231",
  1008. "imageUrl":"",
  1009. "acro":"",
  1010. "trans":""
  1011. }{
  1012. "term":"licence",
  1013. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/9743f29379352bdf572d494a7aefe9d6.ogg",
  1014. "def":"A legally binding agreement in which one party grants certain rights and privileges to another.",
  1015. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/4772fcc160addb246c657f72ef043d74.ogg",
  1016. "example":"In the computer field, a software publisher will typically grant a non-exclusive right - a licence - to a user to use one copy of its software and prohibit further copying and distribution of that software to another user.",
  1017. "termId":"2171",
  1018. "imageUrl":"",
  1019. "acro":"",
  1020. "trans":"Lizenz"
  1021. }{
  1022. "term":"Linux",
  1023. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/fae860c5292eabc735786606bb46b33d.ogg",
  1024. "def":"A popular open source version of UNIX that runs on a wide variety of hardware platforms.",
  1025. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/9b9758747391449ba491065c934f72b5.ogg",
  1026. "example":"As for the pronunciation of the word, if you live in Finland, you would say 'lee-nooks,' because the name Linus is pronounced 'lee-noose.' Since the English pronunciation of Linus is 'line-us,' some call it 'line-ucks.' Very common is 'lin-ucks,' which is somewhere in between. \n<br>No matter how you pronounce it, Linux is growing rapidly.",
  1027. "termId":"2405",
  1028. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/d7431db4c46c51f0ebf4d225c7dba9cd.jpg",
  1029. "acro":"",
  1030. "trans":""
  1031. }{
  1032. "term":"load balancing",
  1033. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/5350fe25b03a4d141cd1bc57bca470ed.ogg",
  1034. "def":"The process of dividing the amount of work that a computer has to do between two or more computers so that more work gets done in the same amount of time.",
  1035. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/9d1493a3c4cf65029676da0f5b8e51b1.ogg",
  1036. "example":"Load balancing can be implemented with hardware, software, or a combination of both. Typically, load balancing is the main reason for computer server clustering.\n<br>On the Internet, companies whose websites get a great deal of traffic usually use load balancing.",
  1037. "termId":"2175",
  1038. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/b5d196b3e7ca81f0e8379cc98701c70d.jpg",
  1039. "acro":"",
  1040. "trans":"Lastverteilung"
  1041. }{
  1042. "term":"local-area network",
  1043. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/577fbe70f6b1744a3d958e78b1722dc6.ogg",
  1044. "def":"A communications network that serves users within a single building or complex. It is made up of servers, workstations, a communications link, and a network operating system.",
  1045. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/36e24009be06b05140ba8187041a6967.ogg",
  1046. "example":"Local area networks can be small, linking as few as three computers, or large, linking hundreds of computers used by thousands of people.",
  1047. "termId":"2176",
  1048. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/f03a14bfed4f78a680a1ea2d7a9ac7b4.jpg",
  1049. "acro":"LAN",
  1050. "trans":"lokales Netzwerk"
  1051. }{
  1052. "term":"loop",
  1053. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/a3e5a7afbee3823176ef55238e83544c.ogg",
  1054. "def":"In computer programming, a sequence of instructions that is continually repeated until a certain condition is reached.",
  1055. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/ea19ab622dca1292b6161d9b21d5156a.ogg",
  1056. "example":"A loop is a fundamental programming idea that is commonly used in writing programs.\n<br>An infinite loop may occur when an assumed condition that would eventually terminate the loop failed to happen.",
  1057. "termId":"2177",
  1058. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/719e154ed081581268b5f1b32622447a.jpg",
  1059. "acro":"",
  1060. "trans":"Schleife"
  1061. }{
  1062. "term":"machine code",
  1063. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/33d43ca1e605473433ae665a9f70d027.ogg",
  1064. "def":"Computer program instructions that are understood by the CPU.",
  1065. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/34ac8811adde16354ea9a41d70da4ee6.ogg",
  1066. "example":"Programs written in high-level languages are translated into assembly code or machine code by a compiler. Assembly programs are translated into machine code by a program called assembler. \n<br>Every type of CPU has a different set of machine code instructions.",
  1067. "termId":"2180",
  1068. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/f400411a328dd84146e495d512a34ab5.jpg",
  1069. "acro":"",
  1070. "trans":""
  1071. }{
  1072. "term":"master boot record",
  1073. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/5de27ad5727ec13cdd5083ec087d7f42.ogg",
  1074. "def":"A small program typically residing on the first sector of a hard disk that is executed when a computer boots up.",
  1075. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/1f7a23bc69067d1b15b063be9e7736b8.ogg",
  1076. "example":"The MBR begins the boot process by looking up the partition table to determine which partition to use for booting.\n<br>In DOS and Windows systems, you can create the MBR with the FDISK /MBR command.",
  1077. "termId":"2182",
  1078. "imageUrl":"",
  1079. "acro":"MBR",
  1080. "trans":"Startprogramm einer Festplatte"
  1081. }{
  1082. "term":"memory-resident",
  1083. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/ccdeee566b83beeb27ea115365ded516.ogg",
  1084. "def":"The characteristic of a program which is permanently kept in main memory.",
  1085. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/c940accc47dac50cfd87bd8809611f84.ogg",
  1086. "example":"Certain programs can be marked as being memory-resident, which means that the operating system is not permitted to swap them out to a storage device; they will always remain in memory. \n<br>The programs and data used most frequently are the ones that should be memory resident.",
  1087. "termId":"2185",
  1088. "imageUrl":"",
  1089. "acro":"",
  1090. "trans":"(arbeits-)speicherresident"
  1091. }{
  1092. "term":"mirror",
  1093. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/83567fe1b4ea02fe48c2ef655c71dbc7.ogg",
  1094. "def":"An exact copy of a data set, especially a website.",
  1095. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/7f21f1cccbc85eb0f3150c76c79ddb38.ogg",
  1096. "example":"Please find a list of mirrors of this website below. If you want to add your mirror to the list, see our Mass Mirroring WikiLeaks page.",
  1097. "termId":"2069",
  1098. "imageUrl":"",
  1099. "acro":"",
  1100. "trans":""
  1101. }{
  1102. "term":"motherboard",
  1103. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/abba9430ac2b830e8a5f3f684ca9d855.ogg",
  1104. "def":"The most important circuit board of a microcomputer.",
  1105. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/e6c6ac58eda0446e3fc8169988be0df3.ogg",
  1106. "example":"Typically, the motherboard contains the CPU, BIOS, memory, mass storage interfaces, serial and parallel ports, expansion slots, and all the controllers required to control standard peripheral devices.\n<br>On most PCs, it is possible to add memory chips directly to the motherboard.",
  1107. "termId":"2186",
  1108. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/63e40b12bd8593789127594e6f9ace3c.jpg",
  1109. "acro":"",
  1110. "trans":"Hauptplatine, Basisplatine"
  1111. }{
  1112. "term":"Moving Picture Experts Group",
  1113. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/0cdb9f1785fb968dac570e59e23df255.ogg",
  1114. "def":"A family of digital video compression standards and file formats named after their developers, a working group of the International Organization for Standardization.",
  1115. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/6e5c69b90c015731e38c3e0d9fba5941.ogg",
  1116. "example":"MPEG achieves high compression rates by storing only the changes from one frame to another, instead of each entire frame.\n<br>MPEG's compression type is referred to as lossy compression, since some data is removed in the compression. However, the difference is generally negligible to the user.",
  1117. "termId":"2213",
  1118. "imageUrl":"",
  1119. "acro":"MPEG",
  1120. "trans":""
  1121. }{
  1122. "term":"multiplexing",
  1123. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/c03f5c8902a634e731f1bd007d82bd0a.ogg",
  1124. "def":"The process of transmitting several different signals or data streams via a single carrier, which takes place simultaneously by combining the various signals into one common signal that will efficiently move through the carrier bandwidth.",
  1125. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/bcbba46ca60fc4c550a42e7bfd0450ae.ogg",
  1126. "example":"Multiplexing is one of the common tools used today in just about every form of communications. \n<br>Optical networks rely heavily on multiplexing to carry voice and video transmissions along concurrent but separate wavelengths from a point of origin to various points of determination.",
  1127. "termId":"2070",
  1128. "imageUrl":"",
  1129. "acro":"",
  1130. "trans":"Multiplexverfahren"
  1131. }{
  1132. "term":"network adaptor",
  1133. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/dad1c5195c6dae4711a84a48f63c00ed.ogg",
  1134. "def":"An expansion circuit board to be inserted into the mainboard allowing the computer to be connected to a network.",
  1135. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/cddc3ed2a953a66cd96f1873fc7bf0c1.ogg",
  1136. "example":"Most network adaptors are designed for a particular type of network, protocol, and media, although some can serve multiple networks.",
  1137. "termId":"2215",
  1138. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/fd9748bbc575b1ac0da023f7df8bbea0.jpg",
  1139. "acro":"",
  1140. "trans":"Netzwerkkarte, Netzkarte"
  1141. }{
  1142. "term":"network engineer",
  1143. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/6e890493eccf0a422082155b13c2b7ae.ogg",
  1144. "def":"The job title of professionals who design and implement computer networks.",
  1145. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/b82a813be390c38f8d3d72de825b57e5.ogg",
  1146. "example":"Unlike network administrators, who perform day-to-day support, the network engineer, or network architect, focuses on high-level design and planning. Network engineers select the appropriate data communications components and configure them to meet user and corporate needs.",
  1147. "termId":"2190",
  1148. "imageUrl":"",
  1149. "acro":"",
  1150. "trans":""
  1151. }{
  1152. "term":"object",
  1153. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/ad4aa89820490a5a619a58f4403851ee.ogg",
  1154. "def":"An item that can be individually selected and manipulated.",
  1155. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/0ec1931c904c63bb7edc2c5440bb61cd.ogg",
  1156. "example":"Objects include shapes and pictures that appear on a display screen as well as less tangible software entities.\n<br>In object-oriented programming, for example, an object is a self-contained entity that consists of both data and procedures to manipulate the data.",
  1157. "termId":"2216",
  1158. "imageUrl":"",
  1159. "acro":"",
  1160. "trans":"Objekt"
  1161. }{
  1162. "term":"object-oriented programming",
  1163. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/fe3773ef95312ca2dcb724b79b2fb951.ogg",
  1164. "def":"A type of programming in which programmers define not only the data type of a data structure, but also the types of operations (functions) that can be applied to the data structure.",
  1165. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/4b1c8009e266f3e62fcb333d1bbc8012.ogg",
  1166. "example":"Object-oriented programming techniques facilitate the creation of modules that do not need to be changed when a new object is added. Furthermore, new objects can inherit many of their features from existing objects, which allows for quick and easy program modifications.",
  1167. "termId":"2218",
  1168. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/7f02dc85f0142a67e7b1d3bb9e3cef63.jpg",
  1169. "acro":"OOP",
  1170. "trans":"Objektorientiertes Programmieren"
  1171. }{
  1172. "term":"octal",
  1173. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/4712a0537016e7df3b4018c67c4adc9d.ogg",
  1174. "def":"The base-8 number system, which uses just eight unique symbols (0, 1, 2, 3, 4, 5, 6, and 7).",
  1175. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/32e10d7352531cb65bd031c79a7c749c.ogg",
  1176. "example":"Programs often display data in octal format because it is relatively easy for humans to read and can easily be translated into binary format, which is the most relevant format for computers. \n<br>In octal format, each digit represents three binary digits.",
  1177. "termId":"2224",
  1178. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/8ae4fa5fea7c5126a5048c1ea4491d94.jpg",
  1179. "acro":"",
  1180. "trans":"oktal, auf der Zahl 8 basierend"
  1181. }{
  1182. "term":"open source",
  1183. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/e726c5b94ab12015952307901c57b5d7.ogg",
  1184. "def":"Free software the source code of which is available to the general public for use, modification and/or re-distribution.",
  1185. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/b3c7eaececb6f44e220e44fc14995de2.ogg",
  1186. "example":"Open source software is usually supported by communities of developers. This means, users can expect future enhancements, and they are not dependent on a particular author or organization, as with freeware or shareware.\n<br>The distribution terms of open-source software must comply with 10 criteria, as defined by the Open Source Initiative.",
  1187. "termId":"2148",
  1188. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/eba77b8530fbcbe74355083b01d6da89.jpg",
  1189. "acro":"",
  1190. "trans":""
  1191. }{
  1192. "term":"operating system",
  1193. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/79f9ceec861bc2aee1009a5eaf357aec.ogg",
  1194. "def":"The most basic computer program that provides file, task, and job management.",
  1195. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/dbe757fedd142dbc3d3c9dc768d1bbc9.ogg",
  1196. "example":"Operating systems provide a software platform on top of which other programs, called application programs, can run. The application programs must be written to run on top of a particular operating system. Your choice of operating system, therefore, determines to a great extent the applications or apps you can run.",
  1197. "termId":"2226",
  1198. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/d8b1607ddfa97e046a8c5a74dc05237f.jpg",
  1199. "acro":"OS",
  1200. "trans":"Betriebssystem"
  1201. }{
  1202. "term":"OSI model",
  1203. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/600c8b14608e2398bd6e950feb8dc484.ogg",
  1204. "def":"An abstract model of how network protocols and equipment should communicate and interoperate. It segregates the process into groups, called layers.",
  1205. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/f2db1c553c722f00209727ae012193fe.ogg",
  1206. "example":"The seven layers of the Open Systems Interconnection (OSI) reference model are Application, Presentation, Session, Transport, Network, Data Link, and Physical. \n<br>The short form used to memorize the layer names of the OSI model is <strong><em>A</em></strong>ll <strong><em>P</em></strong>eople <strong><em>S</em></strong>eem <strong><em>T</em></strong>o <strong><em>N</em></strong>eed <strong><em>D</em></strong>ata <strong><em>P</em></strong>rocessing.",
  1207. "termId":"2071",
  1208. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/7447578fcbbea66270d7546264169cfd.jpg",
  1209. "acro":"",
  1210. "trans":"OSI-Schichtenmodell"
  1211. }{
  1212. "term":"overclocking",
  1213. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/630770eea4b166549f15c1459b76e5a1.ogg",
  1214. "def":"A method of forcing a computer component to run at a higher clock rate than designed or designated by the manufacturer.",
  1215. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/9d36a58c52776c9dd6f4c75e2c5d6e5a.ogg",
  1216. "example":"Overclocking is commonly practiced by PC enthusiasts in order to increase the performance of their computer components such as processors, video cards, motherboard chipsets, or RAM.",
  1217. "termId":"1578",
  1218. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/ade1bf6144b5210e611ca7c90e066c0558988838.jpg",
  1219. "acro":"",
  1220. "trans":""
  1221. }{
  1222. "term":"patch",
  1223. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/488d19be2225f90a8ffb7c5428ec4128.ogg",
  1224. "def":"A number of changes to an application program, distributed separately, to add features or fix bugs.",
  1225. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/23466cf0e386fc01ec63c0e8bd205f65.ogg",
  1226. "example":"A patch, service patch or changeset, is an up-to-date piece of object code that is inserted into (patched into) an executable program. A patch is designed to fix problems with, or update a computer program or its supporting data. \n<br>Patches typically are available as downloads over the Internet.",
  1227. "termId":"2121",
  1228. "imageUrl":"",
  1229. "acro":"",
  1230. "trans":"Korrektur, Aktualisierung, Fehlerbehebung"
  1231. }{
  1232. "term":"PCI Express",
  1233. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/d7c65e2a927e185cfb9c1204781c874e.ogg",
  1234. "def":"A common I/O interconnect bus standard which represents a two-way, serial connection that carries data in packets along two pairs of point-to-point data lanes.",
  1235. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/5c59d0a91e03ef0f3ade77c9a15be39a.ogg",
  1236. "example":"PCI Express was developed so that high-speed interconnects such as 1394b, USB 2.0, InfiniBand and Gigabit Ethernet would have an I/O architecture suitable for their transfer high speeds.\n<br>In virtually all modern PCs, from consumer laptops and desktops to enterprise data servers, the PCIe bus serves as the primary motherboard-level interconnect, connecting the host system processor with both integrated-peripherals (surface mounted ICs) and add-on peripherals (expansion cards).",
  1237. "termId":"1581",
  1238. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/7e2300cae4001454c6c03920aae29fa71b57bd5b.jpg",
  1239. "acro":"PCIe",
  1240. "trans":""
  1241. }{
  1242. "term":"peer-to-peer",
  1243. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/82374a5ece9bc6b2b076aa95836a5cc0.ogg",
  1244. "def":"A type of network architecture in which each workstation has equivalent capabilities and responsibilities.",
  1245. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/b6dbf3559e0c02e773ee9189fc2c4eb5.ogg",
  1246. "example":"Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the application.\n<br>Peer-to-peer networks differ from client/server architectures, in which some computers are dedicated to serving the others, in that they are simpler, but they usually do not offer the same performance under heavy loads.",
  1247. "termId":"2232",
  1248. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/5cbd07d2abd66f84d373dedbce24c438.jpg",
  1249. "acro":"P2P",
  1250. "trans":""
  1251. }{
  1252. "term":"phishing",
  1253. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/011ef64e8b849a4ad8aacdf3a498b38d.ogg",
  1254. "def":"The act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information, which will then be used for identity theft.",
  1255. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/83cb2962dd796d0eb800e48b1fde3887.ogg",
  1256. "example":"The word phishing comes from the analogy that Internet scammers are using email lures to fish for passwords and financial data from the sea of Internet users. \n<br>The term was coined in 1996 by hackers who were stealing AOL Internet accounts by scamming passwords from unsuspecting AOL users. Since hackers have a tendency to replacing <em>f</em> with <em>ph</em>, the term phishing was derived.",
  1257. "termId":"1757",
  1258. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/e523b8bea93d2a817230f5c6ff3839afa6437a69.jpg",
  1259. "acro":"",
  1260. "trans":""
  1261. }{
  1262. "term":"PHP (Hypertext Preprocessor)",
  1263. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/141d4bf9f96db3ff7cd8e976f4d1a041.ogg",
  1264. "def":"An open source, server-side, cross-platform, HTML-embedded scripting language used to create dynamic web pages.",
  1265. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/93e8e46a520ba65155fe18e2bbf7f523.ogg",
  1266. "example":"PHP is commonly used to extract data out of a database and present it on the web page.\n<br>The major Linux and Windows Web servers support PHP, and it is widely used with the mySQL database.",
  1267. "termId":"2235",
  1268. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/8c6fe35e7958d315f246163c11317ce7.jpg",
  1269. "acro":"PHP",
  1270. "trans":""
  1271. }{
  1272. "term":"pin grid array",
  1273. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/be36e462c109a8e6b52748f23a9f5323.ogg",
  1274. "def":"A type of chip package in which the connecting pins are located on the bottom in concentric squares.",
  1275. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/ee663f95322f6df0965ab7cc6221ba65.ogg",
  1276. "example":"PGA chips are particularly good for chips that have many pins, such as modern microprocessors.",
  1277. "termId":"2236",
  1278. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/6bf0b7a574331101d0214b275bb50fd8.jpg",
  1279. "acro":"PGA",
  1280. "trans":"Kontaktstift-Rasterfeld"
  1281. }{
  1282. "term":"pixel",
  1283. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/b4c6b17507dfd948a2e91ff136d1b319.ogg",
  1284. "def":"A single point in a graphic image.",
  1285. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/70e61efa9564d75d113123fd4de8da86.ogg",
  1286. "example":"Graphics monitors display pictures by dividing the display screen into thousands (or millions) of pixels, arranged in rows and columns. \n<br>The pixels are so close together that they appear connected.",
  1287. "termId":"2237",
  1288. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/8f7b680f6ddcd1911569e16abf26aac8.png",
  1289. "acro":"",
  1290. "trans":""
  1291. }{
  1292. "term":"plaintext",
  1293. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/8576d1294c96ebb276e54f1ba9a6f190.ogg",
  1294. "def":"In cryptography, ordinary readable text before being encrypted into ciphertext or after being decrypted.",
  1295. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/995dc16f1f521df3a1e690a7e3d41534.ogg",
  1296. "example":"Digital certificates contain both plaintext and encrypted text.",
  1297. "termId":"2238",
  1298. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/abbbda0ff4a96dc545b2311082988f86.jpg",
  1299. "acro":"",
  1300. "trans":"Klartext"
  1301. }{
  1302. "term":"post office protocol",
  1303. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/88b30946f3941c123097a84fa9171a1f.ogg",
  1304. "def":"One of the two most prevalent Internet standard protocols for email retrieval, the other being the Internet message access protocol (IMAP).",
  1305. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/fe39a5e435bd5f74ac34a9829ffff107.ogg",
  1306. "example":"POP is recommended only for people who need to access their email offline. \n<br>POP removes your email from the server and stores it on your computer in your email client (i.e. Thunderbird, Outlook, or whatever program you use to check email).",
  1307. "termId":"2166",
  1308. "imageUrl":"",
  1309. "acro":"POP",
  1310. "trans":""
  1311. }{
  1312. "term":"post-processing",
  1313. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/880de3e19438d2ef11dfed5ba4688b51.ogg",
  1314. "def":"A term which collectively denotes the methods and processes of editing images, sound and video recordings.",
  1315. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/33f97bdf0f1e1f4b822eede693ef6276.ogg",
  1316. "example":"Depending on the media, programmers, media professionals, photographers and artists can choose from a wide variety of methods and tools for digital post-processing purposes. Post-processing is all about changing the perceived quality of media while minimizing the size of files and programs.\n<br>It is important to understand that video post-processing always involves a trade-off between speed, smoothness and sharpness.",
  1317. "termId":"1580",
  1318. "imageUrl":"",
  1319. "acro":"",
  1320. "trans":"Nachbearbeitung"
  1321. }{
  1322. "term":"programming language",
  1323. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/7d01e9ff8541e8ef2f02891f741d4b67.ogg",
  1324. "def":"A vocabulary and set of grammatical rules for instructing a computer to perform specific tasks.",
  1325. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/2771aa50ad4ed4b067fb9ecf7fcfae28.ogg",
  1326. "example":"There are different types of programming languages, such as object-oriented and functional programming languages.\n<br>Apparently, there seems to be no clear-cut borderline between low-level and high-level programming languages. Alan Perlis said: \"A programming language is low-level when its programs require attention to the irrelevant\".",
  1327. "termId":"2241",
  1328. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/78f3824c6cda45a25b326eaff31540be.jpg",
  1329. "acro":"",
  1330. "trans":"Programmiersprache"
  1331. }{
  1332. "term":"protocol",
  1333. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/703b74569eff3d6b963e40156f13a7e8.ogg",
  1334. "def":"An agreed set of procedures for transmitting data between two devices. It determines (1) the type of error checking to be used, (2) the data compression method, if applied, (3) how the sending device will indicate that it has finished sending a message, and (4) how the receiving device will indicate that it has received a message.",
  1335. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/4bf88f9c4e71109183cc1678efdd89b9.ogg",
  1336. "example":"While there is no universally accepted formal definition of \"protocol\" in computer science, an informal definition, based on the previous, could be \"a set of procedures to be followed when communicating\". In computer science, the word algorithm is a synonym for the word procedure, so a protocol is to communications what an algorithm is to mathematics.",
  1337. "termId":"2242",
  1338. "imageUrl":"",
  1339. "acro":"",
  1340. "trans":""
  1341. }{
  1342. "term":"proxy server",
  1343. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/8a2da20df97a0f759326210b0ab3ea5d.ogg",
  1344. "def":"A server which sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.",
  1345. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/bd873ef7844a92eaa9e222813257ebad.ogg",
  1346. "example":"Proxy servers have two main purposes: firstly, to improve performance and secondly, to filter requests.\n<br>A company might use a proxy server to prevent its employees from accessing a specific set of Web sites.",
  1347. "termId":"2243",
  1348. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/518ab11e6abf55e913525a51cfab13ae.jpg",
  1349. "acro":"",
  1350. "trans":"Vermittlungsserver"
  1351. }{
  1352. "term":"public-key encryption",
  1353. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/fbe2dba3aef79c5db13518545dbf24b7.ogg",
  1354. "def":"A cryptographic system that uses two keys -- a public key known to everyone and a private or secret key known only to the recipient of the message.",
  1355. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/3e408b451d4eea8ac82e0092998a185c.ogg",
  1356. "example":"An important element to the public-key system is that the public and private keys are related in such a way that only the public key can be used to encrypt messages, and only the corresponding private key can be used to decrypt them.\n<br>When John wants to send a secure message to Jane, he uses Jane's public key to encrypt the message. Jane then uses her private key to decrypt it.",
  1357. "termId":"2244",
  1358. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/a3e26a744d218b3d77cbeb00df27752d.jpg",
  1359. "acro":"",
  1360. "trans":""
  1361. }{
  1362. "term":"random-access memory",
  1363. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/1b6ac8320382fb2290aea6f7592a1dae.ogg",
  1364. "def":"A type of computer memory that allows every byte to be accessed without touching the preceding bytes.\n<br>The computer's working memory.",
  1365. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/4ff3804cd5980acce9554cd64e4e3cf5.ogg",
  1366. "example":"The 'random' in RAM means that the contents of each byte of storage in the chip can be directly accessed without regard to the bytes before or after it. \n<br>When personal computers first came on the market in the late 1970s, 64 kilobytes of RAM was the upper limit.",
  1367. "termId":"2245",
  1368. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/fae88546676ea834aa62e1c4f147dc63.jpg",
  1369. "acro":"RAM",
  1370. "trans":"Arbeitsspeicher, frei adressierbarer Festspeicher"
  1371. }{
  1372. "term":"rapid application development",
  1373. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/7a89bc91bb285dbdee1b4b3d8c01fe22.ogg",
  1374. "def":"A software development methodology which involves methods like iterative development and software prototyping. It can be described as a merger of various structured techniques, especially data-driven information engineering with prototyping techniques to accelerate software systems development.",
  1375. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/f45146790ad488222230dcfee64e2c25.ogg",
  1376. "example":"In general, RAD systems provide a number of tools to help build graphical user interfaces that would normally take a large development effort. Two of the most popular RAD systems for Windows are Visual Basic and Delphi.",
  1377. "termId":"2246",
  1378. "imageUrl":"",
  1379. "acro":"RAD",
  1380. "trans":"schnelle Anwendungsentwicklung"
  1381. }{
  1382. "term":"raw",
  1383. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/c6f962f2fbfb7c23810d7865939834a3.ogg",
  1384. "def":"The term refers to data that is passed along to an I/O device without being interpreted.",
  1385. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/956a8b83372979bf101463b8f7a1bde7.ogg",
  1386. "example":"The term \"raw\" comes from UNIX, which supports cooked and raw modes for data output to a terminal.",
  1387. "termId":"2247",
  1388. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/f82e86c45489c6f77abc3da405f9d3d4.jpg",
  1389. "acro":"",
  1390. "trans":"unbearbeitet, roh"
  1391. }{
  1392. "term":"Really Simple Syndication",
  1393. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/55b6ebf3369efaa0542d2712f03a6427.ogg",
  1394. "def":"A family of web feed formats used to publish frequently updated digital content, such as blogs, news feeds or podcasts.",
  1395. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/2d4e3b8764d362c929cf198127705e96.ogg",
  1396. "example":"Most commonly used to update news articles and other content that changes quickly, RSS feeds may also include audio files (PodCasts) or video files (VodCasts). \n<br>The user 'subscribes' to a feed by entering the link of the RSS feed into their RSS feed reader, which then checks the subscribed feeds to see if any have new content since the last time it checked, and if so, retrieves the new content and presents it to the user. \n<br>RSS also stood for 'Rich Site Summary' and 'RDF Site Summary.'",
  1397. "termId":"1759",
  1398. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/4f8d41edc2c596c05064edf0ccebd53ba2238749.jpg",
  1399. "acro":"RSS",
  1400. "trans":""
  1401. }{
  1402. "term":"redundant array of independent disks",
  1403. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/56256b358e3f204c9022714a4093ffc1.ogg",
  1404. "def":"A system of storing the same data in different places on multiple hard disks to increase fault-tolerance and performance.",
  1405. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/8298a497d42e701d868c8601103aae0b.ogg",
  1406. "example":"A RAID appears to the operating system to be a single logical hard disk.\n<br>There are a number of RAID levels defined. However, contrary to common perception, a higher numbered RAID level is not necessarily superior to a lower numbered one.",
  1407. "termId":"2248",
  1408. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/d6b2286627dbc85d834de47ac6f379b7.jpg",
  1409. "acro":"RAID",
  1410. "trans":""
  1411. }{
  1412. "term":"refresh rate",
  1413. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/0957d1dedf2a304a033a48e3b2bbb3ba.ogg",
  1414. "def":"The rate at which a video card is sending complete screens from its frame buffer memory to a display, and the corresponding rate at which the display refreshes the whole image.",
  1415. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/eb144daa2ab0bc9c64fdcd0b47170797.ogg",
  1416. "example":"A refresh rate of 60 hz equals 60 complete refreshes per second.",
  1417. "termId":"2144",
  1418. "imageUrl":"",
  1419. "acro":"",
  1420. "trans":"Bildwiederholrate"
  1421. }{
  1422. "term":"registered jack 45",
  1423. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/237dfd3a0ea621772bf8793ddd21385f.ogg",
  1424. "def":"An eight-wire connector commonly used to connect computers onto local-area networks (LANs), especially Ethernets.",
  1425. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/e49fd8d6c27f26c4b666c3562f804518.ogg",
  1426. "example":"RJ45 connectors look similar to the ubiquitous RJ11 connectors used for connecting telephone equipment, but they are somewhat wider.",
  1427. "termId":"2249",
  1428. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/7cbe573dddf88a2500057fb09e0c14b2.jpg",
  1429. "acro":"RJ45",
  1430. "trans":""
  1431. }{
  1432. "term":"remote procedure call",
  1433. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/e8b6015fc95890cb2fa86325361877f3.ogg",
  1434. "def":"A type of protocol that allows a program on a client to execute a program on a server. The client program sends a message to the server with appropriate arguments, and the server returns a message containing the results of the program executed.",
  1435. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/a2eb8320ed392281fc76785c90285feb.ogg",
  1436. "example":"Each remote procedure call has two sides: an active client side that makes the call to a server side, which sends a reply back to the client.\n<br>Sun Microsystems developed the first widely used RPC protocol as part of their Open Network Computing architecture in the early 1980s.",
  1437. "termId":"2250",
  1438. "imageUrl":"",
  1439. "acro":"RPC",
  1440. "trans":""
  1441. }{
  1442. "term":"replication",
  1443. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/6a812a612713a96a2d49dae1f7a73049.ogg",
  1444. "def":"The process of creating and managing duplicate versions of a database.",
  1445. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/847d5afc9581ab6d6c5a6166947e6ccb.ogg",
  1446. "example":"Replication not only copies a database but also synchronizes a set of replicas so that changes made to one replica are reflected in all the others. The beauty of replication is that it enables multiple users to work with their own local copy of a database but have the database updated as if they were working on a single, centralized database.",
  1447. "termId":"2251",
  1448. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/43a333c2310d934e3bf5eb5b1bd3a2ba.jpg",
  1449. "acro":"",
  1450. "trans":"Abgleich"
  1451. }{
  1452. "term":"representational state transfer",
  1453. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/33be4a45c3a40d4c506bc607103ad4f5.ogg",
  1454. "def":"An architectural style for distributed hypermedia systems which is based on an idealized model of the interactions within a global Web application.",
  1455. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/7d546526c728760fe75746975e9a659f.ogg",
  1456. "example":"Representational State Transfer (REST) is a coordinated set of architectural constraints that attempts to minimize latency and network communication while at the same time maximizing the independence and scalability of component implementations.\n<br>With the exception of the Streaming API, the Twitter API attempts to conform to the design principles of representational state transfer.\n<br>A REST API should spend almost all of its descriptive effort on defining the media type(s) used for representing resources and driving application state, or on defining extended relation names and/or hypertext-enabled mark-up for existing standard media types.",
  1457. "termId":"2655",
  1458. "imageUrl":"",
  1459. "acro":"REST",
  1460. "trans":""
  1461. }{
  1462. "term":"Request for Comments",
  1463. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/8e695718f432d68a4b0bfebc57817d1a.ogg",
  1464. "def":"A series of technical and organizational notes about the Internet, beginning in 1969 when the Internet was the ARPANET.",
  1465. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/46b09ac5b6630b1311544510bdfc4774.ogg",
  1466. "example":"An Internet document can be submitted to the Internet Engineering Task Force by anyone, but the IETF decides if the document becomes a Request for Comments. \n<br>Each RFC is designated by an RFC number. Once published, an RFC never changes. \n<br>Eventually, if an RFC gains enough interest, it may evolve into an Internet standard.",
  1467. "termId":"2252",
  1468. "imageUrl":"",
  1469. "acro":"RFC",
  1470. "trans":""
  1471. }{
  1472. "term":"response time",
  1473. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/76beef556a028845ef5dee95bd0e8f9e.ogg",
  1474. "def":"The time a system or functional unit takes to react to a given input.",
  1475. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/e5525d32c26a5718accd02671f59040d.ogg",
  1476. "example":"In a data system, the system response time is the interval between the receipt of the end of transmission of an inquiry message and the beginning of the transmission of a response message to the station originating the inquiry.\n<br>In terms of display technologies, response time is the amount of time a pixel takes to go from one value to another and back again, which is measured in milliseconds (ms).",
  1477. "termId":"1983",
  1478. "imageUrl":"",
  1479. "acro":"",
  1480. "trans":"Reaktionszeit"
  1481. }{
  1482. "term":"router",
  1483. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/efbd71fff86b34a39b70a163a5b37018.ogg",
  1484. "def":"A protocol-bound device that forwards data packets from one LAN or WAN to another.",
  1485. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/d0093c7b862ec23921559a0d81b67cb6.ogg",
  1486. "example":"Routers can only route a message that is transmitted by a routable protocol such as IP, or IPX.\n<br>Most routers are specialized computers that are optimized for communications. However, router functions can also be implemented by adding routing software to a file server.",
  1487. "termId":"2262",
  1488. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/13b6ed103defe536bf869842d7b9bdf4.jpg",
  1489. "acro":"",
  1490. "trans":""
  1491. }{
  1492. "term":"sampling",
  1493. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/c27103c6dd7914d302e386f7a1ae5146.ogg",
  1494. "def":"A technique used to capture continuous phenomena by taking periodic snapshots.",
  1495. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/82dda537f314151b052e73d5531f9fd2.ogg",
  1496. "example":"If the sampling rate is fast enough, the human sensory organs cannot discern the gaps between each snapshot when they are played back. This is the principle behind motion pictures.\n<br>Sampling is the key technique used to digitize analog information.",
  1497. "termId":"2263",
  1498. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/10c46ac0493af0c71e6ad73e37c861cf.jpg",
  1499. "acro":"",
  1500. "trans":"Abtastung, Abfragen"
  1501. }{
  1502. "term":"scalable vector graphics",
  1503. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/6379b452cfa0fde8d5b8cac0790ef17b.ogg",
  1504. "def":"A modularized language for describing two-dimensional vector and mixed vector/raster graphics in XML.",
  1505. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/2056f95a0d3c94595e25eddf93575ffc.ogg",
  1506. "example":"SVG is a language for rich graphical content, allowing for three types of graphic objects: vector graphic shapes, images and text.\n<br>Sophisticated applications of SVG are possible by use of a supplemental scripting language that accesses SVG Document Object Model (DOM), which provides full access to all elements, attributes and properties. A rich set of event handlers such as 'onmouseover' and 'onclick' can be assigned to any SVG graphical object.",
  1507. "termId":"2260",
  1508. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/3fc8d4a9c3ed14c9afdbd1c522a3a60d.jpg",
  1509. "acro":"SVG",
  1510. "trans":""
  1511. }{
  1512. "term":"secure shell",
  1513. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/cf6a107bd6a52df414b70ec100fe030a.ogg",
  1514. "def":"A program to log into another computer over a network, allowing it to execute commands on a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels.",
  1515. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/5749440422aa65b076d12315118e2c23.ogg",
  1516. "example":"SSH protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing.\n<br>When using SSH's login, the entire login session, including the transmission of the password, is encrypted. Therefore it is almost impossible for an outsider to collect passwords.",
  1517. "termId":"2264",
  1518. "imageUrl":"",
  1519. "acro":"SSH",
  1520. "trans":""
  1521. }{
  1522. "term":"secure sockets layer",
  1523. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/1a4440aec164c1a2b50c52abfede7f39.ogg",
  1524. "def":"A leading security protocol on the Internet, originally developed by Netscape for creating a secure connection between a client and a server. Current upgrades partly operate under the name Transport Layer Security (TLS).",
  1525. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/90bd469053feee19bd62cfe13be072cd.ogg",
  1526. "example":"By convention, URLs that require an SSL or TLS connection start with https: instead of http:.\n<br>What happens when a browser tries to connect to a Web site secured with SSL? The browser requests the web server to identify itself. The server sends the browser a copy of its SSL certificate. The browser checks whether it trusts the SSL certificate. If so, it sends a message to the server. The server sends a digitally signed acknowledgement back to start an SSL encrypted session. Encrypted data is shared between the browser and the server.",
  1527. "termId":"2265",
  1528. "imageUrl":"",
  1529. "acro":"SSL",
  1530. "trans":""
  1531. }{
  1532. "term":"semantic web",
  1533. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/73ec56b5e0267948102dbedb29e71016.ogg",
  1534. "def":"A man-made woven web of data which enables machines to understand the semantics, or meaning, of information, and to comprehensively respond to complex human information requests.",
  1535. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/292c3a67d61f5b9988595cb65fe8a923.ogg",
  1536. "example":"The term was coined by Tim Berners-Lee, who defines the Semantic Web as \"a web of data that can be processed directly and indirectly by machines.\" It builds upon the concept of the Semantic Network Model as a form to represent semantically structured knowledge. \n<br>The semantic web extends the network of hyperlinked human-readable web pages by inserting machine-readable metadata about pages and how they are related to each other, enabling automated agents to access the web more intelligently and perform tasks on behalf of users.",
  1537. "termId":"2261",
  1538. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/1e689b683bbed0332f8938d8601dbe25.jpg",
  1539. "acro":"",
  1540. "trans":""
  1541. }{
  1542. "term":"Serial Advanced Technology Attachment",
  1543. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/9b933dae4e4e48384277ee9a11b00ae1.ogg",
  1544. "def":"A common computer bus interface for connecting host bus adapters to mass storage devices such as hard disk drives and optical drives.",
  1545. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/013a390986236e366a17e2b18bccf5eb.ogg",
  1546. "example":"As the name suggests, SATA is simply a serial link or interface standard used to control and transfer data and information from a server or storage appliance to a client application.",
  1547. "termId":"1577",
  1548. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/ac4d76d31c9ddf045d737f76e0a00e71aee4f1b5.jpg",
  1549. "acro":"SATA",
  1550. "trans":""
  1551. }{
  1552. "term":"server appliance",
  1553. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/21f7014ba972f1717ed7fb735c6bb6a4.ogg",
  1554. "def":"A specialized server that is designed for ease of installation and maintenance.",
  1555. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/e67525a564d09dace9b610ea83dfa093.ogg",
  1556. "example":"Server appliances have their hardware and software bundled in the product, so all applications are pre-installed.\n<br>Server appliances provide Internet sharing, FTP services, e-mail, VPN connections, firewall services, print and file sharing. Access to the server appliance is through a Web browser.",
  1557. "termId":"2205",
  1558. "imageUrl":"",
  1559. "acro":"",
  1560. "trans":""
  1561. }{
  1562. "term":"session",
  1563. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/6debb44578dca7d2df19a9bd694e31bf.ogg",
  1564. "def":"A series of interactions between two communication end points that occur during the span of a single connection.",
  1565. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/6809bb51c6543e4b13cd701b02fe754b.ogg",
  1566. "example":"The session begins when the connection is established at both ends and terminates when the connection is ended. \n<br>Some connections and sessions last only long enough to send a message in one direction. However, other sessions may last longer, usually with one or both of the communicating parties able to terminate it.",
  1567. "termId":"2266",
  1568. "imageUrl":"",
  1569. "acro":"",
  1570. "trans":""
  1571. }{
  1572. "term":"shortcut",
  1573. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/b59ec166c8db0c705ed35e047e0e376a.ogg",
  1574. "def":"A combination of keystrokes that provides easier access to a command or operation. \n<br>Alternatively, a symbolic file link, or symlink, usually displayed as an icon only containing the location of another file in the computer.",
  1575. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/6408d76540d26563aa3dadc171fd3529.ogg",
  1576. "example":"A keyboard shortcut is a finite set of one or more keys that invoke a software or operating system operation when triggered by the user. Ctrl-C and Ctrl-V seem to belong to the shortcuts that have become most common.\n<br>A file shortcut in Microsoft Windows is a small file containing a target URI or GUID, or the name of a target program file that the shortcut represents.",
  1577. "termId":"2122",
  1578. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/cf7b425117e578221675878f347b706c.jpg",
  1579. "acro":"",
  1580. "trans":"Verknüpfung"
  1581. }{
  1582. "term":"simple mail transfer protocol",
  1583. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/d645598fe4e3c9030b3f074bfff095ac.ogg",
  1584. "def":"A standard protocol for sending email messages between servers or from a mail client to a mail server.",
  1585. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/360d45d3195a6d81ae9352a964cf471a.ogg",
  1586. "example":"Most email systems, which send mail over the Internet, use SMTP to transfer messages from one server to another one. Furthermore, SMTP is generally used to send messages from a mail client to a mail server. This is why you need to specify both the POP or IMAP server and the SMTP server when you configure your email application.",
  1587. "termId":"2075",
  1588. "imageUrl":"",
  1589. "acro":"SMTP",
  1590. "trans":""
  1591. }{
  1592. "term":"SOAP",
  1593. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/a46a36d632493d58fd234b2ebb8bae65.ogg",
  1594. "def":"A lightweight XML-based messaging protocol used to encode the information in Web service request and response messages before sending them over a network.",
  1595. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/5050386dd4166903f6f616b8821ddd10.ogg",
  1596. "example":"SOAP specifies exactly how to encode an HTTP header and an XML file so that a program in one computer can call a program in another computer and pass it information. It also specifies how the called program can return a response.\n<br>SOAP messages are independent of any operating system or protocol and may be transported using a variety of Internet protocols.",
  1597. "termId":"2267",
  1598. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/08b51eebf499cae8238f9a3b5f88bcd7.jpg",
  1599. "acro":"",
  1600. "trans":""
  1601. }{
  1602. "term":"social media",
  1603. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/67a69ceee2a7d9e9846570709794e4ed.ogg",
  1604. "def":"Various activities and attempts to integrate technology, social interaction and the construction of words, pictures, videos and audio.",
  1605. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/5fa4e24a3450b967ae6c863dd55ee689.ogg",
  1606. "example":"'Social media' is an umbrella term, which describes web-based platforms and tools such as Twitter, Facebook, Youtube, Flickr, blogs and other.\n<br>Without content, there is no need for social media. Without social media, how will anyone find your content?",
  1607. "termId":"2169",
  1608. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/efa96974b68d9b3e64ffe0dd59c9c30d.jpg",
  1609. "acro":"",
  1610. "trans":""
  1611. }{
  1612. "term":"software engineering",
  1613. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/ce9cac139e4d0c6a26d7d9056743d2f6.ogg",
  1614. "def":"The application of a systematic, disciplined, quantifiable approach to the development, operation and maintenance of software, and to the study of these approaches. In other words, the application of computer science, mathematics and engineering practices to software.",
  1615. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/52089f825784ad79655db74584270b1b.ogg",
  1616. "example":"Software engineering applies the scientific knowledge acquired in the foundations of computer science to the development, operation, and maintenance of different systems, such as operating systems, micro-controllers for automobile engines, flight attendance systems, power station controls, ATM software systems, and e-commerce applications.",
  1617. "termId":"2076",
  1618. "imageUrl":"",
  1619. "acro":"SE",
  1620. "trans":""
  1621. }{
  1622. "term":"solid state disk",
  1623. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/5c784abbd76fd4646480a23f79c82a28.ogg",
  1624. "def":"A high-performance plug-and-play storage device that includes either a DRAM or EEPROM memory board, a memory bus board, a CPU, and a battery card, but no moving parts.",
  1625. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/e4cda1c1d5eb0fa59f6a087140c31c9d.ogg",
  1626. "example":"Solid state disks are a lot faster than conventional rotating hard disks and produce highest possible I/O rates. Therefore, they are most effective for server applications and server systems. \n<br>Data stored on SSDs should include anything that creates bottlenecks, such as databases, swap files, library and index files, and authorization and login information.",
  1627. "termId":"2191",
  1628. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/b58d0b9a758190bcd9765294266896e2.jpg",
  1629. "acro":"SSD",
  1630. "trans":""
  1631. }{
  1632. "term":"source code",
  1633. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/df69a44851f647718ad39dfe80285030.ogg",
  1634. "def":"Program instructions in their original form.",
  1635. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/d2df6561f2f6ab416e5bb520ea6d269c.ogg",
  1636. "example":"Initially, a programmer writes a program in a particular programming language. This form of the program is called the source code.\n<br>Source code is the only format that is readable by humans.",
  1637. "termId":"2268",
  1638. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/3c844a85c611918517c03a67e24cd1e4.jpg",
  1639. "acro":"",
  1640. "trans":"Quellcode"
  1641. }{
  1642. "term":"streaming",
  1643. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/a8d1f0a76f9054748f6746fff7ba9d79.ogg",
  1644. "def":"A technique for transferring data so that it can be processed as a steady and continuous flow.",
  1645. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/5fc79ef741040a206e8c875c0cd7a18d.ogg",
  1646. "example":"With streaming, the client browser or plug-in can start displaying the data before the entire file has been transmitted. \n<br>Streaming technologies became increasingly important with the growth of file sizes offered on the Web.",
  1647. "termId":"2269",
  1648. "imageUrl":"",
  1649. "acro":"",
  1650. "trans":""
  1651. }{
  1652. "term":"structured data",
  1653. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/c989bb8d58f21ed931cef4ae230c7273.ogg",
  1654. "def":"Any information that is identifiable because of its internal organization. A database, which stores information in a grid of columns and rows, is considered a common example.",
  1655. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/6d5b9328f8d2fe628572deaf61d9e4c6.ogg",
  1656. "example":"Data can be designated as structured or unstructured data for classification within an organization. \n<br>Structured data is not only understood by computers. It is also efficiently organized for human readers.\n<br>Structured data is searchable by data type within content.",
  1657. "termId":"2211",
  1658. "imageUrl":"",
  1659. "acro":"",
  1660. "trans":""
  1661. }{
  1662. "term":"structured programming",
  1663. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/e9660138174b6ea09be2004d5458f827.ogg",
  1664. "def":"A subset of procedural programming that enforces a logical structure on the program being written.",
  1665. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/d4625837f17127cf202c40b512391315.ogg",
  1666. "example":"With structured programming, large routines are broken down into small, modular routines. The use of the GOTO statement is discouraged in structured programming.\n<br>Edsger Dijkstra's article, 'Go To Statement Considered Harmful' was instrumental in the trend towards structured programming.",
  1667. "termId":"2270",
  1668. "imageUrl":"",
  1669. "acro":"",
  1670. "trans":"strukturierte Programmierung"
  1671. }{
  1672. "term":"structured query language",
  1673. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/fee7e4de019008db4efd2f594b37e8e7.ogg",
  1674. "def":"The most widely used database language for the management of information in relational database management systems (RDBMS).",
  1675. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/248cfdd99081da205cbc7f0ce92bd1fa.ogg",
  1676. "example":"The Structured Query Language (SQL) forms the backbone of all relational databases. \n<br>SQL offers a flexible interface for databases of all shapes and sizes and is used as the basis for all user and administrator interactions with the database.",
  1677. "termId":"2271",
  1678. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/be5482ba873b99b143b485480b28baff.jpg",
  1679. "acro":"SQL",
  1680. "trans":"strukturierte (Datenbank-)Abfragesprache"
  1681. }{
  1682. "term":"symmetric multiprocessing",
  1683. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/da9262b71c2f616ff52e1267f0c65bdc.ogg",
  1684. "def":"A feature of an operating system in which two or more processors are managed by one kernel, sharing the same memory and having equal access to I/O devices, and in which any task, including kernel tasks, can run on any processor.",
  1685. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/4c335ba299b4998e61a3b44930736833.ogg",
  1686. "example":"SMP can also be described as a system in which functionally identical multiple processors are used in parallel, providing high performance as well as simple and efficient load balancing.",
  1687. "termId":"2273",
  1688. "imageUrl":"",
  1689. "acro":"SMP",
  1690. "trans":""
  1691. }{
  1692. "term":"systems administrator",
  1693. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/e04ac72528997d93a34ec39b789f4013.ogg",
  1694. "def":"The job title of professionals who install, maintain, and support an organization's information technology systems.",
  1695. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/60d9c6617b475c8861264414e9731dce.ogg",
  1696. "example":"Systems administrators test system components to ensure that computers, software, and network equipment function seamlessly together. Sysadmins may be in charge of the company's LAN, WAN, intranet or Internet systems. Some administrators focus on specialist roles such as network security, IT audit, or system upgrade research.",
  1697. "termId":"2187",
  1698. "imageUrl":"",
  1699. "acro":"sysadmin",
  1700. "trans":""
  1701. }{
  1702. "term":"systems software",
  1703. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/b9c4f5cb92c03ed1c0beaa6fa8143f63.ogg",
  1704. "def":"Programs which manage computer resources at an elementary level. Examples include operating systems, compilers, and utilities for managing computer resources.",
  1705. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/0c47ddf4183668ac95229ae3bd578493.ogg",
  1706. "example":"Systems software includes compilers, loaders, linkers, and debuggers.",
  1707. "termId":"2202",
  1708. "imageUrl":"",
  1709. "acro":"",
  1710. "trans":"Systemprogramme"
  1711. }{
  1712. "term":"to back up",
  1713. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/5e85302a67f351b44285a0261c4d4778.ogg",
  1714. "def":"To copy files or databases so that they will be preserved in case of equipment failure or other catastrophe.",
  1715. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/705c0afc8f8e9b7c8ba7c0d08740f6ac.ogg",
  1716. "example":"The retrieval of files you backed up is called restoring them.\n<br>Backup procedures are routine parts of the operation of business computing systems.",
  1717. "termId":"2275",
  1718. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/aa319fe3bcbdb882d476d2a94b32cb7c.jpg",
  1719. "acro":"",
  1720. "trans":"eine Sicherungskopie anfertigen"
  1721. }{
  1722. "term":"to boot",
  1723. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/647392a81c6c108468de68dd18b89ab6.ogg",
  1724. "def":"To start-up a computer by executing basic instructions and loading the operating system.",
  1725. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/0487960a6e1fadab0e48359c61f8de74.ogg",
  1726. "example":"A computer knows how to boot because instructions for booting are built into one of its chips, the BIOS.\n<br>Some operating systems come with utilities that allow you to choose, at boot time, which partition to boot.",
  1727. "termId":"2276",
  1728. "imageUrl":"",
  1729. "acro":"",
  1730. "trans":"starten"
  1731. }{
  1732. "term":"to broadcast",
  1733. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/1db6938c739f89fdcd8d7fce568b965c.ogg",
  1734. "def":"To transmit data to every station connected to the network or network segment.",
  1735. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/d31ce564c20ec42272323b86acf65ac3.ogg",
  1736. "example":"In networking, a distinction is made between broadcasting and multicasting. Broadcasting sends a message to everyone on the network, whereas multicasting sends a message to a select list of recipients.",
  1737. "termId":"2277",
  1738. "imageUrl":"",
  1739. "acro":"",
  1740. "trans":"senden"
  1741. }{
  1742. "term":"to defrag",
  1743. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/0a536d2068af4699204989db099dd150.ogg",
  1744. "def":"To reorganize the way information is stored on a computer disk so that all of the information belonging to a file is stored in a single, contiguous area of the disk.",
  1745. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/8634376ee19939e610363f5492057530.ogg",
  1746. "example":"Before you defrag your computer there are a number of steps you must take first. Read this entire procedure before you use the defrag utility.",
  1747. "termId":"1579",
  1748. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/f4fbf6ffed48fcf0ff9cbc8c5e3fb514fdb03fe4.jpg",
  1749. "acro":"",
  1750. "trans":""
  1751. }{
  1752. "term":"to encrypt",
  1753. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/44b069fd9f0e32379219c59173f03fe9.ogg",
  1754. "def":"To translate data by means of a secret key and thus preventing the information from being read by unauthorized parties.",
  1755. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/0f59c7b1223ea856425e43deb3643106.ogg",
  1756. "example":"Encrypted data needs to be decrypted before it can be read.\n<br>Public key encryption and symmetric key encryption are two ways of encrypting data.\n<br>Personal information sent over the Internet should always be encrypted.",
  1757. "termId":"2104",
  1758. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/995a0af8d43d8d118fcb2b963b9a2b46.jpg",
  1759. "acro":"",
  1760. "trans":"verschlüsseln"
  1761. }{
  1762. "term":"to implement",
  1763. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/7927e77b4194709d83714d4d95809bb0.ogg",
  1764. "def":"To apply an algorithm, procedure, system or something else in a manner consistent with its purpose or design.",
  1765. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/ed7eed3bae101d735a16d2226fb9c03d.ogg",
  1766. "example":"Most algorithms are usually implemented on particular hardware or software platforms, and their algorithmic efficiency is eventually put to the test using real code.\n<br>Let's have a look at the steps you need to take to implement an algorithm similar to the A-Star Pathfinding algorithm, using the C# programming language.",
  1767. "termId":"2161",
  1768. "imageUrl":"",
  1769. "acro":"",
  1770. "trans":"umsetzen, anwenden, einführen"
  1771. }{
  1772. "term":"to render",
  1773. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/c2c25fe9b4787c315df108c76fa76b42.ogg",
  1774. "def":"To generate an image from a model, which is one of the major sub-topics of 3D computer graphics.",
  1775. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/d10be05ffc83391436a3589878def851.ogg",
  1776. "example":"Rendering has uses in architecture, video games, simulators, movie or TV special effects, and design visualization, each employing a different balance of features and techniques. \n<br>For movie animations, several images (frames) must be rendered, and stitched together in a program capable of making an animation of this sort. \n<br>The process of rendering a map means taking raw geospatial data and making a visual map from it.",
  1777. "termId":"2074",
  1778. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/74cdc84355af5a526a1c478dd711935d.jpg",
  1779. "acro":"",
  1780. "trans":"Rendern, Verfahren zur Berechnung und Erzeugung von Oberflächen, Reflexionen, Texturen, Schattenwürfen etc. eines virtuellen 3D-Modells"
  1781. }{
  1782. "term":"to restrict",
  1783. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/3bc17c53ba8d173495e17831d1be787a.ogg",
  1784. "def":"To keep or confine within certain limits or specified bounds.",
  1785. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/b56b0b6b344589800bac4546a0f47294.ogg",
  1786. "example":"If you have web pages that you do not wish to be publicly available to anyone in the world, you can take steps to restrict who can access them.",
  1787. "termId":"2077",
  1788. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/9944e62c09a3b2dac6ddc0beee0f326e.jpg",
  1789. "acro":"",
  1790. "trans":"begrenzen, einschränken"
  1791. }{
  1792. "term":"to swap",
  1793. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/30db359628b6dec961d9e3c753805019.ogg",
  1794. "def":"To replace pages or segments of data in memory from disk.",
  1795. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/652c8f020d9ac5b092c47d74a8e8a401.ogg",
  1796. "example":"Swapping is a convenient technique that enables a computer to execute programs and manipulate data files larger than main memory. In UNIX systems, swapping refers to moving entire processes in and out of main memory.",
  1797. "termId":"2279",
  1798. "imageUrl":"",
  1799. "acro":"",
  1800. "trans":"ein- oder auslagern"
  1801. }{
  1802. "term":"top-level domain",
  1803. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/f69b93165c159d9e0bea85d3abeccffd.ogg",
  1804. "def":"The final and most general part of a domain name, such as .com, .org, .eu or .de.",
  1805. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/78c8926243bdcbf2687eb3a31feac049.ogg",
  1806. "example":"There are two common types of top-level domains: generic top-level domains (gTLDs), such as .com, .net, .org. and country code top-level domains (ccTLDs) which are assigned to countries and continents, such as .uk, .de, .eu and .asia. New top-level domains (nTLDs) include the names of towns, regions and a wide range of commercial key words, such as .nyc, .bayern, .hotel, .med and .music.",
  1807. "termId":"2123",
  1808. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/502b2cde9b15d388894c705c50ae2433.jpg",
  1809. "acro":"TLD",
  1810. "trans":""
  1811. }{
  1812. "term":"topology",
  1813. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/00110e069dc033edbd6ee6862111bf56.ogg",
  1814. "def":"The shape of a local-area network (LAN) or other communications system.",
  1815. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/bcc1a8f2afeded165414ab021d4aa5d8.ogg",
  1816. "example":"Topologies are either physical or logical. \n<br>A network's topology (e.g. bus, star or ring) determines how different nodes in a network are connected to each other and how they communicate.",
  1817. "termId":"2281",
  1818. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/1e710cb8f2962f8e3734b7479d338b81.jpg",
  1819. "acro":"",
  1820. "trans":"Netzwerkstruktur"
  1821. }{
  1822. "term":"traffic meter",
  1823. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/8c56cd160c8ac1b19163adc2feab8a52.ogg",
  1824. "def":"A router feature that monitors the data consumption (upload and download) of all the devices on a network and notifies the administrator when a predefined threshold is approached.",
  1825. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/fd0786cbfd22fee07588e19496a30268.ogg",
  1826. "example":"A traffic meter is useful if your ISP is enforcing a maximum monthly data transfer allocation.",
  1827. "termId":"2206",
  1828. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/fe8213f09fef9745a26ebbc193fa2831.jpg",
  1829. "acro":"",
  1830. "trans":""
  1831. }{
  1832. "term":"transform coding",
  1833. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/ff427e8119bbdd3be77c31c8c22ef97c.ogg",
  1834. "def":"A method of data compression for 'natural' data like audio signals or images which discards part of the information.",
  1835. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/f2d09ec58c882173c04fbd327e765249.ogg",
  1836. "example":"The basic process of digitizing an analog signal is a kind of transform coding that uses sampling in one or more domains as its transform. \n<br>The JPEG transform coding process is a widely used form of lossy image compression that centers around the Discrete Cosine Transform (DCT).",
  1837. "termId":"2078",
  1838. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/f85e2fb66e33037606e0eb8d81881205.jpg",
  1839. "acro":"",
  1840. "trans":"Transformationskodierung"
  1841. }{
  1842. "term":"transmission control protocol",
  1843. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/5f106e19e6ea5ed32315330302bbfc15.ogg",
  1844. "def":"The transport layer protocol that enables two hosts to establish a connection, and exchange streams of data. It guarantees delivery of data in the same order in which it was sent.",
  1845. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/7e508f3fe33e5ae04eae35f83067c5ce.ogg",
  1846. "example":"TCP provides transport functions, which ensures that the total amount of bytes sent is received correctly at the other end.\n<br>UDP, which is part of the TCP/IP suite, is an alternate transport that does not guarantee delivery. It is widely used for real-time voice and video transmissions.",
  1847. "termId":"2283",
  1848. "imageUrl":"",
  1849. "acro":"TCP",
  1850. "trans":"Übertragungskontrollprotokoll, TCP-Protokoll"
  1851. }{
  1852. "term":"Unified Modeling Language",
  1853. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/9eea11ab4f6db59b2a629ad78b313781.ogg",
  1854. "def":"A general-purpose notational language for specifying and visualizing complex software, especially software-intensive, object-oriented projects.",
  1855. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/7466b690dfac57522752726bac54477f.ogg",
  1856. "example":"The Unified Modeling Language (UML) is used to specify, visualize, modify, construct and document the artifacts of an object-oriented software-intensive system under development. UML offers a standard way to visualize a system's architectural blueprints, including elements such as activities, actors, business processes, database schemas, logical components, programming language statements, and reusable software components.",
  1857. "termId":"2080",
  1858. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/bc814f2a1758da196547f748301c76ba.jpg",
  1859. "acro":"UML",
  1860. "trans":"vereinheitlichte Modellierungssprache"
  1861. }{
  1862. "term":"uniform resource locator",
  1863. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/add4c3950897a18675e654ca7589da7a.ogg",
  1864. "def":"An object's global address on the Web, the first part of which indicates what protocol to use, whereas the second part specifies the IP address or the domain name where the resource is located.",
  1865. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/c1d45be9ab3b7fdb5ee67a79392b5988.ogg",
  1866. "example":"The two URLs below point to two different files at the domain htwk-leipzig.de. ftp://www.htwk-leipzig.de/rzstuff.exe specifies an executable file that should be fetched using the FTP protocol; http://www.htwk-leipzig.de/index.html specifies a Web page that should be fetched using the HTTP protocol.",
  1867. "termId":"2124",
  1868. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/15653000fc1f493b6ecf16bc20c24123.jpg",
  1869. "acro":"URL",
  1870. "trans":"Internetadresse"
  1871. }{
  1872. "term":"unstructured data",
  1873. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/675ad2de1513e36719480537379e323c.ogg",
  1874. "def":"Any data that has no identifiable structure. Within a dataset or folder, a collection of images, videos, email and other text documents is considered to represent this kind of data.",
  1875. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/fbda4b5845b089257427c8b0723b6d36.ogg",
  1876. "example":"Data can be designated as unstructured or structured data for classification within an organization. \n<br>While each individual document may contain its own specific structure or formatting that is based on the software used to create the data, unstructured data may also be considered 'loosely structured data' because the data sources do have a structure, but all data within a dataset will not contain the same structure.",
  1877. "termId":"2208",
  1878. "imageUrl":"",
  1879. "acro":"",
  1880. "trans":""
  1881. }{
  1882. "term":"user datagram protocol",
  1883. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/79c4a7cd64b1e9bb23ffdb07d5b594ca.ogg",
  1884. "def":"A connectionless protocol which, like TCP, runs on top of IP networks.",
  1885. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/0e495a561a5ce287e0066edbe2e777ba.ogg",
  1886. "example":"RFC 768 states: \"This User Datagram Protocol (UDP) is defined to make available a datagram mode of packet-switched computer communication in the environment of an interconnected set of computer networks.\"\n<br>Unlike TCP/IP, UDP/IP provides very few error recovery services, offering instead a direct way to send and receive datagrams over an IP network.",
  1887. "termId":"2239",
  1888. "imageUrl":"",
  1889. "acro":"UDP",
  1890. "trans":""
  1891. }{
  1892. "term":"user experience design",
  1893. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/2708011412adb9f24625341c693e5269.ogg",
  1894. "def":"The application of user-centered design methods, user research data and process management techniques to affect and influence users of an interactive system in a predictable and measured way, in order to meet both their own goals and measures of success and enjoyment, as well as the objectives of the providing organization.",
  1895. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/496fb3a3e9aca4f5cd42369bd96a900e.ogg",
  1896. "example":"One of the fundamentals of User Experience Design is simply incorporating user feedback in to the design evolution process. \n<br>This conference track focuses on technologies and techniques for building more compelling user experiences, which includes design, performance, and the \"wow\" needed to draw users into your application and keep them coming back. \n<br>One of the key facets of Ajax and rich Web technologies is to deliver a substantial improvement in user experience over traditional Web applications.",
  1897. "termId":"2040",
  1898. "imageUrl":"",
  1899. "acro":"UXD",
  1900. "trans":""
  1901. }{
  1902. "term":"virtual local-area network",
  1903. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/bebf677719eec79d0b7bf09a94df509a.ogg",
  1904. "def":"A group of hosts with a common set of requirements that communicate as if they were attached to the same wire, or broadcast domain, regardless of their physical location.",
  1905. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/981ae6dfacf4528dffc3368a82da0d89.ogg",
  1906. "example":"A VLAN has the same attributes as a physical local area network (LAN), but it allows for end stations to be grouped together even if they are not located on the same network switch. VLAN membership can be configured through software instead of physically relocating devices or connections.",
  1907. "termId":"2288",
  1908. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/2946f766abb6508058c1c6072d706ce0.jpg",
  1909. "acro":"VLAN",
  1910. "trans":"virtuelles lokales Netzwerk"
  1911. }{
  1912. "term":"virtual machine",
  1913. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/37da7ac0d08fc03932bcb3fe09152ef8.ogg",
  1914. "def":"A self-contained operating environment that behaves as if it were a separate computer.",
  1915. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/31798fd1006e2711d971a6ce1bae59f1.ogg",
  1916. "example":"For example, Java applets run in a Java virtual machine that has no access to the host operating system. The Java VM design has two advantages: system independence and security.",
  1917. "termId":"2082",
  1918. "imageUrl":"",
  1919. "acro":"VM",
  1920. "trans":""
  1921. }{
  1922. "term":"virtual private network",
  1923. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/77bd3d3647147dbf3b842a31434eb948.ogg",
  1924. "def":"An access controlled network that is constructed by using public wires to connect nodes.",
  1925. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/db3a7be940cb49ea4a2c347207a09fa4.ogg",
  1926. "example":"VPNs use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.",
  1927. "termId":"2289",
  1928. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/00be8cabbeef12c517632eff23db0697.jpg",
  1929. "acro":"VPN",
  1930. "trans":"virtuelles privates Netzwerk"
  1931. }{
  1932. "term":"webserver",
  1933. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/d059abb188dbdd68315b8a074d9f0302.ogg",
  1934. "def":"A computer that delivers (serves up) webpages.\n<br>Alternatively, the term may refer to just the software and not the entire computer system.",
  1935. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/611a48f9ba457e47aeff8ad940162919.ogg",
  1936. "example":"Every webserver has an IP address and possibly a domain name.\n<br>Any computer can be turned into a web server by installing server software and connecting the machine to the Internet. \n<br>There are numerous Web server software applications, including public domain software from Apache, and commercial packages.",
  1937. "termId":"1553",
  1938. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/24f59c0a8b0f69795aa9e998e3594ca6.jpg",
  1939. "acro":"",
  1940. "trans":""
  1941. }{
  1942. "term":"what you see is what you get",
  1943. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/8d495e3f8018e65e9c553b2b3ec9089b.ogg",
  1944. "def":"A system in which content displayed during editing appears very similar to the final output.",
  1945. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/18846dc48079942b99c62e677633a0f6.ogg",
  1946. "example":"WYSIWYG implies the ability to directly manipulate the layout of a document without having to type or remember names of layout commands.\n<br>In former times, WYSIWYG referred to any word processor that could accurately show line breaks on the display screen. Present-day word processors must be able to display graphics and many different font sizes and typefaces to be considered WYSIWYG.",
  1947. "termId":"2125",
  1948. "imageUrl":"",
  1949. "acro":"WYSIWYG",
  1950. "trans":""
  1951. }{
  1952. "term":"white paper",
  1953. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/e96da4b177715c86a7e4a0f1827f5d6f.ogg",
  1954. "def":"An authoritative report or guide that helps to solve a problem in technical, business, political and other fields. In commercial use, the term has come to refer to documents used by businesses as a marketing or sales tool.",
  1955. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/7fa7478febfe42cf68ae5c8e66e738cc.ogg",
  1956. "example":"White papers are used to generate sales leads, establish thought leadership, make a business case, or to educate customers and help them make decisions. They usually argue that the benefits of the described technology, product or policy are superior for solving a specific problem.",
  1957. "termId":"2291",
  1958. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/5e18a0bb092687949f0f2cf88f45526f.jpg",
  1959. "acro":"",
  1960. "trans":"meist kommerziell motivierte Fachpublikation"
  1961. }{
  1962. "term":"Wi-Fi",
  1963. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/2a59d77fa5e7094428cbed756dee6d94.ogg",
  1964. "def":"A trademarked term used to promote certified WLAN devices, which comply with the IEEE 802.11x standards.",
  1965. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/46ea32c3121f49a9ec204d21300a5469.ogg",
  1966. "example":"The Wi-Fi Alliance, the organization that owns the registered trademark Wi-Fi defines it as any wireless local area network (WLAN) product that is based on the IEEE 802.11 standards.\n<br>A common misconception is that Wi-Fi is short for wireless fidelity. Actually, this is not the case. Wi-Fi is simply a trademarked term meaning IEEE 802.11x.",
  1967. "termId":"2204",
  1968. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/73eade33cce75d70795b219dd8ac36fe.jpg",
  1969. "acro":"",
  1970. "trans":""
  1971. }{
  1972. "term":"widget",
  1973. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/2bc616c56cc7deb5e0b905896b338edc.ogg",
  1974. "def":"A program that performs some simple function, such as providing a weather report or stock quote. It offers a GUI on the home screen of a mobile device or a website, which is periodically updated and, consequently, may cause lag due to automatic updates, which use CPU power and battery resources.",
  1975. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/13dbf7e13ea086f4e675ddcfdbd381cb.ogg",
  1976. "example":"As compared to apps, widgets do not need to be touched to display the information they are designed for. \n<br>The main difference between a web widget and a desktop widget is that a web widget requires the user to be on a certain website while a desktop widget can always be displayed on the device.",
  1977. "termId":"2084",
  1978. "imageUrl":"",
  1979. "acro":"",
  1980. "trans":""
  1981. }{
  1982. "term":"World Wide Web Consortium",
  1983. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/e32b20dfdce01ba5b12c6b6bf1b1b918.ogg",
  1984. "def":"An international community founded by Web inventor Tim Berners-Lee, the work of which revolves around the standardization of Web technologies.",
  1985. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/26c2737f2e96cb2a34141a621f84bafc.ogg",
  1986. "example":"The mission of the World Wide Web Consortium (W3C) is to lead the World Wide Web to its full potential by developing common protocols that promote its evolution and ensure its interoperability. \n<br>W3C standards define an Open Web Platform for application development that has the unprecedented potential to enable developers to build rich, interactive experiences, powered by vast data stores that are available on any device.",
  1987. "termId":"2256",
  1988. "imageUrl":"https://webcourses.htwk-leipzig.de/tt/media/terms/023c85194feffe5c9d124762f08cae9a.jpg",
  1989. "acro":"W3C",
  1990. "trans":""
  1991. }{
  1992. "term":"ZeuS",
  1993. "termSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/f833ad58501ebfab87eb85d250c56e97.ogg",
  1994. "def":"The most widespread botnet in history. A trojan with more than 50,000 variants that infiltrate computers in order to steal banking information and other sensitive data by logging keystrokes and grabbing forms.",
  1995. "defSound":"https://webcourses.htwk-leipzig.de/tt/media/terms/787105b6db7cf51acc3f0aed194c2ced.ogg",
  1996. "example":"In May, 2011, source code of ZeuS was published as public domain. Since that time, several mobile botnet variants of ZeuS have surfaced, targeting all popular mobile phone systems, such as Google Android, Blackberry, Symbian, or Windows Mobile. They&nbsp;are designed to steal the mobile transaction authentication numbers that banks use to strengthen security for logging in to online accounts.",
  1997. "termId":"2189",
  1998. "imageUrl":"",
  1999. "acro":"",
  2000. "trans":""
  2001. }
Add Comment
Please, Sign In to add comment