Glossary of Terms

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 37

Bolivarian Republic of Venezuela

Ministry of Popular Power for Higher Education

National Experimental University of Greater Caracas

PNFI Section 101-41

JOB NO. 1

Teacher Student

Alberto Pérez María Gabriela Ortega C.I 26.131.237

Ccs, 01/02/2021
PRESENTATION SHEET

GLOSSARY OF TERMS

A
1. Account: Identification of a user, normally protected by an

access word (Password) that allows the use by this user.

2. Acrobat Reader: Adobe program that allows you to capture

documents and view them in their original appearance.

Acrobat works with PDF files.


3. ActiveX: Technology created by the Microsoft company that

provides a programming environment to allow interaction and

personalization of Web sites.

4. Agent: Small "intelligent" program created to carry out certain

tasks, facilitating the user's operation. A well-known example

of an agent is the Wizards that exist in most modern software.

5. AGP: graphics accelerator port. Allows you to run three-

dimensional graphic files quickly.

6. Algorithm: set of well-defined rules for solving a problem. A

software program is the transcription, into programming

language, of an algorithm.

7. Antivirus: program that searches for and eventually removes

computer viruses that may have infected a hard drive or

floppy disk.

8. Applet (program): applet in Java programming language

embedded in a web page.

9. Archie: Tool that allows you to locate files on the Internet

created in Montreal by McGill University. An Archie server

(there are several distributed throughout the Internet)

maintains a database that records the location of several

thousand files.

10. ARP (Address Resolution Protocol): A protocol for resolving

electronic addresses into IP numbers that runs on local

networks. Part of the TCP / IP protocol suite.

11. ARPANET (Advanced Research Projects Agency Network,

Advanced Research Projects Agency Network): A pioneering


network of computers, founded by DARPA, a research agency

of the North American government. It was the fundamental

basis in the sixties for the development of what would later

become the Internet network.

12. ASCII (American Standard Code for Information Interchange):

Set of characters, letters and symbols used in all computer

systems of any country and language. It allows a common base

of communication. It includes the normal letters of the Spanish

alphabet, with the exception of ñ and all accented letters.

13. ATM (Asynchronus Transfer Mode): is a high speed multiplexing

and switching technology, used to transmit different types of

traffic simultaneously, including voice, video and data.

14. Attachment: This is the name of a data file (for example a

spreadsheet or a word processor letter) sent together with an

e-mail message.

15. Authoring: Activity of creating content for the Web in Pages in

HTML format. The administrator of a website or Webmaster is,

in general, responsible for the authorship of its content.

16. AVI - Microsoft's format for audio and video files.

B
17. Back-end processor - A processor used for a certain highly

specialized function, such as managing a database.

18. Backbone (vertebral column): High-speed connection that

connects to computers in charge of circulating large volumes of

information.
19. Backdoor (or trapdoor, backdoor or trapdoor): Hidden section

of a computer program, which is only put into operation if

there are very specific conditions or circumstances in the

program.

20. Backup: backup. It is done to prevent a possible loss of

information. Backbones connect cities, or countries, and

constitute the fundamental structure of communication

networks. Used to interconnect networks with each other using

different types of technologies.

21. Bandwidth: Technical term that determines the volume of

information that can circulate through a physical means of

data communication, that is, the capacity of a connection. The

higher the bandwidth, the better access speed and higher

traffic.

22. Banner: Advertising notice that occupies part of a web page,

generally located in the upper part of the center. By clicking

on it, the navigator can reach the advertiser's site.

23. BBS (Bulletin Board System, Messaging System also

erroneously called Database): It is a computerized system for

the exchange of data between a group of people who share the

same geographical area where files, messages and other useful

information can be exchanged between the different users.

24. Bcc: blind carbon copy. Function that allows you to send an e-

mail message to more than one recipient. Unlike the cc

function, the recipient's name does not appear in the header.


25. Benchmark: program specially designed to evaluate the

performance of a system, software or hardware.

26. Betatest: in the software development process, it is the second

phase of verification or testing, prior to the launch of the

product.

27. Binhex: A standard for data encoding under the Macintosh

platform, used to send attachments. Similar in concept to

MIME and Uuencode.

28. BIOS: Basic Input / Output System: Basic data input / output

system. A set of procedures that controls the flow of data

between the operating system and devices such as the hard

drive, video card, keyboard, mouse, and printer.

29. Bit - Short for binary digit. The bit is the smallest unit of

storage in a binary system within a computer.

30. Bookmark (bookmark or favorites): The menu section of a

browser where you can store your favorite sites, and then

return to them simply by choosing them with a simple click

from a menu.

31. Boolean: Symbolic logic that is used to express the relationship

between mathematical terms. Its rationale can be extended to

analyze the relationship between words and phrases. The two

most common symbols are AND (and) and OR (or).

32. Boot: load the operating system of a computer.

33. Bottleneck: Bottleneck of data packets (information) that

circulate through a connection causing delays in

communication.
34. Bps: bits per second.

35. Bridge: Device used to connect two networks and make them

work as if they were one. They are typically used to divide a

network into smaller networks, to increase performance.

36. Browser / Web browser (browser or viewer): Program that

allows you to read documents on the Web and follow links

(links) from document to Hypertext document. Browsers

"request" files (pages and others) from Web servers according

to the user's choice and then show the result on the monitor.

37. Buffer: memory area used to temporarily store data during a

work session.

38. Bug: bug, insect. Programming error that causes problems in

the operations of a computer.

39. Bus: common link; common conductor; way of interconnection.

Device interconnection method using a single shared line. In a

bus topology each node is connected to a common cable. A hub

is not required in a bus topology network.

40. Byte: unit of information used by computers. Each byte is

made up of eight bits.

C
41. Cable: Conduit that connects devices on the network to each

other. The type of cable to use depends on the size of the

network and its topology.

42. Cable-modem: a modem that connects a computer to the

Internet at high speed, through a cable TV line.


43. Cache: In a browser, the cache stores copies of frequently

accessed documents, so that they will appear more quickly in

the future.

44. CAD: Computer Aided Design: Computer Aided Design.

Software that allows you to create two-dimensional and

three-dimensional precision drawings. It is used mainly by

architects and engineers.

45. CD-ROM: Compact Disk - Read Only Memory. Read-only

compact disc. It has a storage capacity of up to 650

megabytes, much larger than that of a floppy disk.

46. Celeron: Intel family microprocessor, inexpensive version of the

Pentium with little internal cache memory.

47. Character: number, letter or symbol in the computer, made up

of one byte.

48. Chat: Internet service that allows two or more users to

converse online using the keyboard.

49. Chip: Short for "microchip." Very small circuit, made up of

thousands to millions of transistors printed on a silicon wafer.

50. Cluster: group; grouping. In computer technology, a cluster is

the storage unit on the hard disk. A file is made up of several

clusters, which can be stored in different places on disk.

51. Coaxial Cable: It is a copper cable surrounded by insulation, a

secondary conductor that acts as & uml; dirt ¨ and an outer

plastic cover. Thanks to these two layers of shielding, the coax

is relatively immune to electrical interference.


52. Command: instruction that a user gives to the computer's

operating system to perform a certain task.

53. Cookie: small text file that a website places on the hard drive

of a visiting computer. At the same time, it collects

information about the user. Streamlines navigation on the site.

Its use is controversial, because it puts the privacy of users at

risk.

54. CPU: Central Processing Unit. Central Processing Unit. It is the

processor that contains the logic circuits that carry out the

instructions of the computer.

55. CRT: Cathode Ray Tube. Cathode ray tube from a monitor,

found in most desktop computers.

D
56. Data entry: data entry. Process of entering data into a

computer for processing.

57. Database: a set of data organized in such a way that it is easy

to access, manage, and update.

58. Debugging: debugging, correction of errors or bugs.

59. Diode: electronic component that allows the passage of electric

current in only one direction.

60. Direct access: it is an icon that makes it easier to open a

certain program or file.

61. Directory: group of related files that are stored under a name.

62. Disk Cache: A small portion of RAM that stores recently read

data, thereby speeding up future access to the same data.


63. Download: download, download. Transfer of information from

the Internet to a computer.

64. DSL (Digital Subscription Line): Technology that allows you to

send a lot of information at high speed through telephone lines.

65. DVD (Digital Versatile Disc): A disc that has a large storage

capacity and is also used to store movies.

66. Dynamic HTML: variant of HTML (Hyper TextMark-up

Language) that allows you to create more animated web pages.

E
67. Emulation: process of compatibility between computers using

software.

68. Encrypt: protect files by expressing their content in encrypted

language. Simple cipher languages consist, for example, of

substituting letters for numbers.

69. Ethernet: Ethernet was developed at PARC with the

participation of Robert Metcalfe founder of 3 Com; it is a set

of standards for network infrastructure. In addition to defining

the physical media and the Ethernet connections, it defines

how the data is transmitted.

70. Extranet: part of an intranet for access available to clients and

other users outside the company.

F
71. FAQ: frequently-asked questions. The most frequently asked

questions (and their answers) about the main topic of a

website.
72. Fast Ethernet: A new Ethernet standard that provides speeds

of 100 Megabits per second (as opposed to 10 megabits per

second for Ethernet networks).

73. FDDI (Fiber Distributed Data Interface): Optical fiber

distributed data interface. It is a network of 100 Megabits per

second in star or ring topology widely used in backbones, today

displaced by new technologies such as ATM.

74. Fiber optics: technology to transmit information as light pulses

through a fiberglass conduit. Optical fiber carries much more

information than conventional copper cable. Most of the long

distance lines of telephone companies use fiber optics.

75. Firewall: A computer that runs special software used to

prevent unauthorized user access to the network. All network

traffic must first go through the firewall computer.

76. FTP (File Transfer Protocol): File Transfer Protocol. It is used to

send and receive files from the Internet.

G
77. Gateway: Device used to connect different types of operating

environments. Typically they are used to connect LAN

networks to minicomputers or mainframes.

78. GIF: Graphic Interchange Format. Graphic format widely used

in the WWW.

79. Giga: prefix that indicates a multiple of 1,000 million that is

109. When the binary system is used, as in computer science,

it means a multiple of 230 that is 1,073,741,824.


80. Gigabit: Approximately 1 billion bits (exactly 1,073,741,824

bits).

81. Gigabyte (GB): unit of measurement of a memory. 1 gigabyte

= 1024 megabytes = 1,073,741,824 bytes.

H
82. Handheld: A computer small enough to be held in your hand

or stored in a pocket. In some, data can be entered by

handwriting. Others have small keyboards built in.

83. Hard disk: rotating storage holder in the form of a circular

plate covered by a magnetic film. The data is recorded on

concentric tracks on the film.

84. Hardware: all physical components of the computer and its

peripherals.

85. Hertz: Hertz. Unit of electromagnetic frequency. Equivalent to

one cycle per second.

86. Hologram: three-dimensional image created by photographic

projection.

87. Hosting: hosting. Service offered by some providers, who

provide their clients (individuals or companies) with a space on

their server to host a website.

88. HTML: Hyper Text Mark-up Language. Programming language

to build web pages.

89. HTTP: Hypertext Transfer Protocol. Hypertext transfer

protocol. It is a protocol that allows transferring information


in text files, graphics, video, audio and other multimedia

resources.

90. Hub: Hub. Device that is typically used in star topology as the

central point of a network, where therefore all the links of the

different network devices converge.

91. Hyperlink: link.

92. Hypertext: texts linked to each other. By clicking with the

mouse the user moves from one text to another, linked to the

previous one.

I
93. ICQ ("I Seek You"): Program that lets friends and contacts

know that one is online. It allows you to send messages and

files, make chat, establish voice and video connections, etc.

94. Inkjet printer: printer that works by spraying ink on paper.

95. Interface: A transition or connection element that facilitates

the exchange of data. The keyboard, for example, is an

interface between the user and the computer.

96. Internet: The Internet is generally defined as the global

network of networks. Networks that are part of this network

can communicate with each other through a protocol called

TCP / IP (Transmission Control Protocol / Internet Protocol).

It was conceived in the late 1960s by the United States

Department of Defense; more precisely, by the ARPA. It was

first called Arpanet and was designed to fulfill research

functions. Its use became popular after the creation of the


WWW. It is currently a public space used by millions of people

around the world as a communication and information tool.

97. Intranet: Intranets are corporate networks that use Internet

protocols and tools. Its appearance is similar to that of

Internet pages. If this network is itself connected to the

Internet, it is generally protected by firewalls.

98. IP: Internet Protocol.

99. IrDA (Infrared Data Association): Organization founded to

create international standards for hardware and software used

in infrared communication links. Infrared ray technology plays

an important role in wireless communications.

100. ISDN: Integrated Services Digital Network: Integrated Services

Digital Network: system for digital telephone transmission.

With an ISDN line and an ISDN adapter it is possible to surf

the Web at a speed of 128 kbps, as long as the ISP also has

ISDN.

101. ISO: International Organization for Standardization. Founded

in 1946, it is an international federation that unifies

standards in about 100 countries. One of them is the OSI

standard, the universal reference model for communication

protocols.

102. ISP: Internet Service Provider.

J
103. Jpeg: extension of certain graphic files.
K
104. Kernel: kernel or essential part of an operating system. It

provides the basic services of the rest of the system.

105. Keyword: keyword for any search.

106. Kilobit: 1,024 bits.

107. Kilobyte (KB): unit of measurement of a memory. l kilobyte =

1024 bytes.

L
108. LAN: Local Area Network or local area network: It is a

geographically limited data communication network, for

example, a company.

109. LAN Manager: network operating system.

110. Laptop: Laptop about the size of a portfolio.

111. Latency: the time required for a packet of information to

travel from its source to its destination. Latency and

bandwidth together define the capacity and speed of a

network.

112. LCD: Liquid Crystal Display. Liquid crystal display, generally

used in notebooks and other small computers.

113. Link: link. Image or highlighted text, by underlining or color,

that leads to another sector of the document or to another

web page.
114. Linux: A free operating system for personal computers derived

from UNIX.

115. LISP (LISt Processing): Specific language of artificial

intelligence. The original version, Lisp 1, was invented by John

McCarthy at MIT in the late 1950s.

116. LPT: Line Print Terminal. Connection between a personal

computer and a printer or other device. It is a parallel port

and it is faster than a serial port.

M
117. Macrovirus: it is a very widespread virus, which mainly affects

Word documents. It is more annoying than destructive. For

example, it makes the program ignore commands or enter

words or phrases that the user has not typed.

118. Mainframe: main structure. Large multi-user type computer,

used in companies.

119. Majordomo: small program that automatically distributes e-

mail messages to users subscribed to a mailing list.

120. Megabit: Approximately 1 million bits. (1,048,576 bits).

121. Megabyte (MB): unit of measurement of a memory. 1

megabyte = 1024 kilobytes = 1,048,576 bytes.

122. Megahertz (MHz): One million hertz or hertz.

123. Microprocessor: It is the most important chip in a computer.

Its speed is measured in MHz.

124. Millisecond: one thousandth of a second.


125. Mirror site: mirror site. Website copied to another server in

order to facilitate access to its contents from the closest or

most convenient place for the user.

126. MIT: Massachusetts Institute of Technology. Prestigious

American institution based in Boston. Many consider it the

best technical university in the world.

127. MMX: Pentium microprocessor designed to give greater speed

to multimedia applications.

128. Modem: modulator-demodulator. Peripheral device that

connects the computer to the telephone line.

129. Motherboard: Board that contains the basic printed circuits of

the computer, the CPU, the RAM memory and slots in which

you can insert other boards (network, audio, etc.).

130. MPEG: The Moving Pictures Expert Group develops standards

for digital video and audio compression. It is sponsored by the

ISO.

N
131. Nanosecond: one billionth of a second. It is a common measure

of RAM access time.

132. Network: (network) a computer network is a data

communication system that connects computer systems

located in different places. It can be made up of different

combinations of various types of networks.

133. Network Interface Card: Adapter cards located inside

computers that specify the type of network to be used


(Ethernet, FDDI, ATM) and that through them are the

connection link between the computer and the network. That

is, the network cables connect to the computer.

134. Network Operating System: An operating system that includes

programs for communicating with other computers over a

network and sharing resources.

135. Node: A device on the network, usually a computer or printer.

O
136. Online: online, connected. State of a computer when it

connects directly to the network through a device, for example

a modem.

137. OSI (Open Systems Interconnection): Universal standard for

communication protocols.

P
138. Packet (packet): the part of a message that is transmitted over

a network. Before being sent over the Internet, the

information is divided into packets.

139. Packet switching: Communications paradigm by means of

which each of the packets into which a message is broken

down travels a route between central systems, without that

route being previously defined or the same for all those

packets.
140. Page: File (or file) that constitutes a significant unit of

information accessible on the WWW through a browser

program.

141. Palmtop: Small-sized computer, somewhat larger than a pack

of cigarettes that can be carried in the palm of the hand

(palm) and that, in addition to other functions allows

connection to the Internet.

142. Parallel port: connection through which data is sent through

various pipes. A computer usually has a parallel port called

LPT1.

143. Password: Set of characters that make it possible to protect

access to certain computer resources by unauthorized persons.

144. PCMCIA: Personal Computer Memory Card International

Association. Memory expansion cards that increase storage

capacity.

145. PDF: Portable Document Format. A file format that captures a

printed document and reproduces it in its original appearance.

PDF files are created with the Acrobat program.

146. Peripheral: any device that connects to the computer. For

example: keyboard, monitor, mouse, printer, scanner, etc.

147. Perl: High-level interpreted programming language very

suitable for carrying out programs or scripts (see "script") for

processing files and text strings.

148. Personal Digital Assistant: Small-sized computer whose main

function was initially to maintain an electronic diary, although


it is increasingly being confused with handheld and palmtop

computers.

149. Personal page: Information about a person stored individually

on an Internet server, usually WWW.

150. Pipe: It is a communication channel between two programs or

between a program and a device or file.

151. Pixel: combination of "picture" and "element". Minimal graphic

element with which images are composed on a computer

screen.

152. Plug & play: means "plug and play". Immediate recognition of

a device by the computer, without the need for user

instructions.

153. Plug-in: program that can be installed and used as part of the

browser. An example is Macromedia's Shockwave, which allows

reproducing sounds and animations.

154. PNG: Free use graphic format supported by most of the

current browsers.

155. PoP: Point of Presence. Internet access point.

156. POP3: It is a standard protocol for receiving e-mail.

157. Port: in a computer, it is the specific place of connection with

another device, generally through a plug. It can be a serial port

or a parallel port.

158. Portable Document Format: Document storage format,

developed by the company Adobe Systems.

159. Portal: website that serves as a starting point for browsing the

Internet. The portals offer a great diversity of services: list of


websites, news, e-mail, weather information, chat, newgroups

(discussion groups) and electronic commerce. In many cases the

user can customize the presentation of the portal. Some of the

best known are Altavista, Yahoo!, Netscape, and Microsoft.

160. Prety Good Privacy: program used to encrypt and decrypt

email, in order to protect privacy. It can also be used for other

types of files.

161. Processor: set of logic circuits that process the basic

instructions of a computer.

162. Programming language: writing system for the precise

description of algorithms or computer programs.

163. Protocol: A set of formal rules that describe how data is

transmitted, especially over the network. Low-level protocols

define the electrical and physical standards to be observed,

while high-level protocols define what.

164. Protocol: Language used by two computers to communicate

with each other.

165. Postmaster: Person responsible for troubleshooting email,

answering user questions, and other issues for a particular

facility.

166. PostScript: Page description language, used mainly to send

information to printers, developed by the company Adobe

Systems.
Q
167. Quality of Service: Level of performance of a network, based on

parameters such as transmission speed, delay level,

performance, schedule, packet loss ratio.

R
168. Rack: Frame designed to house electronic and communications

equipment.

169. Radio buttons: They have the same appearance as checkboxes,

except that only one of those that make up a series can be

activated at the same time.

170. RAM: Random Access Memory: Random Access Memory.

Memory where the computer stores data that allows the

processor to quickly access the operating system, applications,

and data in use. It is closely related to the speed of the

computer. It is measured in megabytes.

171. Real Audio: Program developed by the North American

company Real Networks that allows WWW users to listen to

multimedia files (audio and / or video) in real time (or near

real time depending on the response time of the server and

the degree of saturation of the network).

172. Real time Control Protocol: Protocol oriented to the exchange

of information in real time.


173. Rebute: reload the operating system of a computer that has

"hung".

174. Remote login: Operation carried out on a remote computer

through a computer network, as if it were a local connection.

175. Remove: it is an action carried out by a user, program or by

the operating system on one or more storage units that

empties one or more bytes that contain information.

176. Repeater: A device that boosts network signals. Repeaters are

used when the total length of the network cables is longer than

the maximum allowed by the type of cable. Not in all cases

they can be used.

177. Request For Comments: Documents that describe the standards

used on the Internet.

178. Resolution: maximum number of pixels that can be seen on a

screen. Two examples: 800 x 600 and 640 x 480. / On a

printer, resolution is the quality of the reproduced image and

is measured in dpi.

179. Robot: Program that travels the network carrying out specific

tasks, especially creating an index of the contents of the sites,

to feed the search engines.

180. ROM: Read Only Memory: Read only memory. Built-in

memory that contains data that cannot be modified. Allow the

computer to boot. Unlike RAM, data in ROM is not lost when

the computer is * -turned off.


181. Rootkit: A set of programs and registry files that a hacker

must place in place of the original ones to hide his presence

and his activities inside a computer system.

182. Router: Device that directs traffic between networks and is

capable of determining the most efficient paths, ensuring high

performance.

183. Router: router. System consisting of hardware and software

for the transmission of data on the Internet. The sender and

receiver must use the same protocol.

S
184. Save: Function and action of storing data in files. Any

application where the user can create documents (images,

videos, models, text documents, etc.).

185. Save as: In the basic form, shown in the following image, this

dialog gives a text box to assign a name to the file, and a

drop-down list to select a directory where to save it.

186. ScanDisk: Windows program that checks a disk, detects errors

and corrects them.

187. Scheduller: It is the part of the system that decides the order

of priority of the threads.

188. Screen: it is a screen that by means of a direct touch on its

surface allows the input of data and orders to the device.

189. Screensaver: It is a computer program designed to preserve

the image quality of cathode ray tube monitors that could not
be turned off by software, and leave moving images when the

computer is not being used.

190. Screenshot: A screenshot (noun) is a digital snapshot of images

on a computer or smartphone screen.

191. Script: Small program, usually written in an interpreted

programming language, such as Perl.

192. Scroll bar: It is an element that is part of the user interface of

an applet or an application.

193. SDRAM: Very fast, high capacity memory for servers and

workstations.

194. Search engine: WWW service that allows the user to access

information on a specific topic contained in an Internet

information server through search words entered by it.

195. Secure Electronic Transation: Protocol used to securely carry

out credit card transactions over public networks.

196. Secure server: Special type of server designed to make it

difficult for unauthorized persons to access the information

contained therein.

197. Secure Sockets Layer: Protocol that uses encryption techniques

to protect the information that is being transferred through

the Web from the consumer to the producer.

198. Semiconductor: this is the name given to insulating substances,

such as germanium and silicon, which become conductors by

the addition of certain impurities. Semiconductors are of

enormous importance in electronics.


199. Send: It is a very interesting Windows function included in the

context menu of the Desktop, the folders, the files and the

Start menu that allows you to send the selected item to a

specific destination directly without using Windows Explorer or

the Copy command.

200. Serial: method of transmitting data sequentially, that is, bit by

bit.

201. Serial Line IP: Protocol that allows a PC or other small

computer to establish a TCP / IP connection.

202. Server: See Server.

203. Server: central computer of a network system that provides

services and programs to other connected computers. System

that provides resources (for example, file servers, name

servers). On the Internet, this term is used very often to

designate those systems that provide information to network

users.

204. 0610 Service: This allows Argentine users to connect to the

Internet at a lower cost than normal rates, placing the prefix

0610 before the telephone number of their provider.

205. Servlet: It is a program written in Java language that is

executed on the server side as an extension or complement of a

Web server when a request is made by an HTML page.

206. Share: It refers to giving it to other people in common of a

resource or a space. In a strict sense, it refers to the

simultaneous enjoyment or alternative use of a finite asset,

such as a public forest or a place of residence.


207. Shareware: Software distributed on a trial basis. After a

certain time of use (generally 30 days) the user has the option

to buy it.

208. Shell: Programmable command interpreter of the operating

system.

209. Shell script: Script used by the operating system shell to read

and execute commands contained in a file.

210. Shopbot: Help tool, more or less automated, to purchase

products and services through the network.

211. Signature: A three- or four-line message at the end of an

email message or a Usenet article that identifies its author.

212. Slot: slot on the motherboard that allows you to expand the

capacity of a computer by inserting plates.

213. SMS: Short Message Service. Messaging service for cell phones.

Allows you to send a message of up to 160 characters to a cell

phone. This service was initially enabled in Europe. There are

several websites from which you can send an "sms".

214. SMTP: Simple Mail Transfer Protocol. It is a standard protocol

for sending e-mail.

215. SNA: System Network Architecture: network architecture for

mainframes, developed by IBM.

216. Sniffer: program that monitors and analyzes network traffic

to detect problems or bottlenecks. Its objective is to maintain

the efficiency of data traffic. But it can also be used

illegitimately to capture data on a network.


217. Socket: (holder) electrical connector, socket, plug. A socket is

the end point of a connection. A method of communication

between a client program and a server program on a network.

218. Software: general term that designates the diverse types of

programs used in computing.

219. Sound card: the one that provides sound to a computer. One

of the best known is Sound Blaster.

220. Spam: unsolicited email. It is considered unethical, as the

recipient pays to be connected to the Internet.

221. Speech recognition: ability of a program to interpret words

spoken aloud or execute a verbal command.

222. SQL: Structured Query Language. Programming language that

is used to retrieve and update the information contained in a

database. It was developed in the 1970s by IBM. It has become

an ISO and ANSI standard.

223. SSL: Secure Sockets Layer. Protocol designed by the Netscape

Company to provide encrypted communications on the

Internet.

224. Star Ring Topology: In Star Ring or star topologies, nodes

radiate from a hub. The hub or concentrator is different

depending on the technology used Ethernet, FDDI, etc. The

biggest advantage of this topology is that if one node fails, the

network continues to function.

225. Stream: Mechanism that allows a Java application to

communicate with files, networks, other devices, and even

other threads within the same application.


226. Stub network: An isolated network distributes packets to and

from local systems. Even if it has routes to some other network

defined, it does not carry messages to other networks.

227. Switch: A network device capable of performing a number of

management tasks, including redirecting data.

T
228. Tag Image File Format: Method for storing images in digital

format. Files that use this method usually have a.

229. Talk: Protocol that allows two people connected to computers

located in two different places to communicate in writing in

real time.

230. TCP / IP: Transfer Control Protocol / Internet Protocol. It is

the protocol used on the Internet.

231. TDMA Standard: Time division Multiple Access: Time Division

Multiple Access. Standard for data transmission through

wireless phones.

232. Telnet: Protocol to connect as a remote terminal to another

computer connected to a network, and use it as if you were

working on the same console.

233. Text area: It is an element that is part of the user interface of

an applet or an application.

234. Text fieldl: It is an element that is part of the user interface of

an applet or an application belonging to the AWT Java

package with its constructors, methods and variables.


235. Thread: They are portions of code of the same application that

can be executed concurrently.

236. Thumbnail image: Graphic or image that is reduced in size to

be able to display several on a single Web page simultaneously.

237. Tokens: They are the basic elements of a programming

language.

238. Token ring: A ring network is a type of LAN with nodes wired

in a ring. Each node constantly passes a control message

("token") to the next, so that any node that has a "token" can

send a message.

239. Tolbar: The toolbar is located at the top of your search engine,

with icons that help you to have control of what you see.

240. Topology: The "shape" of the network. Three types of

technologies predominate: Bus, Star and Ring.

241. Transceiver: Electronic device that converts signals of one type

into another.

242. Transcend Networking: 3Com technologies for building large

corporate networks. It consists of three main elements, scalable

performance, extensible reach, and growth management.

243. Transmission Control Protocol / Internet Protocol: Set of

independent standard protocols for connecting computers.

244. Trojan (Trojan horse; Trojan horse): A program that contains

malicious code within seemingly harmless data. It can ruin

part of the rigid.

245. Twisted pair: Cable similar to standard telephone pairs,

consisting of two insulated cables "twisted" together and


encapsulated in plastic. Insulated pairs come in two forms:

covered and uncovered.

U
246. Unicast: An address that can only be recognized by a central

system.

247. Unicode: Standard code for the representation of characters

used in Java, and similar in nature to the ASCII code (7 bits,

128 characters) or to ISO 8859-1 (8 bits, 256 characters),

but using 16 bits (65,536 characters). Its greater volume

allows it to include characters belonging to a large number of

languages.

248. UNIX: multi-user operating system was very important in the

development of the Internet.

249. Universal Resource Locator: Standard system for identifying

resources on the Internet.

250. Unzip: Action of unzipping a previously compressed file in zip

format.

251. Upload: On the Internet, the process of transferring

information from a personal computer to an information

server.

252. URL: This is the address that takes you to a specific web page

on the internet. It usually starts with www. and ends with

.com (or .edu or .gov).


253. USB (Universal Serial Bus): it is a plug & play interface

between a computer and certain devices, for example,

keyboards, telephones, scanners and printers.

254. User: That person who uses a device or a computer and

performs multiple operations for different purposes.

255. Uudecode: Program that reverts a file treated with "uuencode"

to its original form.

256. Uuencode: Program that reversibly converts a binary file (with

special characters) to ASCII format.

V
257. Video Graphics Adapter: This term is used both to refer to the

graphic display system for PCs (VGA 15-pin D subminiature

connector that was first marketed in 1988 by IBM); as at

640 × 480 resolution.

258. Video-on-demand: Asynchronous television service that

provides the user with access to video material stored digitally

on remote servers.

259. Virtual Reality Modeling Language: Non-proprietary and

multiplatform language for the creation of three-dimensional

worlds.

260. Virtual circuit: Method that provides connection services

regardless of the structure of the network that is being used.

261. Virus: A program that duplicates itself on a computer system

by incorporating itself into other programs that are used by

various systems.
262. Virus Class: it is a virus that affects Microsoft Office

spreadsheets. It is also called W97M.Class.G. This virus does not

try to hide itself. Every time he acts he takes on a different

look.

263. Virus hoax: false alarm about virus that usually arrives by e-

mail.

264. Viruses: small program that "infects" a computer; it can cause

undesirable effects and even irreparable damage.

265. Voice Extensible Markup Language: Adaptation of the XML

language for use in wireless telephony.

266. Void: It is a special type of data that indicates that the

returned result does not belong to any type or is nothing.

W
267. Wallpaper: All the desktop icons are placed, in addition to the

menus and other elements.

268. WAN- Wide Area Network: Wide Area Network: A network

generally built with serial lines that extend over distances

greater than one kilometer.

269. WAP (Wireless Application Protocol): international standard

for applications that use wireless communication, for example

accessing the Internet from a cell phone.

270. Watermark: They are invisible marks that are located in the

graphics so that you can recognize who the author or owner is.
271. Wav: extension of a sound file called "wave", created by

Microsoft. It has become a standard for PC audio format. It

can also be used on Macintosh and other operating systems.

272. Web: WWW information server. It is also used to define the

WWW universe as a whole.

273. Web-mail: service offered by certain websites to create a free

e-mail account. Through webmail, email is checked with the

browser. It can be accessed from any computer located

anywhere.

274. Webmaster: Person who is in charge of the management and

maintenance of a WWW server.

275. Web page: one of the pages that make up a WWW site. A

website groups together a set of related pages. The home page

is called a "home page".

276. Web server: Machine connected to the network in which the

pages that make up a website are physically stored.

277. Website: Collection of web pages with a web address.

278. WebTV: Consists of using television to access the Internet and

enjoy the services that are offered on it.

279. Windows 2000: Version of the Windows operating system, the

release of which has been announced by Microsoft for 1999.

280. Windows 95: Operating system released by Microsoft in August

1995.

281. Windows 98: Operating system launched by Microsoft in

1998, as a successor to Windows 95. One of the most visible

differences with the previous one is the integration of the


operating system with the Internet Explorer browser. This

characteristic led to a monopoly lawsuit.

282. Windows CE: Windows-based operating system. It was

designed for mobile or small devices.

283. Windows NT Server: Windows NT designed for machines that

provide services to computers connected to a LAN.

284. Windows NT Workstation: Windows NT designed especially for

business, is considered more secure and stable than Windows

95 and 98.

285. Windows NT: Microsoft's operating system designed for

advanced users and businesses. These are actually two

products: Windows NT Workstation and Windows NT Server.

286. Winsocks: A set of specifications or communication standards

from the Microsoft company so that programmers can create

applications based on the TCP / IP protocols for use in the

Windows operating system.

287. WinZip: Windows program that allows you to compress files.

288. Wireless Application Protocol: Protocol that allows mobile

phone user’s interactive access to the Internet, viewing the

information on the phone's display.

289. White pages: The Internet maintains various databases that

contain information about users such as email addresses,

telephone numbers, and postal addresses.

290. Wide Area Network: Computer network that interconnects

computers located at very great distances from each other.


291. Widget: Elements of the window system that constitutes the

user interface with the operating system, such as buttons,

scroll bars, text area, etc.

292. WI-FI: Wi-Fi allows computers to communicate wirelessly.

Once you connect to a "Wi-Fi network", you can access the

Internet without having to connect your device to a cable

system.

293. Workstation: work station. Personal computer connected to a

LAN. It can be used independently of the mainframe, since it

has its own applications and its own hard disk.

294. World Wide Web: It is the multimedia part of the Internet,

which involves the insertion of hypertext and graphics. That is,

the resources created in HTML and its derivatives. It is the

global information system developed in 1990 by Robert

Cailliau and Tim Berners-Lee at CERN (European Council for

Nuclear Research) that was the basis for the explosive

popularization of the Internet starting in 1993.

295. Worm: Self-duplicating and self-propagating computer

program.

X
296. X bitmap: A very simple format for storing images in digital

format. Images appear in black and white only.

297. Xerox Network System: Family of protocols developed by the

Xerox Corporation for use in LAN and WAN networks, the

LANS being usually of the Ethernet type.


Y
298. Yellow Pages: Service used by UNIX administrators to manage

databases distributed over a network.

Z
299. Zip drive: removable device for data storage. Originally each

zip disk could contain up to 100 MB (megabytes) or the

equivalent of 70 floppy disks, the new version of the device,

allows to store up to 750 MB.

300. Zip: file compression format.

You might also like