AIT-1 Flashcards

(269 cards)

1
Q

hardwere, that may convert electrical signals to acoustic signals or vice versa. An example is the hydrophone. which responds to waterborne sound waves and is useful in underwater sound detection

A

acoustictoelectric transducer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the part of a hard disk to which the read/write arm attaches which controls the movements of the read/write arm

A

actuator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ecommerce is the activity of buying or selling of products on online services or over the Internet. Developer. Consequently. is the person who creates the such a sites

A

ecommerce developer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

let you watch DVDs. play music and listen to the radio on the Internet.

A

media player

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Browser hijacking is a form of unwanted software that modifies a web browser’s settings without a user’s permission. to inject unwanted advertising into the user’s browser. A browser hijacker may replace the existing home page. error page. or search engine with its own.

A

browser hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The desktop consists of … such as windows. icons. menus

A

graphical user interfaces (GUI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

can store up to 650700 MB of data

A

CDs (compact discs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is any software that brings harm to a computer system. Malware can be in the form of worms. viruses. trojans. spyware. adware and rootkits. etc.. which steal protected data. delete documents or add software not approved by a user.

A

malware/malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

defines the Internet domain name of the web server that hosts the website

A

Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a symbol that appears on the display screen and that you move to select objects and commands

A

cursor/pointer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a person or thing that makes partial or minor changes to something.

A

modifiers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a computer program used to prevent. detect. and remove malware.

A

antivirus program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

business transactions conducted on the Internet

A

ecommerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

documents. pictures. sounds and even computer programs

A

attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

provide little or no abstraction from a computers commands in the language map closely to processor instructions. Generally they refer to machine code.

A

lowlevel language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the blog administration should not be confused with the actual writing of a blog His responsibilities are adding photos is often key.Topics of the blog should be tweaked by a blog administrator. In one word it is the pesron who is respi=osible for the blogs (for example) of famous perple. They obviously have no time to post pictures. reply to commetns. promote some stock and ets

A

blog administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

it such links refer to multimedia. i.e. audiovisual elements

A

hypermedia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a wireless technology standard for exchanging data over short distances from fixed and mobile devices. and building PANs

A

bluethoot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

in agreement with something

A

in concurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

makes a PC easier for disabled users to use

A

accessibility software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

a microprocessor designed to supplement the capabilities of the primary processor

A

coprocessor/coprocessor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

a small device able to be connected to and used with a computer. especially to allow access to wireless broadband or use of protected software

A

dongle/key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

carbon copy sent to another addressee

A

CC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

technology of very small devices made of silicon or polymer which perform nonelectronic functions such as typically sensing and actuation

A

microsystems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
a message posted to a public Internet discussion group with the intent of provoking an angry response or argument over a topic
flamebait
26
a level of access above that of a normal user. ... In an application environment. users with 'superuser' or system administratorroles and responsibilities would be considered to have Administrator Access.
administratorlevel access
27
makes copies of all information stored on a disk and restores either the entire disk or selected files
backup software
28
The delete key is a key on most computer keyboards which typically is used to delete either (in text mode) the character ahead of or beneath the cursor. or (in GUI mode) the currentlyselected object.
Delete key
29
military branches
.mil
30
is the overall size (generally height) of a font shown on a screen or printed on a page. A font is typically measured in a point (pt) size
font size
31
a row of items titles that. when clicked. display dropdown menus of other items or commands
menu bar
32
a small picture that represents an object or program
icon
33
a small area on a screen in which the user is prompted to provide information or select commands.
dialog box
34
buttons on a computer keyboard that are either programmed or designated to move the cursor in a specified direction.
arrow keys
35
Almost the same as a whiteboard. but it is a desk. there is no projectors only sensors
interactive table
36
is one of the oldest browsers predominantly used on Windows computers
Internet Explorer
37
Manages projects. technology and people. Takes responsibility for the maintenance of servers and installation of new software. and for staffing a helpdesk and a support group
IT Manager
38
the use of the Internet or other electronic means to stalk or harass an individual. group. or organization. It may include false accusations. defamation. slander and libel. It may also include monitoring. identity theft. threats. vandalism. solicitation for sex. or gathering information that may be used to threaten. embarrass or harass.
cyberstalking
39
Can be responsible for installation. maintenance or repair of computers and associated equipment. Installs hardware. ranging from personal computers to mainframe machines. and tests by running special software.
Computer Services Engineering Technician
40
small pictures that are stored on a computer and can be easily added to a document
clip art
41
a thirdparty entity that manages and distributes softwarebased services and solutions to customers across a wide area network from a central data center
Application Service Provider (ASP)
42
fixed into the surface of something: The thorn was embedded in her thumb.(встроенный)
embedded
43
for schools
.edu
44
small pieces of data sent from a website
cookies
45
is the brains of the computer where the actual processing data takes place
CPU
46
an input device consisting of a flat. pressuresensitive pad which the user draws on or points at with a special stylus. to guide a pointer displayed on the screen.
graphics tablet
47
the large system of connected computers around the world that allows people to share information and communicate with each other
internet
48
the learning or developing of a skill. habit. or quality.
acquisition
49
a computer hardware component that connects a computer to a computer network
Network Interface Card (NIC)
50
blank/blind carbon copy sent to a recipient without the recipients address appearing in the message
BCC
51
software that contains advertisements embedded in the application
adware/advertisingsupported software
52
a distinctive attribute or aspect of something
feature
53
Advises potential customers about available hardware and sells equipment to suit individual requirements.
Computer Salesperson
54
defines the domain host (default host for http is www)
Host
55
defines the name of a single web page
Filename
56
change the form. character. or function of something.
convert
57
is small programs that harm the computer system
carry viruses
58
the physical and electronic parts of a computer
hardware
59
conforming to the law or to rules.
legitimate
60
the practice of sharing computer data or space on a network
file swapping
61
interprets software programs written in assembly language into machine code
assembler
62
a central connection point in the star network topology. which does not distinguish to which port data packets should be sent
hub
63
press a computer mouse button twice in quick succession to select a file. program. or function.
double click
64
a type of broadband communications technology which is up to 24 Mbps fast
ADSL (Asymetric Digital Subscriber Line)
65
at the bottom. top. and/or sides of the screen–
menu
66
software that is specifically designed to disrupt. damage. or gain unauthorized access to a computer system.
malware
67
a machinereadable representation of the UPC (Universal Product Code) which is read by a scanner that passes over the code and registers the UPC
barcode
68
is a feature in Microsoft Excel that automatically adjusts the width or height of a cell.
AutoFit Behaviour panel
69
the creation of documents using page layout skills on a personal desktop computer primarily for print
desktop publishing (DTP)
70
is a harddisk failure that occurs when a read/write head comes in contact with its rotating platter. resulting in permanent and usually irreparable damage
head crash
71
a rapid transition from one phase of a business enterprise or project to another.
cutover
72
is the luminance of images that is measured in cd/m^2(candela per square metre)
brightness
73
navigation key. A keyboard key used to move the cursor (pointer) around on the screen. They include the four Arrow keys. PageUp. PageDown. Home and Endkeys.
navigation keys
74
a company in UK
.co.uk
75
Software protection and anticheat for games. against copying. piracy and illegal use. Copy protection is a system of measures aimed at countering unauthorized duplication of information. usually presented in electronic form.
anticopying software
76
a small device on a piece of electrical or electronic equipment which is pressed to operate it.
button
77
the authoring language used to create documents on the Web
HyperText Markup Language (HTML)
78
a device or piece of equipment designed to perform a specific task.
appliance
79
is an error. flaw. failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result
bug
80
a sheet of information in the form of a table. graph. or diagram
chart
81
longterm storage devices. which means the data is still saved even if the computer is turned off or unplugged
mass storage device
82
a key on keyboards that turns insert mode on and off
Insert key
83
the state of being watchful for possible danger.
alert(n)
84
a special type of expansion cards designed specifically for the purpose of accelerating various workloads.
acceleration card
85
the keyboard key that originally pushed the typewriter carriage one position backwards. and in modern computer systems moves the display cursor one position backwards. deletes the character at that position. and shifts back the text after that position by one position.
Backspace key
86
Will allow you to move in the begging of the string
Home key
87
an arrangement of text and graphics
layout
88
is a freeware web browser developed by Google in 2008
Chrome
89
Researches. designs. and develops computers. or parts of computers and the computerized element of appliances. machines. and vehicles.
Hardware Engineer/Hardware Architect
90
compress the contents of a disk. increasing the capacity of the disk
disk compression utilities
91
technology is a type of online chat that offers realtime text transmission over the Internet. A LAN messenger operates in a similar way over a local area network.
instant messaging (IM)
92
nonprofit organizations
.org
93
Input devices are devices such as cameras and scanners which are used to record an image of some physical scene. Outputdevices are devices such as displays and printers on which images are produced.
imaging device
94
an email utility that automatically replies to an email message with a prewritten response when that email comes into a specific email or Internet address
autoresponder
95
the time a program or device takes to locate a single piece of information and make it available to the computer for processing
access time/seek time
96
the code used to create Web pages
HTML
97
Function and Edit Keys. ... These keys would include cursor keys and editoperation keys. and are referred to here as edit keys. Left arrow.right arrow. up arrow. down arrow. Home key. End key. Page Up.Page Down. Insert. Delete
editing keys
98
a measurement that indicates the diagonal distance between likecolored phosphor dots on a display screen
dot pitch/phosphor pitch (note: DPI dots per inch is a number of dots per 2.54 cm)
99
which examines the instructions in the users program. interprets each instruction and causes the circuits and the rest of the components disk drives. monitor. etc. to be activated to execute the functions specified
Control unit
100
a line or block of text that is automatically added to the bottom of every page
footer
101
is a mechanism that is controlled or monitored by computerbased algorithms. tightly integrated with the Internet and its users. In cyberphysical systems. physical and software components are deeply intertwined. each operating on different spatial and temporal scales. exhibiting multiple and distinct behavioral modalities. and interacting with each other in a lot of ways that change with context.
cyberphysical system
102
a specific geographic location in which an access point provides public wireless broadband network services to mobile visitors through a WLAN
hotspot
103
is a large. powerful computer that handles the processing for many users simultaneously (up to several hundred users
Mainframe
104
the amount of data that can be transmitted in a fixed amount of time or range within a band of frequencies or wavelengths
bandwidth
105
is a more active version of the word include if you _____. you are adding something to the mix.
incorporate
106
a published false statement that is damaging to a person's reputation a written defamation
libel
107
a component designed to lower the temperature of an electronic device by dissipating heat into the surrounding air
heat sink/cooler/fan
108
a specialized functional area within an organization where experts in electronic communications of all kinds wor
ICT department
109
runs on top of the operating system and allows the user to perform a specific task. such as word processing a letter. calculating a payroll in a spreadsheet. manage a database of information. reading email messages. or manipulating digital photographs
application software
110
used as a teaching language
BASIC
111
The green line indicates a ____(in ms word)
grammatical error
112
a free open source operating system (OS) based on UNIX that was created in 1991
Linux
113
the dimensions of a display resolution the relative horizontal and vertical sizes of a display
aspect ratio
114
used for scientific and mathematical applications
FORTRAN
115
graphics processing unit built into the motherboard instead of having a separate video card
GPU
116
Definition Of Flat Surface. A plane horizontal surface with no depths is called a Flat Surface.
flat surface
117
A joystick is an input device consisting of a stick that pivots on a base and reports its angle or direction to the device it is controlling. A joystick. also known as the control column. is the principal control device in the cockpit of many civilian and military aircraft. either as a center stick or sidestick. It often has supplementary switches to control various aspects of the aircraft's flight
joystick
118
A desktop publisher uses the computer and software to create visual displays of ideas and information. The desktop publisher may receive text and images from other sources or may be responsible for writing or editing text and acquiring images through digital photography. illustration. or other means
DTP operator
119
protects your computer from unauthorized access over a network or telecom connection
firewall
120
a device that forwards data packets along two or more networks
router
121
Delphi is an integrated development environment (IDE) for rapid application development of desktop. mobile. web. and console software.[1] developed by Embarcadero Technologies.(1995)
Delphi
122
is a file system cataloging structure which contains references to other computer files. and possibly other directories
directory
123
specialized computing to put a computer program onto a computer so that the computer can use it: Andrew. can you help me install this software?
install
124
quick to notice any unusual and potentially dangerous or difficult circumstances
alert
125
defines a path at the server the place where a web page is located
Directory Path
126
for company
.com
127
initializing a disk and preparing it to receive data
formatting
128
a process by which the space between the words in a line is divided evenly to make the text flush with both left and right margins.
justification
129
a small graphical element used to highlight or itemize a list
bullets
130
is a message which is written to deliberately spread fear. uncertainty and doubt
hoax (is an email chain letter)
131
Applications are stored on a personal computer as executable files documents are stored as ...
data file
132
SMART Board is an interactive whiteboard developed by SMART Technologies. It is a large touchsensitive whiteboard that uses a sensor for detecting user input (e.g. scrolling interaction) that are equivalent to normal PC input devices. such as mice or keyboards. A projector is used to display a computer's video output onto the whiteboard. which then acts as a huge touchscreen. The SMART Board usually comes with 4 digital writing utensils that use digital ink replacing the traditional whiteboard markers. The digital ink work by using an active digitizer that controls the PC input information for writing capabilities such as drawing or handwriting.
interactive smartboard/whiteboard
133
Microsoft Exchange Server is Microsoft's email. calendaring. contact. scheduling and collaboration platform deployed on the Windows Server operating system for use within a business or larger enterprise
Exchange/Microsoft Exchange Server
134
an instance of striking or being struck.
hit
135
is a reference to data that readers can directly follow either by clicking or by hovering. thus enabling them easily to navigate their browsers to related resources
hyperlink
136
is a style sheet language used for describing the presentation of a document written in a markup language like HTML
CSS (Cascading Style Sheets)
137
select an option on an electronic interface in order to reach another file. website. or web page.
clicking
138
a computer program that records every keystroke made by a computer user. especially in order to gain fraudulent access to passwords and other confidential information.
keylogger
139
a special program used to find errors in other program. which allows a programmer to stop a program at any point and examine and change the values of variables
debugger
140
texts containing hyperlinks
hypertext
141
are similar in size to CDs (both are 1.2 mm thick and 120 mm in diameter). but they differ in structure and capacity
DVDs (digital versatile discs)
142
computer time or services. including data processing services. Internet services. electronic mail services. electronic message services. or information or data stored in connection therewith.
computer service
143
It's the underlying protocol used by the World Wide Web to define how messages are formatted and transmitted
Hypertext Transfer Protocol (HTTP)
144
someone who provides guidance. instruction. direction and leadership to a group of individuals (the team) for the purpose of achieving a key result or group of aligned results.
Team Leader
145
the fraudulent practice of using another person's name and personal information in order to obtain credit. loans. etc
identity thef
146
a hacker who violates computer security for little reason beyond maliciousness or for personal gain
blackhat hacker/cracker
147
a LAN architecture that uses a bus or star topology and supports data transfer rates of 10 Mbps
Ethernet
148
an object that can contain multiple documents
folder
149
is a device that modulates the digital signal from the computer into analogue signal that can be carried over the phone line
Modem
150
the portion of a market controlled by a particular company or product.
market share
151
something that exists apart from other things. having its own independent existence
entity
152
scan for computer viruses
antivirus/antivirus utility
153
made for a particular customer or user.
bespoke
154
a key on a computer keyboard which is used to perform various functions. such as executing a command or selecting options on a menu.
Enter key
155
a graphical control element that allows the user to choose one value from a list
dropdown/pulldown menu/list
156
the main transmission path within a WAN
backbones
157
the term used to describe any link in any part of a software system that is intended to cause security breaches or damage to a system
malicious link
158
an input device that allows a person to enter letters. numbers. and other symbols (these are called characters) into a computer. It is one of the most used input devices for computers. Using a keyboard to enter lots of data is called typing.
main keyboard
159
The process of keeping something in good(at least same)condition: Computer ... is the practice of keeping computers in a good state of repair.
maintenance
160
is the part of the email where you write the information about the addresses and subject
header
161
a very small microcomputer that also sacrificed power for small size and portability
palmtop or handheld PC
162
is a multiuser computer that is less powerful than a mainframe
Minicomputers
163
blinking vertical line in the working area that shows the position on the screen
cursor
164
the science dealing with the development and application of devices involving flow of electrons in a vacuum. gaseous media and semiconductors
electronics
165
is a method of exchanging digital messages from an author to one or more recipients
email
166
is the message itself
body
167
a digital electronic circuit that performs arithmetic and bitwise logical operations
Arithmetic Logic Unit
168
an outstanding part of an event or period of time.
highlight
169
to perform or complete a job or activity to fulfill:
carry out
170
digital image is a numeric representation. normally binary. of a twodimensional image. Depending on whether the image resolution is fixed. it may be of vector or raster type
digital image
171
a record of the address of a website or other data made to enable quick access
bookmarks/favourites
172
bullying that takes place over digital devices like cell phones. computers. and tablets. Cyberbullying can occur through SMS. Text. and apps. or online in social media. forums. or gaming where people can view. participate in. or share content. Cyberbullying includes sending. posting. or sharing negative. harmful. false. or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal behavior.
cyber bullying/cyberbully
173
persons who have the ability to develop. operate and maintain ICT systems and for whom ICTs constitute the main part of their job
ICT specialists
174
the green line indicates a grammatical error (proccess)
grammarchecking
175
act in such a way as to have an effect on each other. communicate or be involved directly.
interact
176
A Digital Certificate is an electronic password that allows a person. organizaion to exchange data securely over the Internet using the public key infrastructure (PKI). Digital Certificate is also known as a public key certificate or identity certificate
digital certificate
177
a type of data transmission in which a single medium (coaxial cable or optical fibre) can carry several channels at once
broadband(from crossword)
178
the use of a computer to perform calculations on data : a dataprocessing bureau
data processing
179
hinder. restrain. or prevent (an action or process).
inhibit
180
is a security identification and authentication device. Such devices use automated methods of verifying or recognising the identity of a living person based on a physiological or behavioral characteristic.
biometric scanner
181
is a type of card used in digital cameras
flash memory card
182
a part of the systems GUI. which provides easy management and access to panel components
Control Panel
183
The _____ provides many of the most common options for formatting selected text. such as font style. font size. font weight. text alignment and colour.
format menu
184
an object or machine that has been invented for a particular purpose: a machine. for example a phone or computer. that can be used to connect to the internet
device
185
a camera which produces digital images that can be stored in a computer and displayed on screen
digital camera
186
a combination of keys that. when pressed simultaneously. perform some task that ordinarily requires use of a mouse or other input device and may take longer to do. In Windows XP . for example. pressing ControlAltDelete will bring up the task manager utility for application and system monitoring and control.
keyboard shortcuts
187
is two or more connected computers sharing certain resources in a relatively small geographic location. often in the same building
local area network (LAN)
188
showing or feeling opposition or dislike unfriendly.
hostile
189
preventing success or development harmful unfavourable
adverse
190
a type of drive that plugs into a USB port and lets you share photos and music with friend/ is a data storage device that includes flash memory with an integrated USB interface
Flash drive
191
is a personal computerdesigned for regular use at a single location on or near a desk or table due to its size and power requirements.
desktop computer
192
refers to software that creates digital media art images and illustrations/ software. such as Adobe Photoshop and Illustrator. are used to create digital media art images and illustrations. or to edit digital images from scanners or digital cameras
graphics software
193
the act of putting a plan into action or of starting to use something
implementation
194
a copy of an email message sent to a recipient without the recipients address appearing in the message
blank/blind carbon copy (BCC)
195
excessive and insincere praise. given especially to further one's own interests.
Flattery
196
boundaries across which two independent systems meet and act on or communicate with each other
interface
197
the amount of vertical space between successive lines of text.
line spacing
198
...are closer to human languages and they use forms resembling English. which makes programming easier. Highlevel programming languages include C++. Java. FORTRAN. COBOL. PASCAL. BASIC. Visual BASIC. Python and Ruby.
highlevel language
199
Writes the programs which enable computer to carry out particular tasks. May write new programs or adapt existing programs. perhaps altering computer packages to meet the needs of an individual company
Applications Programmer
200
not authorized by the law not in accordance with accepted standards or rules.
illegitimate
201
is software designed to perform a group of coordinated functions. tasks. or activities for the benefit of the user
application/app
202
Drawed by hand. especially as opposed to by an animal or by mechanical power
handdraw image
203
an opening in a computer where a circuit board can be inserted to add new capabilities to the computer
expansion slot
204
an application. or a component of an interface. that enables a user to perform a function or access a service.
graphical control element/widget
205
a family of computer networking technologies commonly used in LANs and MANs
ethernet
206
designed to run on the Web its applets let you watch animated characters. play music and games
Java
207
connects a computer to the Internet via a modem and a public telephone network. It is the cheapest option. but slower than other kinds of Internet access (the maximum theoretical connection speed is 56 Kbps)
dialup connection (narrowband connection)
208
new and improved technology. and is used in mobile phones on which you can use the internet. watch television. is short for 'third generation'
3G
209
a vulnerability used by an attacker to collect an infected user's click
clickjacking
210
Design new computer hardware. creating blueprints of computer equipment to be built Test the completed models of the computer hardware they design Analyze the test results and modify the design as needed Maintain knowledge of computer engineering trends and new technology
hardware engineer/architect
211
popular for business applications
COBOL
212
are those terminal. that can interpret a limited number of control codes (CR. LF. etc.) but do not have the ability to process special escape sequences that perform functions such as clearing a line. clearing the screen. or controlling cursor position
dumb terminal
213
1)Designing and implementing safety measures and controls 2)Monitoring network activity to identify vulnerable points 3)Acting on privacy breaches and malware threats
computer security specialist
214
a collection of data or information that has a name
file
215
The function keys or Fkeys on a computer keyboard. labeled F1 through F12. are keys that have a special function defined by the operating system. or by a currently running program. They may be combined with the Alt or Ctrl keys.
function keys
216
government websites
.gov
217
is a heated argument between two individuals
flame war
218
A cordless mouse. also called a wireless mouse. is amouse that connects to a computer without the use of wires. Instead. the mouse uses some manner of wirelesstechnology. like Bluetooth.
cordless/wireless mouse
219
is a set of communication standards for simultaneous digital transmission of voice. video. data. and other network services over the traditional circuits of the public switched telephone network
Integrated Services Digital Network (ISDN)
220
is a special highspeed buffer storage mechanism which stores copy of the data from frequently used main memory locations
cache
221
is a data secondary storage device where the software is installed. and where documents and other files are stored.
hard disk drive
222
a keyboard that contains both numbers and letters on the same keys. Definition of alphanumeric. 1 : consisting of both letters and numbers and often other symbols (such as punctuation marks and mathematical symbols) an alphanumeric code also : being a character in an alphanumeric system.
alphanumeric group/keyboard
223
the builtin software that determines what a computer can do without accessing programs from a disk
Basic Input Output System (BIOS)
224
architecture. where one computer acts as the server containing the main hard disk and controlling other workstations or nodes. all the devices linked in the network
clientserver
225
means user has been taken offline. often for security reasons.
disabled user
226
is an organization that provides services for accessing. using. or participating in the Internet.
internet service provider (ISP)
227
A digital video camera. video camcorder. or digital camcorder is a device that records video to formats including Digital8. MiniDV. DVD. a hard drive. or solidstate flash memory.
digital camcorder
228
the process of combining the various versions of a file or folder
Merge
229
a small circuit board that has 64bit path and holds memory chips
dual inline memory module (DIMM)
230
the term used to describe any code in any part of a softwaresystem or script that is intended to cause undesired effects. security breaches or damage to a system.
malicious code
231
is a type of digital subscriber line (DSL) technology. a data communications technology that enables faster data transmission over copper telephone lines than a conventional voiceband modem can provide
Asymmetric digital subscriber line (ADSL)
232
causing disruption or annoyance through being unwelcome or uninvited.(назойливый)
intrusive
233
the intensity of light emitted from a surface per unit area in a given direction which carries information on the brightness of the image
luminance
234
the main graphical user interface of an operating system. usually displaying icons. windows and background wallpaper
desktop
235
Calculations . Preliminary assumptions
estimates (noun)(pl)
236
is a free and open source web browser developed in 2002 for Microsoft Windows. Mac OS X. and Linux coordinated by Mozilla Corporation and Mozilla Foundation
Firefox
237
Black hat refers to a hacker who breaks into a computer system or network with malicious intent. ... The black hat hacker may also sell these exploits to other criminal organizations.
cracker/black hat
238
a monitor pattern or picture or other graphic representation that forms the background
desktop background/wallpaper
239
A dictionary with details about the feed image. A feed image can be a logo. banner. or a picture of the author | nahrávat (obraz)
feed (image)
240
an interruption in an authorized user's access to a computer network. typically one caused with malicious intent
denial of service
241
a network of private computers infected with malicious software and controlled as a group without the owners' knowledge. e.g. to send spam
BotNet
242
is an external unit with the drive mechanism and the media all in one sealed case
External hard drive
243
an interface for typing commands directly to a computer's operating system
command line
244
LOCK is a function that locks part of a keyboard keys into a distinct mode of operation. depending on the lock settings selected NUMLOCK
lock keys
245
Caps Lock is a button on a computer keyboard that causes all letters of Latinbased scripts to be generated in capitals
Caps lock
246
refers to a file containing instructions and data meant for performing a sequence of tasks on a computer
executable file
247
is a computer that has a microprocessor chip (or multiple microprocessors) as its central processing unit (CPU).
microcomputer
248
used to write system software. graphics and commercial programs
C++
249
the software that transforms a highlevel programming language into machine code
compiler
250
In computer graphical user interfaces. drag and drop is a pointing device gesture in which the user selects a virtual object by grabbing it and draggingit to a different location or onto another virtual object.
drag and drop functions
251
A help desk. in the context of IT. is a department inside an organization that is responsible for answering the technical questions of its users.
help desk/helpdesk technician
252
the blue line indicates a contextual spelling error (proccess)
contextual spelling error
253
aggressive pressure or intimidation. behaviour that annoys or upsets someone: sexual harassment
harassment
254
In user interface design. a mode is a distinct setting within a computer program or any physical machine interface. in which the same user input will produce perceived results different to those that it would in other settings.(Режим)
mode
255
a solid or hollow spherical or eggshaped object that is kicked. thrown. or hit in a game.
ball
256
An input device is a hardware or peripheral device used to send data to a computer. An input device allows users to communicate and feed instructions and data to computers for processing. display. storage and/or transmission.
input device
257
The only language a PC can directly execute which consists of 1s and 0s
machine code
258
is composed of a flexible sheet of plastic. coated with ironoxide a magnetisable material
floppy disk
259
An electronic visual display. informally a screen. is a display device for presentation of images. text. or video transmitted electronically. without producing a permanent record.
electronic visual display/monitor
260
languages, that are used to create Web documents. They use instructions (markups) to format and link text files. They include HTML and VoiceXML.
markup language
261
is a disturbance generated by an external source that affects an electrical circuit by electromagnetic induction
electromagnetic interference
262
the process of giving things out to several people. or spreading or supplying something
distribution technology
263
broad subject concerned with technology and other aspects of managing and processing information. especially in large organizations.
Information technology (Information and Communication Technology)
264
register which holds the instruction that is currently being executed
Instruction Register
265
a highcapacity transmission technique using a wide range of frequencies. which enables a large number of messages to be communicated simultaneously
broadband
266
is a beginning page of web site
home page
267
is a method of encoding characters that is based on the order of alphabetic characters in the English language.
ASCI
268
consists of addressing modes. instructions. native data types. registers. memory architecture. interrupt. and exception handling. and external I/O.
coded set of instructions
269
is larger than a LAN. covering an area of a few city blocks to the area of an entire city. often including the surrounding areas
metropolitan area network (MAN)