You are on page 1of 7

PREPARATION IN ED. TECH.

JENNA MARIE TOLOSA


BSED III-U

1. digit - the digits are the elements of the set {0, 1}. This system is used by computers because the
two digits can represent the logic low and high states.

bit - is the smallest unit of information in a computer. It is used for storing information and has a
value of true/false, or on/off.

byte - in most computer systems, a byte is a unit of data that is eight binary digits long. A byte is the
unit most computers use to represent a character such as a letter, number or typographic symbol.
Each byte can hold a string of bits that need to be used in a larger unit for application purposes.

2. hard disk - stores and provides relatively quick access to large amounts of data on an
electromagnetically charged surface or set of surfaces. Today's computers typically come with a
hard disk that contains several billion bytes (gigabytes) of storage.

CPU - (central processing unit)- is the primary component of a computer that processes
instructions. It runs the operating system and applications, constantly receiving input from the user
or active software programs. It processes the data and produces output, which may stored by an
application or displayed on the screen.

mother board - it connects all the other components through different pathways or connections
and it acts as a nervous system of the computer.

3. web site - a Web site is a related collection of World Wide Web (WWW) files that includes a
beginning file called a home page. A company or an individual tells you how to get to their Web site
by giving you the address of their home page. From the home page, you can get to all the other
pages on their site. A very large Web site may be spread over a number of servers in different
geographic locations since site implies a geographic place.

web log - consists of a series of entries arranged in reverse chronological order, often updated on
frequently with new information about particular topics. It consist of the recorded ideas of an
individual (a sort of diary) or be a complex collaboration open to anyone. The information can be
written by the site owner, gleaned from other Web sites or other sources, or contributed by users.

web page - A web page or web page is a document commonly written in HyperText Markup
Language (HTML) that is accessible through the Internet or other network using an Internet
browser. A web page is accessed by entering a URL address and may contain text, graphics, and
hyperlinks to other web pages and files. The page you are reading now is an example of a web page.

4. virtual reality - it is the use of computer modeling and simulation that enables a person to
interact with an artificial three-dimensional (3-D) visual or other sensory environment.
web - In order to ensure you are getting the right calibre of staff, you need to have at least a basic
grasp of the subject. This solution will attempt to give you a basic understanding of various aspects
of web publishing languages such as HTML, ASP, JavaScript, CGI and server configuration. To view
the Internet most people use a browser, your browser window is probably where you are viewing
this page. There are many different browsers: the two most popular being Netscape Navigator and
Microsoft Internet Explorer. Web browsers work by connecting over the Internet via modem or
ISDN via a server or ISP to remote machines, asking for a particular document (or page) and then
formatting the documents they receive for viewing on a computer. To do this, web browsers use a
special language called HTTP (HyperText Transfer Protocol). The remote machines containing the
documents run HTTP servers. When an HTTP server receives a request for a page, it sends it back
to the local computer for viewing through the browser. Each document on the Web has a particular
URL (Uniform Resource Locator). This tells the browser which server to go to to get the document.
The syntax of the URL is simple to understand. The HTTP signifies that the language to be used is
HyperText Transfer Protocol. The host name is the name of the server. For example,
http://www.itnetwork.com would look for the IT Network's server. The path is the document
requested from the server. This is not the same as the file system path; the server defines its root.

cyber space - an electronic medium used to form a global computer network to facilitate online
communication. It is a large computer network made up of many worldwide computer networks
that employ TCP/IP protocol to aid in communication and data exchange activities. Cyberspace
allows users to share information, interact, swap ideas, play games, engage in discussions or social
forums, conduct business and create intuitive media, among many other activities.

5. facebook status - is an update feature which allows users to discuss their thoughts,
whereabouts, or important information with their friends. Similar to a tweet on the social
networking site Twitter, a status is usually short and generally gives information without going into
too much detail. When a status is updated, it posts on the user's personal wall, as well as in the
news feeds of their friends.

blog - A blog (short for weblog) is a personal online journal that is frequently updated and intended
for general public consumption. Blogs are defined by their format: a series of entries posted to a
single page in reverse-chronological order. Blogs generally represent the personality of the author
or reflect the purpose of the Web site that hosts the blog. Topics sometimes include brief
philosophical musings, commentary on Internet and other social issues, and links to other sites the
author favors, especially those that support a point being made on a post.

tweet - a tweet is a post on Twitter. The act of writing a tweet is called tweeting or twittering.
Tweets can be up to 140 characters long, including spaces, and can include URLs and hashtags.

6. cyber bullying - Cyber bullying is the use of technology to harass, threaten, embarrass, or target
another person.

cyber trafficking - There are crimes committed in cyberspace and cyberspace related crimes that
use Internet as means to their commission such as trafficking in persons. Cyberspace related
crimes can also be committed with the traditional way. In trafficking, perpetrators use all kind of
means to recruit victims from traditional to more modern ones. When trafficking is committed with
the use of Internet it is called “cyber-trafficking”. Cyber-trafficking refers to the use of cyber-space
for: the recruitment of victims, advertisement of victims’ services, attracting clients. In some forms
it refers also to the space of commission of the crime (e.g. if the exploitation is on line by cyber-sex
or of procuring material of child pornography).

internet fraud - Fraud through the criminal use of a computer or the Internet can take many
different forms. “Hacking” is a common form, in which a perpetrator uses technological tools to
remotely access a protected computer or system. Another common form involves the interception
of an electronic transmission unintended for the interceptor, such as passwords, credit card
information, or other types of identity theft.

7. log in - is the process by which an individual gains access to a computer system by identifying
and authenticating themselves.

buffer - A buffer contains data that is stored for a short amount of time, typically in the computer's
memory (RAM). The purpose of a buffer is to hold data right before it is used. For example, when
you download an audio or video file from the Internet, it may load the first 20% of it into a buffer
and then begin to play. While the clip plays back, the computer continually downloads the rest of
the clip and stores it in the buffer. Because the clip is being played from the buffer, not directly from
the Internet, there is less of a chance that the audio or video will stall or skip when there is network
congestion. Buffering is used to improve several other areas of computer performance as well. Most
hard disks use a buffer to enable more efficient access to the data on the disk. Video cards send
images to a buffer before they are displayed on the screen (known as a screen buffer). Computer
programs use buffers to store data while they are running. If it were not for buffers, computers
would run a lot less efficiently and we would be waiting around a lot more.

boot-up - o boot up is to start up a computer system by providing it with the required electrical
power and loading the startup services until the operating system is loaded. The boot up process
primarily starts when the power button on a CPU or computer system is manually pressed by a
human operator. The computer is then activated and performs a series of boot time tests and
checks before normal operations can be performed by the user. These checks include the power on
self test (POST), which ensures that the computer has enough electrical power to proceed, a
peripheral devices check and the initiation of the boot loader, which loads and executes the startup
sequence and the operating system.

8. LCD - LCD (liquid crystal display) is the technology used for displays in notebook and other
smaller computers. Like light-emitting diode (LED) and gas-plasma technologies, LCDs allow
displays to be much thinner than cathode ray tube (CRT) technology. LCDs consume much less
power than LED and gas-display displays because they work on the principle of blocking light
rather than emitting it.

CRT - A cathode ray tube (CRT) is a specialized vacuum tube in which images are produced when
an electron beam strikes a phosphorescent surface. Most desktop computer displays make useof
CRTs. The CRT in a computer display is similar to the "picture tube" in a television receiver.
LED - Light-emitting diodes (LEDs) are solid-state devices that convert electric energy directly into
light of a single color.

9. Windows - Windows OS, computer operating system (OS) developed by Microsoft Corporation to
run personal computers (PCs). Featuring the first graphical user interface (GUI) for IBM-compatible
PCs, the Windows OS soon dominated the PC market. Approximately 90 percent of PCs run some
version of Windows.

Software - is a set of instructions or programs instructing a computer to do specific tasks. Software


is a generic term used to describe computer programs. Scripts, applications, programs and a set of
instructions are the terms often used to describe software

App - An application program is a program designed to perform a specific function directly for the
user or, in some cases, for another application program. Examples of applications include word
processors, database programs, Web browsers, development tools, drawing, paint, image editing
programs, and communication programs. Applications use the services of the computer's operating
system and other supporting applications.

10. flaming - is the act of posting or sending offensive messages over the Internet. These messages,
called "flames," may be posted within online discussion forums or newsgroups, or sent via e-mail or
instant messaging programs. The most common area where flaming takes place is online discussion
forums, which are also called bulletin boards.

emoji - An emoji is a small icon that can be placed in line with text. They are commonly used in text
messaging, social media, and in apps like Instagram and Snapchat. Emojis can be inserted inline
with text because each icon corresponds to a Unicode value for a specific character. Inserting an
emoji is just like typing a letter or symbol on your keyboard. However, in order for the emoji to be
displayed, it must be supported by the operating system (OS). In other words, the OS must
recognize the Unicode value and have an emoji that corresponds to it. If no emoji is found, either a
blank space or an empty box will be displayed.

Bluetooth - this wireless technology enables communication between Bluetooth-compatible


devices. It is used for short-range connections between desktop and laptop computers, PDAs (like
the Palm Pilot or Handspring Visor), digital cameras, scanners, cellular phones, and printers.

11. avatar - an avatar is the embodiment of a person or idea. However, in the computer world, an
avatar specifically refers to a character that represents an online user. Avatars are commonly used
in multiplayer gaming, online communities, and Web forums. Once a user has created an avatar, he
or she becomes part of an online community filled with other users' avatars. Players can interact
with other avatars and talk to them using text or voice chat. Online discussion boards typically
require users to register and provide information about themselves. Many give users the option to
select an image file that represents the user's persona. This image, combined with a made-up
username, serves as a person's avatar. Regardless of the application, avatars allow people to
represent themselves online in whatever way they want.
cookie - is a small amount of data generated by a website and saved by your web browser. Its
purpose is to remember information about you, similar to a preference file created by a software
application. While cookies serve many functions, their most common purpose is to store login
information for a specific site. Some sites will save both your username and password in a cookie,
while others will only save your username. Whenever you check a box that says, "Remember me on
this computer," the website will generate a login cookie once you successfully log in. Each time you
revisit the website, you may only need to enter your password or you might not need to log in at all.
Cookies are also used to store user preferences for a specific site. For example, a search engine may
store your search settings in a cookie. A news website may use a cookie to save a custom text size
you select for viewing news articles. Financial websites sometimes use cookies to store recently
viewed stock quotes. If a website needs to store a lot of personal information, it may use a cookie to
remember who you are, but will load the information from the web server.

smart phone - A smart phone is a mobile phone that includes advanced functionality beyond
making phone calls and sending text messages. Most smart phones have the capability to display
photos, play videos, check and send e-mail, and surf the Web. Modern smart phones, such as the
iPhone and Android based phones can run third-party applications, which provides limitless
functionality. Since smartphones have a wide range of functionality, they require advanced
software, similar to a computer operating system. The smartphone software handles phone calls,
runs applications, and provides configuration options for the user. Most smartphones include a USB
connection, which allows users to sync data with their computers and update their smartphone
software.

12. hot spot - For users of portable computers equipped for wireless, a hot spot (or hotspot) is a
wireless LAN (local area network) node that provides Internet connection and virtual private
network (VPN) access from a given location. For example, a business traveller with a laptop
equipped for Wi-Fi can look up a local hot spot, contact it, and get connected through its network to
reach the Internet and their own company remotely with a secure connection.

troll - A troll is a member of an Internet community who posts offensive, divisive and controversial
comments. Often, a troll will make obvious and inflammatory statements that are meant to bait new
users (newbies) into reacting. This is sometimes called trolling. Despite multiple attempts at
limiting trolling on the Internet, it is still widespread in social networks, comment sections and
anywhere else where users can post in relative anonymity.

memory - device that is used to store data or programs (sequences of instructions) on a temporary
or permanent basis for use in an electronic digital computer. Computers represent information in
binary code, written as sequences of 0s and 1s. Each binary digit (or “bit”) may be stored by any
physical system that can be in either of two stable states, to represent 0 and 1. Such a system is
called bistable. This could be an on-off switch, an electrical capacitor that can store or lose a charge,
a magnet with its polarity up or down, or a surface that can have a pit or not.

13. storage - Storage is frequently used to describe the devices and data connected to the computer
through input/output (I/O) operations -- that is, hard disk and tape systems and other forms of
storage that don't include computer memory and other in-computer storage. For the enterprise, the
options for this kind of storage are of a much greater variety and expense than those related to
memory.

URL - URL, in full Uniform Resource Locator, Address of a resource on the Internet. The resource
can be any type of file stored on a server, such as a Web page, a text file, a graphics file, or an
application program. The address contains three elements: the type of protocol used to access the
file (e.g., HTTP for a Web page, ftp for an FTP site); the domain name or IP address of the server
where the file resides; and, optionally, the pathname to the file (i.e., description of the file’s
location). For example, the URL http://www.britannica.com/heritage instructs the browser to use
the HTTP protocol, go to the www.britannica.com Web server, and access the file named heritage.

GUI - Graphical user interface (GUI), a computer program that enables a person to communicate
with a computer through the use of symbols, visual metaphors, and pointing devices. Best known
for its implementation in Apple Inc.’s Macintosh and Microsoft Corporation’s Windows operating
system,

GPS - GPS (Global Positioning System) is a "constellation" of approximately 30 well-spaced


satellites that orbit the Earth and make it possible for people with ground receivers to pinpoint
their geographic location. The location accuracy is anywhere from 100 to 10 meters for most
equipment. Accuracy can be pinpointed to within one (1) meter with special military-approved
equipment. GPS equipment is widely used in science and has now become sufficiently low-cost so
that almost anyone can own a GPS receiver.

GIF - Stands for "Graphics Interchange Format." GIF is an image file format commonly used for
images on the web and sprites in software programs. Unlike the JPEG image format, GIFs uses
lossless compression that does not degrade the quality of the image. However, GIFs store image
data using indexed color, meaning a standard GIF image can include a maximum of 256 colors.

LAN - Stands for "Local Area Network" and is pronounced "lan." A LAN is a network of connected
devices that exist within a specific location. LANs may be found in homes, offices, educational
institution, or other areas. A LAN may be wired, wireless, or a combination of the two. A standard
wired LAN uses Ethernet to connect devices together. Wireless LANs are typically created using a
Wi-Fi signal. If a router supports both Ethernet and Wi-Fi connections, it can be used to create a
LAN with both wired and wireless devices.

ISP - Stands for "Internet Service Provider." An ISP provides access to the Internet. Whether you're
at home or work, each time you connect to the Internet, your connection is routed through an ISP.
Early ISPs provided Internet access through dial-up modems. This type of connection took place
over regular phone lines and was limited to 56 Kbps. In the late 1990s, ISPs began offering faster
broadband Internet access via DSL and cable modems. Some ISPs now offer high-speed fiber
connections, which provide Internet access through fiber optic cables. Companies like Comcast and
Time Warner provide cable connections while companies like AT&T and Verizon provide DSL
Internet access.

OS - An operating system, or "OS," is software that communicates with the hardware and allows
other programs to run. It is comprised of system software, or the fundamental files your computer
needs to boot up and function. Every desktop computer, tablet, and smart phone includes an
operating system that provides basic functionality for the device. Common desktop operating
systems include Windows, OS X, and Linux. While each OS is different, most provide a graphical
user interface, or GUI, that includes a desktop and the ability to manage files and folders. They also
allow you to install and run programs written for the operating system. Windows and Linux can be
installed on standard PC hardware, while OS X is designed to run on Apple systems. Therefore, the
hardware you choose affects what operating system(s) you can run.

LED - LED - Light-emitting diodes (LEDs) are solid-state devices that convert electric energy
directly into light of a single color.

HTTPS - Stands for "HyperText Transport Protocol Secure." HTTPS is the same thing as HTTP, but
uses a secure socket layer (SSL) for security purposes. Some examples of sites that use HTTPS
include banking and investment websites, e-commerce websites, and most websites that require
you to log in. Websites that use the standard HTTP protocol transmit and receive data in an
unsecured manner. This means it is possible for someone to eavesdrop on the data being
transferred between the user and the Web server. While this is highly unlikely, it is not a comforting
thought that someone might be capturing your credit card number or other personal information
that you enter on a website. Therefore, secure websites use the HTTPS protocol to encrypt the data
being sent back and forth with SSL encryption. If someone were to capture the data being
transferred via HTTPS, it would be unrecognizable.

ISO9001 - The International Organization for Standardization (ISO), based in Geneva Switzerland,
developed the ISO9000 series of standards to set guidelines for effective management systems. It is
the most comprehensive quality management standard covering all main processes within a
company, ranging from research and development to delivery and shipping ensuring that these
processes are not only conducted under controlled conditions, but also subject to continuous
improvement. The ISO 9000 family represents a consensus on good management practices, which is
an accepted business standard in more than 90 countries. ISO 9001:2008 specifies audits by third-
party registrars for initial registration and continued compliance.

You might also like