You are on page 1of 3

2-in-1 PC

A laptop computer that can convert into a tablet-like device.


debugger
A tool in an integrated development environment that helps programmers analyze a program as it runs.
3-D sound card A feature of Java whereby code A Microsoft programming cyberloafing nodes on the network A compact audio–video
An expansion card that enables needs to be compiled only once, language developed to compete Doing anything with a communicate. interface standard that carries
a computer to produce sounds. after which the code can be run with Java. computer that’s unrelated to a both high-definition video and
on many different CPUs. job Ethernet port uncompressed digital audio.
A cable Internet A port that transfers data at
acceptable use policies arithmetic logic unit (ALU)
The part of the CPU that
A broadband service that
transmits data over coaxial
D speeds of up to 10 Gbps; used
to connect a computer to a
home area network (HAN)
A network located in a home
regarding usage of computer performs arithmetical and logic cables. data collision modem or to a network. that’s
systems. When two computers send data
calculations. at the same time and the sets of a home network.
access card reader cascading style sheet (CSS) data collide somewhere in the exploit kits
A device that reads information artificial neural networks A list of rules that defines in transmission media. A software toolkit used to take honey pot
from a magnetic strip on the (ANNs) one single location how to advantage of security A computer system that’s set up
back of a credit card–like Computer systems constructed display HTML elements. data-flow diagram weaknesses found in apps or to attract unauthorized users by
access card. based on the structure of the Diagrams that trace all data in operating systems, usually to appearing to be a key part of a
human brain using loosely Cat 5e cable an information system from the deploy malware. network or a system that
connected artificial neurons. A UTP cable commonly found point at which data enters the contains something of great
access method in wired Ethernet networks, system to its final resting place value.
A method to control which eXtensible Markup Langua
computer is allowed to use assembly language designed for 100 Mbps-wired (storage or output). (XML)
transmission media at a certain A computer language that Ethernet networks. A markup language that enables HTML embedded scripting
time. allows programmers to write Cat 6 cable data staging designers to define their own langua
programs using a set of short, A UTP cable that provides An intermediate storage area data-based tags, A programming language that
English-like commands that more than 1 Gbps of used for data processing during tucks programming code
access point speak directly to the CPU. throughput. the extract, transform, and load directly within the HTML of a
Device that is connected by a Cat 6a cable extranet web page; the most popular
cable to the main router that process; between the data An area of an intranet that only
assistive (adaptive) A UTP cable that is designed source and the data warehouse. certain entities or individuals example is JavaScript.
amplifies a wireless signal to for ultrafast 10GbE networks.
otherwise unreachable places technology Cat 7 cable can access; the owner decides
Any device, software feature, or A UTP cable that is designed database management system who will be permitted to access hybrid topology
app that is designed to improve for 10GbE networks and offers (DBMS) it. Combining multiple topologies
access time the A specially designed on one network.
The time it takes a storage greater
device to locate its stored data. application software used to F
audio MIDI interface create and manage databases. fifth-generation language Hypertext Markup Langua
Interface technology that allows (CPU or processor) HTML
accounting software The part of the system unit of a (5GL)
a user to connect musical computer that is responsible for decision point A computer language in which A series of tags that define how
An application program that instruments and microphones to A place where a program must a problem is presented as a elements on a website should
helps business owners manage his or her computer. data processing; The CPU be displayed in a browser.
their finances more efficiently controls all the functions choose from a list of actions series of facts or constraints
by providing tools for. performed by the computer’s based on the value of a certain instead of as a specific
authentication other components and input. algorithm Hypertext Transfr Protocol
The process of identifying a processes all the commands HTTP
Active Server Pages (ASP) computer user, issued to it by software decision support system flat database The protocol that allows files to
Programming language used to instructions. (DSS) A type of database that is often be transferred from a web
build websites with interactive represented as a list or simple server so that you can see them
capabilities; adapts an HTML authentication server A type of business intelligence on your computer by using a
page to the user’s selections. A server that keeps track of clock cycle system designed to help table.
who’s logging on to the Steady beats or “ticks” of the managers develop solutions for browser.
system specific problems. flatbed scanner
active topology Hypertext Transfer Protocol
A type of network design where B clock speed denial-of-service (DoS) attack
Used to create a digital image
from a tangible image (like a Secure (HTTPS)
the nodes participate in moving backdoor program paper photo). The Internet protocol that
data through the network. A program that enables a The steady and constant pace at An attack that occurs when ensures data is sent securely
hacker to take complete control which a computer goes through legitimate users are denied
machine cycles, measured in access to a computer system over the Web.
adware of a computer because a hacker foreign key
hertz In a relational database, the
A program that downloads on common field between tables hyperthreading
your computer when a user base class that’s not the primary key. A technology that permits
installs a freeware program, In object-oriented analysis, the cluster derived class quicker processing of
game, or utility. Generally, original class. The smallest increment in In object-oriented analysis, the information by enabling a new
adware enables sponsored which data is stored on hard modified class. fourth-generation language
disks; hard disks are divided set of instructions to start
advertisements to appear in a basic input/output system (4GL) executing before the previous
section of a browser window or into tracks, then wedges, then device driver A computer language type that set has finished.
as a pop-up ad. (BIOS) sectors, then clusters. includes database query
A program that manages the Software that facilitates the
data between a computer’s communication between a languages and report
affective computing operating system and all the CMYK device and its operating system. generators. I
A type of computing that input and output devices A color model in which all inoculation
relates to emotion or that attached to the computer; also colors are described as a disk defragmentation fuzzy logic A process used by antivirus
deliberately tries to influence responsible for loading the mixture of four base colors The process of regrouping Enables the interjection of software; compares old and
emotion. operating system (OS) from its (cyan, magenta, yellow, and related pieces of files on the experiential learning into current qualities of files to
permanent location on the hard black). hard drive, enabling faster knowledge-based systems by detect viral activity.
aggregator drive to random access memory retrieval of the data. allowing the consideration of
A software program that finds (RAM). coaxial cable probabilities. integrated development
and retrieves the latest update A single copper wire distributions (distros) environment (IDE)
surrounded by layers of plastic A developmental tool that helps
of web material (usually
podcasts) according to your
bastion host
A heavily secured server insulation,
Linux download packages. G programmers write and test
specifications. located on a special perimeter gigahertz (GHz) their programs; one IDE can be
network between the Document Object Model One billion hertz. configured to support many
codec (DOM) different languages.
AJAX (Asynchronous company’s secure internal A rule, implemented in either Used by JavaScript to organize
JavaScript and XML) network and its firewall. software or hardware, which objects and page elements. graphics doubl data rate 6
squeezes a given amount of GDDR6 internal hard drive
A collection of technologies A standard of video memory. A hard drive that resides within
that allow the creation of web batch processing media
applications The accumulation of DSL (digital subscriber line) the computer’s system unit and
transaction data until a certain A type of connection that uses graphics processing unit that usually holds all
cognitive surplus telephone lines to connect to (GPU) permanently stored programs
algorithm point is reached, at which time The combination of leisure time the Internet and that allows and data.
several transactions are and the tools to be creative. both phone and data A specialized logic chip that’s
A set of specific, sequential processed at once. dedicated to quickly displaying
steps that describe exactly what transmissions to share the same and calculating visual data such
the computer program must compilation line. Internet Corporation for
as shadows, textures, and Assigned Names and
binary large object (BLOB) The process by which code is luminosity. Numbers (ICANN)
alphabetic check Audio clips, video clips, converted into machine dynamic addressing The organization that registers
In a database, confirms that pictures, and extremely large language—the language the A way of assigning Internet Internet protocol addresses to
only textual characters are documents. CPU can understand. protocol addresses where a gray-hat hacker
A cross between black and ensure they’re unique and
entered in a field. computer is assigned a white—a hacker who will often haven’t been assigned to other
Boolean operators compiler temporary address from an illegally break into systems users.
American Standard Code for A word used to refine logical A program that understands available pool of addresses. merely to flaunt his or her
Information Interchange searches. For Internet searches, both the syntax of the expertise to the administrator of
the words AND, NOT, and OR programming language and the Internet exchange point (IXP)
(ASCII) Dynamic Host Configuration the system he or she penetrated A way of connecting Internet
The American National describe the relationships exact structure of the CPU and Protocol (DHCP) or to attempt to sell his or her service providers (ISPs) that’s
Standards Institute’s standard between keywords in the its machine language. A protocol for assigning services in repairing security made up of one or more
code, pronounced “AS-key,” to search. dynamic Internet protocol breaches. network switches to which the
represent each letter or computer-aided design (CAD) addresses. ISPs connect.
character as an 8-bit (or 1-byte) boot process A 3-D modeling program
binary code. The process for loading the dynamic HTML (DHTML)
H
operating system (OS) into head crash Internet protocol (IP)
random access memory (RAM) control structure A combination of technologies Impact of the read/write head One of the original two
analog when the computer is turned on. General term used for a —HTML, cascading style against the magnetic platter of protocols that were developed
Waves that illustrate the keyword in a programming sheets, and JavaScript—used to the hard drive; often results in for the Internet (the other was
loudness of a sound or the language that allows the create lively and interactive data loss. TCP).
brightness of the colors in an boot-sector virus programmer to direct the flow websites.
image at a given moment in A virus that replicates itself into of the program based on a
time. the master boot record of a decision. E
hexadecimal digit
A digit with 16 possible values:
J
flash drive or hard drive. jam signal
electronic data interchange 0–9 and A–F. A special signal sent to network
antivirus software control unit (EDI) nodes alerting them that a data
Software specifically designed breadcrumb trail Unit of the CPU that manages The exchange of large amounts collision has occurred.
to detect viruses and protect a A navigation aid that shows the switches inside the CPU. of data in a standardized hexidecimal notation
computer and files from harm. users the path they have taken electronic format. A base-16 number system,
to get to a web page or where meaning it uses 16 digits to Javascript Object Notation
the page is located within the copyleft represent numbers instead of (JSON)
applet website; it usually appears at A simplified licensing scheme element the 10 digits used in base 10 or A syntax for exchanging
A small application located on the top of a page. that enables copyright holders In HTML, a pair of tags and the the two digits used in base 2. information between
a server; when requested, the to grant certain rights to a work text between them. The 16 digits it uses are the 10 computers.
applet is downloaded to the while retaining other rights. numeric digits, 0 to 9, plus six
client. bridge extra symbols: A, B, C, D, E,
A device that is used to send embodied agents and F. K
data between different collision crisis-mapping tool Robots that look and act like
application programming A tool that collects information human kernel
interface (API)A set of domains in a network, from e-mails, text messages, The essential component of the
depending on where the hibernate operating system that’s
software routines that allows recipient device is located. blog posts, and maps them, A power-management mode
one software system to work making the information enterprise resource planning that saves the current state of responsible for managing the
with another. available instantly. (ERP) system the current system to the processor and all other
bus (linear bus) topology A business intelligence system computer’s hard drive. components of the computer
A system of networking that accumulates in a central system. Because it stays in
application server connections in which all CSMA/CD location all information random access memory (RAM)
A server that acts as a devices are connected in The method used on Ethernet relevant to running a business high definition the entire time the computer is
repository for application sequence on a single cable. networks to avoid data and makes it readily available A standard of digital TV signal powered on, the kernel is called
software. collisions; short for carrier to whoever needs it to make that guarantees a specific level memory resident..
sense multiple access with decisions. of resolution and a specific
application software C collision detection. A node
connected to the network uses
aspect ratio, which is the
L
The set of programs on a C++ Ethernet network rectangular shape of the image.
computer that helps a user carry A programming language; takes carrier sense to verify that no Linux
out tasks C to an object-oriented level. other nodes are currently A network that uses the An open-source operating
transmitting data Ethernet protocol as the means high-definition multimedia system based on UNIX.
(or standard) by which the interface (HDMI) port Because of the stable nature of
architecture neutral C#
this operating system, it’s often the categories of inputs that are phishing which is placed outside the also provides a connection for
used on web servers. part of the problem the program The process of sending e-mail home and is connected to a the speakers and microphone..
is meant to solve. messages to lure Internet users R computer with coaxial cable.
into revealing personal RAID 0 The satellite company then
local area network (LAN) information such as credit card The strategy of running two sends the data to a satellite spear phishing
A network in which the nodes object-oriented database or Social Security numbers or hard drives in one system, orbiting Earth. The satellite, in A targeted phishing attack that
are located within a small A database that stores data in other sensitive information that cutting in half the time it takes turn, sends the data back to the sends e-mails to people known
geographic area. objects rather than in tables. could lead to identity theft. to write a file. satellite dish and to the to be customers of a company.
computer. Such attacks have a much
logic bomb Object Query Language greater chance of successfully
(OQL) PHP (PHP: Hypertext RAID 1 getting individuals to reveal
A computer virus that runs Preprocessor) The strategy of mirroring all the scalability sensitive data.
when a certain set of conditions A query language used by data written on one hard drive
is met, such as when a program many object-oriented databases. Programming language used to A characteristic of client/server
build websites with interactive to a second hard drive, networks where more users can
is launched a specific number capabilities; adapts the HTML providing an instant backup of be easily added without spooler
of times. Objective C page to the user’s selections. all data. affecting the performance of A program that helps
The programming language other network nodes. coordinate all print jobs being
logical port most often used to program sent to the printer at the same
applications to run under OS X. physical memory random access memory time.
A virtual communications The amount of random access (RAM) scareware
gateway or path that enables a memory (RAM) that’s installed The computer’s temporary
computer to organize requests A type of malware that’s star topology
octet in a computer. storage space or short-term downloaded onto your
for information (such as web A reference to each of the four memory. It’s located in a set of computer and that tries to The most widely deployed
page downloads and e-mail numbers in a dotted decimal chips on the system unit’s convince you that your client/server network topology,
routing) from other networks or number Internet protocol piggybacking motherboard, and its capacity is computer is infected with a where the nodes connect to a
computers. address, so called because each The process of connecting to a measured in megabytes or virus or other type of malware. central communications device
number would have eight wireless network without the gigabytes. called a switch in a pattern
logical port blocking numerals in binary form. permission of the owner of the resembling a star.
A condition in which a firewall network. scope creep
is configured to ignore all rapid application An ever-changing set of
omnibox development (RAD) requests from clients for static addressing
incoming packets that request A combined search and address pinning An alternative program- additional features as they wait A way of assigning Internet
access to a certain port so that bar, so you can both type a The process through which you development method; instead of longer and longer to see a protocol addresses where the
no unwanted requests will get website URL or search the Web choose which applications are developing detailed system working prototype. address for a computer never
through to the computer. from the address bar. visible on the Windows Start documents before they produce changes and is most likely
screen. the system, developers first assigned manually by a network
loop create a prototype, then script administrator or an Internet
A type of decision point in an online analytical processing pipelining generate system documents as A list of commands (mini- service provider.
algorithm. In a loop, a question OLAP they use and remodel the programs or macros) that can
Software that provides A technique that allows the be executed on a computer
is asked, and if the answer is standardized tools for viewing CPU to work on more than one product. structured (analytical) data
yes, a set of actions is instruction (or stage of without user interaction. Data such as “Bill” or “345,” as
performed. Once the set of and manipulating data in a data processing) at the same time, opposed to unstructured data.
actions has finished, the warehouse. thereby boosting CPU read-only memory (ROM)
A set of memory chips, located scripting language
question is asked again, performance. on the motherboard, that stores A simple programming Structured Query Language
creating a loop. If the answer to online transaction processing data and instructions that language that’s limited to (SQL)
the question is no, the algorithm (OLTP) cannot be changed or erased; it performing a set of specialized
breaks free of the loop and The real-time processing of platter tasks. A database programming
database transactions online. A thin, round, metallic storage holds all the instructions the language used to construct
moves on to the first step that plate stacked onto the hard computer needs to start up. queries to extract data from
follows the loop. drive spindle. search engine optimization relational databases; one
OpenPGP real-time operating system (SEO) example of a fourth-generation
M A free public-key standard for Plug and Play (PnP) (RTOS) Designing a website to ensure language.
macro encryption available for A program with a specific ranking near the top of search
download on the Internet. The technology that enables the engine results.
A small program that groups a operating system, once it is purpose that must guarantee SuperFetch
series of commands to run as a booted up, to recognize certain response times for A memory-management
single command. Open Systems automatically any new particular computing tasks or second-generation language technique used by Windows.
Interconnection (OSI) peripherals and to configure else the machine’s application (2GL) Monitors the applications you
macro virus A networking protocol them to work with the system. is useless. Real-time operating A computer language that use the most and preloads them
A virus that’s distributed by established by the Institute of systems are found in many allows programmers to write into your system memory so
hiding it inside a macro. Electrical and Electronics types of robotic equipment.. programs using a set of short, that they’ll be ready to go.
Engineers (IEEE) that provides point of presence (POP) English-like commands that
guidelines for modern A bank of modems, servers, speak directly to the central
master boot record networks. routers, and switches through Really Simple Syndication processing unit and that give swap file (page file)
A small program that runs which Internet users connect to (RSS) A temporary storage area on the
an Internet service provider. An XML–based format that the programmer direct control hard drive where the operating
whenever a computer boots up. optical character recognition allows frequent updates of of hardware resources; also
called assembly language. system “swaps out” or moves
(OCR) software content on the Web. the data or instructions from
metropolitan area network Software that digitizes and polymorphic virus random access memory (RAM)
(MAN) saves text in digital form. A virus that changes its virus sector that haven’t recently been used.
A wide area network (WAN) signature (the binary pattern recommendation engines This process takes place when
that makes the virus AI systems that help people A section of a hard drive
that links users in a specific discover things they may like platter, wedge-shaped from the more RAM space is needed.
geographic area (such as within identifiable) every time it center of the platter to the edge.
infects a new file. This makes it but are unlikely to discover on \
a city or county). their own.
more difficult for antivirus
programs to detect the virus. secure sockets layer (SSL) switch
N P redundant array of A network security protocol A device for transmitting data
natural language processing packet analyzer (sniffer) positive acknowledgment independent disks (RAID) that provides for the encryption on a network that makes
(NLP) system A computer hardware device or (ACK) A set of strategies for using of data transmitted using the decisions, based on the media
A knowledge-based business software program designed to In data exchange, the more than one hard drive in a Internet. The current versions access control address of the
intelligence system that enables detect and record digital confirmation sent from one computer system. of all major web browsers data, as to where the data is to
users to communicate with information being transmitted computer or system to another support SSL. be sent.
computer systems using a over a network. saying that the computer has
natural spoken or written received a data packet that it referential integrity
language instead of a computer In a relational database, a seek time syntax
packet filtering can read. condition where, for each value The time it takes for the hard An agreed-on set of rules
programming language. drive’s read/write heads to defining how a language must
A process in which firewalls in the foreign key table, there’s
are configured so that they filter power-on self-test (POST) a corresponding value in the move over the surface of the be structured.
negative acknowledgment out packets sent to specific The first job the basic primary key table. disk to the correct track.
(NAK) logical ports. input/output system (BIOS) syntax error
In data exchange, the performs, ensuring that select query A violation of the strict set of
communication sent from one essential peripheral devices are registers rules that define the
computer or system to another packet screening Special memory storage areas In Structured Query Language,
Having a screening router attached and operational. This built into the CPU, which are displays a subset of data from a programming language.
stating that it did not receive a process consists of a test on the table (or tables) based on the
data packet in readable form. examine data packets to ensure the most expensive, fastest
they originated from or are video card and video memory, a memory in your computer. criteria specified. system clock
authorized by valid users on a BIOS identification process This internal clock is actually a
network address translation network. (during which the BIOS semantic web (Web 3.0) special crystal that acts like a
(NAT) version, manufacturer, and data registry metronome, keeping a steady
are displayed on the monitor), A portion of the hard drive An evolving extension of the
A process that firewalls use to containing all the different Web in which information is beat and controlling when the
assign internal Internet protocol packet switching and a memory test to ensure defined in such a way as to CPU moves to the next stage of
addresses on a network. A communications memory chips are working configurations (settings) used
methodology that makes properly. by the Windows operating make it more easily readable by processing.
computer communication system as well as by other computers
network-attached storage efficient by breaking up data applications. system development life cycle
(NAS) into smaller chunks called pretexting service mark (SDLC)
A specialized computing device packets. The act of creating an invented Essentially the same as a A process used to develop
designed to store and manage scenario (the pretext) to release to manufacturers trademark, but it applies to a information systems; it consists
network data. convince someone to divulge (RTM)
paging information. The point in the release cycle, service as opposed to a product. of the following six steps:
The process of swapping data where, after beta testing, a
network interface card (NIC) or instructions that have been manufacturer makes changes to service pack system evaluation
An expansion card that enables placed in the swap file for later Pretty Good Privacy (PGP) the software and releases it to A software update. The process of looking at a
a computer to connect other use back into active random A public-key package for other manufacturers, for computer’s subsystems, what
computers or to a cable modem access memory (RAM). The encryption available for installation on new machines, they do, and how they perform
to facilitate a high-speed contents of the hard drive’s download on the Internet. for example. service set identifier (SSID) to determine whether the
Internet connection. swap file then become less A network name that wireless computer system has the right
routers use to identify hardware components to do
active data or instructions. primary key field rootkit themselves.
network navigation device In a database, a field that has a Programs that allow hackers to what the user ultimately wants
A device on a network such as peripheral device value unique to a record. gain access to your computer it to do.
a router or switch that moves and take almost complete shielded twisted-pair (STP)
data signals around the A device such as a monitor, cable
printer, or keyboard that control of it without your Twisted-pair cable that contains system unit
network. connects to the system unit knowledge. These programs are The metal or plastic case that
designed to subvert normal a layer of foil to reduce holds all the physical parts of
through a data port. interference.
network operating system login procedures to a computer the computer together,
(NOS) program development life and to hide their operations including the computer’s
Software that handles requests persistence of information from normal detection methods. Simple Mail Transfer processor (its brains), its
The tendency for pictures, cycle (PDLC) Protocol (SMTP)
for information, Internet access, videos, and narratives to The process of performing a memory, and the many circuit
and the use of peripherals for continue to exist in cyberspace programming project, which router The protocol responsible for boards that help the computer
network nodes, providing the consists of five stages: A device that routes packets of sending e-mail along the function.
services necessary for the even after you delete them. Internet to its destination; part
describing the problem, making data between two or more of the Internet protocol suite.
computers on the network to a plan, coding, debugging, and
com personal area network (PAN) testing and documentation.
networks. T
A network used for solid-state drive (SSD) T line
nonvolatile storage communication among devices rules-based systems A storage device that uses the A communications line that
Permanent storage, as in read- close to one person, such as program file Software that asks questions same kind of memory that flash carries digital data over twisted-
only memory (ROM). smartphones, laptops, and Files that are used in the and responds based on drives use but that can reach pair wires.
tablets, using wireless running of software programs preprogrammed algorithms. data in only a tenth
technologies such as Bluetooth. and that do not store data. Early attempts at expert TCP/IP
NoSQL database systems were rules based.
A nonrelational database solid-state hybrid drive The main suite of protocols
developed to store unstructured petabyte pseudocode (SSHD) used for transmitting data over
data generated primarily from 1015 bytes of digital A text-based approach to runtime error A drive that is a combination of the Internet; short for
Web 2.0 applications such as information. documenting an algorithm. An error in a program that both a mechanical hard drive Transmission Control Protocol
clickstream data, social media occurs when a programmer and an SSD (TCP) and Internet protocol
data, and location-based accidentally writes code that (IP).
information.
pharming Q divides by zero, a mathematical
Planting malicious code on a query error. sound card
computer that alters the In a database, a way of An expansion card that attaches terminator
browser’s ability to find web A device that absorbs a signal
O addresses and that directs users
retrieving information that
defines a particular subset of S
to (or is integrated into) the
motherboard inside the system so that it’s not reflected back
object-oriented analysis to bogus websites. data; can be used to extract data onto parts of the network that
A type of analysis in which satellite Internet unit and that enables the have already received it.
programmers first identify all from one or more tables. A way to connect to the Internet computer to produce sounds;
using a small satellite dish,
A type of business intelligence In a database, generally defined
test condition system for keeping track of universal serial bus (USB) as part of the data dictionary visual programming wide area network (WAN)
A check to see whether the loop everyday business activities. port and specified in the field languages A network made up of local
in an algorithm is completed. A port that can connect a wide properties for each field; Programming language that area networks (LANs)
transistor variety of peripheral devices to violations result in an error uses graphical blocks to connected over long distances.
Electrical switches built out of the computer, including message and a suggested represent control elements and
third-generation language layers of a special type of keyboards, printers, mice, action. variables.
(3GL) material called a smartphones, external hard wiki
A computer language that uses semiconductor. drives, flash drives, and digital variable A type of website that allows
symbols and commands to help cameras. voice recognition software anyone visiting the site to
programmers tell the computer Each input and output item the Software that allows you to change its content by adding,
what to do, making 3GL Transmission Control program manipulates. control your computing devices removing, or editing the
languages easier for humans to Protocol (TCP) UNIX by speaking into the content.
read and remember; examples One of the original two An operating system originally variable declaration microphone instead of using a
of 3GL languages include protocols developed for the conceived in 1969 by Ken Tells the operating system that keyboard or mouse. Windows
BASIC, FORTRAN, COBOL, Internet. Thompson and Dennis Ritchie the program needs to allocate Microsoft’s operating system
C/C++, and JAVA. of AT&T’s Bell Labs. In 1974, storage space in RAM. VoIP (voice over Internet that incorporates a user-
transmission media the UNIX code was rewritten in protocol) friendly, visual interface.
thrashing The radio waves or the physical the standard programming VB.NET A technology that facilitates
A condition of excessive paging system (cable) that transports language C. Today there are An object-oriented making telephone calls across
in which the operating system data on a network. various commercial versions of programming language based in the Internet instead of using wireless access point (WAP)
becomes sluggish. UNIX. the Microsoft .NET framework. conventional telephone lines. Gives wireless devices a
sending and receiving
transport layer security connection point to the
three-way handshake (TLS) unshielded twisted-pair VBScript volatile storage network.
In Transmission Control An updated extension of the (UTP) cable A subset of Visual Basic, used Temporary storage, such as in
Protocol, the process used to secure sockets layer. The most popular transmission to introduce dynamic decision random access memory. When
establish a connection between media option for Ethernet making into web pages. the power is turned off, the data wireless Internet service
two computers before networks. UTP cable is in volatile storage is cleared provider (wireless ISP):
exchanging data. The steps in a tunneling composed of four pairs of wires out. An ISP that provides service to
three-way handshake are as The main technology for that are twisted around each vertical market software wireless devices such as
follows: One computer achieving a virtual private other to reduce electrical Software that’s developed for smartphones.
establishes a connection to the network; the placement of data
packets inside other data
interference. and customized to a specific
industry’s needs (such as a W
Internet service provider (ISP) packets. wood inventory system for a warm boot wireless network interface
and announces it has e-mail to unsupervised learning sawmill) as opposed to software The process of restarting a card (wireless NIC)
send, the ISP server responds When an AI system can look at computing device while it’s A special network adapter card
that it’s ready to receive, and Turing test data on its own and build rules that’s useful across a range of powered on. that allows a computing device
the computer acknowledges the A simple test to distinguish for deciding what it is seeing. industries (such as word to connect to a network using
ready state of the server and between a human and a processing software). wireless media.
computer system. Named after Web 2.0
begins to transmit the e-mail. unstructured data Tools and Web-based services
Alan Turing, a computing video card (video adapter) that emphasize online wireless range extender
pioneer. Audio clips, video clips, An expansion card that’s
throughput pictures, and extremely large collaboration and sharing A device that amplifies your
documents. Also called binary installed inside a system unit to among users. wireless signal to get it out to
The actual speed of data translate binary data (the 1s and
transfer that’s achieved. It’s twisted-pair cable large object (BLOB). 0s the computer uses) into the parts of your home that are
usually less than the data Cable made of copper wires images viewed on the monitor. web authoring software experiencing poor connectivity.
transfer rate. that are twisted around each Programs you can use to design
other and are surrounded by a urban legends
When hoaxes become so well interactive web pages without wizard
plastic jacket (such as known that they’re incorporated video log (vlog or video blog) knowing any HyperText A step-by-step guide that walks
time bomb traditional home phone wire). A personal online journal that
A virus that’s triggered by the into society as true events even Markup Language (HTML) a user through the necessary
passage of time or on a certain though they’re false. uses video as the primary code. steps to complete a complicated
content in addition to text,
date. U images, and audio. task.
ultrabook User Datagram Protocol
time-variant data A full-featured but lightweight (UDP) white-hat hacker (ethical and special languages (such as
Data that doesn’t pertain to one laptop computer that features a An Internet protocol that video memory the HyperText Markup
low-power processor and a Random access memory that’s hacker)
time period. creates data packets across the included as part of a video card. A hacker who breaks into Language, or HTML) that
solid-state drive; it tries to Internet. systems just for the challenge enable different computers to
reduce its size and weight to of it (and who doesn’t wish to talk to each other and display
token extend battery life without virtual desktops information in compatible
A special data packet used to sacrificing performance. user interface steal or wreak havoc on the
pass data on a network. A Windows 10 feature that systems). Such hackers tout formats and (2) its use of
Part of the operating system allows you to organize groups special links (called hyperlinks)
that enables individuals to of windows into different themselves as experts who are
unethical behavior interact with the computer. performing a needed service for that enable users to jump from
token method Not conforming to a set of displays. society by helping companies one place to another on the
The access method used by ring approved standards of behavior realize the vulnerabilities that Web.
networks to avoid data —cheating on an exam, for utility program virtual keyboard exist in their systems.
collisions. example A small program that performs A keyboard that displays on worm
many of the general screen when text input is A program that attempts to
housekeeping tasks for the required. whole-house surge protector travel between systems through
top-down design unicode computer, such as system A surge protector that’s
A systematic approach in which An encoding scheme that uses maintenance and file installed on (or near) the network connections to spread
a problem is broken up into a 16 bits instead of 8 bits. compression. virtual memory breaker panel of a home and infections. Worms can run
series of high-level tasks. Unicode can represent nearly The space on the hard drive that protects all electronic independently of host file
1,115,000 code points and where the operating system devices in the home from execution and are active in
track currently assigns more than V stores data if there isn’t enough power surges. spreading themselves.
A concentric circle that serves 128,000 unique character validation random access memory to hold
as a storage area on a hard drive symbols. The process of ensuring that all of the programs you’re Wi-Fi Z
platter. data entered into a field of a currently trying to run. The 802.11 standard for zombie
Uniform Resource Locator database meets specified wireless data transmissions A computer that is controlled
transaction-processing system (URL) guidelines. Visual Basic (VB) established by the Institute of by a hacker who uses it to
(TPS) A website’s unique address; an A programming language used Electrical and Electronics launch attacks on other
example is microsoft.com. validation rule to build a wide range of Engineers (IEEE). computer sys
Windows applications.

4G
Stands for fourth generation.
The current mobile
communication standard with
faster data transfer rates than
3G

You might also like