SlideShare a Scribd company logo
1 of 138
Steven Otárola Alvarado 
Manuel Vargas Garcia 
Marco Vega Arroyo
X
A
• Is a physical device that allows one 
hardware or electronic interface to be 
adapted (accommodated without loss of 
function) to another hardware or 
electronic interface. In a computer, an 
adapter is often built into a card that can 
be inserted into a slot on the computer's 
motherboard. 
Sub-menu
• Is the unit of router policy, either a 
single network or a group of networks 
that is controlled by a common network 
administrator (or group of 
administrators) on behalf of a single 
administrative entity (such as a 
university, a business enterprise, or a 
business division). 
Sub-menu
• Is a type of program designed to 
prevent and detect unwanted 
spyware program installations and to 
remove those programs if installed. 
Sub-menu Video
Sub-menu
• ASP stands for Application Service Providers, companies that provide 
software services to its clients through a network. 
Sub-menu
• ASCII stands for American Standard 
Code for Information Interchange. 
Computers can only understand 
numbers, so an ASCII code is the 
numerical representation of a 
character such as 'a' or '@' or an 
action of some sort. 
Sub-menu
• Antivirus software was originally 
developed to detect and 
remove computer viruses, hence the 
name. However, with the proliferation 
of other kinds of malware, antivirus 
software started to provide protection 
from other computer threats. 
Sub-menu
• Is a software framework created by Microsoft that adapts its earlier 
Component Object Model (COM) and Object Linking and Embedding 
(OLE) technologies for content downloaded from a network, particularly in 
the context of the World Wide Web. 
Sub-menu
B
• In general, broadband refers to 
telecommunication in which a wide 
band of frequencies is available to 
transmit information. 
Sub-menu
• In computer science, the Boolean data type is a data type, having two values 
(usually denoted true and false), intended to represent the truth 
values of logic and Boolean algebra. 
Sub-menu
• A browser or web browser, or 
browser is a software that allows 
Internet access, interpreting 
information from files and websites 
so that they can be read. 
Sub-menu
• In mathematics and digital 
electronics, a binary number is a 
number expressed in the binary 
numeral system, or base-2 numeral 
system, which represents numeric 
values using two different symbols: 
typically 0 (zero) and 1 (one). 
Sub-menu
• Is the informal name given by users to the 
Windows general protection fault (GPF) 
error. Named in honor of the error's 
dreaded display image of white text on a 
blue background, the BSOD is generated 
by the operating system when it has 
suddenly terminated with an error. 
Sub-menu
C
• It is a CD that uses laser light to store 
and read large amounts of information 
in digital format. 
Sub-menu
• Is random access memory (RAM) 
that a computer microprocessor can 
access more quickly than it can 
access regular RAM. 
Sub-menu
• Is a state of being in accordance with established guidelines, specifications, 
or legislation or the process of becoming so. Software, for example, may be 
developed in compliance with specifications created by some standards body, 
such as the Institute of Electrical and Electronics Engineers (IEEE). 
Sub-menu
• To counterfeit means to imitate 
something. Counterfeit products are 
fake replicas of the real product. 
Counterfeit products are often 
produced with the intent to take 
advantage of the superior value of 
the imitated product. 
Sub-menu
D
• Is an incident in which sensitive, protected or confidential data has 
potentially been viewed, stolen or used by an individual unauthorized to do 
so. 
Sub-menu
• Is a control panel placed in front of the driver of an automobile, housing 
instrumentation and controls for operation of the vehicle. 
Sub-menu
• Is a mathematical technique used to validate the authenticity and integrity of 
a message, software or digital document. 
Sub-menu
• Data can travel through a serial or parallel interface, simply consists of a 
suitable physical connection, such as a cable. 
Sub-menu
• The Dynamic Host Configuration 
Protocol (DHCP) is a standardized 
network protocol used on Internet 
Protocol (IP) networks for 
dynamically distributing network 
configuration parameters, such as IP 
addresses for interfaces and services. 
Sub-menu
• A digit is a type of symbol (a numeral symbol, such as "2" or "5") used in 
combinations (such as "25") to represent numbers (such as the number 25) 
in positional numeral systems. 
Sub-menu
• The Domain Name System (DNS) is 
a hierarchical distributed naming 
system for computers, services, or 
any resource connected to the 
Internet or a private network. 
Sub-menu
• The term downloading is distinguished from 
the related concept of streaming, which 
indicates the receiving of data that is used 
nearly immediately as it is received, while the 
transmission is still in progress and which may 
not be stored long-term, whereas in a process 
described using the term downloading, this 
would imply that the data is only usable when 
it has been received in its entirety. 
Sub-menu
E
• Electronic mail or email is a quick way of sending messages to people using 
the internet. 
Sub-menu
• Is the conversion of electronic data into another form, called ciphertext, 
which cannot be easily understood by anyone except authorized parties. 
Sub-menu Video
Sub-menu
• Random variations in potential, current, or voltage in electric circuits and 
communications lines. It can damage your devices. 
Sub-menu
• In computing, a character encoding is used to represent a repertoire of 
characters by some kind of an encoding system. Depending on the 
abstraction level and context, corresponding code points and the resulting 
code space may be regarded as bit patterns, octets, natural numbers, electrical 
pulses, etc. 
Sub-menu
F
• Is a type of constantly-powered nonvolatile memory that can be erased and 
reprogrammed in units of memory called blocks. 
Sub-menu
• Vehicle mount mobile computers put robust computing power in a rugged 
form factor designed to handle the vibration of forklifts, fleet cars, delivery 
trucks and other vehicles. 
Sub-menu
• In computing, a firewall is a network security system that controls the 
incoming and outgoing network traffic based on applied rule set. A firewall 
establishes a barrier between a trusted, secure internal network and another 
network (e.g., the Internet). 
Sub-menu
G
• A geographic information system (GIS) is a computer system designed to 
capture, store, manipulate, analyze, manage, and present all types of spatial 
or geographical data. 
Sub-menu
• The Global Positioning System (GPS) to determine the position of an 
object, person or vehicle to centimeter precision worldwide. 
Sub-menu
H
• The term refers to all hardware tangible parts of a computer system; its 
components are: electrical, electronic, electromechanical and mechanical. 
Sub-menu
• A computer system that is accessed by a user working at a remote location. 
Typically, the term is used when there are two computer systems connected 
by modems and telephone lines. The system that contains the data is called 
the host, while the computer at which the user sits is called the remote 
terminal. 
Sub-menu
I
• Internet is a network of networks that allows the decentralized networking 
of computers through a set of protocols called TCP / IP. 
Sub-menu
• An icon is a small graphic representation of a program or file. 
Sub-menu
• The Internet service provider is the company that provides Internet access to 
their customers. 
Sub-menu
• The Institute of Electrical and Electronics Engineers is an organization that 
develops global standards in a broad range of industries including: power 
and energy, biomedicine, information technology, telecommunications, 
transportation, nanotechnology, insurance information, and many more. 
Sub-menu
• Is a form of stealing someone's identity in which someone pretends to be 
someone else by assuming that person's identity, usually as a method to gain 
access to resources or obtain credit and other benefits in that person's name. 
Sub-menu Video
Sub-menu
• Internet Protocol version 4 (IPv4) is 
the fourth version in the 
development of the Internet 
Protocol (IP) Internet, and routes 
most traffic on the Internet 
Sub-menu
• Internet Protocol version 6 (IPv6) is 
the latest version of the Internet 
Protocol (IP), the communications 
protocol that provides an 
identification and location system for 
computers on networks and routes 
traffic across the Internet. 
Sub-menu
J
• A jumper is a short length of 
conductor used to close a break in or 
open, or bypass part of, an electrical 
circuit. Jumpers are typically used to 
set up or configure printed circuit 
boards, such as the motherboards of 
computers. 
Sub-menu
K
• A keyboard is for putting information such as letters, words and numbers 
into your computer. 
Sub-menu
• Keywords are used on the Web in two different ways: 1) as search terms for 
search engines, and 2) words that identify the content of the website. 
Sub-menu
L
• When you are browsing the Web and 
you see a highlighted and underlined 
word or phrase on a page, there is a 
good chance you are looking at a 
link. By clicking on a link, you can 
"jump" to a new Web page or a 
completely different Web site. 
Sub-menu
• A LAN is a computer network 
limited to a small area such as an 
office building, university, or even a 
residential home. 
Sub-menu
M
• M2M (Machine to Machine) is a 
generic term that refers to the 
exchange of information or data 
format communication between two 
remote machines. 
Sub-menu
• It is a computerized device used in public transport vehicles and are used to 
display the mapping and information relevant to the tasks and actions taken 
by the vehicle, such as CAD drawings, diagrams and safety information. 
Sub-menu
• Mobile broadband is a wireless technology that allows you to connect a 
mobile device such as your smartphone or tablet to a broadband internet 
connection wirelessly through a mobile phone network. 
Sub-menu
• Is any software used to disrupt computer operation, gather sensitive 
information, or gain access to private computer systems. 
Sub-menu
• A media access control address (MAC address) is a unique identifier assigned 
to network interfaces for communications on the physical network segment. 
MAC addresses are used as a network address for most IEEE 802 network 
technologies, including Ethernet and Wi-Fi. Logically, MAC addresses are 
used in the media access control protocol sub layer of the OSI reference 
model. 
Sub-menu
N
• The nodes are devices or data points in a network. Devices such as a 
personal computer, cell phone, or printer are nodes. 
Sub-menu
• A network is a group of two or more computer systems linked together. 
Sub-menu
O
• Online is the condition of being 
connected to a network of 
computers or other devices. 
Sub-menu
• Data generated by a computer is 
referred to as output. 
Sub-menu
P
• The platforms refer to the technology used for the creation and development 
of courses or course modules in the Web used more broadly on the Web. 
Sub-menu
• A password is an unspaced sequence 
of characters used to determine that 
a computer user requesting access to 
a computer system is really that 
particular user. 
Sub-menu
• An electronic device that is easily transported. It may refer to a pocket-sized 
handheld device or to a laptop that weighs several pounds. 
Sub-menu
• In its simplest form, a peer-to-peer 
(P2P) network is created when two 
or more PCs are connected and 
share resources without going 
through a separate server computer. 
Sub-menu Video
Sub-menu
• Is a collection of software tools that automates the process of installing, 
upgrading, configuring, and removing software packages for a computer's 
operating system in a consistent manner. 
Sub-menu
• Is the attempt to acquire sensitive information such as 
usernames, passwords, and credit card details (and sometimes, 
indirectly, money) by masquerading as a trustworthy entity in an electronic 
communication. 
Sub-menu Video
Sub-menu
Q
• A quad-core CPU has four processing cores in a single chip. It is similar to a 
dual-core CPU, but has four separate processors (rather than two), which can 
process instructions at the same time. 
Sub-menu
• This is a multimedia technology developed by our friends at Apple 
Computer. It is a popular format for creating and storing sound, graphics, 
and movie (.mov) files. 
Sub-menu
• This term is used to describe a 
standard (Latin alphabet-based) 
keyboard. Why? Because the first six 
keys in the upper-left part of the 
keyboard spell out Q-W-E-R-T-Y. 
Sub-menu
R
• Is the place in a computer where the operating system, application 
programs, and data in current use are kept so that they can be quickly 
reached by the computer's processor. 
Sub-menu
• Is "built-in" computer memory 
containing data that normally can 
only be read, not written to. ROM 
contains the programming that 
allows your computer to be "booted 
up" or regenerated each time you 
turn it on. 
Sub-menu
• Is the process of backing up data created by remote and branch offices 
(ROBOs) and storing it securely. 
Sub-menu
• A remote system is a workstation or 
server that is connected to the local 
system with any type of physical 
network and configured for TCP/IP 
communication. 
Sub-menu
• Also called homecare telehealth) is a 
type of ambulatory healthcare that 
allows a patient to use a mobile 
medical device to perform a routine 
test and send the test data to a 
healthcare professional in real-time. 
Sub-menu
• Radio frequency identification 
(RFID) is a form of wireless 
communication that uses radio waves 
to identify and track objects. 
Sub-menu
• A router is a networking device, 
commonly specialized hardware that 
forwards data packets between 
computer networks. This creates an 
overlay internetwork, as a router is 
connected to two or more data lines 
from different networks. 
Sub-menu
S
• Is a communications center that 
provides a single point of contact 
(SPOC) between a company and its 
customers, employees and business 
partners. The purpose of a service 
desk is to ensure that users receive 
appropriate help in a timely manner. 
Sub-menu
• Is a computer program that blanks the screen or fills it with moving images 
or patterns when the computer is not in use. 
Sub-menu
• Sequential access memory (SAM) is a 
class of data storage devices that 
read their data in sequence. 
Sub-menu
• In computing, a service pack or SP (in short SP) comprises a collection of 
updates, fixes, or enhancements to a software program delivered in the form 
of a single installable package. 
Sub-menu
• It is defined unsolicited SPAM 
messages, normally containing 
advertising sent in masse. 
Sub-menu
• Software is a set of programs, instructions and rules that allow computer to 
run various tasks on a computer. 
Sub-menu
• El spyware o programa espía es un 
software que recopila información de 
un ordenador y después transmite 
esta información a una entidad 
externa sin el conocimiento o el 
consentimiento del propietario del 
ordenador. 
Sub-menu Video
Sub-menu
• A server is a running instance of an 
application (software) capable of 
accepting requests from the client 
and giving responses accordingly 
Remote System. 
Sub-menu
• These devices are very useful for the modern man, are the main protagonists 
of communications in the world; Thanks to them, we receive TV signals, 
radio and telephone, internet and have valuable information on climate, our 
environment and space. 
Sub-menu
• Is a spyware and adware removal 
computer program compatible with 
Microsoft Windows 95 and later. It 
scans the computer hard disk and/or 
RAM for malicious software. 
Sub-menu
T
• Generally a tracking system is used 
for the observing of persons or 
objects on the move and supplying a 
timely ordered sequence of 
respective location data to a model 
e.g. capable to serve for depicting the 
motion on a display capability. 
Sub-menu
• A telematic control unit (TCU) in the 
automobile industry refers to the 
embedded system on board a vehicle 
that controls tracking of the vehicle. 
Sub-menu
• Telematics are an interdisciplinary field encompassing telecommunications, 
vehicular technologies, road transportation, road safety, electrical engineering 
(sensors, instrumentation, wireless communications, etc.). 
Sub-menu
• A toolbar is a graphical control 
element on which on-screen buttons, 
icons, menus, or other input or 
output elements are placed. 
Sub-menu
U
• Username is the name given to a user on a computer or computer network. 
Sub-menu
• Updates are additions to software 
that can prevent or fix problems, 
enhance computer security or 
improve the performance of it. 
Sub-menu
• A uniform resource locator (abbreviated URL; also known as a web address, 
particularly when used with HTTP) is a specific character string that 
constitutes a reference to a resource. Most web browsers display the URL of 
a web page above the page in an address bar. A typical URL might look 
like: http://www.example.org/wiki/Main_Page. 
Sub-menu
V
• Is a feature of an operating system 
(OS) that allows a computer to 
compensate for shortages of physical 
memory by temporarily 
transferring pages of data from 
random access memory (RAM) 
to disk storage. 
Sub-menu
• Computer systems that can recognize 
spoken words. Note that voice 
recognition implies only that 
the computer can take dictation, not 
that it understands what is being said. 
Sub-menu
• Not real. The term virtual is popular 
among computer scientists and is 
used in a wide variety of situations. 
In general, it distinguishes something 
that is merely conceptual from 
something that has physical reality. 
Sub-menu
• A virtual private network (VPN) extends a 
private network across a public network, such 
as the Internet. It enables a computer or Wi- 
Fi-enabled device to send and receive data 
across shared or public networks as if it were 
directly connected to the private network, 
while benefiting from the functionality, security 
and management policies of the private 
network. 
Sub-menu
• Is a decreased ability to see to a 
degree that additional it causes 
problems that are not fixable by 
usual means, such as glasses or 
medication. 
Sub-menu
W
• Computer network is a device that 
interconnects wired communication 
device to form a wireless network. 
Sub-menu
• Wireless communication is the transfer of information between two or more 
points that are not connected by an electrical conductor. 
Sub-menu
• An Internet forum is an online discussion site where people can hold 
conversations in the form of posted messages. 
Sub-menu
• Windows Update, a service offered 
by Microsoft, provides updates for 
Windows components. 
Sub-menu
• In computing, a web widget is a 
software widget for the web. It's a 
small application with limited 
functionality that can be installed and 
executed within a web page by an 
end user. A widget has the role of a 
transient or auxiliary application. 
Sub-menu
X
• x86 is the generic name for Intel processors released after the original 8086 
processor. If a computer's technical specifications state that is based on the 
x86 architecture, that means it uses an Intel processor (not AMD or 
PowerPC). 
Sub-menu
Y
• YouTube is a video sharing service that allows users to watch videos posted 
by other users and upload videos of their own. 
Sub-menu
• Yahoo! is one of the Internet's 
leading search engines. It is also the 
largest Web portal, providing links to 
thousands of other websites. These 
links include sites from the Yahoo! 
Directory as well as news stories that 
are updated several times a day. 
Sub-menu
Z
• A zone file is stored on a name server 
and provides information about one 
or more domain names. Each zone 
file contains a list of DNS records 
with mappings between domain 
names and IP addresses. 
Sub-menu
• Windows users will see this term a lot when looking for files on the Internet. 
A zip file (.zip) is a "zipped" or compressed file. For example, when you 
download a file, if the filename looks like this: "filename.zip," you are 
downloading a zipped file. 
Sub-menu

More Related Content

What's hot

Diccionario kelly ingles
Diccionario kelly inglesDiccionario kelly ingles
Diccionario kelly inglesduranmendez
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers OverviewMISY
 
Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networksPratik Gupta
 
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud ComputingRaymond Gao
 
Diccionario andris--------> ingles
Diccionario andris--------> inglesDiccionario andris--------> ingles
Diccionario andris--------> inglesandrisolano
 
Introduction of computer networks
Introduction of computer networksIntroduction of computer networks
Introduction of computer networksAlidHasan4
 
Introduction to Computer & ICT
Introduction to Computer & ICTIntroduction to Computer & ICT
Introduction to Computer & ICTPravinGhosekar
 
Fundamental of Information Technology
Fundamental of Information TechnologyFundamental of Information Technology
Fundamental of Information TechnologySundar B N
 
C programming for problem solving
C programming for problem solving  C programming for problem solving
C programming for problem solving Anuradha Moti T
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the InternetAdjeiKwadjo
 
Concept of information system & networking..
Concept of information system & networking..Concept of information system & networking..
Concept of information system & networking..Deekshit Geddam
 
Chapter 02 The Internet
Chapter 02 The InternetChapter 02 The Internet
Chapter 02 The Internetxtin101
 
Basic terms & definitions
Basic terms & definitionsBasic terms & definitions
Basic terms & definitionsRozell Sneede
 
Chapter 4 computer network and the internet2
Chapter 4 computer network and the internet2Chapter 4 computer network and the internet2
Chapter 4 computer network and the internet2Melaku Bayih Demessie
 

What's hot (20)

Diccionario kelly ingles
Diccionario kelly inglesDiccionario kelly ingles
Diccionario kelly ingles
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers Overview
 
Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networks
 
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing
 
Diccionario andris--------> ingles
Diccionario andris--------> inglesDiccionario andris--------> ingles
Diccionario andris--------> ingles
 
Introduction of computer networks
Introduction of computer networksIntroduction of computer networks
Introduction of computer networks
 
Introduction to Computer & ICT
Introduction to Computer & ICTIntroduction to Computer & ICT
Introduction to Computer & ICT
 
Fundamental of Information Technology
Fundamental of Information TechnologyFundamental of Information Technology
Fundamental of Information Technology
 
Network models
Network  modelsNetwork  models
Network models
 
C programming for problem solving
C programming for problem solving  C programming for problem solving
C programming for problem solving
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the Internet
 
Concept of information system & networking..
Concept of information system & networking..Concept of information system & networking..
Concept of information system & networking..
 
Chapter 02 The Internet
Chapter 02 The InternetChapter 02 The Internet
Chapter 02 The Internet
 
Networks
NetworksNetworks
Networks
 
Basic terms & definitions
Basic terms & definitionsBasic terms & definitions
Basic terms & definitions
 
Terms & definitions
Terms & definitionsTerms & definitions
Terms & definitions
 
Ch02
Ch02Ch02
Ch02
 
Chapter 4 computer network and the internet2
Chapter 4 computer network and the internet2Chapter 4 computer network and the internet2
Chapter 4 computer network and the internet2
 
The Computer
The ComputerThe Computer
The Computer
 

Viewers also liked

Hum 176 week 9 final
Hum 176 week 9 finalHum 176 week 9 final
Hum 176 week 9 finalnupasura1981
 
РНИИ – Первооснова отчественной ракетно-космической отрасли. 1933-1946 гг.
РНИИ – Первооснова отчественной ракетно-космической отрасли. 1933-1946 гг.РНИИ – Первооснова отчественной ракетно-космической отрасли. 1933-1946 гг.
РНИИ – Первооснова отчественной ракетно-космической отрасли. 1933-1946 гг.Polytechnic Museum
 
Этапы развития ракетно-космической отрасли в Самаре
Этапы развития ракетно-космической отрасли  в СамареЭтапы развития ракетно-космической отрасли  в Самаре
Этапы развития ракетно-космической отрасли в СамареPolytechnic Museum
 
Museum and Educational Center of the Polytechnic Museum and Lomonosov Moscow ...
Museum and Educational Center of the Polytechnic Museum and Lomonosov Moscow ...Museum and Educational Center of the Polytechnic Museum and Lomonosov Moscow ...
Museum and Educational Center of the Polytechnic Museum and Lomonosov Moscow ...Polytechnic Museum
 
Polytech.Science.Art 2014 program review
Polytech.Science.Art 2014 program reviewPolytech.Science.Art 2014 program review
Polytech.Science.Art 2014 program reviewPolytechnic Museum
 
Ahmed Karam - Portfolio & Presentation.
Ahmed Karam - Portfolio & Presentation.Ahmed Karam - Portfolio & Presentation.
Ahmed Karam - Portfolio & Presentation.Ahmed Karam
 

Viewers also liked (9)

Hum 176 week 9 final
Hum 176 week 9 finalHum 176 week 9 final
Hum 176 week 9 final
 
Resume - Wendy 2014
Resume - Wendy 2014Resume - Wendy 2014
Resume - Wendy 2014
 
РНИИ – Первооснова отчественной ракетно-космической отрасли. 1933-1946 гг.
РНИИ – Первооснова отчественной ракетно-космической отрасли. 1933-1946 гг.РНИИ – Первооснова отчественной ракетно-космической отрасли. 1933-1946 гг.
РНИИ – Первооснова отчественной ракетно-космической отрасли. 1933-1946 гг.
 
Этапы развития ракетно-космической отрасли в Самаре
Этапы развития ракетно-космической отрасли  в СамареЭтапы развития ракетно-космической отрасли  в Самаре
Этапы развития ракетно-космической отрасли в Самаре
 
Resume - Wendy 2014
Resume - Wendy 2014Resume - Wendy 2014
Resume - Wendy 2014
 
Polytech Festival 2014
Polytech Festival 2014Polytech Festival 2014
Polytech Festival 2014
 
Museum and Educational Center of the Polytechnic Museum and Lomonosov Moscow ...
Museum and Educational Center of the Polytechnic Museum and Lomonosov Moscow ...Museum and Educational Center of the Polytechnic Museum and Lomonosov Moscow ...
Museum and Educational Center of the Polytechnic Museum and Lomonosov Moscow ...
 
Polytech.Science.Art 2014 program review
Polytech.Science.Art 2014 program reviewPolytech.Science.Art 2014 program review
Polytech.Science.Art 2014 program review
 
Ahmed Karam - Portfolio & Presentation.
Ahmed Karam - Portfolio & Presentation.Ahmed Karam - Portfolio & Presentation.
Ahmed Karam - Portfolio & Presentation.
 

Similar to Interactive glossary

Introduction to Computer Network
Introduction to Computer NetworkIntroduction to Computer Network
Introduction to Computer NetworkAdetula Bunmi
 
Notes for banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationxNotes for  banking railway opsc psc preparationx
Notes for banking railway opsc psc preparationxRAJSEKHAR PEDINA
 
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfConnecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfEYOHAICTMEDIA
 
Trends in Embedded system Design
Trends in Embedded system DesignTrends in Embedded system Design
Trends in Embedded system DesignRaman Deep
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptxAkshayIngole17
 
Computers: Questions & Answers Theory
Computers: Questions & Answers TheoryComputers: Questions & Answers Theory
Computers: Questions & Answers TheoryMakaha Rutendo
 
Lecture 12-1234865709062834-2
Lecture 12-1234865709062834-2Lecture 12-1234865709062834-2
Lecture 12-1234865709062834-2Sami Khan
 
INFORMATION TECHNOLOGY
INFORMATION TECHNOLOGYINFORMATION TECHNOLOGY
INFORMATION TECHNOLOGYAmy Jackie
 
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docxWeek 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docxcockekeshia
 
Chapter 4-CIM Industrial Communication2.pptx
Chapter 4-CIM Industrial Communication2.pptxChapter 4-CIM Industrial Communication2.pptx
Chapter 4-CIM Industrial Communication2.pptxMohdSyaifuadJasemi
 
Overview of computer
Overview of computerOverview of computer
Overview of computerSunny Pavan
 
Information technology infrastructures by- neo arya
Information technology infrastructures by- neo aryaInformation technology infrastructures by- neo arya
Information technology infrastructures by- neo aryaneoarya2012
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15Eric
 

Similar to Interactive glossary (20)

Introduction to Computer Network
Introduction to Computer NetworkIntroduction to Computer Network
Introduction to Computer Network
 
Notes for banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationxNotes for  banking railway opsc psc preparationx
Notes for banking railway opsc psc preparationx
 
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfConnecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
 
Trends in Embedded system Design
Trends in Embedded system DesignTrends in Embedded system Design
Trends in Embedded system Design
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
 
The Computer
The ComputerThe Computer
The Computer
 
Computers: Questions & Answers Theory
Computers: Questions & Answers TheoryComputers: Questions & Answers Theory
Computers: Questions & Answers Theory
 
Lecture 12-1234865709062834-2
Lecture 12-1234865709062834-2Lecture 12-1234865709062834-2
Lecture 12-1234865709062834-2
 
INFORMATION TECHNOLOGY
INFORMATION TECHNOLOGYINFORMATION TECHNOLOGY
INFORMATION TECHNOLOGY
 
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docxWeek 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
 
Info scince pp
Info scince ppInfo scince pp
Info scince pp
 
Chapter 4-CIM Industrial Communication2.pptx
Chapter 4-CIM Industrial Communication2.pptxChapter 4-CIM Industrial Communication2.pptx
Chapter 4-CIM Industrial Communication2.pptx
 
Overview of computer
Overview of computerOverview of computer
Overview of computer
 
Information technology infrastructures by- neo arya
Information technology infrastructures by- neo aryaInformation technology infrastructures by- neo arya
Information technology infrastructures by- neo arya
 
Lecture 1 2
Lecture 1 2Lecture 1 2
Lecture 1 2
 
Lec1 ict
Lec1 ictLec1 ict
Lec1 ict
 
FUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORKFUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORK
 
Basics of Mobile COmmunication.pptx
Basics of Mobile COmmunication.pptxBasics of Mobile COmmunication.pptx
Basics of Mobile COmmunication.pptx
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15
 
Computer networks
Computer networksComputer networks
Computer networks
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Celine George
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfNirmal Dwivedi
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxCeline George
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 

Recently uploaded (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 

Interactive glossary

  • 1. Steven Otárola Alvarado Manuel Vargas Garcia Marco Vega Arroyo
  • 2. X
  • 3. A
  • 4. • Is a physical device that allows one hardware or electronic interface to be adapted (accommodated without loss of function) to another hardware or electronic interface. In a computer, an adapter is often built into a card that can be inserted into a slot on the computer's motherboard. Sub-menu
  • 5. • Is the unit of router policy, either a single network or a group of networks that is controlled by a common network administrator (or group of administrators) on behalf of a single administrative entity (such as a university, a business enterprise, or a business division). Sub-menu
  • 6. • Is a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed. Sub-menu Video
  • 8. • ASP stands for Application Service Providers, companies that provide software services to its clients through a network. Sub-menu
  • 9. • ASCII stands for American Standard Code for Information Interchange. Computers can only understand numbers, so an ASCII code is the numerical representation of a character such as 'a' or '@' or an action of some sort. Sub-menu
  • 10. • Antivirus software was originally developed to detect and remove computer viruses, hence the name. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. Sub-menu
  • 11. • Is a software framework created by Microsoft that adapts its earlier Component Object Model (COM) and Object Linking and Embedding (OLE) technologies for content downloaded from a network, particularly in the context of the World Wide Web. Sub-menu
  • 12. B
  • 13. • In general, broadband refers to telecommunication in which a wide band of frequencies is available to transmit information. Sub-menu
  • 14. • In computer science, the Boolean data type is a data type, having two values (usually denoted true and false), intended to represent the truth values of logic and Boolean algebra. Sub-menu
  • 15. • A browser or web browser, or browser is a software that allows Internet access, interpreting information from files and websites so that they can be read. Sub-menu
  • 16. • In mathematics and digital electronics, a binary number is a number expressed in the binary numeral system, or base-2 numeral system, which represents numeric values using two different symbols: typically 0 (zero) and 1 (one). Sub-menu
  • 17. • Is the informal name given by users to the Windows general protection fault (GPF) error. Named in honor of the error's dreaded display image of white text on a blue background, the BSOD is generated by the operating system when it has suddenly terminated with an error. Sub-menu
  • 18. C
  • 19. • It is a CD that uses laser light to store and read large amounts of information in digital format. Sub-menu
  • 20. • Is random access memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM. Sub-menu
  • 21. • Is a state of being in accordance with established guidelines, specifications, or legislation or the process of becoming so. Software, for example, may be developed in compliance with specifications created by some standards body, such as the Institute of Electrical and Electronics Engineers (IEEE). Sub-menu
  • 22. • To counterfeit means to imitate something. Counterfeit products are fake replicas of the real product. Counterfeit products are often produced with the intent to take advantage of the superior value of the imitated product. Sub-menu
  • 23. D
  • 24. • Is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. Sub-menu
  • 25. • Is a control panel placed in front of the driver of an automobile, housing instrumentation and controls for operation of the vehicle. Sub-menu
  • 26. • Is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document. Sub-menu
  • 27. • Data can travel through a serial or parallel interface, simply consists of a suitable physical connection, such as a cable. Sub-menu
  • 28. • The Dynamic Host Configuration Protocol (DHCP) is a standardized network protocol used on Internet Protocol (IP) networks for dynamically distributing network configuration parameters, such as IP addresses for interfaces and services. Sub-menu
  • 29. • A digit is a type of symbol (a numeral symbol, such as "2" or "5") used in combinations (such as "25") to represent numbers (such as the number 25) in positional numeral systems. Sub-menu
  • 30. • The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. Sub-menu
  • 31. • The term downloading is distinguished from the related concept of streaming, which indicates the receiving of data that is used nearly immediately as it is received, while the transmission is still in progress and which may not be stored long-term, whereas in a process described using the term downloading, this would imply that the data is only usable when it has been received in its entirety. Sub-menu
  • 32. E
  • 33. • Electronic mail or email is a quick way of sending messages to people using the internet. Sub-menu
  • 34. • Is the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties. Sub-menu Video
  • 36. • Random variations in potential, current, or voltage in electric circuits and communications lines. It can damage your devices. Sub-menu
  • 37. • In computing, a character encoding is used to represent a repertoire of characters by some kind of an encoding system. Depending on the abstraction level and context, corresponding code points and the resulting code space may be regarded as bit patterns, octets, natural numbers, electrical pulses, etc. Sub-menu
  • 38. F
  • 39. • Is a type of constantly-powered nonvolatile memory that can be erased and reprogrammed in units of memory called blocks. Sub-menu
  • 40. • Vehicle mount mobile computers put robust computing power in a rugged form factor designed to handle the vibration of forklifts, fleet cars, delivery trucks and other vehicles. Sub-menu
  • 41. • In computing, a firewall is a network security system that controls the incoming and outgoing network traffic based on applied rule set. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet). Sub-menu
  • 42. G
  • 43. • A geographic information system (GIS) is a computer system designed to capture, store, manipulate, analyze, manage, and present all types of spatial or geographical data. Sub-menu
  • 44. • The Global Positioning System (GPS) to determine the position of an object, person or vehicle to centimeter precision worldwide. Sub-menu
  • 45. H
  • 46. • The term refers to all hardware tangible parts of a computer system; its components are: electrical, electronic, electromechanical and mechanical. Sub-menu
  • 47. • A computer system that is accessed by a user working at a remote location. Typically, the term is used when there are two computer systems connected by modems and telephone lines. The system that contains the data is called the host, while the computer at which the user sits is called the remote terminal. Sub-menu
  • 48. I
  • 49. • Internet is a network of networks that allows the decentralized networking of computers through a set of protocols called TCP / IP. Sub-menu
  • 50. • An icon is a small graphic representation of a program or file. Sub-menu
  • 51. • The Internet service provider is the company that provides Internet access to their customers. Sub-menu
  • 52. • The Institute of Electrical and Electronics Engineers is an organization that develops global standards in a broad range of industries including: power and energy, biomedicine, information technology, telecommunications, transportation, nanotechnology, insurance information, and many more. Sub-menu
  • 53. • Is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, usually as a method to gain access to resources or obtain credit and other benefits in that person's name. Sub-menu Video
  • 55. • Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) Internet, and routes most traffic on the Internet Sub-menu
  • 56. • Internet Protocol version 6 (IPv6) is the latest version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. Sub-menu
  • 57. J
  • 58. • A jumper is a short length of conductor used to close a break in or open, or bypass part of, an electrical circuit. Jumpers are typically used to set up or configure printed circuit boards, such as the motherboards of computers. Sub-menu
  • 59. K
  • 60. • A keyboard is for putting information such as letters, words and numbers into your computer. Sub-menu
  • 61. • Keywords are used on the Web in two different ways: 1) as search terms for search engines, and 2) words that identify the content of the website. Sub-menu
  • 62. L
  • 63. • When you are browsing the Web and you see a highlighted and underlined word or phrase on a page, there is a good chance you are looking at a link. By clicking on a link, you can "jump" to a new Web page or a completely different Web site. Sub-menu
  • 64. • A LAN is a computer network limited to a small area such as an office building, university, or even a residential home. Sub-menu
  • 65. M
  • 66. • M2M (Machine to Machine) is a generic term that refers to the exchange of information or data format communication between two remote machines. Sub-menu
  • 67. • It is a computerized device used in public transport vehicles and are used to display the mapping and information relevant to the tasks and actions taken by the vehicle, such as CAD drawings, diagrams and safety information. Sub-menu
  • 68. • Mobile broadband is a wireless technology that allows you to connect a mobile device such as your smartphone or tablet to a broadband internet connection wirelessly through a mobile phone network. Sub-menu
  • 69. • Is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Sub-menu
  • 70. • A media access control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used as a network address for most IEEE 802 network technologies, including Ethernet and Wi-Fi. Logically, MAC addresses are used in the media access control protocol sub layer of the OSI reference model. Sub-menu
  • 71. N
  • 72. • The nodes are devices or data points in a network. Devices such as a personal computer, cell phone, or printer are nodes. Sub-menu
  • 73. • A network is a group of two or more computer systems linked together. Sub-menu
  • 74. O
  • 75. • Online is the condition of being connected to a network of computers or other devices. Sub-menu
  • 76. • Data generated by a computer is referred to as output. Sub-menu
  • 77. P
  • 78. • The platforms refer to the technology used for the creation and development of courses or course modules in the Web used more broadly on the Web. Sub-menu
  • 79. • A password is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is really that particular user. Sub-menu
  • 80. • An electronic device that is easily transported. It may refer to a pocket-sized handheld device or to a laptop that weighs several pounds. Sub-menu
  • 81. • In its simplest form, a peer-to-peer (P2P) network is created when two or more PCs are connected and share resources without going through a separate server computer. Sub-menu Video
  • 83. • Is a collection of software tools that automates the process of installing, upgrading, configuring, and removing software packages for a computer's operating system in a consistent manner. Sub-menu
  • 84. • Is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Sub-menu Video
  • 86. Q
  • 87. • A quad-core CPU has four processing cores in a single chip. It is similar to a dual-core CPU, but has four separate processors (rather than two), which can process instructions at the same time. Sub-menu
  • 88. • This is a multimedia technology developed by our friends at Apple Computer. It is a popular format for creating and storing sound, graphics, and movie (.mov) files. Sub-menu
  • 89. • This term is used to describe a standard (Latin alphabet-based) keyboard. Why? Because the first six keys in the upper-left part of the keyboard spell out Q-W-E-R-T-Y. Sub-menu
  • 90. R
  • 91. • Is the place in a computer where the operating system, application programs, and data in current use are kept so that they can be quickly reached by the computer's processor. Sub-menu
  • 92. • Is "built-in" computer memory containing data that normally can only be read, not written to. ROM contains the programming that allows your computer to be "booted up" or regenerated each time you turn it on. Sub-menu
  • 93. • Is the process of backing up data created by remote and branch offices (ROBOs) and storing it securely. Sub-menu
  • 94. • A remote system is a workstation or server that is connected to the local system with any type of physical network and configured for TCP/IP communication. Sub-menu
  • 95. • Also called homecare telehealth) is a type of ambulatory healthcare that allows a patient to use a mobile medical device to perform a routine test and send the test data to a healthcare professional in real-time. Sub-menu
  • 96. • Radio frequency identification (RFID) is a form of wireless communication that uses radio waves to identify and track objects. Sub-menu
  • 97. • A router is a networking device, commonly specialized hardware that forwards data packets between computer networks. This creates an overlay internetwork, as a router is connected to two or more data lines from different networks. Sub-menu
  • 98. S
  • 99. • Is a communications center that provides a single point of contact (SPOC) between a company and its customers, employees and business partners. The purpose of a service desk is to ensure that users receive appropriate help in a timely manner. Sub-menu
  • 100. • Is a computer program that blanks the screen or fills it with moving images or patterns when the computer is not in use. Sub-menu
  • 101. • Sequential access memory (SAM) is a class of data storage devices that read their data in sequence. Sub-menu
  • 102. • In computing, a service pack or SP (in short SP) comprises a collection of updates, fixes, or enhancements to a software program delivered in the form of a single installable package. Sub-menu
  • 103. • It is defined unsolicited SPAM messages, normally containing advertising sent in masse. Sub-menu
  • 104. • Software is a set of programs, instructions and rules that allow computer to run various tasks on a computer. Sub-menu
  • 105. • El spyware o programa espía es un software que recopila información de un ordenador y después transmite esta información a una entidad externa sin el conocimiento o el consentimiento del propietario del ordenador. Sub-menu Video
  • 107. • A server is a running instance of an application (software) capable of accepting requests from the client and giving responses accordingly Remote System. Sub-menu
  • 108. • These devices are very useful for the modern man, are the main protagonists of communications in the world; Thanks to them, we receive TV signals, radio and telephone, internet and have valuable information on climate, our environment and space. Sub-menu
  • 109. • Is a spyware and adware removal computer program compatible with Microsoft Windows 95 and later. It scans the computer hard disk and/or RAM for malicious software. Sub-menu
  • 110. T
  • 111. • Generally a tracking system is used for the observing of persons or objects on the move and supplying a timely ordered sequence of respective location data to a model e.g. capable to serve for depicting the motion on a display capability. Sub-menu
  • 112. • A telematic control unit (TCU) in the automobile industry refers to the embedded system on board a vehicle that controls tracking of the vehicle. Sub-menu
  • 113. • Telematics are an interdisciplinary field encompassing telecommunications, vehicular technologies, road transportation, road safety, electrical engineering (sensors, instrumentation, wireless communications, etc.). Sub-menu
  • 114. • A toolbar is a graphical control element on which on-screen buttons, icons, menus, or other input or output elements are placed. Sub-menu
  • 115. U
  • 116. • Username is the name given to a user on a computer or computer network. Sub-menu
  • 117. • Updates are additions to software that can prevent or fix problems, enhance computer security or improve the performance of it. Sub-menu
  • 118. • A uniform resource locator (abbreviated URL; also known as a web address, particularly when used with HTTP) is a specific character string that constitutes a reference to a resource. Most web browsers display the URL of a web page above the page in an address bar. A typical URL might look like: http://www.example.org/wiki/Main_Page. Sub-menu
  • 119. V
  • 120. • Is a feature of an operating system (OS) that allows a computer to compensate for shortages of physical memory by temporarily transferring pages of data from random access memory (RAM) to disk storage. Sub-menu
  • 121. • Computer systems that can recognize spoken words. Note that voice recognition implies only that the computer can take dictation, not that it understands what is being said. Sub-menu
  • 122. • Not real. The term virtual is popular among computer scientists and is used in a wide variety of situations. In general, it distinguishes something that is merely conceptual from something that has physical reality. Sub-menu
  • 123. • A virtual private network (VPN) extends a private network across a public network, such as the Internet. It enables a computer or Wi- Fi-enabled device to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security and management policies of the private network. Sub-menu
  • 124. • Is a decreased ability to see to a degree that additional it causes problems that are not fixable by usual means, such as glasses or medication. Sub-menu
  • 125. W
  • 126. • Computer network is a device that interconnects wired communication device to form a wireless network. Sub-menu
  • 127. • Wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor. Sub-menu
  • 128. • An Internet forum is an online discussion site where people can hold conversations in the form of posted messages. Sub-menu
  • 129. • Windows Update, a service offered by Microsoft, provides updates for Windows components. Sub-menu
  • 130. • In computing, a web widget is a software widget for the web. It's a small application with limited functionality that can be installed and executed within a web page by an end user. A widget has the role of a transient or auxiliary application. Sub-menu
  • 131. X
  • 132. • x86 is the generic name for Intel processors released after the original 8086 processor. If a computer's technical specifications state that is based on the x86 architecture, that means it uses an Intel processor (not AMD or PowerPC). Sub-menu
  • 133. Y
  • 134. • YouTube is a video sharing service that allows users to watch videos posted by other users and upload videos of their own. Sub-menu
  • 135. • Yahoo! is one of the Internet's leading search engines. It is also the largest Web portal, providing links to thousands of other websites. These links include sites from the Yahoo! Directory as well as news stories that are updated several times a day. Sub-menu
  • 136. Z
  • 137. • A zone file is stored on a name server and provides information about one or more domain names. Each zone file contains a list of DNS records with mappings between domain names and IP addresses. Sub-menu
  • 138. • Windows users will see this term a lot when looking for files on the Internet. A zip file (.zip) is a "zipped" or compressed file. For example, when you download a file, if the filename looks like this: "filename.zip," you are downloading a zipped file. Sub-menu