4. • Is a physical device that allows one
hardware or electronic interface to be
adapted (accommodated without loss of
function) to another hardware or
electronic interface. In a computer, an
adapter is often built into a card that can
be inserted into a slot on the computer's
motherboard.
Sub-menu
5. • Is the unit of router policy, either a
single network or a group of networks
that is controlled by a common network
administrator (or group of
administrators) on behalf of a single
administrative entity (such as a
university, a business enterprise, or a
business division).
Sub-menu
6. • Is a type of program designed to
prevent and detect unwanted
spyware program installations and to
remove those programs if installed.
Sub-menu Video
8. • ASP stands for Application Service Providers, companies that provide
software services to its clients through a network.
Sub-menu
9. • ASCII stands for American Standard
Code for Information Interchange.
Computers can only understand
numbers, so an ASCII code is the
numerical representation of a
character such as 'a' or '@' or an
action of some sort.
Sub-menu
10. • Antivirus software was originally
developed to detect and
remove computer viruses, hence the
name. However, with the proliferation
of other kinds of malware, antivirus
software started to provide protection
from other computer threats.
Sub-menu
11. • Is a software framework created by Microsoft that adapts its earlier
Component Object Model (COM) and Object Linking and Embedding
(OLE) technologies for content downloaded from a network, particularly in
the context of the World Wide Web.
Sub-menu
13. • In general, broadband refers to
telecommunication in which a wide
band of frequencies is available to
transmit information.
Sub-menu
14. • In computer science, the Boolean data type is a data type, having two values
(usually denoted true and false), intended to represent the truth
values of logic and Boolean algebra.
Sub-menu
15. • A browser or web browser, or
browser is a software that allows
Internet access, interpreting
information from files and websites
so that they can be read.
Sub-menu
16. • In mathematics and digital
electronics, a binary number is a
number expressed in the binary
numeral system, or base-2 numeral
system, which represents numeric
values using two different symbols:
typically 0 (zero) and 1 (one).
Sub-menu
17. • Is the informal name given by users to the
Windows general protection fault (GPF)
error. Named in honor of the error's
dreaded display image of white text on a
blue background, the BSOD is generated
by the operating system when it has
suddenly terminated with an error.
Sub-menu
19. • It is a CD that uses laser light to store
and read large amounts of information
in digital format.
Sub-menu
20. • Is random access memory (RAM)
that a computer microprocessor can
access more quickly than it can
access regular RAM.
Sub-menu
21. • Is a state of being in accordance with established guidelines, specifications,
or legislation or the process of becoming so. Software, for example, may be
developed in compliance with specifications created by some standards body,
such as the Institute of Electrical and Electronics Engineers (IEEE).
Sub-menu
22. • To counterfeit means to imitate
something. Counterfeit products are
fake replicas of the real product.
Counterfeit products are often
produced with the intent to take
advantage of the superior value of
the imitated product.
Sub-menu
24. • Is an incident in which sensitive, protected or confidential data has
potentially been viewed, stolen or used by an individual unauthorized to do
so.
Sub-menu
25. • Is a control panel placed in front of the driver of an automobile, housing
instrumentation and controls for operation of the vehicle.
Sub-menu
26. • Is a mathematical technique used to validate the authenticity and integrity of
a message, software or digital document.
Sub-menu
27. • Data can travel through a serial or parallel interface, simply consists of a
suitable physical connection, such as a cable.
Sub-menu
28. • The Dynamic Host Configuration
Protocol (DHCP) is a standardized
network protocol used on Internet
Protocol (IP) networks for
dynamically distributing network
configuration parameters, such as IP
addresses for interfaces and services.
Sub-menu
29. • A digit is a type of symbol (a numeral symbol, such as "2" or "5") used in
combinations (such as "25") to represent numbers (such as the number 25)
in positional numeral systems.
Sub-menu
30. • The Domain Name System (DNS) is
a hierarchical distributed naming
system for computers, services, or
any resource connected to the
Internet or a private network.
Sub-menu
31. • The term downloading is distinguished from
the related concept of streaming, which
indicates the receiving of data that is used
nearly immediately as it is received, while the
transmission is still in progress and which may
not be stored long-term, whereas in a process
described using the term downloading, this
would imply that the data is only usable when
it has been received in its entirety.
Sub-menu
33. • Electronic mail or email is a quick way of sending messages to people using
the internet.
Sub-menu
34. • Is the conversion of electronic data into another form, called ciphertext,
which cannot be easily understood by anyone except authorized parties.
Sub-menu Video
36. • Random variations in potential, current, or voltage in electric circuits and
communications lines. It can damage your devices.
Sub-menu
37. • In computing, a character encoding is used to represent a repertoire of
characters by some kind of an encoding system. Depending on the
abstraction level and context, corresponding code points and the resulting
code space may be regarded as bit patterns, octets, natural numbers, electrical
pulses, etc.
Sub-menu
39. • Is a type of constantly-powered nonvolatile memory that can be erased and
reprogrammed in units of memory called blocks.
Sub-menu
40. • Vehicle mount mobile computers put robust computing power in a rugged
form factor designed to handle the vibration of forklifts, fleet cars, delivery
trucks and other vehicles.
Sub-menu
41. • In computing, a firewall is a network security system that controls the
incoming and outgoing network traffic based on applied rule set. A firewall
establishes a barrier between a trusted, secure internal network and another
network (e.g., the Internet).
Sub-menu
43. • A geographic information system (GIS) is a computer system designed to
capture, store, manipulate, analyze, manage, and present all types of spatial
or geographical data.
Sub-menu
44. • The Global Positioning System (GPS) to determine the position of an
object, person or vehicle to centimeter precision worldwide.
Sub-menu
46. • The term refers to all hardware tangible parts of a computer system; its
components are: electrical, electronic, electromechanical and mechanical.
Sub-menu
47. • A computer system that is accessed by a user working at a remote location.
Typically, the term is used when there are two computer systems connected
by modems and telephone lines. The system that contains the data is called
the host, while the computer at which the user sits is called the remote
terminal.
Sub-menu
49. • Internet is a network of networks that allows the decentralized networking
of computers through a set of protocols called TCP / IP.
Sub-menu
50. • An icon is a small graphic representation of a program or file.
Sub-menu
51. • The Internet service provider is the company that provides Internet access to
their customers.
Sub-menu
52. • The Institute of Electrical and Electronics Engineers is an organization that
develops global standards in a broad range of industries including: power
and energy, biomedicine, information technology, telecommunications,
transportation, nanotechnology, insurance information, and many more.
Sub-menu
53. • Is a form of stealing someone's identity in which someone pretends to be
someone else by assuming that person's identity, usually as a method to gain
access to resources or obtain credit and other benefits in that person's name.
Sub-menu Video
55. • Internet Protocol version 4 (IPv4) is
the fourth version in the
development of the Internet
Protocol (IP) Internet, and routes
most traffic on the Internet
Sub-menu
56. • Internet Protocol version 6 (IPv6) is
the latest version of the Internet
Protocol (IP), the communications
protocol that provides an
identification and location system for
computers on networks and routes
traffic across the Internet.
Sub-menu
58. • A jumper is a short length of
conductor used to close a break in or
open, or bypass part of, an electrical
circuit. Jumpers are typically used to
set up or configure printed circuit
boards, such as the motherboards of
computers.
Sub-menu
60. • A keyboard is for putting information such as letters, words and numbers
into your computer.
Sub-menu
61. • Keywords are used on the Web in two different ways: 1) as search terms for
search engines, and 2) words that identify the content of the website.
Sub-menu
63. • When you are browsing the Web and
you see a highlighted and underlined
word or phrase on a page, there is a
good chance you are looking at a
link. By clicking on a link, you can
"jump" to a new Web page or a
completely different Web site.
Sub-menu
64. • A LAN is a computer network
limited to a small area such as an
office building, university, or even a
residential home.
Sub-menu
66. • M2M (Machine to Machine) is a
generic term that refers to the
exchange of information or data
format communication between two
remote machines.
Sub-menu
67. • It is a computerized device used in public transport vehicles and are used to
display the mapping and information relevant to the tasks and actions taken
by the vehicle, such as CAD drawings, diagrams and safety information.
Sub-menu
68. • Mobile broadband is a wireless technology that allows you to connect a
mobile device such as your smartphone or tablet to a broadband internet
connection wirelessly through a mobile phone network.
Sub-menu
69. • Is any software used to disrupt computer operation, gather sensitive
information, or gain access to private computer systems.
Sub-menu
70. • A media access control address (MAC address) is a unique identifier assigned
to network interfaces for communications on the physical network segment.
MAC addresses are used as a network address for most IEEE 802 network
technologies, including Ethernet and Wi-Fi. Logically, MAC addresses are
used in the media access control protocol sub layer of the OSI reference
model.
Sub-menu
78. • The platforms refer to the technology used for the creation and development
of courses or course modules in the Web used more broadly on the Web.
Sub-menu
79. • A password is an unspaced sequence
of characters used to determine that
a computer user requesting access to
a computer system is really that
particular user.
Sub-menu
80. • An electronic device that is easily transported. It may refer to a pocket-sized
handheld device or to a laptop that weighs several pounds.
Sub-menu
81. • In its simplest form, a peer-to-peer
(P2P) network is created when two
or more PCs are connected and
share resources without going
through a separate server computer.
Sub-menu Video
83. • Is a collection of software tools that automates the process of installing,
upgrading, configuring, and removing software packages for a computer's
operating system in a consistent manner.
Sub-menu
84. • Is the attempt to acquire sensitive information such as
usernames, passwords, and credit card details (and sometimes,
indirectly, money) by masquerading as a trustworthy entity in an electronic
communication.
Sub-menu Video
87. • A quad-core CPU has four processing cores in a single chip. It is similar to a
dual-core CPU, but has four separate processors (rather than two), which can
process instructions at the same time.
Sub-menu
88. • This is a multimedia technology developed by our friends at Apple
Computer. It is a popular format for creating and storing sound, graphics,
and movie (.mov) files.
Sub-menu
89. • This term is used to describe a
standard (Latin alphabet-based)
keyboard. Why? Because the first six
keys in the upper-left part of the
keyboard spell out Q-W-E-R-T-Y.
Sub-menu
91. • Is the place in a computer where the operating system, application
programs, and data in current use are kept so that they can be quickly
reached by the computer's processor.
Sub-menu
92. • Is "built-in" computer memory
containing data that normally can
only be read, not written to. ROM
contains the programming that
allows your computer to be "booted
up" or regenerated each time you
turn it on.
Sub-menu
93. • Is the process of backing up data created by remote and branch offices
(ROBOs) and storing it securely.
Sub-menu
94. • A remote system is a workstation or
server that is connected to the local
system with any type of physical
network and configured for TCP/IP
communication.
Sub-menu
95. • Also called homecare telehealth) is a
type of ambulatory healthcare that
allows a patient to use a mobile
medical device to perform a routine
test and send the test data to a
healthcare professional in real-time.
Sub-menu
96. • Radio frequency identification
(RFID) is a form of wireless
communication that uses radio waves
to identify and track objects.
Sub-menu
97. • A router is a networking device,
commonly specialized hardware that
forwards data packets between
computer networks. This creates an
overlay internetwork, as a router is
connected to two or more data lines
from different networks.
Sub-menu
99. • Is a communications center that
provides a single point of contact
(SPOC) between a company and its
customers, employees and business
partners. The purpose of a service
desk is to ensure that users receive
appropriate help in a timely manner.
Sub-menu
100. • Is a computer program that blanks the screen or fills it with moving images
or patterns when the computer is not in use.
Sub-menu
101. • Sequential access memory (SAM) is a
class of data storage devices that
read their data in sequence.
Sub-menu
102. • In computing, a service pack or SP (in short SP) comprises a collection of
updates, fixes, or enhancements to a software program delivered in the form
of a single installable package.
Sub-menu
103. • It is defined unsolicited SPAM
messages, normally containing
advertising sent in masse.
Sub-menu
104. • Software is a set of programs, instructions and rules that allow computer to
run various tasks on a computer.
Sub-menu
105. • El spyware o programa espía es un
software que recopila información de
un ordenador y después transmite
esta información a una entidad
externa sin el conocimiento o el
consentimiento del propietario del
ordenador.
Sub-menu Video
107. • A server is a running instance of an
application (software) capable of
accepting requests from the client
and giving responses accordingly
Remote System.
Sub-menu
108. • These devices are very useful for the modern man, are the main protagonists
of communications in the world; Thanks to them, we receive TV signals,
radio and telephone, internet and have valuable information on climate, our
environment and space.
Sub-menu
109. • Is a spyware and adware removal
computer program compatible with
Microsoft Windows 95 and later. It
scans the computer hard disk and/or
RAM for malicious software.
Sub-menu
111. • Generally a tracking system is used
for the observing of persons or
objects on the move and supplying a
timely ordered sequence of
respective location data to a model
e.g. capable to serve for depicting the
motion on a display capability.
Sub-menu
112. • A telematic control unit (TCU) in the
automobile industry refers to the
embedded system on board a vehicle
that controls tracking of the vehicle.
Sub-menu
113. • Telematics are an interdisciplinary field encompassing telecommunications,
vehicular technologies, road transportation, road safety, electrical engineering
(sensors, instrumentation, wireless communications, etc.).
Sub-menu
114. • A toolbar is a graphical control
element on which on-screen buttons,
icons, menus, or other input or
output elements are placed.
Sub-menu
116. • Username is the name given to a user on a computer or computer network.
Sub-menu
117. • Updates are additions to software
that can prevent or fix problems,
enhance computer security or
improve the performance of it.
Sub-menu
118. • A uniform resource locator (abbreviated URL; also known as a web address,
particularly when used with HTTP) is a specific character string that
constitutes a reference to a resource. Most web browsers display the URL of
a web page above the page in an address bar. A typical URL might look
like: http://www.example.org/wiki/Main_Page.
Sub-menu
120. • Is a feature of an operating system
(OS) that allows a computer to
compensate for shortages of physical
memory by temporarily
transferring pages of data from
random access memory (RAM)
to disk storage.
Sub-menu
121. • Computer systems that can recognize
spoken words. Note that voice
recognition implies only that
the computer can take dictation, not
that it understands what is being said.
Sub-menu
122. • Not real. The term virtual is popular
among computer scientists and is
used in a wide variety of situations.
In general, it distinguishes something
that is merely conceptual from
something that has physical reality.
Sub-menu
123. • A virtual private network (VPN) extends a
private network across a public network, such
as the Internet. It enables a computer or Wi-
Fi-enabled device to send and receive data
across shared or public networks as if it were
directly connected to the private network,
while benefiting from the functionality, security
and management policies of the private
network.
Sub-menu
124. • Is a decreased ability to see to a
degree that additional it causes
problems that are not fixable by
usual means, such as glasses or
medication.
Sub-menu
126. • Computer network is a device that
interconnects wired communication
device to form a wireless network.
Sub-menu
127. • Wireless communication is the transfer of information between two or more
points that are not connected by an electrical conductor.
Sub-menu
128. • An Internet forum is an online discussion site where people can hold
conversations in the form of posted messages.
Sub-menu
129. • Windows Update, a service offered
by Microsoft, provides updates for
Windows components.
Sub-menu
130. • In computing, a web widget is a
software widget for the web. It's a
small application with limited
functionality that can be installed and
executed within a web page by an
end user. A widget has the role of a
transient or auxiliary application.
Sub-menu
132. • x86 is the generic name for Intel processors released after the original 8086
processor. If a computer's technical specifications state that is based on the
x86 architecture, that means it uses an Intel processor (not AMD or
PowerPC).
Sub-menu
134. • YouTube is a video sharing service that allows users to watch videos posted
by other users and upload videos of their own.
Sub-menu
135. • Yahoo! is one of the Internet's
leading search engines. It is also the
largest Web portal, providing links to
thousands of other websites. These
links include sites from the Yahoo!
Directory as well as news stories that
are updated several times a day.
Sub-menu
137. • A zone file is stored on a name server
and provides information about one
or more domain names. Each zone
file contains a list of DNS records
with mappings between domain
names and IP addresses.
Sub-menu
138. • Windows users will see this term a lot when looking for files on the Internet.
A zip file (.zip) is a "zipped" or compressed file. For example, when you
download a file, if the filename looks like this: "filename.zip," you are
downloading a zipped file.
Sub-menu