This document defines abbreviations and terms commonly used in computing. It provides definitions for hardware components, software programs, file formats, network protocols, and other technical terms from A-Z. The definitions are brief explanations of what each term refers to in the context of computers and technology.
Information Technology IMP question and answers. The students who are enrolled for Competitive Preparations, they can go through this. This can help in your career.
Java™ (OOP) - Chapter 1: "Introduction to Computers, Programs, and Java"Gouda Mando
To review computer basics, programs, and operating systems (§§1.2-1.4).
To explore the relationship between Java and the World Wide Web (§1.5).
To distinguish the terms API, IDE, and JDK (§1.6).
To write a simple Java program (§1.7).
To display output on the console (§1.7).
To explain the basic syntax of a Java program (§1.7).
To create, compile, and run Java programs (§1.8).
(GUI) To display output using the JOptionPane output dialog boxes (§1.9).
Information Technology IMP question and answers. The students who are enrolled for Competitive Preparations, they can go through this. This can help in your career.
Java™ (OOP) - Chapter 1: "Introduction to Computers, Programs, and Java"Gouda Mando
To review computer basics, programs, and operating systems (§§1.2-1.4).
To explore the relationship between Java and the World Wide Web (§1.5).
To distinguish the terms API, IDE, and JDK (§1.6).
To write a simple Java program (§1.7).
To display output on the console (§1.7).
To explain the basic syntax of a Java program (§1.7).
To create, compile, and run Java programs (§1.8).
(GUI) To display output using the JOptionPane output dialog boxes (§1.9).
Persebaran hewan di Indonesia meliputi daerah Indonesia bagian barat, Indonesia bagian tengah dan Indonesia bagian timur. Wilayah Indonesia bagian barat dengan Indonesia bagian tengah dibatasi oleh garis wallace. Hewan yang ada di Indonesia bagian barat dikenal dengan hewan tipe oriental. Wilayah Indonesia bagian tengah dengan Indonesia bagian timur dibatasi oleh garis weber. Hewan yang ada di Indonesia bagian timur dikenal dengan hewan tipe australia sedangan hewan yang ada di Indonesia bagian tengah dikenal dengan hewan tipe peralihan. *AbdKadir*
Learn the computer from scratch
visit https://evelin-s-site-b109.thinkific.com/
https://evelin-s-site-b109.thinkific.com/pages/advanced-computer-literacy
https://payhip.com/b/XuPYH
https://payhip.com/ComputerLiteracy or my youtube channel on
@computerliteracy-hh1we
assignment
1.Internal components are the devices that are inside the main computer tower. These devices include the Central Processing Unit (CPU), Motherboard and the modem.
Computer Hardware is the physical part of a computer, as distinguished from thecomputer softwarethat executes or runs on the hardware. The hardware of a computer isinfrequently changed, while software and data are modified frequently. The term "soft" refers to readily created, modified, or erased. Theseare unlike the physical components within the computer which are "hard".
Inside Computer
Motherboard
The motherboard is the "body" or mainframe of the computer, through which all other componentsinterface. It is thecentral circuit board making up a complex electronic system. A motherboard provides the electrical connections by which the other components of the systemcommunicate. The mother board includes many components such as: centralprocessing unit (CPU), random access memory (RAM), firmware, and internal and external buses.
Motherboard
Central Processing Unit
The Central Processing Unit (CPU; sometimes just called processor) is amachine that can executecomputer programs It is sometimes referred to as the "brain" of the computer.
CPU Diagram
There are four steps that nearly all CPUs use in their operation:fetch, decode, execute, and writeback. The firststep, fetch, involves retrieving an instruction from program memory. In thedecode step, the instruction is broken up into parts that have significance toother portions of theCpu. During the execute step various portions of the CPU such as the arithmeticlogic unit (ALU) and thefloating point unit (FPU) are connected so they can perform the desired operation. The final step, writeback, simply "writes back" the results of the execute step to some form of memory.
Random Access Memory
Random access memory (RAM) is fast-access memory that is cleared when the computer is power-down. RAM attaches directly to the motherboard, and is used to store programs that are currently running. RAM is a set of integrated circuits that allow the stored data to be accessed in any order (why it is called random). There are many different types of RAM. Distinctions between these different types include: writable vs. read-only, static vs. dynamic, volatile vs. non-volatile, etc.
RAM
Firmware
Firmware is loaded from the Read only memory (ROM) run from the BasicInput-Output System (BIOS). It is a computer program that is embedded in a hardware device, for example a microcontroller. As it name suggests, firmware is somewhere between hardware and software. Like software, it is a computer program which is executed by a microprocessor or a microcontroller. But it is also tightly linked to a piece of hardware, and has little meaning outside of it. Most devices attached to modern systems are special-purpose computers intheir own right, running their own software. Some of these devices store that software ("firmware") in a ROM within the device itself
Power Supply
The power supply as its name might suggest is the device that supplies power to all the components in the computer. Its case holds a transformer, voltage control, and (usually) a cooling fan. The power supply converts about 100-120 volts of AC power to low-voltage DC power for the internal components to use. The most common computer power supplies are built to conform with the form factor. This enables different power supplies to be interchangable with different components inside the computer. ATX power supplies also are designed to turn on and off using a signal from the motherboard, and provide support for modern functions such as standby mode.
Removable Media Devices
If your putting something in your computer and taking it out is most likely a form of removable media. There are many different removable media devices. The most popular are probably CD and DVD drives which almost every computer these days has at least one of. There are some new disc drives such as Bl
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
A 101025201954-phpapp02
1. A
AGP: Accelerated Graphics Port, a new connecting slot for graphics cards that
exist in the motherboard Pentium II computers.
needles (printer "needles"): see matrix.
AMD processors known manufacturer, compatible with the Intel x86 series
(Advanced Micro Devices).
Antivirus: Computer application designed to detect and remove viruses.
Apple: Home computer maker, maker of computers like the Apple II, Lisa,
Macintosh and iMac.
Archive: It is often used as synonymous with file. In the world of compressors,
often make a distinction, saying that several original files are compressed and
packed into an archive.
B
BIOS: System Basic Input / Output (Basic Input Output System). Typically
involve one or more ROM chips (usually EPROMs) containing the basic
routines and out, the first steps you should take a computer to fire, the basic
system configuration, etc..
Bit: The smallest unit of information that can store and manage a computer
equivalent to a 0 or 1.
2. Byte: A basic unit of information. In practice, one can consider that a byte is the
amount of space required to store a letter. Have multiples as the Kilobyte,
Megabyte, Gigabyte and Terabyte. Internally, it corresponds to 8 bits.
C
CAM: Computer-aided manufacturing (Computer Aided Manufacturing).
or Country: In the world of databases, each of the data that make up a record
(or tab).For example, in the file for each provider would have fields like your
name, postal address, phone, etc..
CD: Usually refers to Compact Disc. Other abbreviations are: a CD-ROM, CD-R
and CD-RW. Compact Disc A computer will be able to store about 650 Mb of
information.
CD-R: A Compact Disc which can record information (Recordable), but not
delete or modify the existing one.
CD-ROM: A Compact Disc playback, which can read data but not delete or
modify (Read Only Memory). Also commonly use this same name for the device
manager to read this Compact Disc for your computer (it would be more
appropriate to call "CD-ROM).
CD-RW: A Compact Disc which can record information and delete or amend
existing (Recordable-Writable).
Compiler: Computer application used to create programs in a programming
language. Converts programs created in a programming language the
computer's internal language (machine code).
3. Compressor: Computer application is responsible for "compressed" information
to save space and to facilitate its storage and transport. In most cases, this
compression is done without any loss: the data can "unzip" to come back to
stay exactly as they were.
Corel: Known software maker, author of packages such as Corel Draw and also
acquired and developed others such as Ventura Publisher and WordPerfect.
CPU: Central Processing Unit (Central Processing Unit). See "Processor."
or Cracker: A person who tries to break the protections of a computer system,
usually for malicious purposes (other than a "hacker", which seeks to deepen
some system to learn from him).
D
Dbase: Database Manager, by Ashton Tate and then bought and improved by
Borland.
DNS domain name server (Domain Name Server).
DOC: Extension files created with Word and other word processors (short
document).
DOS: Disk Operating System (Disk Operating System). This is a single-user
single-tasking operating system.
DRAM: Dynamic RAM.
Driver: display driver.
DVD digital disk improved, with a capacity far superior to CD. (Digital Video
Disk or Digital Versatile Disk). ."
E
EGA: enhanced graphics adapter (Enhanced Graphics Adapter). Graphics Card
PC and compatible computers, evolution of the CGA, which could work well in
16 colors with 320x200, 640x200 and 640x350 points.
Executable: A program that can "run" or use "alone", without the need to have
a certain software application from which to manage it (for details, see
Compiler).
E-mail: e-mail (electronic mail). Message (usually private) sent over a computer
network. .
4. Excel: spreadsheet application by Microsoft.
F
FAQ: Collection of frequently asked questions about a certain topic and
answers (Frequently Asked Questions).
File: A collection of information that is stored or used for consultation later. In a
computer, usually each file should have a name you can reference it. .
Firmware: The "software that is within the hardware." Refers to ROMs recorded
programs.
Freeware: Computer application can be copied and distributed freely, and
whose use is free.
.
G
GIF: This is the extension corresponding to a graphic file type of bitmap
(Graphics Interchange Format).
Gigabyte: Multiple byte: a gigabyte is 1,024 megabytes, about 1,000 million
bytes.
H
Hacker: computer enthusiast. The word is often used to indicate also a certain
intrusion, a hacker is a person who is always willing to learn and meet new
challenges, which you can find access to a theoretically closed system.
Hardware: The part "you can touch" of a computer: box (and all its contents),
keyboard, screen, etc.and Hayes modems known manufacturer, the operator of
the AT commands.
HD: HDD (Hard Disk) / / HD: High density (High Density).
Hewlett-Packard, a major manufacturer of hardware for nearly all types:
computers, laser and inkjet printers, plotters, etc.
HTM: Extension under MSDOS files to HTML.
I
5. Intel: processor known manufacturer, creator of the X86 line.
Interface: Connecting a computer to the outside, or between two devices.
Internet: Computer network worldwide. It offers various services, such as
sending and receiving electronic mail (e-mail), the ability to see information on
Web pages, participate in discussion forums (News), to send and receive files
via FTP, time chatsReal-IRC, etc.
or Rick: See compiler.
J
Java: programming language, object-oriented C-based, increasingly
widespread, especially through Internet.
Joystick: Joystick used in many games.
JPEG, JPG: This is the extension corresponding to a graphic file type of
bitmap. It is a compressed format that, unlike most, becomes rough when
compressed
K
Kbps: Thousands of bps.
Kernel: kernel of an operating system.
kilobytes: Multiple byte: A kilobyte is 1,024 bytes.
L
LAN: Local Area Network (Local Area Network).
Laser: A type of printer is generally based on a mechanism similar to that of
photocopiers.
LCD: LCD (Liquid Crystal Display).
Linux: freeware version (free) operating system Unix, developed by Linus
Torvalds, with contributions from programmers around the world.
Logo: programming language, which for a time was considered more
appropriate to introduce computers to young children.
6. M
MacOS: Operating system of Apple Macintosh computers.
or Macintosh: Known range of computers made by Apple, initially based on
processors from the Motorola 68000 series, and today on PowerPC
processors.
Mainboard: English, motherboard.
Megabyte: Multiple of byte: a megabyte is 1,024 kilobytes, about one million
bytes.
Microsoft: software development house, maker of operating systems like MS-
DOS and Windows, as well as applications of all kinds.
Modem: A device that allows a computer to send and receive information by
telephone (modular-demodulator).
Mouse: A device used to communicate with the computer. Lets point out areas
of the screen, as a way to tell the computer what you want to do.
N
NMI: Non-Maskable Interrupt. Is the input of an interrupt has the highest priority
and is always accepted by the processor.
Node: a computer on a network.
Notebook: or handheld computer (laptop) closed is similar in size to an A4.
O
Office: Suite by Microsoft, which includes applications such as Word, Excel,
Outlook (and optionally other as Access or Publisher).
and Olivetti: known manufacturer of computers, printers, typewriters, etc.
OpenLinux: Linux operating system version, compiled by Caldera.
Outlook: Personal Organizer by Microsoft.
7. P
Password: password or password required to access a system.
PC: PC (Personal Computer). This abbreviation comes from the IBM Personal
Computer, the house created by IBM in the early 80's. The original PC was
working with unprocesador8086 at 4.77 MHz and 64 Kb of memory. Since then
often speak of the "PC" as the computers compatible with the original IBM PC
(capable of using any program that was designed for that), processors based on
Intel's X86 series.
PCI: Type standard architecture motherboard with expansion slots 32 or 64 bits,
used on computers with Pentium processor and above
PNG: The extension that corresponds to a graphic file type bitmaps (Portable
Network Graphics).
Processor: The brain of the computer. Its working speed is measured in
megahertz (MHz) and its processing capacity by the number of bits that can
handle at a time (eg 32 bits or 64 bits)
or word processor. One type of application that allows you to write texts of all
kinds, from letters to books. Today it is often possible to use different fonts,
include images and tables, write columns add mathematical equations, etc.
Proxy: Software that allows multiple computers to access the Internet through a
single physical connection. As advanced, can allow access to Web pages, FTP,
email, etc. It is often also include other services such as firewalls (firewalls).
or inch: English system unit of length equal to 2.54 cm.
R
RAM: Direct Memory Access (Random Access Memory). This name is usually
used to refer to reports which you can read and write (RWM). In últimosPC is
usual to use Fast Page Ram (386 and above), EDO Ram (486 and Pentium)
and SDRAM (latest Pentium, Pentium MMX and above).
RAR: Extension of compressed files. The compressor for the RAR.
ROM, read only memory (Read Only Memory).
Run: Run View.
S
Scanner: A device capable of reading and send still images to your
computer.From your computer will be able to print these images, modify them,
etc.
8. operating system: A layer between the computer and the user. It could be
considered as a program (usually large) that takes control of the computer and
provides the basic utilities. For more advanced uses, need to install applications
such as databases, spreadsheets, custom programs, etc.
Software: The party "can not touch" of a computer: programs and data.
Sound Card: A device that gives the computer the ability to synthesize and
make sounds as well as capture. Often a computer that has no sound card has
at least a small speaker.
SQL: A standard query language database (Structured Query Language).
T
TCP / IP: Protocol Standard Internet communications (Transmission Control
Protocol / Internet Protocol). issue low-quality sound.
Terabyte: Multiple byte: A terabyte is 1,024 gigabytes, about a trillion (one
trillion) bytes.
U .
URL: Direction of a certain page of information in Internet (Universal Resource
Locator).
USB: Universal Serial Bus (universal serial bus), a new type of serial
connection that is gaining rapidly on certain characteristics such as: you can
connect multiple devices to a single port (up to 127), may be connected to the
computer on, and the computer detects the device in question.
or Usenet: One of the services offered by the Internet, also known as News.
V
VGA: video graphics array (Video Graphics Array). Graphics Card PC and
compatible computers, evolution of the MCGA, which could work well in 16
colors with 640x480 pixels.
Virus: A program with malicious intent, which is able to spread from one file to
another computer.
W
Windows: Generic name for a family of software designed by Microsoft. Earlier
versions (up to 3.11) were a Windows-based graphical environment for the
9. DOS operating system. From Windows 95 (Windows 95 and Windows 98) and
is an operating system itself, with multitasking capabilities. There are also
"Special" version of Windows such as Windows NT, designed for professional
environments, or Windows CE, for laptops with very small dimensions.
Word: Word Processor by Microsoft.
Z
ZIP: Extension of compressed files. The corresponding compressor is often
called ZIP or PKZIP. / / ZIP: storage unit like a floppy disk, but with a capacity of
100 Mb, created by Iomega.