BIT 250

BIT 250

BIT 250


Set of flashcards Details

Flashcards 247
Language English
Category English
Level University
Created / Updated 26.12.2014 / 02.01.2016
Weblink
https://card2brain.ch/box/bit_250
Embed
<iframe src="https://card2brain.ch/box/bit_250/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

to change and or add to the data in a file in order to make the data current

  a change or addition to a computer file so that it has the most recent information

update v. n.

a computer visualization of a tree-dimensional image showing the outlines of all edges in a transparent drawing

wireframe n.

included as part of application for end-users

built-in a.

a computer utility programm that uses AI to perform tasks such as retrieving and delivering information

intelligent agent n.

a removable device with a flash memory card format

memory stick n.

a programm or computer that you use for writing letters and other documents

word processor n.

the exact directions to a file on a computer, usually described by means of the hierarchical filing system

path n.

to make a programm or command happen or work

execute v.

use computer system as aid for task

computer-aided a.

a spherical window on a screen allowing the user to communicate with the computer by entering information or setting options

dialogue (also dialog) box n.

(the act of) restart a computer

reboot n. v.

the essential part of a programm or OS that performs tha basic functions

kernel n.

a system or combination of systems that enforces a boundary between the Internet and another network or a workstation

firewall n.

to remove an application from a computer by removing all the files that were added when the applicationwas initially installed

uninstall v.

a pseudonym users geve themselves, either to protect their identity or create an online presence

nickname n.

merging two or more disprate technologies by incorporating

convergence n.

the act of putting data in a secret code so it is unreadable expect by authorized users

encryption n.

(into) to pass light over a picture or document in order to copy and store it in the memory of a computer

scan v.

(of a computer system) designed to deal with data which is imprecise or has uncertain boundaries

fuzzy a.

to acces a computer system, often by means of a password

log in (also on) v.

the practice of tricking a user into giving away personal information inta a fake form on the internet

phishing n.

relating to long distance

tele (prefix)

a hedphone combined with a microphone

headset n.

programm that translates programming language to machine code

compiler n.

a large and powerful computer that can support hundreds, or even thousands, of users at the same time

mainframe n.

group of circuits to perform funktion

chipset n.

able to work together

compatible a.

a computer screen which represents an office ... and shows the icons of the programms ready for use

desktop

an interconnection point on a computer network where numerous lines come together at the same switch

node n.

a web page made by mixing and matching content from other sources

to autimatically mix and match content from other sources on one's webpage

mash-up n., to mash up v.

to play sound or video on your computer while it is being downloaded from the net

  the file played....

stream v. n.

to transfer data from your computer to a server

upoad v. n.

to find and bring back stored data, so that it can be diasplayed on the screen and processed

retrieve v.

relating to business software that enables companies to exchange services, information or products online

business-to-business (B2B) a.

a place on a computer to connect sth or an an endpoint to a logical connection

  to move software from one computer system to another

port n. v.

a small mark that can be moved around a computer screen to show exactly where you are working

cursor n.

a alnguage that has codes for indicating the layout and styling of a file, such as italics, paragraphs, insertion of graphics, etc.

markup language n.

to use ingenuity and creativity to solve computer programming problems or to overcome the limitations of a system

hack v.

a unique inaudible code into a digital file that identifies tho owner or the first person who legally purchased the file

watermark n.

(to upload) a radio-style show that is downloaded in MP-3 or video format

podcast n. v.