BIT 250
BIT 250
BIT 250
Fichier Détails
Cartes-fiches | 247 |
---|---|
Langue | English |
Catégorie | Anglais |
Niveau | Université |
Crée / Actualisé | 26.12.2014 / 02.01.2016 |
Lien de web |
https://card2brain.ch/box/bit_250
|
Intégrer |
<iframe src="https://card2brain.ch/box/bit_250/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
a symbol that can represent any single or group of numbers or letters in OS and applications
wild card n.
a part of TCP/IP, which is used to route a data packet from its source to its destination over the internet
Internet Protocol (IP) n.
to isolate the source of a problem which is suspected to be hardware-related and fix it
troubleshoot v.
code n. v.
clipboard n.
to find and remove errors in a computer programm
debug v.
(to install or make) a new and presumably better version of hardware or software
upgrade n. v.
breaking a file into parts to store the data in whatever disk areas are available
fragmentation n.
the main circuit board inside a computer that everything plugs into ant that contains the CPU, the buses, memory sockets etc.
motherboard n.
checkout button n.
the place in a network or organization where users ask questions or report problems with hardware or software
help desk n.
animate v.
a collaborative construction engine on the Web which allows any user to add and edit content
wiki n.
th change encrypted data back to its original form
decrypt v.
compression n.
a programm or service in the internet that allows users to search for files ans information
engine n.
compress v.
blog (also weblog n.) v., n.
relating to changing data that is processed fat enough to controll its source; or referring to events simulated in real-live speed
real-time a.
a flat surface in a cinema on a television or a computer system on which pictures or words are shown
screen n.
an indivudual name used to gain access to a computer system, also part of an email adress before the @ symbol
username n.
a destructive programm that masquerades as a benign application containing additional hidden code
trojan horse n.
the electronic equivalent of junk mail, often advertising mail
to send the same message to many different people over the Internetspam n. v.
a system to mamage all the information of a business or company from shared data stores
enterprise resource planning (ERP) n.
link computer with network or internet
connect v.
a device for entering drawings, sketches or handwriting into a computer by means of an LCD screen and stylus
tablet n.
extremely small
micro (prefix)
turn off an optional software item, making it non-functional
disable v.
backbone n.
the main page of a Web site to which the others are linked
home page n.
a map or plan showing the arrangement and interlinking of computers in a network
topology n.
any piece of hardware and connected to a computer, or any aprt of the computer outside the CPU and working memory
peripheral n.
applying the ressources of many computers in a network to solve or work on the same problem simultaneously
grid computing n.
a shared boundary or common point for interaction between hardware and hardware or between a human and a computer
interface n.
(of a computer or -system) able to "learn" from experience, used in applications such as speech recognition, robotics, medical diagnosis, etc.
neural a.
cache n., v.
buffer n., v.
a virtual container used to organize other ... and files in a hierarchical structure
directory (also folder) n.
able to be rewritten many times; for example: storage media such as optical disks and magnetic tapes
rewritable a.
the process of placing, holding and retrieving data on a computer
storage n.