IT Words (Beispielssätze)

zuerst kommt das Wort, dann ein Satz in dem es verwendet wird. Lücken wurden aus zeitlichen Gründen nicht eingebaut.

zuerst kommt das Wort, dann ein Satz in dem es verwendet wird. Lücken wurden aus zeitlichen Gründen nicht eingebaut.

Dominik Schürmann

Dominik Schürmann

Kartei Details

Karten 244
Sprache Deutsch
Kategorie Englisch
Stufe Universität
Erstellt / Aktualisiert 28.12.2011 / 09.06.2015
Weblink
https://card2brain.ch/box/it_words_beispielssaetze
Einbinden
<iframe src="https://card2brain.ch/box/it_words_beispielssaetze/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

icon n.

Files and programs have icons which open when the user double-clicks on the icon.

information (super-) highway n.

The information superhighway, once a dream, is now threatening us with overflowing traffic.

intelligent agent n.

Intelligent agents are capable of autonomous action when searching through your email program.

interactive a.

The opposite of interactive processing is batch p., where all the commands are given before the program starts to run.

interconnected a.

Creating a system of interconnected devices is the next great challenge.

interface n.

The user-friendly interface is combined with a set of algorithms. * graphical user interface * virtual interface

intrusion n.

Intrusion detection has become a lucrative sector of IT security. * Intrusion Detection System (IDS).

Internet Protocol (IP) n.

The system is protected by https, a secure internet protocol. * IP address * Voice over Internet Protocol (VoIP)

kernel n.

My new netbook runs on a Linux kernel.

log in (also on) v.

You need a password to log on to your home page.

log off (also out) v.

YouÕve got to log out before switching the computer off.

low-end a.

Many users are happy with low-end computers that offer data processing and internet access.

magnetic stripe card n.

Magnetic stripe cards are commonly used in credit cards, identity cards, and transportation tickets.

mainframe n.

Their mainframe computer is located in an air-cooled bunker below the earth.

markup language n.

Exact instructions for a markup language have to be followed.

mash-up n, mash up v.

Mash-ups can be done with music, video, and text content. * This site explains how to mash up songs at home.

media player n.

The current market for media players has been captured by RealPlayer.

memory n.

The information is then stored in the computer's memory. * read only memory (ROM) * random access memory (RAM)

memory stick n.

Insert the memory stick into a USB port of your PC and copy the file onto the memory stick.

merge v.

This is a tool for comparing and merging files and folders. * mail merge * print merge

micro prefix

microchip * microcomputer * microÐelectronics * microprocessor

modem n.

To enable you to surf the internet, your computer has to set up a connection via the modem.

motherboard n.

Additional boards, called daughter boards, can be plugged into the motherboard.

multi prefix

multimedia * multi-player * multitasking

nano prefix

nanobot * nanocomputer * nanotechnology

net suffix

Ethernet * extranet * Internet * intranet

netiquette n.

ÔNo FlamingÕ is the most commonly breached rule of netiquette.

netizen n.

Many netizens face a crack down at the hands of the authorities who see their internet activities as dangerous dissent.

network n.

The office network allows users to share files and to use a central printer.* local area network (LAN)

neural a.

The bank is using neural networks to assess credit risks.* neural network * neural computer

newsgroup n.

There are thousands of newsgroups on different subjects.

nickname n.

Everyone in this newsgroup goes by several nicknames.

node n.

Intrusions are often attempted at a networkÕs most vulnerable node.

object-oriented a.

To perform object-oriented program_ming, one needs an object-oriented programming language like Java or C++.

offline a.

Our computers are offline for one hour each day.

ontology n.

The essential knowledge about the domain will be made available to the agents by means of an ontology.

operating system n.

The application is running under a full, general-purpose operating system.

packet n.

The data packets related to a message are reassembled once they have arrived at their destination. * packet switching

password n.

When a user enters a password, it appears as a line of asterisks ******* so no one can read it.

patch v., n.

The computer was required to download another series of security patches. * Resource Builder patched and modified the application directly.