IT Words (Beispielssätze)
zuerst kommt das Wort, dann ein Satz in dem es verwendet wird. Lücken wurden aus zeitlichen Gründen nicht eingebaut.
zuerst kommt das Wort, dann ein Satz in dem es verwendet wird. Lücken wurden aus zeitlichen Gründen nicht eingebaut.
Kartei Details
Karten | 244 |
---|---|
Sprache | Deutsch |
Kategorie | Englisch |
Stufe | Universität |
Erstellt / Aktualisiert | 28.12.2011 / 09.06.2015 |
Weblink |
https://card2brain.ch/box/it_words_beispielssaetze
|
Einbinden |
<iframe src="https://card2brain.ch/box/it_words_beispielssaetze/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
icon n.
Files and programs have icons which open when the user double-clicks on the icon.
information (super-) highway n.
The information superhighway, once a dream, is now threatening us with overflowing traffic.
intelligent agent n.
Intelligent agents are capable of autonomous action when searching through your email program.
interactive a.
The opposite of interactive processing is batch p., where all the commands are given before the program starts to run.
interconnected a.
Creating a system of interconnected devices is the next great challenge.
interface n.
The user-friendly interface is combined with a set of algorithms. * graphical user interface * virtual interface
intrusion n.
Intrusion detection has become a lucrative sector of IT security. * Intrusion Detection System (IDS).
Internet Protocol (IP) n.
The system is protected by https, a secure internet protocol. * IP address * Voice over Internet Protocol (VoIP)
kernel n.
My new netbook runs on a Linux kernel.
log in (also on) v.
You need a password to log on to your home page.
log off (also out) v.
YouÕve got to log out before switching the computer off.
low-end a.
Many users are happy with low-end computers that offer data processing and internet access.
magnetic stripe card n.
Magnetic stripe cards are commonly used in credit cards, identity cards, and transportation tickets.
mainframe n.
Their mainframe computer is located in an air-cooled bunker below the earth.
markup language n.
Exact instructions for a markup language have to be followed.
mash-up n, mash up v.
Mash-ups can be done with music, video, and text content. * This site explains how to mash up songs at home.
media player n.
The current market for media players has been captured by RealPlayer.
memory n.
The information is then stored in the computer's memory. * read only memory (ROM) * random access memory (RAM)
memory stick n.
Insert the memory stick into a USB port of your PC and copy the file onto the memory stick.
merge v.
This is a tool for comparing and merging files and folders. * mail merge * print merge
micro prefix
microchip * microcomputer * microÐelectronics * microprocessor
modem n.
To enable you to surf the internet, your computer has to set up a connection via the modem.
motherboard n.
Additional boards, called daughter boards, can be plugged into the motherboard.
multi prefix
multimedia * multi-player * multitasking
nano prefix
nanobot * nanocomputer * nanotechnology
net suffix
Ethernet * extranet * Internet * intranet
netiquette n.
ÔNo FlamingÕ is the most commonly breached rule of netiquette.
netizen n.
Many netizens face a crack down at the hands of the authorities who see their internet activities as dangerous dissent.
network n.
The office network allows users to share files and to use a central printer.* local area network (LAN)
neural a.
The bank is using neural networks to assess credit risks.* neural network * neural computer
newsgroup n.
There are thousands of newsgroups on different subjects.
nickname n.
Everyone in this newsgroup goes by several nicknames.
node n.
Intrusions are often attempted at a networkÕs most vulnerable node.
object-oriented a.
To perform object-oriented program_ming, one needs an object-oriented programming language like Java or C++.
offline a.
Our computers are offline for one hour each day.
ontology n.
The essential knowledge about the domain will be made available to the agents by means of an ontology.
operating system n.
The application is running under a full, general-purpose operating system.
packet n.
The data packets related to a message are reassembled once they have arrived at their destination. * packet switching
password n.
When a user enters a password, it appears as a line of asterisks ******* so no one can read it.
patch v., n.
The computer was required to download another series of security patches. * Resource Builder patched and modified the application directly.