IT Words (Beispielssätze)
zuerst kommt das Wort, dann ein Satz in dem es verwendet wird. Lücken wurden aus zeitlichen Gründen nicht eingebaut.
zuerst kommt das Wort, dann ein Satz in dem es verwendet wird. Lücken wurden aus zeitlichen Gründen nicht eingebaut.
Kartei Details
Karten | 244 |
---|---|
Sprache | Deutsch |
Kategorie | Englisch |
Stufe | Universität |
Erstellt / Aktualisiert | 28.12.2011 / 09.06.2015 |
Weblink |
https://card2brain.ch/box/it_words_beispielssaetze
|
Einbinden |
<iframe src="https://card2brain.ch/box/it_words_beispielssaetze/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
source code n.
Source code is the only program format that is readable by humans. * open-source
spam n.
The act of sending spam is called, naturally, "spamming."
spreadsheet n.
Each location in a spreadsheet is called a cell, and each cell has a number, such as A3, B4, etc.
standalone n.
The various applications are archi_tecturally autonomous and can also be used separately as standalone solutions.
storage n.
I have the rights of reproduction and storage. * storage device * data storage * storage and retrieval of information
stream v., n.
The programme was streamed on the web 24 hours a day. * to stream files * video stream
stylus n.
Using a stylus, you can navigate the menu by touching icons on the screen.
surf v.
The new open-source operating system would primarily make it easier to surf the Internet * to surf the Web
swipe v.
The cash register only opens once the card has been swiped.
synchronization (also sync or synch) n.
The network facilitates fail-proof syn_chro____nization of the databases in both com_puter centres. * in sync * out of sync
tablet n.
They are capturing now signatures on the display of a tablet. * graphics tablet * digitizing tablet * tablet PC
tag n., v.
World Wide Web documents are set up using HTML tags. * end tag * start tag
tele prefix
telecommunications * telecommuter * teleconferencing * teletext * teleworking
terminal n.
This connectivity option is suitable for participants who already have a Bloomberg terminal.
thumbnail n.
Please click on the thumbnail to view a larger version of the image.
tool n.
The collaboration tool supports this exchange of information. * toolbar
topology n.
WhatÕs the network topology that a potential client will reside in? * bus topology * ring topology * star topology
transmit v.
Dial-up modems utilize traditional copper phone lines to transmit analogue signals. * to transmit data
transmission n.
The company markets fibre optic capacity for the transmission of data. * (a-)synchronous transmission
trojan horse n.
Using social engineering techniques, the Trojan horse could be disguised as a game or a handy new utility.
troubleshoot v.
Your hardware manufacturer will troubleshoot any driver installation problems.
unauthorized a.
Can we prevent any unauthorized access from other people or software programs?
unformatted a.
Unformatted text can be created using Notepad. * an unformatted disk
uninstall v.
Before you install the new version, you must first uninstall your current version.
uninterruptible po_wer supply (UPS) n.
A built-in uninterruptable power supply (UPS) and an automatic backup function ensure that data is not lost.
up a.
My new computer is finally up and running properly. * uptime
update v., n.
ItÕs high time they updated their soft_ware. * From now on users will have to do without a daily update. * file update
upgrade v., n.
Do you know how to upgrade to Ubuntu 9.10? * Software companies sell upgrades at a discount to prevent users from switching to other products.
upload v., n.
It wonÕt take long for this to upload. * Do you have any tips on how to handle file uploads?
username n.
Usernames, and often passwords, are required in multi-user systems.
utility n.
Open the utility for decompressing files, select the compressed, and specify where you want to save it.
virtual a.
We tested the control measures in virtual form before implementing them in practice. virtual office * virtual reality
volatile a.
The main memory (RAM) of the computer is volatile memory. * non-volatile memory * volatile storage
ware combining form
adware * freeware * groupware * hardware * malware * shareware * software * spyware
watermark n.
Do you want to protect your audio files with a watermark?
wiki n.
How can I put links to other pages in my own wiki entry? * Wikipedia
wild card n.
Wild card characters can be included if similar words should be looked for within the same search.
window n.
In a graphical interface, windows can be opened, closed, and moved around on the screen. * active window
wireframe n.
The output consists of a wireframe structure that can be imported directly into the program.
wireless a.
The wireless network consists of several access points and is available through_out the building. * wireless hotspot