DEPCH - Free Computer Help!

 DOS Commands|Shortcuts|XP Tips|Video|News     

  Disable start up programs to speed up your computer! How to

Click to visit Techterms.com some definitions below from Techterms  

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

 

 

 

 

 
Term Definition
Abandonware Also known as Abandon Warez, abandonware is a type of software developed several years ago that is no longer being produced, sold, or supported and is considered to be abandoned. However, although many of these programs appear to be abandoned or the companies that developed them are out of business, downloading and installing abandonware is illegal.
Access light Also known as the activity light, the access light is a LED on the front of a computer and/or disk drive that indicates when the computer or disk drive is being used.
Aggro In addition to in-game creatures aggro is also often used in chat and games to describe real-life aggro. For example, a player might say "parent aggro" or "gf aggro" as a way to let others communicating with that user that they need to log off or step away because their parents or girlfriend is giving them grief about being in the game or chatting.
AIMBOT Program / Software tool used with first person shooting games to help the player shoot more efficiently, commonly automatically aiming their gun to the enemy. Because this helps the user shoot more accurately with less skill, this is considered cheating when used. Various programs are available to help detect or not allow players to use Aimbots. One commonly used program is PunkBuster.
Alias Also known as a nick or handle, an alias is an alternative name for a computer, object, person, group, or user. Usually used to replace long names or to keep your own name private.
Anamorphic When referring to DVD movies, anamorphic is an ability that enables a DVD to automatically increase its size to match that of the TV the movie is being displayed on. This allows for better resolution and a better viewing experience. Most DVDs that support this feature will be labeled as Anamorphic Widescreen.
Applet A small Java application that is downloaded by an ActiveX or Java-enabled web browser. Once it has been downloaded, the applet will run on the users computer. Common applets include financial calculators and web drawing programs.
Application Computer software that performs a task or set of tasks, such as word processing or drawing. Applications are also referred to as programs.
Archived A file that contains one or more compressed files. Most archive formats are also capable of storing folders in order to reconstruct the file/folder relationship when decompressed.
ASCII American Standard Code for Information Interchange, an encoding system for converting keyboard characters and instructions into the binary number code that the computer understands.
ATA Advanced Technology Attachment. A computer disk drive interface standard.
ATAPI Short for AT Attachment Packet Interface, ATAPI is an extension to ATA that allows support for devices such as CD-ROM drives, Tape drives and other computer peripherals and not just hard disk drives. Before the release of ATA-4 or ATAPI-4, ATAPI was a separate standard from ATA. Additional information about ATA, ATAPI and other computer interfaces can be found on our Interface Page.
Audio CD Also commonly known as a music CD, an audio CD is any compact disc that contains audio tracks that enable the user to listen to music, speeches, books on tape, or any type of audio.
AutoPlay Also known as autorun, AutoPlay is a feature that was first introduced in Microsoft Windows 95 and above that enables CDs that have the proper files to automatically run when inserted into the computer. This feature enables for a much easier setup and/or program execution because the program developer can easily start the installation of a program or create a menu that is automatically displayed when the CD is inserted.
Ban To prohibit or deny access. For example, a user may be banned from a chat server because he or she has disobeyed the rules or may be banned from a server or game for cheating.
Bandwidth The capacity of a networked connection. Bandwidth determines how much data can be sent along the networked wires. Bandwidth is particularly important for Internet connections, since greater bandwidth also means faster downloads.
Bandwidth The amount of data you can send through a connection.
Battery A hardware device that supplies power to a device or appliance and enables that device or appliance to work without a power cord. The standard battery will power a small device or appliance for a length of time dependent on how much the device or appliance is used and how much power is required. Once fully utilized, the standard battery is disposed of. Today, many high-end devices such as computer laptops and cell phones use rechargeable batteries that allow a user to recharge the battery once it has been depleted of power.
Battery backup Hardware device used to keep a computer or related peripherals on for short periods of time if the power happens to be low or removed. The battery backup allows the computer to shutdown safely or continue to run if the power is off shortly. Large battery backups are commonly used for large corporate networks to safely shutdown servers if power is out for a long period of time or keep the servers running if the power happens to be out for a short period of time.
BD Short for Blu-ray Disc, BD or BD-ROM is an optical disc jointly developed by thirteen consumer electronics and pc companies such as Dell, Hitachi, Hewlett Packard, LG, Mitsubishi, Panasonic, Sony, TDK, and more. The blu-ray was first announced and introduced at the 2006 CES on January 4, 2006 and is capable of storing up to 25 GB on a single layer disc and 50 GB on a dual layer disc. Today Blu-ray is backed by Apple, Dell, Philips, Pioneer, Sony, Sun, TDK and other companies mentioned above and won HD DVD in the high definition disc format wars. On February 19, 2008 HD DVD called it quits making the Blu-ray players the primary HD players available.
BD-Rom Short for Blu-ray Disc, BD or BD-ROM is an optical disc jointly developed by thirteen consumer electronics and pc companies such as Dell, Hitachi, Hewlett Packard, LG, Mitsubishi, Panasonic, Sony, TDK, and more. The blu-ray was first announced and introduced at the 2006 CES on January 4, 2006 and is capable of storing up to 25 GB on a single layer disc and 50 GB on a dual layer disc. Today Blu-ray is backed by Apple, Dell, Philips, Pioneer, Sony, Sun, TDK and other companies mentioned above and won HD DVD in the high definition disc format wars. On February 19, 2008 HD DVD called it quits making the Blu-ray players the primary HD players available.
Benchmark Test used to measure or judge the performance of a hardware peripheral, software or the overall computer. These tests can be used to help compare how well a product may do against other products. Generally, the higher the benchmark the faster the component, software or overall computer is.
Beta A program that has not yet been introduced to the public but is being released to a select few to test, examine and report problems they may experience so that those errors can be fixed before the final release. This type of product should never be purchased. Often there are two types of beta testing, open beta and closed beta. Open beta refers to a type of beta testing that is open to any user. Closed beta refers to a type of beta testing that is only available to a select few individuals or to company individuals.
Binary Code The most basic language a computer understands, it is composed of a series of 0s and 1s. The computer interprets the code to form numbers, letters, punctuation marks, and symbols.
BIOS Basic Input/Output System | more
Bit The smallest piece of computer information, either the number 0 or 1.
Bit Torrent A file sharing service that breaks a file into pieces and distributes them among several participating users. When you download a torrent you are also uploading it to another user.
Blog A web journal. Updating is blogging.
Blue Book Book that defines the standards of the Enhanced Music CD specification, also known as CD-Extra or CD-Plus. These discs allow for data as well as audio to be contained on one disc and not cause damage to players not capable of reading data.
Boosting In computer gamming boosting is the method that allows a player to look over a high object or jump onto a higher object by jumping on another players back who is crouched down. Although this is part of the game many players consider this type of playing cheating.
Boot To start up a computer. Cold boot—restarting computer after having turned off the power. Warm boot—restarting computer without having turned off the power.
Bots Short for robots, a bot is a fictitious character, programmed character or a piece of software designed to mimic a real character or player. A bot may also be a software program designed to do a specific task such as gather a listing of web sites with the latest news. Shorthand for Back On Topic, BOT is commonly used in chat rooms and other text message communications. Below is an example of how this could be used.
Broadband Connection to internet via cable modem.
Bronzing Also known as CD bronzing, bronzing is a type of corrosion that is similar to CD rot that is caused by a manufacturing defect. When bronzing occurs the top and/or bottom of the disc changes colors often changing from a silver color to a bronze, brown, yellow, or gold tint and over time can cause the CD to stop working. The company largely responsible for this defect was Philips & DuPont Optical (PDO) in Lancashire, United Kingdom with discs manufactured between 1988 and 1993. Because this is an actual manufacturing defect no matter how the disc is handled if its defective it will eventually become bad. However, as mentioned above this issue widely only affected discs manufactured in the late 80s and early 90s by PDO.
Browser Software used to navigate the Internet. Netscape Navigator and Microsoft Internet Explorer are todays most popular browsers for accessing the World Wide Web.
Browser A program you use to view web sites.
Buff In computer games a buff often refers to a bonus that is given to a game character that extends his or her ability. Often a buff is gained from an in-game item, from another players ability, and/or a spell. For example, in the MMORPG game EverQuest a popular buff is the SoW (Spirit of Wolf) buff that increased the movement speed of your character.
Bug A malfunction due to an error in the program or a defect in the equipment.
Burn Term used to describe the action of creating a CD or other recordable disc.
Burner Slang used for CD-ROM Burner, more commonly known as a CD-R.
BYOC Short for Bring Your Own Computer, BYOC is a term used to tell users who may be attending a computer related party to bring their own computers if they wish to participate.
Byte Most computers use combinations of eight bits, called bytes, to represent one character of data or instructions. For example, the word “cat” has three characters, and it would be represented by three bytes.
Cable select Often abbreviated as CS, cable select is a disk drive setting that will allow a cable select compatible cable to determine what drive is the master and slave based off where the drives are connected to the cable. For cable select to work the both IDE / EIDE drives must have their jumpers set to CS and be connected to a cable that supports cable select.
Cache A small data-memory storage area that a computer can use to instantly re-access data instead of re-reading the data from the original source, such as a hard drive. Browsers use a cache to store web pages so that the user may view them again without reconnecting to the Web.
CAD-CAM Computer Aided Drawing-Computer Aided Manufacturing. The instructions stored in a computer that will be translated to very precise operating instructions to a robot, such as for assembling cars or laser-cutting signage.
Caddy A container that holds something. An external container used on earlier CD-ROM drives that would hold and protect the disc. A caddy would be inserted into the drive with the CD instead of simply placing the CD into a computer like most CD and DVD drives today.
Camper Term often used in computer gaming to describe an individual who remains in one position for a good majority of the game, picking off other players as they come to them. Generally, this position gives that individual an advantage over other players and in many cases, helps defend an item or objective. For example, in the computer game Quake, a player may position himself or herself on a platform with the rail gun, allowing him or her to shoot other players without allowing them the ability to fight back easily. Generally, a player who camps too much is looked down upon by the other players.
Carebear A derogatory term given to other online game players who only want to take the easy way and/or make the game as non-challenging as possible. For example, when referring to a MMORPG game players may refer to servers that are non-PvP as carebear servers.
CD player Program or hardware device used to play and listen to standard audio CDs.
CDDA Short for Compact Disk Digital Audio, CDDA is one of the standards defined in the red book and is how a compact disc drive reads audio tracks on a CD.
CDDB Short for Compact Disc Database, CDDB is a database used to store audio CD track information. The CDDB is what allows many computer software programs to recognize a CD and list the CD artist, album, and track information. The CDDB was initially created by Ti Kan who later sold the project to Escient. In March 2001 the CDDB was officially renamed to Gracenote and although initially free to access this database now requires a license to access, prompting many programs to switch to freedb.
CD-E Short for CD erasable, CD-E is a format introduced to the public in 1995 and allows users to create, erase and use a CD over-and-over (up to 10,000 times). Today, a CD-E is commonly known and referred to as CD-RW.
CDFS Short for CD File System, CDFS, in Linux systems, is a file system that exports all tracks and boot images on a CD as normal files. In Windows, CDFS is the Windows driver for CD-ROM players. CDFS replaces MSCDEX that was used for MS-DOS and is a 32-bit program that runs in protected mode. In addition, CDFS uses a VCACHE driver to control the CD-ROM disk cache allowing for a smoother play back.
CD-i Short for Compact Disc-Interactive, CD-i is a type of CD format and product specified in 1986. A CD-i player contains all the necessary components (CPU, Memory and operating system) to fully run the CD. The CD-i is able to store 19 hours of audio, 7,500 still images and 72 minutes of full screen video. Today, the CD-i technology is generally only found in education and training locations.
CD-PROM Short for Compact Disc-Programmable ROM, CD-PROM was developed by Kodak as a picture CD format that combines recordable and read-only formats on a single disc.
CD-R Also known as CD-WO (Write once) or WORM (Write Once Read Many) drive. CD-R is short for CD-Recordable and is a type of writable disc and drive that is capable of having information written to the disc once and then having that disc read many times after that. If the data is not written to the disc properly, has errors, or has the incorrect information that disc or portions of that disc cannot be erased.
CDRFS Short for CD-R File System, CDRFS is a file system developed specifically for CD-R discs by Sony Corporation that makes a CD-R as easy to use as a floppy drive. CDRFS uses a new recording technique called packet recording, which can allow several advantages to CD-Rs, such as allowing the CD-R to look re-Writable.
CD-Rom Short for Compact Disc-Read Only Memory, CD-ROM drives are CD-Players inside computers that can have speeds in the range from 1x and beyond, and have the capability of playing audio CDs and computer data CDs.
CD-WO Compact Disc-Write Once, CD-WO is another name for a CD-R disc.
CGI Common Gateway Interface. A programming standard that allows visitors to fill out form fields on a Web page and have that information interact with a database, possibly coming back to the user as another Web page. CGI may also refer to Computer-Generated Imaging, the process in which sophisticated computer programs create still and animated graphics, such as special effects for movies.
Chat Typing text into a message box on a screen to engage in dialog with one or more people via the Internet or other network.
Client A single user of a network application that is operated from a server. A client/server architecture allows many people to use the same data simultaneously. The programs main component (the data) resides on a centralized server, with smaller components (user interface) on each client.
Coaster Common slang used for either an AOL compact disc or a compact disc that is no longer good, either because of scratches or because of a failure during its creations. The term coaster comes from the coaster commonly used to keep watermarks from being made on tables from drinks. This term is also used to describe recordable discs that have become bad after a burn has failed.
Codec Software or hardware that compresses and decompresses audio and video data streams.
Coin cell battery Also known as a button cell or watch battery, a coin cell battery is a battery contained on the computers motherboard that allows it to retain important system settings and remember what the time and date is while the computer is off. Large battery backups are commonly used for large corporate networks to safely shutdown servers if power is out for a long period of time or keep the servers running if the power happens to be out for a short period of time.
Compact Disc Abbreviated as CD, a compact disc is a flat round storage medium that is read by a laser in a CD-ROM drive. The standard CD is capable of holding 72 minutes of music or 650 MB of data. 80 minute CDs are also commonly used to store data and are capable of containing 700 MB of data.
Con A MS-DOS and Microsoft Windows reserved word. When referring to games con is short for consider and is an ability or command used to find out additional information about the targeted creature or player. For example in the MMORPG game EverQuest a player can type: /con to find out additional information about the target. Another term used to describe a type of deception or trick. For example, phishing is a type of con that often deceives the user to give away their log in information. Any type of negative feedback or lack of features of a product.
Cookie A text file sent by a Web server that is stored on the hard drive of a computer and relays back to the Web server things about the user, his or her computer, and/or his or her computer activities.
Cookie Info sent by web server to web browser.
CPU Central Processing Unit. The brain of the computer.
Cracker A person who “breaks in” to a computer through a network, without authorization and with mischievous or destructive intent (a crime in some states).
Crash A hardware or software problem that causes information to be lost or the computer to malfunction. Sometimes a crash can cause permanent damage to a computer.
Credits In general, refers to a listing of all the people who helped develop and bring a product to the public. For example, after a computer game has been completed, it may list the credits of all the people who helped develop, design, test and bring the game to the public.
CSS Cascading Style Sheets (CSS) is a stylesheet language used to describe the presentation of a document written in a markup language. Its most common application is to style web pages written in HTML and XHTML, but the language can be applied to any kind of XML document, including SVG and XUL.
CTF Short for Capture The Flag, CTF is a type of game played in first person shooter (FPS) games where a user must get to an enemys base, grab their flag and bring it back to their bases flag without dying. The team with the most flag captures wins the game.
Cursor A moving position-indicator displayed on a computer monitor that shows a computer operator where the next action or operation will take place.
CYA Shorthand for see ya, CYA is commonly used in chat rooms to let users know you are leaving the room. This term is also another way of saying "good bye" to users who may be leaving.
Cyberspace Slang for the Internet
DAE Short for Digital Audio Extraction, DAE is the process of taking audio tracks from an audio CD and moving them to a hard disk drive or other recordable media.
data organized information
Database A collection of similar information stored in a file, such as a database of addresses. This information may be created and stored in a database management system (DBMS).
DDR An advanced version of SDRAM.
DDR2 Double data rate 2. Improved version of DDR that is faster.
Debug Slang. To find and correct equipment defects or program malfunctions.
Default The pre-defined configuration of a system or an application. In most programs, the defaults can be changed to reflect personal preferences.
Desktop The main directory of the user interface. Desktops usually contain icons that represent links to the hard drive, a network (if there is one), and a trash or recycling can for files to be deleted. It can also display icons of frequently used applications, as requested by the user.
Desktop Publishing The production of publication-quality documents using a personal computer in combination with text, graphics, and page layout programs.
DFMC Short for Direct Methanol Fuel Cell, DFMC is a type of battery from Toshiba that utilizes concentrated methanol to power a device.
DIMM Dual in line memory module.
Directory A list of files stored in the computer.
DivX A video codec from DivXNetworks, based on MPEG 4
DRAM Dynamic random access memory. Slower and cheaper than SRAM.
DRM Digital Rights Management. A system for authorizing the viewing of playback of copyrighted material on a user's computer of digital music player.
DSL Digital Subscriber Line.
E- mail A message of some sort sent from one computer to another computer. Could contain text, graphics or video.
EPROM Eraseable Programmable Read - Only Memory
Fire Wall Separates a network into two or more parts for security.
FTP File Transfer Protocol. Method of moving files.
Gadget A small machine or device which does something useful. You sometimes refer to something as a gadget when you are suggesting that it is complicated and unnecessary.
GHz Short for gigahertz, GHz is a unit of measurement for alternating current (AC) or electromagnetic (EM) wave frequencies equal to 1,000,000,000 Hz. 

When referring to a computer processor or CPU, GHz is a clock frequency, also known as a clock rate or clock speed, representing a cycle of time. An oscillator circuit supplies a small amount of electricity to a crystal each second that is measured in MHz or GHz, where "Hz" is the abbreviation of Hertz, "M" representing Mega, or one million, and "G" representing Giga, or one thousand million. In addition to GHz and MHz, there is KHz, or 1,000 Hz.

 

Gigabyte Most standards is equal to 1,073,741,824 bytes. However, the IEC defines a gigabyte or GB equal to  1,000,000,000 bytes. Therefore, a GB could be either of these values. Many hard disk drive manufacturers and computer manufacturers will define what they consider a gigabyte to equal in the fine print.
Google Inspired from the term googol, Google is a popular and widely used search engine that was first developed by Sergey Brin and Larry Page in 1996 for a research project at Stanford University. and later incorporated on September 7, 1998. Because of its large database of indexed pages and its page rank technique to properly sort search results Google quickly became everyone's favorite search engine.
Hard Drive Hard disk drive (HDD) is a non volatile storage device which stores digitally encoded data on rapidly rotating platters with magnetic surfaces. | Formatting
HTML Hypertext Markup Language. Language used to created documents for the web.
HTTP Hypertext Transfer Protocol. The protocol for moving hypertext files across the web.
IDE Integrated Device Electronics.
Internet Networks that are connected using the TCP/IP protocol.
Intranet A private network inside a company.
IP Number Internet Protocol Number. Every machine has a unique IP number.
JAVA A network friendly programming language invented by Sun Microsystems.
JPEG The most common format for image files.
Keyboard One of the main input devices used on a computer, a PC's keyboard looks very similar to the keyboards of electric typewriters, with some additional keys.
Keyboard Shortcut Also known as a shortcut, accelerator key, hot key, or mnemonic, a keyboard shortcut is one or more keys used to perform a menu function or other common functions in an application, usually also accessible through a mouse-click. Keyboard shortcuts usually are not as intuitive as point & click mouse actions; however, they can be utilized by the novice users in frequently used programs to get to locations much faster than using the mouse.
Kilobyte Abbreviated as K, and KB, a kilobyte is equal to 1,024 bytes, however is also defined by the IEC as equal to 1,000 bytes. Therefore, a KB could really equal either of these values, however is widely accepted as being 1,024 bytes.
LAN Local Area Network. A network limited to the immediate area.
Li-Ion Short for Lithium-Ion, Li-Ion is a fragile technology requiring protector circuit, the Li-ion is used where very high energy density is needed and cost is secondary. Li-Ion batters are generally more expensive.
Maillist Allows you to send to one address and it copies and sends to a list that you created.
Munge To Munge (munj) is to create a strong password by character substitution. The word "Munge" is an acronym for Modify Until Not Guessed Easily. A strong password contains characters from at least 3 of these 4 character sets lower case, upper case, numbers or special characters !@#$%^*
Network Any time you connect two or more computers.
Ni-Cad Trademarked name for a Nickel-Cadmium battery owned by SAFT America Inc. Ni-Cad is a type of rechargeable battery, made mostly of of nickel and cadmium. A primary problem with nickel-cadmium batteries was that they needed to be completely drained of power before they could be recharged. Known as a memory loss or memory effect, if the battery was not completely drained, once the battery reaches its last low level, the battery would go dead, assuming that no power was left.
NiMH Short for Nickel-Metal Hydride and also abbreviated as Ni-MH, NiMH is a type of rechargeable battery used primarily in portable computers.
Off-line storage Term used to describe a type of storage that cannot be accessed by the computer.  A good example of off-line storage is a floppy disk. Off-line storage allows a user to store information that will not be affected by computer viruses or hardware failure.
PATA ATA technology was retroactively renamed Parallel ATA to distinguish it from Serial ATA. Both are IDE although IDE is often misused to indicate PATA.
Peer to peer A communications environment that allows all computers in the network to act as servers and share their files with other on the network.
Portal A site that the owner positions as an entrance to other sites on the internet. It typically has search engines and free email.
POST Beep codes are part of the PC's Power On Self Test (POST) routine. One beep means the system has passed the test and the BIOS believes that the CPU and memory and video are functioning properly.
PowerNow A feature available with AMDs K6-2+, K6-III+, mobile Athlon, Turion 64, and later AMD mobile processors that allows a user to control features of the processor through software that lower its speed. By reducing the overall speed of the processor it helps conserve power and reduce the heat produced by the processor, which saves on battery life.
Q-cable Type of cable that contains 68-wires and is used in conjunction with a P-cable on a 32-bit Wide SCSI cable. With the release of the SCSI-3 specification the Q-cable has become obsolete.
Query When referring to a database or search, a query is a field or option used to locate information within a database or other location.
R/W Short for Read/Write, R/W is a drive and/or media that is capable of being written to or read from, as well as being written to or read from many times. This term is commonly used and found on CD-RW drives, drives capable of of recording and reading CD-RW discs.
RAID Redundant Array of Independent Discs.
RAM Random access memory.
Read - only Allowing the file to be only viewed and not written to.
Router A special purpose computer that handles the connection between 2 or more Packet Switched networks.
Safe Mode Safe Mode is a way for the Windows operating system to run with the minimum system files necessary. It uses a generic VGA display driver instead of the vendor-specific driver, which means you will likely be working with only 16 colors in a resolution of 640x480. Safe Mode also turns off all third-party drivers for other peripherals such as mice, keyboards, printers, and scanners. In basic Safe Mode, networking files and settings are not loaded, meaning you won't be able to connect to the Internet or other computers on a network. So why would I ever want to boot in Safe Mode? Well, that's a good question. Sometimes, Windows may not fully load after an unexpected crash and the only way to get the computer to boot is to use Safe Mode. Once you have successfully booted the computer in Safe Mode, you can run a disk utility program to repair corrupted files or directories on the hard drive. You can also reboot into Safe Mode to see your display when you get a "Sync Out of Range" message on your screen. There may also be times when your computer is performing sluggishly and becomes annoyingly slow. Booting into Safe Mode will allow you to diagnose the problem and determine which files are slowing down the computer. When calling technical support, the support person may ask you to boot into Safe Mode to begin the troubleshooting. To boot your Windows computer into Safe Mode, hold down the F8 key while the computer is starting up. Then select Safe Mode from the list of boot options.
Samba Most people know of samba as a type of rhythmic dance music from Brazil that uses a 2/4 time signature. In the computer world, samba has a different meaning but is no less exciting (if you are a computer nerd). Samba is an open-source software implementation of the SMB networking protocol used by Windows computers. (If you look closely, you can see the correlation between the two names.) Samba allows other computer platforms, such as Mac OS X, Unix, Linux, IBM System 390, and OpenVMS to interact with Windows computers on the same network. This includes sharing files and using shared devices such as printers connected to other computers within the local network. Because SMB was developed only for Windows, without Samba, other computer platforms would be isolated from Windows machines, even if they were part of the same network. Fortunately, Samba helps different types of computers work together as if they were all based on the same platform. This gives network administrators the freedom to choose multiple types of computers systems when setting up a network. Now that's a reason to dance!
Sample A sample is a digital representation of an analog signal. Both digital video and digital audio files are created using samples. The quality of the sample is determined by the sampling rate, or the bit rate the signal is sampled at. What we see and hear in the real world is in analog format (our bodies process analog information). Computers, on the other hand, can only understand digital information. Therefore, audio and video signals must be converted to a digital format in order to be stored on a computer or saved to a CD or DVD. The converted data is called a sample. The term "sample" is often used to refer to short audio clips used for playing back sounds. For example, a violin sound or a bird chirp may be sampled and then played back from a digital keyboard (or synthesizer). However, samples can refer to entire songs or movies, since the information is technically one long sample. To learn more about how samples are created, view the definition of sampling, which is the process of recording and creating digital samples.
Sampling Before digital recording took over the audio and video industries, everything was recorded in analog. Audio was recorded to devices like cassette tapes and records. Video was recorded to Beta and VHS tapes. The media was even edited in analog format, using multichannel audio tapes (such as 8-tracks) for music, and film reels for video recordings. This method involved a lot of rewinding and fast-forwarding, which resulted in a time-consuming process. Fortunately, digital recording has now almost completely replaced analog recording. Digital editing can be done much more efficiently than analog editing and the media does not lose any quality in the process. However, since what humans see and hear is in analog format (linear waves of light and sound), saving audio and video in a digital format requires converting the signal from analog to digital. This process is called sampling. Sampling involves taking snapshots of an audio or video signal at very fast intervals ? usually tens of thousands of times per second. The quality of the digital signal is determined largely by the sampling rate, or the bit rate the signal is sampled at. The higher the bit rate, the more samples are created per second, and the more realistic the resulting audio or video file will be. For example, CD-quality audio is sampled at 44.1 kHz, or 44,100 samples per second. The difference between a 44.1 kHz digital recording and the original audio signal is imperceptible to most people. However, if the audio was recorded at 22 kHz (half the CD-quality rate), most people would notice the drop in quality right away. Samples can be created by sampling live audio and video or by sampling previously recorded analog media. Since samples estimate the analog signal, the digital representation is never as accurate as the analog data. However, if a high enough sampling rate is used, the difference is not noticeable to the human senses. Because digital information can be edited and saved using a computer and will not deteriorate like analog media, the quality/convenience tradeoff involved in sampling is well worthwhile.
SAN (Storage Area Network) Stands for "Storage Area Network." A SAN is a network of storage devices that can be accessed by multiple computers. Each computer on the network can access hard drives in the SAN as if they were local disks connected directly to the computer. This allows individual hard drives to be used by multiple computers, making it easy to share information between different machines. While a single server can provide a shared hard drive to multiple machines, large networks may require more storage than a single server can offer. For example, a large business may have several terabytes of data that needs to be accessible by multiple machines on a local area network (LAN). In this situation, a SAN could be setup instead of adding additional servers. Since only hard drives need to be added instead of complete computer systems, SANs are an efficient way to increase network storage.
SATA Serial ATA.
SATA (Serial Advanced Technology Attachment) Stands for "Serial Advanced Technology Attachment," or "Serial ATA." It is an interface used to connect ATA hard drives to a computer's motherboard. SATA transfer rates start at 150MBps, which is significantly faster than even the fastest 100MBps ATA/100 drives. For this and other reasons, Serial ATA is likely to replace the previous standard, Parallel ATA (PATA), which has been around since the 1980s. Besides faster transfer rates, the SATA interface has several advantages over the PATA interface. For one, SATA drives each have their own independent bus, so there is no competition for bandwidth like there is with Parallel ATA. They also use smaller, thinner cables, which allows for better airflow inside the computer. SATA cables can be as long as one meter, while PATA cables max out at 40cm. This gives manufacturers more liberty when designing the internal layout of their computers. Finally, Serial ATA uses only 7 conductors, while Parallel ATA uses 40. This means there is less likely to be electromagnetic interference with SATA devices. In summary, Serial ATA is a better, more efficient interface than the dated PATA standard. If you are looking to buy a computer that will support fast hard drives for years to come, make sure it comes with a SATA interface.
Screenshot A screenshot, or screen capture, is a picture taken of your computer's desktop. This may include the desktop background, icons of files and folders, and open windows. It may also include whatever is being displayed by currently running programs. Screenshots are and easy way to save something you see on the screen, such as an open window, image, or text article. However, because screenshots are saved in an image format, the text saved in a screenshot will not be editable. Both the Mac OS and Windows operating systems make it easy to take screenshots. Just use the following keyboard shortcuts to capture the current screen displayed on your computer: Mac OS X: Command-Shift-3: Saves a screenshot of the entire desktop to an image file on the desktop. Command-Shift-4: Saves a screenshot of a selection selected with the cursor to an image file on the desktop. Command-Control-Shift-3: Saves a screenshot of the entire desktop to the clipboard. Command-Control-Shift-4: Saves a screenshot or a selection selected with the cursor to the clipboard. Windows XP: Print Screen: Saves a screenshot of the entire desktop to the clipboard. Alt+Print Screen: Saves a screenshot of the active window to the clipboard.
Script A computer script is a list of commands that are executed by a certain program or scripting engine. Scripts may be used to automate processes on a local computer or to generate Web pages on the Web. For example, DOS scripts and VB Scripts may be used to run processes on Windows machines, while AppleScript scripts can automate tasks on Macintosh computers. ASP, JSP, and PHP scripts are often run on Web servers to generate dynamic Web page content. Script files are usually just text documents that contain instructions written in a certain scripting language. This means most scripts can be opened and edited using a basic text editor. However, when opened by the appropriate scripting engine, the commands within the script are executed. VB (Visual Basic) scripts, for example, will run when double-clicked, using Windows' built-in VB scripting support. Since VB scripts can access and modify local files, you should never run a VB script that you receive as an unknown e-mail attachment.
Scroll Bar When the contents of a window are too large to be displayed entirely within the window, a scroll bar will appear. For example, if a Web page is too long to fit within a window, a scroll bar will show up on the right-hand side of the window, allowing you to scroll up and down the page. If the page is too wide for the window, another scroll bar will appear at the bottom of the window, allowing you to scroll to the left and right. If the window's contents fit within the current window size, the scroll bars will not appear. The scroll bar contains a slider that the user can click and drag to scroll through the window. As you may have noticed, the size of the slider may change for different windows. This is because the slider's size represents what percentage of the window's content is currently being displayed within the window. For example, a slider that takes up 75% of the scroll bar means 75% of the content fits within the current window size. A slider that fills only 10% of the scroll bar means only 10% of the window's contents are being displayed within the current window size. Therefore, if two windows are the same size, the one with the smaller slider has more content than the one with the larger slider. Most scroll bars also contain up and down or left and right arrows that allow the user to scroll in small increments by clicking the arrows. However, clicking and dragging the slider is much faster, so the arrow keys are typically not used as often. Also, some mice have a scroll wheel that allows the user to scroll by dragging the wheel instead of clicking and dragging within the scroll bar.
Scroll Wheel Computer windows are often not large enough to display the entire contents of the window at one time. Therefore, you may need to scroll through the window to view all the contents. Traditionally, this has been done by clicking and dragging the slider within the scroll bar. However, many mice now come with scroll wheels that make the scrolling process even easier. The scroll wheel typically sits between the left and right buttons on the top of a mouse. It is raised slightly, which allows the user to easily drag the wheel up or down using the index finger. Pulling the scroll wheel towards you scrolls down the window, while pushing it away scrolls up. Most modern mice include a scroll wheel, since it eliminates the need to move the cursor to the scroll bar in order to scroll through the window. Therefore, once you get accustomed to using a scroll wheel, it can be pretty difficult to live without. Most scroll wheels only allow the user to scroll up and down. However, some programs allow the user to use a modifier key, such as Control or Shift, to change the scrolling input to left and right. Some mice even have a tilting scroll wheel that allows the user to scroll left and right. The Apple Mighty Mouse has a spherical scrolling mechanism (called a scroll ball) that allows the user to also scroll left and right and even diagonally. Whatever the case, any type of scroll wheel is certainly better than nothing.
Scrolling Most computer programs display their content within a window. However, windows are often not large enough to display their entire content at once. Therefore, you may have to scroll through the window to view the rest of the contents. For example, on some monitors, a page from a word processing document may not fit within the main window when viewed at 100%. Therefore, you may have to scroll down the window to view the rest of the page. Similarly, many Web pages do not fit completely within a window and may require you to scroll both vertically and horizontally to see all the content. To scroll up or down within a window, simply click the scroll bar on the right-hand side of the window and drag the slider up or down. If the window requires horizontal scrolling as well, click the scroll bar at the bottom of the window and drag the slider to the right or left. Some computer mice also include a scroll wheel that allows you to scroll through the window by rolling the wheel back and forth.
SCSI (Small Computer System Interface) Stands for "Small Computer System Interface," and is pronounced "scuzzy." SCSI is a computer interface used primarily for high-speed hard drives. This is because SCSI can support faster data transfer rates than the commonly used IDE storage interface. SCSI also supports daisy-chaining devices, which means several SCSI hard drives can be connected to single a SCSI interface, with little to no decrease in performance.
SD (Secure Digital) Stands for "Secure Digital." It is a type of memory card used for storing data in devices such as digital cameras, PDAs, mobile phones, portable music players, and digital voice recorders. The card is one of the smaller memory card formats, measuring 24mm wide by 32mm long and is just 2.1mm thick. To give the cards some orientation, the top-rght corner of each SD card is slanted. Even though the cards are extremely small, as of late 2004, they can hold up to 8GB of data. Part of the reason the cards are called "Secure Digital" cards is because the cards have a copyright protection feature built in. The security feature, called "key revocation" means protected data on the card can only be read by specific devices. The cards can have both secured and unsecured areas on them for copyrighted and non-copyrighted data. For more information on SD cards, visit the SD Card Association.
SDRAM Synchronous Dynamic Random Access Memory. Is an improvement to standard DRAM.
SDRAM (Synchronous Dynamic Random Access Memory) Stands for "Synchronous Dynamic Random Access Memory." Yeah, it's a mouthful, but if you memorize it, you can really impress your friends. SDRAM is an improvement to standard DRAM because it retrieves data alternately between two sets of memory. This eliminates the delay caused when one bank of memory addresses is shut down while another is prepared for reading. It is called "Synchronous" DRAM because the memory is synchronized with the clock speed that the computer's CPU bus speed is optimized for. The faster the bus speed, the faster the SDRAM can be. SDRAM speed is measured in Megahertz, which makes it easy to compare the processor's bus speed to the speed of the memory.
SDSL (Symmetric Digital Subscriber Line) Stands for "Symmetric Digital Subscriber Line." SDSL is a type of of DSL, which is used for transferring data over copper telephone lines. The "symmetric" part of the term means that an SDSL connection has the same maximum upload and download speeds. ADSL, on the other hand, typically provides much faster download speeds than upload speeds. Because most Internet users download much more data than they upload, ISPs usually offer ADSL connections rather than SDSL.
Search Engine Google, Excite, Lycos, AltaVista, Infoseek, and Yahoo are all search engines. They index millions of sites on the Web, so that Web surfers like you and me can easily find Web sites with the information we want. By creating indexes, or large databases of Web sites (based on titles, keywords, and the text in the pages), search engines can locate relevant Web sites when users enter search terms or phrases. When you are looking for something using a search engine, it is a good idea to use words like AND, OR, and NOT to specify your search. Using these boolean operators, you can usually get a list of more relevant sites.
Sector A sector is the smallest unit that can be accessed on a hard disk. Each platter, or circular disk of a hard disk is divided into tracks, which run around the disk. These tracks get longer as they move from the middle towards the outside of the disk, so there are more sectors along the tracks near the outside of the disk than the ones towards the center of disk. This variance in sectors per track is referred to as "zoned-bit recording." Large files can take up thousands of sectors on a disk. Even if one of these sectors becomes corrupted, the file will most likely be unreadable. While a disk utility program may be able to fix corrupted data, it cannot fix physical damage. Physically damaged sectors are called "bad sectors." While your computer may recognize and bypass bad sectors on your hard disk, certain bad sectors may prevent your disk from operating properly. Yet another good reason to always back up your data!
SEO (Search Engine Optimization) Stands for "Search Engine Optimization." Just about every Webmaster wants his or her site to appear in the top listings of all the major search engines. Say, for example, that Bob runs an online soccer store. He wants his site to show up in the top few listings when someone searches for "soccer shoes." Then he gets more leads from search engines, which means more traffic, more sales, and more revenue. The problem is that there are thousands of other soccer sites, whose Webmasters are hoping for the same thing. That's where search engine optimization, or SEO, comes in. SEO involves a number of adjustments to the HTML of individual Web pages to achieve a high search engine ranking. First, the title of the page must include relevant information about the page. In the previous example, Bob's home page might have the title, "Bob's Soccer Store -- Soccer Shoes and Equipment." The title is the most important part of SEO, since it tells the search engine exactly what the page is about. Within Bob's home page, it would be helpful to repeat the words "soccer" and "soccer shoes" a few times, since search engines also scan the text of the pages they index. Finally, there are META tags. These HTML tags can really distinguish your site from the rest of the pile. The META tags that most search engines read are the description and keywords tags. Within the description tags, you should type a brief description of the Web page. It should be similar but more detailed than the title. Within the keywords tags, you should list 5-20 words that relate to the content of the page. Using META tags can significantly boost your search engine ranking. So what happens when a bunch of sites all have similar titles, content, and META tags? Well, most search engines choose to list the most popular sites first. But then how do you get into the most popular sites? The best way is to submit your site to Web directories (not just search engines) and get other sites to link to yours. It can be a long climb to the top, but your perserverance will pay off. For more tips on SEO, visit the Submit Corner Web site.
Serial Port The serial port is a type of connection on PCs that is used for peripherals such as mice, gaming controllers, modems, and older printers. It is sometimes called a COM port or an RS-232 port, which is its technical name. If that's not enough to confuse you, there are two types of serial ports -- DB9 and DB25. DB9 is a 9-pin connection, and DB25 is, you guessed it, a 25-pin connection. A serial port can only transmit one bit of data at a time, whereas a parallel port can transmit many bits at once. The serial port is typically the slowest port you'll find on a PC, if you find one at all. Most newer computers have replaced serial ports with much faster and more compatible USB ports.
Server As the name implies, a server serves information to computers that connect to it. When users connect to a server, they can access programs, files, and other information from the server. Common servers are Web servers, mail servers, and LAN servers. A single computer can have several different server programs running on it.
Server A computer, or a software package, that provides a specific kind of service to a client software running on other computers.
Service Pack A service pack is a software package that contains several updates for an application or operating system. Individual updates are typically called software updates or patches. When a software company has developed several updates to a certain program or operating system, the company may release all the updates together in a service pack. Many Windows users are familiar with service packs because of the popular service pack released for Windows XP, called SP2. Windows XP SP2 not only included typical updates such as bug fixes and security updates, it added new features. Some of the features included new security tools, interface enhancements to Internet Explorer and Outlook Express, and new DirectX technologies. In fact the SP2 service pack for Windows XP was so comprehensive, many newer Windows programs require it in order to run. Service packs are usually offered as free downloads from the software developer's website. A software update program on your computer may even prompt you to download a service pack when it becomes available. Typically, it is a good idea to download and install new service packs. However, is may also be wise to wait a week or two after the service pack is released to make sure no new bugs or incompatibilities are introduced with the service pack. If you do not have a high-speed Internet connection, you can often purchase a service pack update CD for a small charge. While service packs are commonly released for Microsoft products, not all companies use them. Apple's Mac OS X, for example, uses the Software Update program to install incremental updates to the operating system. Each Mac OS X update includes several small updates to the operating system and bundled applications, much like a service pack.
Shareware There is commercial software and then there is shareware. With commercial software, you have to pay for the product before you use it. With shareware, you can use the product for a trial period and then decide if you want to keep it. If you want to keep the software after the trial period is up, you're supposed to (and should) register the product and pay the shareware fee. As an extra incentive to pay for the software, many shareware programs disable certain features in the non-registered version and some will keep bugging you to register the program after the trial period has expired. Shareware programs are usually less expensive than commercial software programs, but they are usually less expensive to develop as well. This is why shareware programs are typically not as robust as commercial software programs. However, there are numerous shareware programs out there, such as system utilities, that can be very useful. The most common way to get shareware these days is off the Internet. Check out C|net's Shareware.com for a huge selection of these great little programs.
Shell Most people know of shells as small protective coverings for certain animals, such as clams, crabs, and mollusks. You may also find a shell on the outside of an egg, which I highly recommend you remove before eating. In the computer science world, however, a shell is a software program that interprets commands from the user so that the operating system can understand them and perform the appropriate functions. The shell is a command-line interface, which means it is soley text-based. The user can type commands to perform functions such as run programs, open and browse directories, and view processes that are currently running. Since the shell is only one layer above the operating system, you can perform operations that are not always possible using the graphical user interface (GUI). Some examples include moving files within the system folder and deleting files that are typically locked. The catch is, you need to know the correct syntax when typing the commands and you may still be prompted for a password in order to perform administrative functions. Shells are most commonly associated with Unix, as many Unix users like to interact with the operating system using the text-based interface. Two common Unix shells are the Bourne shell and the C Shell, which is used by BSD. Most Unix systems have both of these shells available to the user. Windows users may be more familiar with DOS, the shell that has long been included with the Windows operating system. Most computer users have no need to use the shell interface, but it can be a fun way to perform functions on your computer, as well as impress your friends.
SIMM Single in line memory module.
SIMM (Single In-Line Memory Module) Stands for "Single In-Line Memory Module." This is an older type of computer memory. A SIMM is a small circuit board with a bunch of memory chips on it. SIMMs use a 32-bit bus, which is not as wide as the 64-bit bus dual in-line memory modules (DIMMs) use. Newer processors require a 64-bit memory bus, so it is best to use DIMMs. Sometimes you can get away with installing SIMMS, but they have to be installed in pairs.
Site Map A site map, sometimes written "sitemap," is an overview of the pages within a website. Site maps of smaller sites may include every page of the website, while site maps of larger sites often only include pages for major categories and subcategories of the website. While site maps can be organized in a variety of ways, most use an outline form, with pages arranged by topic. This gives visitors a good overall picture of how the site is organized and clearly defines all the resources the website has to offer. While a properly designed website should allow visitors to navigate the entire site without using the site map, incorporating a site map gives users another means of locating pages. For this reason, each page listed in a site map is typically linked to the page it represents. This allows visitors to quickly jump to any section of a website listed in the site map.
Skin This strange term refers to the appearance of a program's interface. By changing the skin of a program, you can make the interface look completely different, but usually still have all the same functions. It is similar to a "Theme" you may use to customize the appearance of your computer's desktop. Skins have become particularly popular for MP3 players. Because of the simple interface of most MP3 programs, it is easy to create different looks for the interface. Other programs, such as Netscape 6, ICQ, Yahoo Messenger, and Windows Media Player also support skins. If you're one of those people who can't stand seeing the same thing over and over again, skins are for you. Some programs that support skins even provide a skin development kit that your can use to create your own. Though this allows for an unlimited amount of interface customizing, it can make it hard to recognize or use the same program on different computers.
SKU (Stock Keeping Unit) Stands for "Stock Keeping Unit," and is conveniently pronounced "skew." A SKU is a number or string of alpha and numeric characters that uniquely identify a product. For this reason, SKUs are often called part numbers, product numbers, and product identifiers. SKUs may be a universal number such as a UPC code or supplier part number or may be a unique identifier used by a specific a store or online retailer. For example, one company may use the 10 character identifier supplied by the manufacturer as the SKU of an external hard drive. Another company may use a proprietary 6-digit number as the SKU to identify the part. Many retailers use their own SKU numbers to label products so they can track their inventory using their own custom database system. When shopping online or at retail stores, knowing a product's SKU can help you locate the exact product at a later time. It will help you identify a unique product when there are many similar options, such as a TV model that comes in different colors, sizes, etc. If you know a product's SKU, you can typically locate the product online by typing the SKU in the online retailer's search box. If you visit a retail store and have questions about product you saw in an ad, knowing the SKU will help the salesperson find the exact product you are asking about. SKUs are typically listed in small print below the product name and are often preceded by the words "SKU," "Part Number," "Product ID," or something similar.
Skyscraper While not as common as the banner ad, the skyscraper is another prevalent form of Web advertising. Skyscraper ads, which are tall and narrow, get their name from the tall buildings you often see in big cities. They are typically placed to the left or right of the main content on the page, which allows all or part of the ad to be visible even as the user scrolls down the window. Skyscraper ads come in two standard sizes -- 120 pixels wide by 600 pixels high (120x600) and 160 pixels wide by 600 pixels high (160x600). They can contain text advertisements, images, or animations. When users click on a skyscraper ad, they are redirected to the advertiser's website.
Slashdot Press releases can often trigger increased interest in a certain topic, and if a Web site link is provided in the release, this can translate to increased hits to the Web site. If the increase in traffic is so dramatic that it causes the server to be completely unreachable, the server is said to have been "slashdotted." The name came into being after October, 1998, when a press release was published on the Slashdot.org Web site, resulting in a major surge in traffic to another Web server, causing it to go down. You can also use the term as a verb, as in, "Dude, thanks to that stupid article, our server got slashdotted today, man!"
SLI (Scalable Link Interface) Stands for "Scalable Link Interface." SLI is a technology developed by NVIDIA that allows multiple graphics cards to work together in a single computer system. This enables faster graphics performance than what is possible with a single card. For example, using SLI to link two cards together may offer up to twice the performance of a single video card. If each card has two GPUs, the result may be up to four times the performance of a typical video card! For video cards to be linked using NVIDIA's SLI system, the computer must have multiple PCI Express slots. PCI Express is the first video card interface that allows the linking of multiple graphics cards because the slots share the same bus. Previous technologies, such as PCI and AGP, used separate buses, which did not allow graphics cards to be bridged together. The PCI Express slots must also support enough bandwidth for the cards, which typically means they must be x8 or x16 slots. Of course, the cards themselves must also support SLI bridging in order to work together.
SMART (Self-Monitoring Analysis And Reporting Technology) Stands for "Self-Monitoring Analysis And Reporting Technology." It is used to protect and prevent errors in hard drives. The SMART technology basically monitors and analyzes hard drives (hence the name), then checks the health of your hard drive and lets you know if there are any problems. The main purpose of SMART is to keep your hard drive running smoothly and prevent it from crashing.
Smart battery Also known as an intelligent battery, a smart battery is a portable computer battery that has the ability of keeping the computer up-to-date with its power status and other specific battery characteristics.
SMB (Server Message Block) Stands for "Server Message Block." SMB is a network protocol used by Windows-based computers that allows systems within the same network to share files. It allows computers connected to the same network or domain to access files from other local computers as easily as if they were on the computer's local hard drive. Not only does SMB allow computers to share files, but it also enables computers to share printers and even serial ports from other computers within the network. For example, a computer connected to a Windows network could print a document on a printer connected to another computer on the network, as long as both machines support the SMB protocol. Though SMB was originally developed for Windows, it can also be used by other platforms, including Unix and Mac OS X, using a software implementation called Samba. By using Samba instructions, Mac, Windows, and Unix computers can share the same files, folders, and printers. This is great for those Windows-based office networks where there is a graphic designer who refuses to use anything but a Mac and a tech guy who does everything on his Linux machine.
SMS (Short Message Service) Stands for "Short Message Service." SMS is used to send text messages to mobile phones. The messages can typically be up to 160 characters in length, though some services use 5-bit mode, which supports 224 characters. SMS was originally created for phones that use GSM (Global System for Mobile) communication, but now all the major cell phone systems support it. While SMS is most commonly used for text messaging between friends or co-workers, it has several other uses as well. For example, subscription SMS services can transmit weather, news, sports updates, and stock quotes to users' phones. SMS can also notify employees of sales inquiries, service stops, and other information pertinent to their business. Doctors can receive SMS messages regarding patient emergencies. Fortunately, text messages sent via SMS do not require the recipient's phone to be on in order for the message to be successfully transmitted. The SMS service will hold the message until the recipient turns on his or her phone, at which point the message will be be sent to the recipient's phone. Most cell phone companies allow you to send a certain number of text messages every month for no charge. Though it would be a good idea to find out what that number is before you go text message crazy.
SMTP Simple Network Management Protocol. A protocol for client server communication that sends and receives information on top of HTTP.
SMTP (Simple Mail Transfer Protocol) Stands for "Simple Mail Transfer Protocol." This is the protocol used for sending e-mail over the Internet. Your e-mail client (such as Outlook, Eudora, or Mac OS X Mail) uses SMTP to send a message to the mail server, and the mail server uses SMTP to relay that message to the correct receiving mail server. Basically, SMTP is a set of commands that authenticate and direct the transfer of electronic mail. When configuring the settings for your e-mail program, you usually need to set the SMTP server to your local Internet Service Provider's SMTP settings (i.e. "smtp.yourisp.com"). However, the incoming mail server (IMAP or POP3) should be set to your mail account's server (i.e. hotmail.com), which may be different than the SMTP server.
Snapshot While the term "snapshot" is often used in photography, it is also a computing term that refers to a copy made of a disk drive at a specific moment in time. Snapshots are useful for backing up data at different intervals, which allows information to be recovered from different periods of time. A hard drive snapshot includes the full directory structure of a hard disk, including all folders and files on the disk. This type of backup may also be referred to as a "disk image." Disk images allow the full disk to be restored in case the primary disk fails. Many backup programs that create snapshots also allow specific files to be recovered from the snapshot, instead of having to restore the complete backup. Since snapshots are mainly used for backup purposes, it is wise to save the snapshot to a secondary hard drive, removable drive, or optical media, such as CDs or DVDs.
SNMP (Simple Network Management Protocol) Stands for "Simple Network Management Protocol." SNMP is used for exchanging management information between network devices. For example, SNMP may be used to configure a router or simply check its status. There are four types of SNMP commands used to control and monitor managed devices: 1) read, 2) write, 3) trap, and 4) traversal operations. The read command is used to monitor devices, while the write command is used to configure devices and change device settings. The trap command is used to "trap" events from the device and report them back to the monitoring system. Traversal operations are used to determine what variables a certain device supports. SNMP has no authentication capabilities, which means it is not a very secure protocol. For this reason, SNMP is often used for monitoring networks rather than managing them. So, practically speaking, SNMP could be considered as a "Simple Network Monitoring Protocol" instead.
SOA (Service Oriented Architecture) Stands for "Service Oriented Architecture." When businesses grow, they often add new products and services. While these additions may help make the business larger, it is often difficult to implement them in an efficient manner. The goal of SOA is to make it easy for businesses to grow and add new services. The Service Oriented Architecture is based on components that work seamlessly with each other. For example, a company sells clothing through an online store. After a few months of successful sales, the company decides to add a jewelry department. An SOA component conveniently adds a new section to the store, in this case, specifically for jewelry. The company then wants to add new shipping options. A SOA shipping component makes adding the new shipping options as easy as checking a few boxes in an administrative control panel. Initially, the company only offered e-mail support, but later decides that adding phone support would be beneficial. A phone support component allows the phone representatives to look up customer orders the same way the e-mail support specialists could. Basically, SOA makes it possible for a business to add new features and services without having to create them from scratch. Instead, they can be added or modified as needed, making it simple and efficient to expand the business. Because many products and services are now offered via the Web, most SOA solutions include Web-based implementations.
SOAP (Simple Object Access Protocol) Stands for "Simple Object Access Protocol," and can do more than just get your hands clean. SOAP is a method of transferring messages, or small amounts of information, over the Internet. SOAP messages are formatted in XML and are typically sent using HTTP (hypertext transfer protocol). Both are widely supported data transmission standards. HTTP, which is the protocol that Web pages are sent over, has the additional advantage of avoiding most network firewalls. Since firewalls usually do not block port 80 (HTTP) traffic, most SOAP messages can pass through without any problems. Each SOAP message is contained in an "envelope" that includes a header and a body. The header may include the message ID and date the message was sent, while the body contains the actual message. Because SOAP messages all use the same format, they are compatible with many different operating systems and protocols. For example, a user can send a SOAP message from a Windows XP machine to a Unix-based Web server without worrying about the message being altered. The Unix machine can then redirect the message to the appropriate location or open the file using a program on the system. While most SOAP messages are sent over the Web via HTTP, they can also be sent via e-mail, using SMTP.
Social Networking When the Web became popular in the mid-1990s, it enabled people to share information in ways that were never possible before. But as limitless as the possibilities seemed, there was a personal aspect that was lacking. While users could create home pages and post their own content on the Web, these individual sites lacked a sense of community. In the early 2000s, the Web became much more personal as social networking websites were introduced and embraced by the masses. Social networking websites allow users to be part of a virtual community. The two most popular sites are currently Facebook and MySpace. These websites provide users with simple tools to create a custom profile with text and pictures. A typical profile includes basic information about the user, at least one photo, and possibly a blog or other comments published by the user. Advanced profiles may include videos, photo albums, online applications (in Facebook), or custom layouts (in MySpace). After creating a profile, users can add friends, send messages to other users, and leave comments directly on friends' profiles. These features provide the building blocks for creating online communities. Thanks to social networking websites, users can share their lives with other people without needing to develop and publish their own home pages. These websites also provide an important linking element between users that allows friends to communicate directly with each other. Because people often have friends from different places and different times in their lives, social networking sites provide an opportunity to keep in touch with old friends and to meet new people as well. Of course, this means that people you don't know may also be able to view your profile page. Therefore, if you join a social networking website, it is a good idea to review the privacy settings for your account. And more importantly, remember to always use discretion in what you publish on your profile.
Socket When a computer program needs to connect to a local or wide area network such as the Internet, it uses a software component called a socket. The socket opens the network connection for the program, allowing data to be read and written over the network. It is important to note that these sockets are software, not hardware, like a wall socket. So, yes, you have a much greater chance of being shocked by a wall socket than by a networking socket. Sockets are a key part of Unix and Windows-based operating systems. They make it easy for software developers to create network-enabled programs. Instead of constructing network connections from scratch for each program they write, developers can just include sockets in their programs. The sockets allow the programs to use the operating system's built-in commands to handle networking functions. Because they are used for a number of different network protocols (i.e. HTTP, FTP, telnet, and e-mail), many sockets can be open at one time.
SO-DIMM (Small Outline Dual In-Line Memory Module) Stands for "Small Outline Dual In-Line Memory Module." Most desktop computers have plenty of space for RAM chips, so the size of the memory modules is not a concern. However, with laptops, the size of the memory modules matters significantly. Because laptops are designed to be as small and as light as possible, the size of each component matters. In fact, laptop parts are so crammed together, large RAM chips often do not fit into the overall laptop design. This is why SO-DIMMs were created. A SO-DIMM is about half the length of a regular size DIMM. This allows greater flexibility in designing the memory slots for laptops. Many laptops have a user-accessible section that houses the SO-DIMMs, which make it easy to upgrade the computer's RAM. If the RAM chips were full size DIMMs, this type of design would be harder to incorporate and would likely increase the size of the laptop. The first SO-DIMMs used 72 pins (or connectors) and supported 32-bit data transfers. Modern SO-DIMMs, however, typically use 144 pins, which allows for the same 64-bit transfers that a regular size DIMM does. While SO-DIMMs are used primarily in laptops, some desktop computers with small form factors also use SO-DIMMs to reduce the overall size of the case. However, when size is not an issue, regular DIMMs are typically used because they are a more cost-effective solution.
Soft Copy A soft copy is a document saved on a computer. It is the electronic version of a document, which can be opened and edited using a software program. The term "soft copy" is most often used in contrast to hard copy, which is the printed version of a document. Soft copies can be sent via e-mail or over a network connection, which makes them a more efficient and cost effective option than using hard copies for communications. The downside to using soft copies is that they require a computer and software to open and can be accidentally deleted. Of course, some people have so many papers on their desks, a soft copy may be less likely to disappear.
Soft Token A soft token is a software version of a hard token, which is a security device used to give authorized users access to secure locations or computer systems. For this reason, soft tokens can be called "virtual tokens," since they are a virtual version of hardware keys and other physical security devices. Soft tokens are typically generated by a central server that runs security software. They are sent to users' devices, such as cell phones, PDAs, and laptops. Once the soft token has been received by the device, the user can use the device within a secure network or can gain access to the sever as an authorized user. To add an extra measure of security, most soft token authentication also requires a username and password to make sure the correct user is using the authorized device.
Software Computer software is a general term that describes computer programs. Related terms such as software programs, applications, scripts, and instruction sets all fall under the category of computer software. Therefore, installing new programs or applications on your computer is synonymous with installing new software on your computer. Software can be difficult to describe because it is "virtual," or not physical like computer hardware. Instead, software consists of lines of code written by computer programmers that have been compiled into a computer program. Software programs are stored as binary data that is copied to a computer's hard drive, when it is installed. Since software is virtual and does not take up any physical space, it is much easier (and often cheaper) to upgrade than computer hardware. While at its most basic level, software consists of binary data, CD-ROMs, DVDs, and other types of media that are used to distribute software can also be called software. Therefore, when you buy a software program, it often comes on a disc, which is a physical means of storing the software.
Solid State Solid state, at its most basic level, means "no moving parts." Therefore, solid state electronic devices are made up of solid components that do not move. Some examples include computer motherboards and integrated circuits. Devices that use only solid state parts, such as television sets, speakers, and digital watches, are often referred to as solid state products. Flash memory devices are solid state products, while hard drives are not. This is because hard drives use a spinning disk and moving drive head to read and write data, while flash memory uses electric charges to perform the same functions. For this reason, flash memory devices are seen as more durable than hard drives. This is why flash memory is often used in products such as portable MP3 players and digital cameras. Because solid state devices have no moving parts, they are less likely to break down than devices that have mobile mechanisms. For this reason, it is often more worthwhile to buy an extended warranty on electronics that have moving parts than those that do not. That is something you may want to think about next time you are shopping.
Sound Card The sound card is a component inside the computer that provides audio input and output capabilities. Most sound cards have at least one analog line input and one stereo line output connection. The connectors are typically 3.5 mm minijacks, which are the size most headphones use. Some sound cards also support digital audio input and output, either through a standard TRS (tip-ring-sleeve) connection or via an optical audio port, such as Toslink connector. While there are many types of sound cards, any type that produces an analog output must include a digital-to-analog converter (DAC). This converts the outgoing signal from digital to analog, which can be played through most speaker systems. Sounds cards that support analog input also require an analog-to-digital converter (ADC). This digitizes the incoming analog signal, so the computer can process it. In some computers, the sound card is part of the motherboard, while other machines may have an actual card that reside in a PCI slot. If you want to more audio capabilities to your computer, such as additional input or output channels, you can install a new sound card. Professional sound cards often support higher sampling rates (such as 192 kHz instead of 44.1 kHz) and may have more inputs and outputs. Some cards may also have 1/4 in. connectors instead of 3.5 mm, which accommodates most instrument outputs. While professional sound cards can add more audio capabilities to your computer, another popular option for multi-channel recording is a breakout box. This is an external box that typically includes a built-in sound card and multiple audio connections. For example, a breakout box may support 16 channels of audio, which would be impossible to fit on a single card. Most breakout boxes connect to a Firewire or USB port, though some connect to a sound card specifically designed to communicate with the box.
Source Code Every computer program is written in a programming language, such as Java, (C/C++|cplusplus), or Perl. These programs include anywhere from a few lines to millions of lines of text, called source code. Source code, often referred to as simply the "source" of a program, contains variable declarations, instructions, functions, loops, and other statements that tell the program how to function. Programmers may also add comments to their source code that explain sections of the code. These comments help other programmers gain at least some idea of what the source code does without requiring hours to decipher it. Comments can be helpful to the original programmer as well if many months or years have gone by since the code was written. Short programs called scripts can be run directly from the source code using a scripting engine, such as a VBScript or PHP engine. Most large programs, however, require that the source code first be compiled, which translates the code into a language the computer can understand. When changes are made to the source code of these programs, they must be recomplied in order for the changes to take effect in the program. Small programs may use only one source code file, while larger programs may reference hundreds or even thousands of files. Having multiple source files helps organize the program into different sections. Having one file that contains every variable and function can make it difficult to locate specific sections of the code. Regardless of how many source code files are used to create a program, you will most likely not see any of the original files on your computer. This is because they are all combined into one program file, or application, when they are compiled.
Southbridge The southbridge is a chip that connects the northbridge to other components inside the computer, including hard drives, network connections, USB and Firewire devices, the system clock, and standard PCI cards. The southbridge sends and receives data from the CPU through the northbridge chip, which is connected directly to the computer's processor. Since the southbridge is not connected directly to the CPU, it does not have to run as fast as the northbridge chip. However, it processes data from more components, so it must be able to multitask well. On Intel systems, the southbridge is also referred to as the I/O Controller Hub, since it controls the input and output devices.
Spam Originating from the name of Hormel's canned meat, "spam" now also refers to junk e-mail or irrelevant postings to a newsgroup or bulletin board. The unsolicited e-mail messages you receive about refinancing your home, reversing aging, and losing those extra pounds are all considered to be spam. Spamming other people is definitely not cool and is one of the most notorious violations of Internet etiquette (or "netiquette"). So if you ever get the urge to let thousands of people know about that hot new guaranteed way to make money on the Internet, please reconsider.
SpeedStep A feature available with Intel Pentium III, Pentium III-Mobile, Pentium 4-Mobile, and later Intel mobile processors that allows a user to control features of the processor through software that lower its speed. By reducing the overall speed of the processor it helps conserve power and reduce the heat produced by the processor, which saves on battery life. If your looking for software and/or drivers relating to SpeedStep for your computer running versions of Microsoft Windows 2000 or earlier you must contact the computer manufacturer. Intel does not provide any software for this feature.
Spider A spider is a software program that travels the Web (hence the name "spider"), locating and indexing websites for search engines. All the major search engines, such as Google and Yahoo!, use spiders to build and update their indexes. These programs constantly browse the Web, traveling from one hyperlink to another. For example, when a spider visits a website's home page, there may be 30 links on the page. The spider will follow each of the links, adding all the pages it finds to the search engine's index. Of course, the new pages that the spider finds may also have links, which the spider continues to follow. Some of these links may point to pages within the same website (internal links), while others may lead to different sites (external links). The external links will cause the spider to jump to new sites, indexing even more pages. Because of the interwoven nature of website links, spiders often return to websites that have already been indexed. This allows search engines to keep track of how many external pages link to each page. Usually, the more incoming links a page has, the higher it will be ranked in search engine results. Spiders not only find new pages and keep track of links, they also track changes to each page, helping search engine indexes stay up to date. Spiders are also called robots and crawlers, which may be preferable for those who are not fond of arachnids. The word "spider" can also be used as verb, such as, "That search engine finally spidered my website last week."
Spoofing The word "spoof" means to hoax, trick, or deceive. Therefore, in the IT world, spoofing refers tricking or deceiving computer systems or other computer users. This is typically done by hiding one's identity or faking the identity of another user on the Internet. Spoofing can take place on the Internet in several different ways. One common method is through e-mail. E-mail spoofing involves sending messages from a bogus e-mail address or faking the e-mail address of another user. Fortunately, most e-mail servers have security features that prevent unauthorized users from sending messages. However, spammers often send spam messages from their own SMTP, which allows them to use fake e-mail addresses. Therefore, it is possible to receive e-mail from an address that is not the actual address of the person sending the message. Another way spoofing takes place on the Internet is via IP spoofing. This involves masking the IP address of a certain computer system. By hiding or faking a computer's IP address, it is difficult for other systems to determine where the computer is transmitting data from. Because IP spoofing makes it difficult to track the source of a transmission, it is often used in denial-of-service attacks that overload a server. This may cause the server to either crash or become unresponsive to legitimate requests. Fortunately, software security systems have been developed that can identify denial-of-service attacks and block their transmissions. Finally, spoofing can be done by simply faking an identity, such as an online username. For example, when posting on an Web discussion board, a user may pretend he is the representative for a certain company, when he actually has no association with the organization. In online chat rooms, users may fake their age, gender, and location. While the Internet is a great place to communicate with others, it can also be an easy place to fake an identity. Therefore, always make sure you know who you are communicating with before giving out private information.
Spreadsheet A spreadsheet is a document that stores data in a grid of rows and columns. Rows are typically labeled using numbers (1, 2, 3, etc.), while columns are labeled with letters (A, B, C, etc). Individual row/column locations, such as C3 or B12, are referred to as cells. Each cell can each store a unique instance of data. By entering data into a spreadsheet, information can be stored in a more structured way than using plain text The row/column structure also allows the data to be analyzed using formulas and calculations. For example, each row of a spreadsheet may store information about a person who has an account with a certain company. Each column may store a different aspect of the person's information, such as the first name, last name, address, phone number, favorite food, etc. The spreadsheet program can analyze this data by counting the number of people who live in a certain zip code, listing all the people who's favorite food is fried veal, or performing other calcuations. In this way, a spreadsheet is similar to a database. However, spreadsheets are more streamlined than databases and are especially useful for processing numbers. This is why spreadsheets are commonly used in scientific and financial applications. For example, a spreadsheet may store bank account data, including balance and interest information. A column that stores the account balances of several clients can easily be summed to produce the total value of all the clients' balances. These amounts can be multiplied by the interest rate from another cell to see what the value of the accounts will be in a year. Once the formula has been created, modifying the value of just the interest rate cell will also change the projected value of all the accounts. The most commonly used spreadsheet application is Microsoft Excel, but several other spreadsheet programs are available including IBM Lotus 1-2-3 for Windows and AppleWorks and Numbers for Mac OS X.
Spyware As the name implies, this is software that "spies" on your computer. Nobody likes to be spied on, and your computer doesn't like it either. Spyware can capture information like Web browsing habits, e-mail messages, usernames and passwords, and credit card information. If left unchecked, the software can transmit this data to another person's computer over the Internet. So how does spyware get on your computer? Just like viruses, spyware can be installed when you open an e-mail attachment containing the malicious software. It can also be installed when you install another program that has a spyware installer attached to it. Because of the insidious nature of spyware, most people don't even know when spyware is on their computer. Fortunately, you can purchase anti-spyware utilities that will search for spyware on your computer and stomp the unwanted software out of your system. A good way to prevent spyware from infecting your computer is to install a security program that lets you know when any program is being installed, so that you can choose to authorize or stop the installation.
SQL (Structured Query Language) Stands for "Structured Query Language," and can be pronounced as either "sequel" or "S-Q-L." It is a query language used for accessing and modifying information in a database. Some common SQL commands include "insert," "update," and "delete." The language was first created by IBM in 1975 and was called SEQUEL for "Structured English Query Language." Since then, it has undergone a number of changes, many coming from Oracle products. Today, SQL is commonly used for Web database development and management. Though SQL is now considered to be a standard language, there are still a number of variations of it, such as mSQL and mySQL. By using a scripting language like PHP, SQL commands can be executed when a Web page loads. This makes it possible to create dynamic Web pages that can display different information each time they load.
SRAM Static random access memory. Faster and more expensive than DRAM.
SRAM (Static Random Access Memory) Stands for "Static Random Access Memory." I know it is tempting to pronounce this term as "Sram," but it is correctly pronounced "S-ram." SRAM is a type of RAM that stores data using a static method, in which the data remains constant as long as electric power is supplied to the memory chip. This is different than DRAM (dynamic RAM), which stores data dynamically and constantly needs to refresh the data stored in the memory. Because SRAM stores data statically, it is faster and requires less power than DRAM. However, SRAM is more expensive to manufacture than DRAM because it is built using a more complex structure. This complexity also limits the amount of data a single chip can store, meaning SRAM chips cannot hold as much data as DRAM chips. For this reason, DRAM is most often used as the main memory for personal computers. However, SRAM is commonly used in smaller applications, such as CPU cache memory and hard drive buffers. It is also used in other consumer electronics, from large appliances to small children's toys. It is important to not confuse SRAM with SDRAM, which is a type of DRAM.
sRGB (Standard Red Green Blue) Stands for "Standard RGB" (and RGB stands for Red-Green-Blue"). All the colors you see on your computer display are made up various mixtures of red, green, and blue light. While this works great for individual displays, the same colors are often displayed differently on different screens. For example, dark red on one screen may look like red-orange on another. When you add printers, scanners, and digital cameras to the mix, the problem is magnified even more. To help achieve a greater color consistency between hardware devices, the sRGB standard was created in 1999. It defines a gamut of colors that represents each color well and can be used by CRT monitors, LCD screens, scanners, printers, and digital cameras. It also has been incorporated into many Web browsers to make sure the colors on Web pages match the color scheme of the operating system. Because of the color consistency sRGB creates, most hardware devices that work with images now use it as the default setting.
SSH (Secure Shell) Stands for "Secure Shell." SSH is a method of securely communicating with another computer. The "secure" part of the name means that all data sent via an SSH connection is encrypted. This means if a third party tries to intercept the information being transferred, it would appear scrambled and unreadable. The "shell" part of the name means SSH is based on a Unix shell, which is a program that interprets commands entered by a user. Because SSH is based on a Unix shell, standard Unix commands can be used to view, modify, and transfer files from a remote machine once an SSH connection has been established. These commands can either be entered manually using a terminal emulator, or may be sent from a program with a graphical user interface (GUI). This type of program translates user actions, such as opening a folder, to Unix commands (cd [folder name]). To log into a server using SSH from a terminal program, type: ssh [servername] -l [username]. The "-l" indicates you are logging in with a username, which is required by most SSH connections (otherwise, it wouldn't be very secure). If the login name is recognized, you will be prompted to enter a password. If the password is correct, your SSH connection will be established. To end the SSH session, type "exit" followed by the Enter key.
SSID (Service Set Identifier) Stands for "Service Set Identifier." An SSID is a unique ID that consists of 32 characters and is used for naming wireless networks. When multiple wireless networks overlap in a certain location, SSIDs make sure that data gets sent to the correct destination. The SSID is different than the name that is assigned to a wireless router. For example, the administrator of a wireless network may set the name of the router, or base station, to "Office." This will be the name that users see when browsing available wireless networks, but the SSID is a different 32 character string that ensures the network name is different from other nearby networks. Each packet sent over a wireless network includes the SSID, which ensures that the data being sent over the air arrives at the correct location. Without service set identifiers, sending and receiving data in a location with multiple wireless networks would be chaotic and unpredictable to say the least.
SSL (Secure Sockets Layer) Stands for "Secure Sockets Layer." SSL is a secure protocol developed for sending information securely over the Internet. Many websites use SSL for secure areas of their sites, such as user account pages and online checkout. Usually, when you are asked to "log in" on a website, the resulting page is secured by SSL. SSL encrypts the data being transmitted so that a third party cannot "eavesdrop" on the transmission and view the data being transmitted. Only the user's computer and the secure server are able to recognize the data. SSL keeps your name, address, and credit card information between you and merchant to which you are providing it. Without this kind of encryption, online shopping would be far too insecure to be practical. When you visit a Web address starting with "https," the "s" after the "http" indicates the website is secure. These websites often use SSL certificates to verify their authenticity. While SSL is most commonly seen on the Web (HTTP), it is also used to secure other Internet protocols, such as SMTP for sending e-mail and NNTP for newsgroups. Early implementations of SSL were limited to 40-bit encryption, but now most SSL secured protocols use 128-bit encryption or higher.
Stack A stack is a type of data structure -- a means of storing information in a computer. When a new object is entered in a stack, it is placed on top of all the previously entered objects. In other words, the stack data structure is just like a stack of cards, papers, credit card mailings, or any other real-world objects you can think of. When removing an object from a stack, the one on top gets removed first. This method is referred to as LIFO (last in, first out). The term "stack" can also be short for a network protocol stack. In networking, connections between computers are made through a series of smaller connections. These connections, or layers, act like the stack data structure, in that they are built and disposed of in the same way.
Standalone A standalone device is able to function independently of other hardware. This means it is not integrated into another device. For example, a TiVo box that can record television programs is a standalone device, while a DVR that is integrated into a digital cable box is not standalone. Integrated devices are typically less expensive than multiple standalone products that perform the same functions. However, using standalone hardware typically allows the user greater customization, whether it be a home theater or computer system. Standalone can also refer to a software program that does not require any software other than the operating system to run. This means that most software programs are standalone programs. Software such as plug-ins and expansion packs for video games are not standalone programs since they will not run unless a certain program is already installed.
Standby When electronic devices are receiving power but are not running, they are in standby mode. For example, a television is in standby mode when it is plugged in, but turned off. While the TV is not "on," it is ready to receive a signal from the remote control. An A/V receiver is also in standby mode when it is plugged in and turned off. This is because the receiver may be activated by receiving input from a connected device or by being turned on directly with the remote control. In other words, these devices are "standing by," waiting to receive input from the user or another device. When a computer is in standby mode, it is not completely turned off. Instead, it has already been turned on, but has gone into "sleep" mode. Therefore, when referring to computers, "Sleep" and "Standby" may be used synonymously. A computer in standby mode requires a small amount of current, called a "trickle charge," that keeps the current state of running software saved in the computer's RAM. However, because the computer is in sleep mode, the CPU, video card, and hard drive are not running. Therefore, the computer uses very little power in standby mode. Since standby mode saves energy, it is a good idea to put your computer to sleep if you are going to be away from it for more than 15 or 20 minutes. You can also use the Power Options control panel (in Windows) or the Energy Saver System Preference (in Mac OS X) to automatically put your computer to sleep after it has been inactive for a specific amount of time. Then, when you take a break from your computer, your computer can take a break as well.
Status Bar A status bar is a small area at the bottom of a window. It is used by some applications to display helpful information for the user. For example, an open folder window on the desktop may display the number of items in the folder and how many items are selected. Photoshop uses the status bar to display the size of the current image, the zoom percentage, and other information. Web browsers use the status bar to display the Web address of a link when the user moves the cursor over it. It also shows the status of loading pages, and displays error messages. If you don't see the status bar in your Web browser or another program, you may be able to enable it by selecting "Show Status Bar" from the application's View menu. If this option is not available in the View menu, the program may not use a status bar. Some programs use a "status window" instead to show the current activity in the application. The option for displaying this window is usually found in the "Window" menu.
Storage Device A computer storage device is any type of hardware that stores data. The most common type of storage device, which nearly all computers have, is a hard drive. The computer's primary hard drive stores the operating system, applications, and files and folders for users of the computer. While the hard drive is the most ubiquitous of all storage devices, several other types are common as well. Flash memory devices, such as USB keychain drives and iPod nanos are popular ways to store data in a small, mobile format. Other types of flash memory, such as compact flash and SD cards are popular ways to store images taken by digital cameras. External hard drives that connect via Firewire and USB are also common. These types of drives are often used for backing up internal hard drives, storing video or photo libraries, or for simply adding extra storage. Finally, tape drives, which use reels of tape to store data, are another type of storage device and are typically used for backing up data.
Streaming Data streaming, commonly seen in the forms of audio and video streaming, is when a multimedia file can be played back without being completely downloaded first. Most files, like shareware and software updates that you download off the Internet, are not streaming data. However, certain audio and video files like Real Audio and QuickTime documents can be streaming files, meaning you can watch a video or listen to a sound file while it's being downloaded to your computer. With a fast Internet connection, you can actually stream live audio or video to your computer.
String A string is a data type used in programming, such as an integer and floating point unit, but is used to represent text rather than numbers. It is comprised of a set of characters that can also contain spaces and numbers. For example, the word "hamburger" and the phrase "I ate 3 hamburgers" are both strings. Even "12345" could be considered a string, if specified correctly. Typically, programmers must enclose strings in quotation marks for the data to recognized as a string and not a number or variable name. For example, in the comparison: if (Option1 == Option2) then ... Option1 and Option2 may be variables containing integers, strings, or other data. If the values are the same, the test returns a value of true, otherwise the result is false. In the comparison: if ("Option1" == "Option2") then ... Option1 and Option2 are being treated as strings. Therefore the test is comparing the words "Option1" and "Option2," which would return false. The length of a string is often determined by using a null character.
Subnet Mask A subnet mask is a number that defines a range of IP addresses that can be used in a network. (It is not something you wear on your head to keep subnets out.) Subnet masks are used to designate subnetworks, or subnets, which are typically local networks LANs that are connected to the Internet. Systems within the same subnet can communicate directly with each other, while systems on different subnets must communicate through a router. Therefore, subnetworks can be used to partition multiple networks and limit the traffic between them. A subnet mask hides, or "masks," the network part of a system's IP address and leaves only the host part as the machine identifier. A common subnet mask for a Class C IP address is 255.255.255.0. Each section of the subnet mask can contain a number from 0 to 256, just like an IP address. Therefore, in the example above, the first three sections are full, meaning the IP addresses of computers within the subnet mask must be identical in the first three sections. The last section of each computer's IP address can be anything from 0 to 255. For example, the IP addresses 10.0.1.201 and 10.0.1.202 would be in the same subnet, while 10.0.2.201 would not. Therefore, a subnet mask of 255.255.255.0 allows for close to 256 unique hosts within the network (since not all 256 IP addresses can be used). If your system is connected to a network, you can typically view the network's subnet mask number in the Network control panel (Windows) or System Preference (Mac OS X). Most home networks use the default subnet mask of 255.255.255.0. However, some office networks may use a different subnet mask such as 255.255.255.128, which can be used to split a network into two subnets. Large networks with several thousand machines may use a subnet mask of 255.255.0.0. This is the default subnet mask used by Class B networks. The largest Class A networks use a default subnet mask of 255.0.0.0.
Superscalar A superscalar CPU can execute more than one instruction per clock cycle. Because processing speeds are measured in clock cycles per second (megahertz), a superscalar processor will be faster than a scalar processor rated at the same megahertz. A superscalar architecture includes parallel execution units, which can execute instructions simultaneously. This parallel architecture was first implemented in RISC processors, which use short and simple instructions to perform calculations. Because of their superscalar capabilities, RISC processors have typically performed better than CISC processors running at the same megahertz. However, most CISC-based processors (such as the Intel Pentium) now include some RISC architecture as well, which enables them to execute instructions in parallel. Nearly all processors developed after 1998 are superscalar.
Surge Protector The surge protector is an important, yet often overlooked part of a computer setup. It allows multiple devices to plugged in to it at one time and protects each connected device from power surges. For example, a home office may have a computer, monitor, printer, cable modem, and powered speakers all plugged into one surge protector, which is plugged into a single outlet in the wall. The surge protector allows many devices to use one outlet, while protecting each of them from electrical surges. Surge protectors, sometimes called power strips, prevent surges in electrical current by sending the excess current to the grounding wire (which is the round part of the plug below the two flat metal pieces on U.S. outlet plugs). If the surge is extra high, such as from a lightning strike, a fuse in the surge protector will blow and the current will prevented from reaching any of the devices plugged into the surge protector. This means the noble surge protector will have given its life for the rest of the equipment, since the fuse is destroyed in the process. While surge protectors all perform the same basic function, they come in many shapes and sizes with different levels of protection. Some may look like basic power strips, while others may be rack mounted or fit directly against the wall. Most surge protectors offer six to ten different outlets. Cheaper surge protectors offer limited protection for surges (under 1000 joules), while more expensive ones offer protection for several thousand joules and include a monetary guarantee on connected devices if a power surge happens. Typically, you get what you pay for, so if you have an expensive computer system, it is wise to buy a quality surge protector that offers at least 1000 joules of protection. Some surge protectors also include line conditioning, which uses an electromagnet to maintain a consistent level of electricity when there are slight variations in current. For example, you might notice your computer monitor or television fade for a moment when you turn on a high-powered device, like a vacuum or air conditioner. A surge protector with line conditioning should prevent connected devices from being affected by these slight variances in current. While you may be able to hook up your computer system without a surge protector, it is important to protect your equipment by using one. You may not need a large, expensive surge protector with line conditioning, but using a quality surge protector for all your electronic devices is a smart choice.
Switch A switch is used to network multiple computers together. Switches made for the consumer market are typically small, flat boxes with 4 to 8 Ethernet ports. These ports can connect to computers, cable or DSL modems, and other switches. High-end switches can have more than 50 ports and often are rack mounted. Switches are more advanced than hubs and less capable than routers. Unlike hubs, switches can limit the traffic to and from each port so that each device connected to the switch has a sufficient amount of bandwidth. For this reason, you can think of a switch as a "smart hub." However, switches don't provide the firewall and logging capabilities that routers do. Routers can often be configured by software (typically via a Web interface), while switches only work the way the hardware was designed. The term "switch" can also be used to refer to a small lever or button on computer hardware. And while it has nothing to do with computers, "riding switch" means riding backwards in skateboarding and snowboarding.
Syntax Each spoken language has a general set of rules for how words and sentences should be structured. These rules are collectively known as the language syntax. In computer programming languages, syntax serves the same purpose, defining how declarations, functions, commands, and other statements should be arranged. Each computer programming language uses a different syntax. Many languages share similar syntax rules, while others have a very unique syntax design. For example, C and Java use a highly similar syntax, while Perl has many characteristics that are not seen in either the C or Java languages. Regardless of the rules, a program's source code must have the correct syntax in order to compile correctly and be made into a program. In fact, it must have the exact right syntax, or the program will fail to compile and produce a "syntax error." A syntax error can be as simple as a missing parenthesis or a forgotten semicolon at the end of a statement. Even these small errors will keep the source code from compiling. Fortunately, most software development programs include a debugger, which helps find the exact location of syntax errors within the source code. Imagine a program that has over ten thousand lines of code and a syntax error is caused by one missing semicolon. Finding a needle in a haystack would be preferred over manually locating the error. Needless to say, the debugger makes the debugging process much easier for the programmer.
System Analyst A system analyst is the person who selects and configures computer systems for an organization or business. His or her job typically begins with determining the intended purpose of the computers. This means the analyst must understand the general objectives of the business, as well as what each individual user's job requires. Once the system analyst has determined the general and specific needs of the business, he can choose appropriate systems that will help accomplish the goals of the business. When configuring computer systems for a business, the analyst must select both hardware and software. The hardware aspect includes customizing each computer's configuration, such as the processor speed, amount of RAM, hard drive space, video card, and monitor size. It may also involve choosing networking equipment that will link the computers together. The software side includes the operating system and applications that are installed on each system. The software programs each person requires may differ greatly between users, which is why it is important that the system analyst knows the specific needs of each user. To summarize, the system analyst's job is to choose the most efficient computer solutions for a business, while making sure the systems meet all the company's needs. Therefore, the system analyst must have a solid understanding of computer hardware and software and should keep up-to-date on all the latest technologies. He must also be willing to listen to the constant needs and complaints of the users he builds systems for.
System Hardening Most computers offer network security features to limit outside access to the system. Software such as antivirus programs and spyware blockers prevent malicious software from running on the machine. Yet, even with these security measures in place, computers are often still vulnerable to outside access. System hardening, also called Operating System hardening, helps minimize these security vulnerabilities. The purpose of system hardening is to eliminate as many security risks as possible. This is typically done by removing all non-essential software programs and utilities from the computer. While these programs may offer useful features to the user, if they provide "back-door" access to the system, they must be removed during system hardening. Advanced system hardening may involve reformatting the hard disk and only installing the bare necessities that the computer needs to function. The CD drive is listed as the first boot device, which enables the computer to start from a CD or DVD if needed. File and print sharing are turned off if not absolutely necessary and TCP/IP is often the only protocol installed. The guest account is disabled, the administrator account is renamed, and secure passwords are created for all user logins. Auditing is enabled to monitor unauthorized access attempts. While these steps are often part of operating system hardening, system administrators may choose to perform other tasks that boost system security. While both Macintosh and Windows operating systems can be hardened, system hardening is more often done on Windows machines, since they are more likely to have their security compromised.
System Requirements Whenever you purchase software or hardware for your computer, you should first make sure your computer supports the system requirements. These are the necessary specifications your computer must have in order to use the software or hardware. For example, a computer game may require you computer to have Windows XP or later, a 2.0 GHz processor, 512 MB or RAM, a 64 MB graphics card, and 500 MB or hard drive space. If your computer does not meet all of these requirements, the game will not run very well or might not run at all. It is just as important to check system requirements for hardware devices. For example, if you buy a printer, it may require either Windows XP or Mac OS X 10.3 or later. It may also require a USB port and 80 MB of available hard drive space. If your computer does not have any USB ports, you will not be able to physically connect the printer. If your machine does not have Windows XP or Mac OS X 10.3 or later, the printer drivers may be incompatible with your operating system. This means you computer will be unable to recognize the printer. Most hardware and software products have the system requirements printed on the side or bottom of the product packaging. When you are shopping for computer software or hardware, it is a good idea to first find out exactly what your system's specifications are and write them down on a piece of paper.
System Resources Your computer has many types of resources. They include the CPU, video card, hard drive, and memory. In most cases, the term "system resources" is used to refer to how much memory, or RAM, your computer has available. For example, if you have 1.0 GB (1024 MB) of RAM installed on your machine, then you have a total of 1024 MB of system resources. However, as soon as your computer boots up, it loads the operating system into the RAM. This means some of your computer's resources are always being used by the operating system. Other programs and utilities that are running on your machine also use your computer's memory. If your operating system uses 300 MB of RAM and your active programs are using 200 MB, then you would have 524 MB of "available system resources." To increase your available system resources, you can close active programs or increase your total system resources by adding more RAM. System resources can also refer to what software is installed on your machine. This includes the programs, utilities, fonts, updates, and other software that is installed on your hard drive. For example, if a file installed with a certain program is accidentally removed, the program may fail to open. The error message may read, "The program could not be opened because the necessary resources were not found." As you can see, the term "system resources" can be a bit ambiguous. Just remember that while it usually refers to your computer's memory, it can be used to describe other hardware or software as well.
System Unit This is the technical term that refers to the box that houses your computer. The system unit refers to the computer itself but does not include the monitor, the keyboard, the mouse, or any other peripherals. I suppose most people will probably know what you mean when you refer to "the box," but saying "system unit" will definitely make you sound more sophisticated.
Systray The systray, short for "system tray," is located on the right side of the Windows toolbar. It is the collection of small icons on the opposite side of the Start Menu. The volume control and the date & time are default items in the systray and many more can be added. Some common icons that get placed in the systray are virus-scan, mouse, and instant messenger icons. They usually get put in the systray (whether you like it or not) when their respective programs are installed. The nice thing about the systray is that it allows quick and easy access to programs and control settings. Most systray icons will open a control panel or program when double-clicked. However, if you install too many of them, the area can get so cluttered, you may find it easier to just browse your hard drive and open the program.
Trojan Horse A computer program that is hidden inside another. Can be harmful.
U U is the standard unit of measurement for rack-mounted equipment. Racks can be used to house servers, hard drives, switches, routers, and other computer hardware. They are also used for mounting audio and video equipment. Standard racks are 24 inches wide, but vary in height. For this reason, the U unit measures how tall a rack-mountable hardware device is. 1U is equal to 1.75 inches. Therefore, a 1U piece of equipment is 1.75 inches tall and takes up one unit of rack space. A 2U device is 3.5 inches tall and takes up 2 units of rack space. Racks themselves are also measured in U. For example, a 10U rack could store 10 1U devices or 5 2U devices. It could also store 3 3U devices, with just enough space left over for your miniature Star Wars action figure.
UDDI (Universal Description Discovery and Integration) Stands for "Universal Description Discovery and Integration." UDDI is a protocol that allows businesses to promote, use, and share services over the Internet. It is an OASIS Standard, which is supported by several major technology companies. Members include Microsoft, Cisco, Oracle, Avaya, Sun Microsystems, and others. The UDDI protocol serves as a foundational tool that allows businesses to find each other and complete transactions quickly and easily. Companies that use the UDDI protocol can extend their market reach and find new customers while also finding other businesses that offer useful services to them. Because UDDI uses a standard format for describing business services, it is easy to search and find useful services offered from other businesses.
UDP (User Datagram Protocol) Stands for "User Datagram Protocol." It is part of the TCP/IP suite of protocols used for data transferring. UDP is a known as a "stateless" protocol, meaning it doesn't acknowledge that the packets being sent have been received. For this reason, the UDP protocol is typically used for streaming media. While you might see skips in video or hear some fuzz in audio clips, UDP transmission prevents the playback from stopping completely.
Ultra DMA This technology for transferring data between a computer's hard disk and memory was developed by Quantum and Intel. The maximum burst rate of an Ultra DMA hard drive is 33.3 MBps. The original DMA (Direct Memory Access) protocol could only transfer data at half that speed. Thanks to Ultra DMA, programs can open faster and run more smoothly. This is because Utlra DMA can send more data to the memory in less time than the original DMA. Ultra DMA also has a built-in utility called Cyclical Redundancy Checking (CRC) that helps protect data integrity. So if you want a nice, fast hard drive, look for one that supports Ultra DMA.
UML (Unified Modeling Language) Stands for "Unified Modeling Language." This is a programming language that is used for object-oriented software development. To organize program code more efficiently, programmers often create "objects" that are sets of structured data within programs. UML, which has been standardized by the Object Management Group (OMG), was designed for this purpose. The language has gained enough support that it has become a standard language for visualizing and constructing software programs.
UNC (Universal Naming Convention) Stands for "Universal Naming Convention," not just the home of the North Carolina Tar Heels. UNC is a filename format that is used to specify the location of files, folders, and resources on a local-area network (LAN). The UNC address of a file may look something like this: \\server-name\directory\filename UNC can also be used to identify peripheral devices shared on the network, including scanners and printers. It provides each shared resource with a unique address. This allows operating systems that support UNC (such as Windows) to access specific resources quickly and efficiently.
Unix A computer operating system
Unix Also known as UNIX, though the letters do not stand for anything. The Unix operating system was first created in Bell Labs way back in the 1960s. It became popular in the 1970s for high-level computing, but not on the consumer level. Since a lot of Internet services were originally hosted on Unix machines, the platform gained tremendous popularity in the 1990s. It still leads the industry as the most common operating system for Web servers. Still, Unix remains somewhat of an ambiguous operating system, as there are many different versions of it. Some examples include Ultrix, Xenix, Linux, and GNU, which, making things even more confusing, all run on a number of different hardware platforms. Most people do not ever need to use Unix, but computer geeks seem to have the need to use it as much as possible.
Unmount Unmounting a disk makes it inaccessible by the computer. Of course, in order for a disk to be unmounted, it must first be mounted. When a disk is mounted, it is active and the computer can access its contents. Since unmounting a disk prevents the computer from accessing it, there is no risk of the disk being disconnected in the middle of a data transfer. Therefore, before removing an external data storage device, such as a USB flash drive, the disk should be unmounted to avoid possible data corruption. Several types of disks can be unmounted, including external hard drives, USB flash drives, iPods, flash memory cards, and disk images. In order to unmount a disk in Windows, open "My Computer," select the disk, and click the "Eject this disk" option in the left sidebar. In Mac OS X, select the disk on the desktop and either drag the disk to the trash (which changes to an Eject icon), or select "File->Eject" from the Finder's menu bar. Once a removable disk has been unmounted, it can safely be disconnected from the computer.
Upload While downloading is receiving a file from another computer, uploading is the exact opposite. It is sending a file from your computer to another system. Pretty straight forward. It is possible to upload and download at the same time, but it may cause slower transfer speeds, especially if you have a low bandwidth connection. Because most files are located on Internet servers, people generally do a lot more downloading than uploading.
UPnP (Universal Plug and Play) Stands for "Universal Plug and Play." Plug and Play describes devices that work with a computer system as soon as they are connected. UPnP is an extension of this idea that expands the range of Plug and Play devices to networking equipment. Universal Plug and Play uses network protocols to allow a wide range of devices to be interconnected and work seamlessly with each other. UPnP devices can be connected via wired (i.e. Ethernet and Firewire) or wireless (i.e. Wi-Fi and Bluetooth) connections. As long as a product supports UPnP, it can communicate with other UPnP devices within a network. The connections are typically created using the DHCP networking protocol, which assigns each connected device a unique IP address. While UPnP is helpful for setting up networks, it also can be used to set up compatible audio and video (AV) devices. UPnP AV is a group of standards based on UPnP that allows audio and video components to be connected via network connections. This enables media files and streaming data to be sent between devices. For example, a movie stored on a hard drive in a bedroom could be played back on the TV screen in the living room. The central controller of a UPnP AV network is called a MediaServer and can be run from a Macintosh, Windows, or Linux computer or from a hardware device specifically designed to manage the network. Since most UPnP devices support zero-configuration setup (like ordinary Plug and Play devices), it is simple to add devices to a network and use them immediately. While the networking terms associated with UPnP can be a bit intimidating, setting up a UPnP network is meant to be hassle-free ? and that is a term we can all appreciate.
UPS (Uninterruptible Power Supply) Stands for "Uninterruptible Power Supply." In the technology world, UPS is more than just a brown shipping company. It is also a type of power supply that uses battery backup to maintain power during unexpected power outages. A typical consumer UPS is a surge protector that contains a high-capacity rechargeable battery. Smaller UPS devices look like bulky power strips, while larger ones may stand upright and look almost like small computers. Many businesses use uninterruptible power supplies to keep their equipment running in case of a power failure. While a UPS may only keep a computer running for 15 minutes after the power is lost, it is usually sufficient time to save all necessary documents and properly shut down the computer. That extra time can be invaluable to someone who is working on an important document or project that has not been recently saved. Because UPS devices run the power through a battery, they have a limit on the wattage load they can support. The maximum power load limit is often included in the name of the UPS, followed by the letters "VA." For example, the APC (American Power Conversion) Battery Backup 750VA has a load limit of 750VA. However, the maximum wattage a UPS supports is typically 60% of the VA number. So the 750VA UPS supports a maximum of 450 watts for connected devices. It is important to check how many total watts your computer setup uses before buying a UPS to make sure you get one with enough wattage so you don't overload it.
URI (Uniform Resource Identifier) Stands for "Uniform Resource Identifier." A URI identifies the name and location of a file or resource in a uniform format. It includes a string of characters for the filename and may also contain the path to the directory of the file. URIs provide a standard way for resources to be accessed by other computers across a network or over the World Wide Web. They are used by software programs such as Web browsers and P2P file-sharing programs to locate and download files. URIs are similar to URLs in that they specify the location of a file. However, a URI may refer to all or part a URL. For example, Apple's iMac Design URL is http://www.apple.com/imac/design.html. The URI of this resource may be defined as just "design.html" or "/imac/design.html." These are called relative URIs since they identify the resource relative to a specific location. The complete URL would be referred to as an absolute URI. Because URLs and URIs are similar, they are often used interchangeably. In most cases, this is acceptable since the two terms often refer to the same thing. The difference is that a URI can be used to describe a file's name or location, or both, while a URL specifically defines a resource's location.
URL Uniform Resource Locator.
URL (Uniform Resource Locator) Stands for "Uniform Resource Locator." A URL is the address of a specific Web site or file on the Internet. It cannot have spaces or certain other characters and uses forward slashes to denote different directories. Some examples of URLs are http://www.cnet.com/, http://web.mit.edu/, and ftp://info.apple.com/. As you can see, not all URLs begin with "http". The first part of a URL indicates what kind of resource it is addressing.
USB (Universal Serial Bus) Stands for "Universal Serial Bus." USB is the most common type of computer port used in today's computers. It can be used to connect keyboards, mice, game controllers, printers, scanners, digital cameras, and removable media drives, just to name a few. With the help of a few USB hubs, you can connect up to 127 peripherals to a single USB port and use them all at once (though that would require quite a bit of dexterity). USB is also faster than older ports, such as serial and parallel ports. The USB 1.1 specification supports data transfer rates of up to 12Mb/sec and USB 2.0 has a maximum transfer rate of 480 Mbps. Though USB was introduced in 1997, the technology didn't really take off until the introduction of the Apple iMac (in late 1998) which used USB ports exclusively. It is somewhat ironic, considering USB was created and designed by Intel, Compaq, Digital, and IBM. Over the past few years, USB has become a widely-used cross-platform interface for both Macs and PCs.
Username A username is a name that uniquely identifies someone on a computer system. For example, a computer may be setup with multiple accounts, with different usernames for each account. Many websites allow users to choose a username so that they can customize their settings or set up an online account. For example, your bank may allow you to choose a username for accessing your banking information. You may need to choose a username in order to post messages to a certain message board on the Web. E-mail services, such as Hotmail require users to choose a username in order to use the service. A username is almost always paired with a password. This username/password combination is referred to as a login, and is often required for users to log in to websites. For example, to access your e-mail via the Web, you are required to enter your username and password. Once you have logged in, your username may appear on the screen, but your password is kept secret. By keeping their password private, people can create secure accounts for various websites. Most usernames can contain letters and numbers, but no spaces. When you choose a username for an e-mail account, the part before the "@" is your username.
Utility Utility programs, commonly referred to as just "utilities," are software programs that add functionality to your computer or help your computer perform better. These include antivirus, backup, disk repair, file management, security, and networking programs. Utilities can also be applications such as screensavers, font and icon tools, and desktop enhancements. Some utility programs help keep your computer free from unwanted software such as viruses or spyware, while others add functionality that allows you to customize your desktop and user interface. In general, programs that help make your computer better are considered utilities. And unlike water and electric bills, computer utilities don't send you a bill every month!
VOIP Voice Over IP (talking via telephone over the internet)
VPN Virtual Private Network
Wi Fi A popular term for a form of wireless data communications
Worm Is a virus that spreads typically through network connections. It makes copies of itself and infects additional computers. It might make alter, install or destroy files and programs
XP Often used for describing Microsoft Windows XP.
XP2 Term used to describe Microsoft Windows XP SP2, XP2 is not a completely new version of Microsoft Windows XP, just another name for the service pack.
Y2K (Year 2000) Stands for "Year 2000." However, this term is more often used to refer to the "Millenium Bug." This bug is a little creature that lives inside older computers. When the year 2000 rolls around, the little bug will self-destruct, blowing up the computer it was residing in. The chain of explosions across the world will be catastrophic, causing global panamonia and LA riots. Also associated with Y2K is the end of the world, which is without doubt, foreshadowed by the dredded Millenium Bug. So, on January 1, 2000, you'll want to make sure you have at least a 5 year's supply of food and water, roughly half a million dollars in cash, and at least 200 acres of land somewhere in Montana. Of course, it doesn't really matter, considering the world will have ended anyway. Update: We're past the year 2000 and the world is still going! No Armageddon, no major computer explosions, no nuclear holocaust, even no L.A. Riots... Wow, I guess Y2K wasn't really that bad after all (surprise, surprise). Sorry about those of you who bought 200 acres of land in Montana. =)
Yahoo! Yahoo! is one of the Internet's leading search engines. It is also the largest Web portal, providing links to thousands of other websites. These links include sites from the Yahoo! Directory as well as news stories that are updated several times a day.
Yobibyte A yobibyte is a unit of data storage that equals 2 to the 80th power, or 1,208,925,819,614,629,174,706,176 bytes. While a yottabyte can be estimated as 10^24 or 1,000,000,000,000,000,000,000,000 bytes, a yobibyte is exactly 1,208,925,819,614,629,174,706,176 bytes. This is to avoid the ambiguity associated with the size of yottabytes. A yobibyte is 1,024 zebibytes and is the largest unit of measurement. For a list of other units of measurements, view this Help Center article. Abbreviation: YiB
Yottabyte A yottabyte is 2 to the 80th power, or 1,208,925,819,614,629,174,706,176 bytes. It can be estimated as 10 to the 24th power, or 1,000,000,000,000,000,000,000,000 bytes. The yottabyte is the largest unit of measurement for computer data, consisting of 1,024 zettabytes. Fortunately for those of us finite beings, yottabytes are not used very often. The prefix "yotta" was chosen since it is the second to last letter of the Greek alphabet. Though it seems more fitting that "yotta" refers to a "lotta" bytes. For a list of all the different units of measurements, view this Help Center article. Abbreviation: YB
Zebibyte zebibyte is a unit of data storage that equals 2 to the 70th power, or 1,180,591,620,717,411,303,424 bytes. While a zettabyte can be estimated as 10^21 or 1,000,000,000,000,000,000,000 bytes, a zebibyte is exactly 1,180,591,620,717,411,303,424 bytes. This is to avoid the ambiguity associated with the size of zettabytes. A zebibyte is 1,024 exbibytes and precedes the yobibyte unit of measurement. For a list of other units of measurements, view this Help Center article. Abbreviation: ZiB
Zero Day Exploit A zero day exploit is a malicious computer attack that takes advantage of a security hole before the vulnerability is known. This means the security issue is made known the same day as the computer attack is released. In other words, the software developer has zero days to prepare for the security breach and must work as quickly as possible to develop a patch or update that fixes the problem. Zero day exploits may involve viruses, trojan horses, worms or other malicious code that can be run within a software program. While most programs do not allow unauthorized code to be executed, hackers can sometimes create files that will cause a program to perform functions unintended by the developer. Programs like Web browsers and media players are often targeted by hackers because they can receive files from the Internet and have access to system functions. While most zero day exploits may not cause serious damage to your system, some may be able to corrupt or delete files. Because the security hole is made known the same day the attack is released, zero day exploits are difficult to prevent, even if you have antivirus software installed on your computer. Therefore, it is always good to keep a backup of your data in a safe place so that no hacker attack can cause you to lose your data.
Zettabyte A zettabyte is 2 to the 70th power, or 1,180,591,620,717,411,303,424 bytes. It can be estimated as 10 to the 21st power, or 1,000,000,000,000,000,000,000 bytes. A zettabyte is 1,024 exabytes and precedes the yottabyte unit of measurement. Because of the enormous size of a zettabyte, this unit is almost never used. The prefix zetta comes from "Zeta," which is the sixth letter of the Greek alphabet. For a list of all the different units of measurements, view this Help Center article. Abbreviation: ZB
ZIF (Zero Insertion Force) Stands for "Zero Insertion Force." ZIF is a type of CPU socket on a computer motherboard that allows for the simple replacement or upgrade of the processor. Processors that use a ZIF socket can easily be removed by pulling a small release lever next to the processor and lifting it out. The replacement processor is then placed in the socket and secured by pushing the lever in the opposite direction -- hence the phrase, "zero insertion force." I suppose there is some force required to push the lever, but it is significantly less than non-ZIF sockets, which require special tools to force the processor out.
Zip Windows users will see this term a lot when looking for files on the Internet. A zip file (.zip) is a "zipped" or compressed file. For example, when you download a file, if the filename looks like this: "filename.zip," you are downloading a zipped file. "Zipping" a file involves compressing one or more items into a smaller archive. A zipped file takes up less hard drive space and takes less time to transfer to another computer. This is why most Windows files that you find on the Internet are compressed. To use a zipped file, you'll need to unzip it first. PKZIP for DOS, or WinZip for Windows, are some popular programs that can unzip files for you. Fortunately, these programs can be downloaded for free from Web sites like Download.com. Macintosh files are most often "stuffed" into Stuffit files (.sit), which can be "unstuffed" using Aladdin's Stuffit Expander. The term "Zip" also refers to a product by Iomega. The company makes a removable storage device called a Zip Drive. Depending on the model, these drives can hold 100, 250 or 750 MB Zip disks. They are usually used for backup and for transferring large files to different locations. However, Zip drives are not as fast as hard drives, so it is usually not a good idea to run programs off them. File extension: .ZIP
Zone File A zone file is stored on a name server and provides information about one or more domain names. Each zone file contains a list of DNS records with mappings between domain names and IP addresses. These records define the IP address of a domain name, the reverse lookup of an IP to other domains, and contain DNS and mail server information. Because zone files are plain text files, they can be edited quickly and easily. However, this also means that if unauthorized users gain access to zone files, the files can be easily modified. This could cause websites to not respond, or worse yet, redirect to the wrong Web server. For this reason, it is important to keep the zone files on a highly secured server and always have a recent backup of zone files on another machine.

 

 

 

 

Copyright © 2005 - 2008 delawarepchelp.com, All Rights Reserved