Steven Otárola Alvarado 
Manuel Vargas Garcia 
Marco Vega Arroyo
X
A
• Is a physical device that allows one 
hardware or electronic interface to be 
adapted (accommodated without loss of 
function) to another hardware or 
electronic interface. In a computer, an 
adapter is often built into a card that can 
be inserted into a slot on the computer's 
motherboard. 
Sub-menu
• Is the unit of router policy, either a 
single network or a group of networks 
that is controlled by a common network 
administrator (or group of 
administrators) on behalf of a single 
administrative entity (such as a 
university, a business enterprise, or a 
business division). 
Sub-menu
• Is a type of program designed to 
prevent and detect unwanted 
spyware program installations and to 
remove those programs if installed. 
Sub-menu Video
Sub-menu
• ASP stands for Application Service Providers, companies that provide 
software services to its clients through a network. 
Sub-menu
• ASCII stands for American Standard 
Code for Information Interchange. 
Computers can only understand 
numbers, so an ASCII code is the 
numerical representation of a 
character such as 'a' or '@' or an 
action of some sort. 
Sub-menu
• Antivirus software was originally 
developed to detect and 
remove computer viruses, hence the 
name. However, with the proliferation 
of other kinds of malware, antivirus 
software started to provide protection 
from other computer threats. 
Sub-menu
• Is a software framework created by Microsoft that adapts its earlier 
Component Object Model (COM) and Object Linking and Embedding 
(OLE) technologies for content downloaded from a network, particularly in 
the context of the World Wide Web. 
Sub-menu
B
• In general, broadband refers to 
telecommunication in which a wide 
band of frequencies is available to 
transmit information. 
Sub-menu
• In computer science, the Boolean data type is a data type, having two values 
(usually denoted true and false), intended to represent the truth 
values of logic and Boolean algebra. 
Sub-menu
• A browser or web browser, or 
browser is a software that allows 
Internet access, interpreting 
information from files and websites 
so that they can be read. 
Sub-menu
• In mathematics and digital 
electronics, a binary number is a 
number expressed in the binary 
numeral system, or base-2 numeral 
system, which represents numeric 
values using two different symbols: 
typically 0 (zero) and 1 (one). 
Sub-menu
• Is the informal name given by users to the 
Windows general protection fault (GPF) 
error. Named in honor of the error's 
dreaded display image of white text on a 
blue background, the BSOD is generated 
by the operating system when it has 
suddenly terminated with an error. 
Sub-menu
C
• It is a CD that uses laser light to store 
and read large amounts of information 
in digital format. 
Sub-menu
• Is random access memory (RAM) 
that a computer microprocessor can 
access more quickly than it can 
access regular RAM. 
Sub-menu
• Is a state of being in accordance with established guidelines, specifications, 
or legislation or the process of becoming so. Software, for example, may be 
developed in compliance with specifications created by some standards body, 
such as the Institute of Electrical and Electronics Engineers (IEEE). 
Sub-menu
• To counterfeit means to imitate 
something. Counterfeit products are 
fake replicas of the real product. 
Counterfeit products are often 
produced with the intent to take 
advantage of the superior value of 
the imitated product. 
Sub-menu
D
• Is an incident in which sensitive, protected or confidential data has 
potentially been viewed, stolen or used by an individual unauthorized to do 
so. 
Sub-menu
• Is a control panel placed in front of the driver of an automobile, housing 
instrumentation and controls for operation of the vehicle. 
Sub-menu
• Is a mathematical technique used to validate the authenticity and integrity of 
a message, software or digital document. 
Sub-menu
• Data can travel through a serial or parallel interface, simply consists of a 
suitable physical connection, such as a cable. 
Sub-menu
• The Dynamic Host Configuration 
Protocol (DHCP) is a standardized 
network protocol used on Internet 
Protocol (IP) networks for 
dynamically distributing network 
configuration parameters, such as IP 
addresses for interfaces and services. 
Sub-menu
• A digit is a type of symbol (a numeral symbol, such as "2" or "5") used in 
combinations (such as "25") to represent numbers (such as the number 25) 
in positional numeral systems. 
Sub-menu
• The Domain Name System (DNS) is 
a hierarchical distributed naming 
system for computers, services, or 
any resource connected to the 
Internet or a private network. 
Sub-menu
• The term downloading is distinguished from 
the related concept of streaming, which 
indicates the receiving of data that is used 
nearly immediately as it is received, while the 
transmission is still in progress and which may 
not be stored long-term, whereas in a process 
described using the term downloading, this 
would imply that the data is only usable when 
it has been received in its entirety. 
Sub-menu
E
• Electronic mail or email is a quick way of sending messages to people using 
the internet. 
Sub-menu
• Is the conversion of electronic data into another form, called ciphertext, 
which cannot be easily understood by anyone except authorized parties. 
Sub-menu Video
Sub-menu
• Random variations in potential, current, or voltage in electric circuits and 
communications lines. It can damage your devices. 
Sub-menu
• In computing, a character encoding is used to represent a repertoire of 
characters by some kind of an encoding system. Depending on the 
abstraction level and context, corresponding code points and the resulting 
code space may be regarded as bit patterns, octets, natural numbers, electrical 
pulses, etc. 
Sub-menu
F
• Is a type of constantly-powered nonvolatile memory that can be erased and 
reprogrammed in units of memory called blocks. 
Sub-menu
• Vehicle mount mobile computers put robust computing power in a rugged 
form factor designed to handle the vibration of forklifts, fleet cars, delivery 
trucks and other vehicles. 
Sub-menu
• In computing, a firewall is a network security system that controls the 
incoming and outgoing network traffic based on applied rule set. A firewall 
establishes a barrier between a trusted, secure internal network and another 
network (e.g., the Internet). 
Sub-menu
G
• A geographic information system (GIS) is a computer system designed to 
capture, store, manipulate, analyze, manage, and present all types of spatial 
or geographical data. 
Sub-menu
• The Global Positioning System (GPS) to determine the position of an 
object, person or vehicle to centimeter precision worldwide. 
Sub-menu
H
• The term refers to all hardware tangible parts of a computer system; its 
components are: electrical, electronic, electromechanical and mechanical. 
Sub-menu
• A computer system that is accessed by a user working at a remote location. 
Typically, the term is used when there are two computer systems connected 
by modems and telephone lines. The system that contains the data is called 
the host, while the computer at which the user sits is called the remote 
terminal. 
Sub-menu
I
• Internet is a network of networks that allows the decentralized networking 
of computers through a set of protocols called TCP / IP. 
Sub-menu
• An icon is a small graphic representation of a program or file. 
Sub-menu
• The Internet service provider is the company that provides Internet access to 
their customers. 
Sub-menu
• The Institute of Electrical and Electronics Engineers is an organization that 
develops global standards in a broad range of industries including: power 
and energy, biomedicine, information technology, telecommunications, 
transportation, nanotechnology, insurance information, and many more. 
Sub-menu
• Is a form of stealing someone's identity in which someone pretends to be 
someone else by assuming that person's identity, usually as a method to gain 
access to resources or obtain credit and other benefits in that person's name. 
Sub-menu Video
Sub-menu
• Internet Protocol version 4 (IPv4) is 
the fourth version in the 
development of the Internet 
Protocol (IP) Internet, and routes 
most traffic on the Internet 
Sub-menu
• Internet Protocol version 6 (IPv6) is 
the latest version of the Internet 
Protocol (IP), the communications 
protocol that provides an 
identification and location system for 
computers on networks and routes 
traffic across the Internet. 
Sub-menu
J
• A jumper is a short length of 
conductor used to close a break in or 
open, or bypass part of, an electrical 
circuit. Jumpers are typically used to 
set up or configure printed circuit 
boards, such as the motherboards of 
computers. 
Sub-menu
K
• A keyboard is for putting information such as letters, words and numbers 
into your computer. 
Sub-menu
• Keywords are used on the Web in two different ways: 1) as search terms for 
search engines, and 2) words that identify the content of the website. 
Sub-menu
L
• When you are browsing the Web and 
you see a highlighted and underlined 
word or phrase on a page, there is a 
good chance you are looking at a 
link. By clicking on a link, you can 
"jump" to a new Web page or a 
completely different Web site. 
Sub-menu
• A LAN is a computer network 
limited to a small area such as an 
office building, university, or even a 
residential home. 
Sub-menu
M
• M2M (Machine to Machine) is a 
generic term that refers to the 
exchange of information or data 
format communication between two 
remote machines. 
Sub-menu
• It is a computerized device used in public transport vehicles and are used to 
display the mapping and information relevant to the tasks and actions taken 
by the vehicle, such as CAD drawings, diagrams and safety information. 
Sub-menu
• Mobile broadband is a wireless technology that allows you to connect a 
mobile device such as your smartphone or tablet to a broadband internet 
connection wirelessly through a mobile phone network. 
Sub-menu
• Is any software used to disrupt computer operation, gather sensitive 
information, or gain access to private computer systems. 
Sub-menu
• A media access control address (MAC address) is a unique identifier assigned 
to network interfaces for communications on the physical network segment. 
MAC addresses are used as a network address for most IEEE 802 network 
technologies, including Ethernet and Wi-Fi. Logically, MAC addresses are 
used in the media access control protocol sub layer of the OSI reference 
model. 
Sub-menu
N
• The nodes are devices or data points in a network. Devices such as a 
personal computer, cell phone, or printer are nodes. 
Sub-menu
• A network is a group of two or more computer systems linked together. 
Sub-menu
O
• Online is the condition of being 
connected to a network of 
computers or other devices. 
Sub-menu
• Data generated by a computer is 
referred to as output. 
Sub-menu
P
• The platforms refer to the technology used for the creation and development 
of courses or course modules in the Web used more broadly on the Web. 
Sub-menu
• A password is an unspaced sequence 
of characters used to determine that 
a computer user requesting access to 
a computer system is really that 
particular user. 
Sub-menu
• An electronic device that is easily transported. It may refer to a pocket-sized 
handheld device or to a laptop that weighs several pounds. 
Sub-menu
• In its simplest form, a peer-to-peer 
(P2P) network is created when two 
or more PCs are connected and 
share resources without going 
through a separate server computer. 
Sub-menu Video
Sub-menu
• Is a collection of software tools that automates the process of installing, 
upgrading, configuring, and removing software packages for a computer's 
operating system in a consistent manner. 
Sub-menu
• Is the attempt to acquire sensitive information such as 
usernames, passwords, and credit card details (and sometimes, 
indirectly, money) by masquerading as a trustworthy entity in an electronic 
communication. 
Sub-menu Video
Sub-menu
Q
• A quad-core CPU has four processing cores in a single chip. It is similar to a 
dual-core CPU, but has four separate processors (rather than two), which can 
process instructions at the same time. 
Sub-menu
• This is a multimedia technology developed by our friends at Apple 
Computer. It is a popular format for creating and storing sound, graphics, 
and movie (.mov) files. 
Sub-menu
• This term is used to describe a 
standard (Latin alphabet-based) 
keyboard. Why? Because the first six 
keys in the upper-left part of the 
keyboard spell out Q-W-E-R-T-Y. 
Sub-menu
R
• Is the place in a computer where the operating system, application 
programs, and data in current use are kept so that they can be quickly 
reached by the computer's processor. 
Sub-menu
• Is "built-in" computer memory 
containing data that normally can 
only be read, not written to. ROM 
contains the programming that 
allows your computer to be "booted 
up" or regenerated each time you 
turn it on. 
Sub-menu
• Is the process of backing up data created by remote and branch offices 
(ROBOs) and storing it securely. 
Sub-menu
• A remote system is a workstation or 
server that is connected to the local 
system with any type of physical 
network and configured for TCP/IP 
communication. 
Sub-menu
• Also called homecare telehealth) is a 
type of ambulatory healthcare that 
allows a patient to use a mobile 
medical device to perform a routine 
test and send the test data to a 
healthcare professional in real-time. 
Sub-menu
• Radio frequency identification 
(RFID) is a form of wireless 
communication that uses radio waves 
to identify and track objects. 
Sub-menu
• A router is a networking device, 
commonly specialized hardware that 
forwards data packets between 
computer networks. This creates an 
overlay internetwork, as a router is 
connected to two or more data lines 
from different networks. 
Sub-menu
S
• Is a communications center that 
provides a single point of contact 
(SPOC) between a company and its 
customers, employees and business 
partners. The purpose of a service 
desk is to ensure that users receive 
appropriate help in a timely manner. 
Sub-menu
• Is a computer program that blanks the screen or fills it with moving images 
or patterns when the computer is not in use. 
Sub-menu
• Sequential access memory (SAM) is a 
class of data storage devices that 
read their data in sequence. 
Sub-menu
• In computing, a service pack or SP (in short SP) comprises a collection of 
updates, fixes, or enhancements to a software program delivered in the form 
of a single installable package. 
Sub-menu
• It is defined unsolicited SPAM 
messages, normally containing 
advertising sent in masse. 
Sub-menu
• Software is a set of programs, instructions and rules that allow computer to 
run various tasks on a computer. 
Sub-menu
• El spyware o programa espía es un 
software que recopila información de 
un ordenador y después transmite 
esta información a una entidad 
externa sin el conocimiento o el 
consentimiento del propietario del 
ordenador. 
Sub-menu Video
Sub-menu
• A server is a running instance of an 
application (software) capable of 
accepting requests from the client 
and giving responses accordingly 
Remote System. 
Sub-menu
• These devices are very useful for the modern man, are the main protagonists 
of communications in the world; Thanks to them, we receive TV signals, 
radio and telephone, internet and have valuable information on climate, our 
environment and space. 
Sub-menu
• Is a spyware and adware removal 
computer program compatible with 
Microsoft Windows 95 and later. It 
scans the computer hard disk and/or 
RAM for malicious software. 
Sub-menu
T
• Generally a tracking system is used 
for the observing of persons or 
objects on the move and supplying a 
timely ordered sequence of 
respective location data to a model 
e.g. capable to serve for depicting the 
motion on a display capability. 
Sub-menu
• A telematic control unit (TCU) in the 
automobile industry refers to the 
embedded system on board a vehicle 
that controls tracking of the vehicle. 
Sub-menu
• Telematics are an interdisciplinary field encompassing telecommunications, 
vehicular technologies, road transportation, road safety, electrical engineering 
(sensors, instrumentation, wireless communications, etc.). 
Sub-menu
• A toolbar is a graphical control 
element on which on-screen buttons, 
icons, menus, or other input or 
output elements are placed. 
Sub-menu
U
• Username is the name given to a user on a computer or computer network. 
Sub-menu
• Updates are additions to software 
that can prevent or fix problems, 
enhance computer security or 
improve the performance of it. 
Sub-menu
• A uniform resource locator (abbreviated URL; also known as a web address, 
particularly when used with HTTP) is a specific character string that 
constitutes a reference to a resource. Most web browsers display the URL of 
a web page above the page in an address bar. A typical URL might look 
like: http://www.example.org/wiki/Main_Page. 
Sub-menu
V
• Is a feature of an operating system 
(OS) that allows a computer to 
compensate for shortages of physical 
memory by temporarily 
transferring pages of data from 
random access memory (RAM) 
to disk storage. 
Sub-menu
• Computer systems that can recognize 
spoken words. Note that voice 
recognition implies only that 
the computer can take dictation, not 
that it understands what is being said. 
Sub-menu
• Not real. The term virtual is popular 
among computer scientists and is 
used in a wide variety of situations. 
In general, it distinguishes something 
that is merely conceptual from 
something that has physical reality. 
Sub-menu
• A virtual private network (VPN) extends a 
private network across a public network, such 
as the Internet. It enables a computer or Wi- 
Fi-enabled device to send and receive data 
across shared or public networks as if it were 
directly connected to the private network, 
while benefiting from the functionality, security 
and management policies of the private 
network. 
Sub-menu
• Is a decreased ability to see to a 
degree that additional it causes 
problems that are not fixable by 
usual means, such as glasses or 
medication. 
Sub-menu
W
• Computer network is a device that 
interconnects wired communication 
device to form a wireless network. 
Sub-menu
• Wireless communication is the transfer of information between two or more 
points that are not connected by an electrical conductor. 
Sub-menu
• An Internet forum is an online discussion site where people can hold 
conversations in the form of posted messages. 
Sub-menu
• Windows Update, a service offered 
by Microsoft, provides updates for 
Windows components. 
Sub-menu
• In computing, a web widget is a 
software widget for the web. It's a 
small application with limited 
functionality that can be installed and 
executed within a web page by an 
end user. A widget has the role of a 
transient or auxiliary application. 
Sub-menu
X
• x86 is the generic name for Intel processors released after the original 8086 
processor. If a computer's technical specifications state that is based on the 
x86 architecture, that means it uses an Intel processor (not AMD or 
PowerPC). 
Sub-menu
Y
• YouTube is a video sharing service that allows users to watch videos posted 
by other users and upload videos of their own. 
Sub-menu
• Yahoo! is one of the Internet's 
leading search engines. It is also the 
largest Web portal, providing links to 
thousands of other websites. These 
links include sites from the Yahoo! 
Directory as well as news stories that 
are updated several times a day. 
Sub-menu
Z
• A zone file is stored on a name server 
and provides information about one 
or more domain names. Each zone 
file contains a list of DNS records 
with mappings between domain 
names and IP addresses. 
Sub-menu
• Windows users will see this term a lot when looking for files on the Internet. 
A zip file (.zip) is a "zipped" or compressed file. For example, when you 
download a file, if the filename looks like this: "filename.zip," you are 
downloading a zipped file. 
Sub-menu

Interactive glossary

  • 1.
    Steven Otárola Alvarado Manuel Vargas Garcia Marco Vega Arroyo
  • 2.
  • 3.
  • 4.
    • Is aphysical device that allows one hardware or electronic interface to be adapted (accommodated without loss of function) to another hardware or electronic interface. In a computer, an adapter is often built into a card that can be inserted into a slot on the computer's motherboard. Sub-menu
  • 5.
    • Is theunit of router policy, either a single network or a group of networks that is controlled by a common network administrator (or group of administrators) on behalf of a single administrative entity (such as a university, a business enterprise, or a business division). Sub-menu
  • 6.
    • Is atype of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed. Sub-menu Video
  • 7.
  • 8.
    • ASP standsfor Application Service Providers, companies that provide software services to its clients through a network. Sub-menu
  • 9.
    • ASCII standsfor American Standard Code for Information Interchange. Computers can only understand numbers, so an ASCII code is the numerical representation of a character such as 'a' or '@' or an action of some sort. Sub-menu
  • 10.
    • Antivirus softwarewas originally developed to detect and remove computer viruses, hence the name. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. Sub-menu
  • 11.
    • Is asoftware framework created by Microsoft that adapts its earlier Component Object Model (COM) and Object Linking and Embedding (OLE) technologies for content downloaded from a network, particularly in the context of the World Wide Web. Sub-menu
  • 12.
  • 13.
    • In general,broadband refers to telecommunication in which a wide band of frequencies is available to transmit information. Sub-menu
  • 14.
    • In computerscience, the Boolean data type is a data type, having two values (usually denoted true and false), intended to represent the truth values of logic and Boolean algebra. Sub-menu
  • 15.
    • A browseror web browser, or browser is a software that allows Internet access, interpreting information from files and websites so that they can be read. Sub-menu
  • 16.
    • In mathematicsand digital electronics, a binary number is a number expressed in the binary numeral system, or base-2 numeral system, which represents numeric values using two different symbols: typically 0 (zero) and 1 (one). Sub-menu
  • 17.
    • Is theinformal name given by users to the Windows general protection fault (GPF) error. Named in honor of the error's dreaded display image of white text on a blue background, the BSOD is generated by the operating system when it has suddenly terminated with an error. Sub-menu
  • 18.
  • 19.
    • It isa CD that uses laser light to store and read large amounts of information in digital format. Sub-menu
  • 20.
    • Is randomaccess memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM. Sub-menu
  • 21.
    • Is astate of being in accordance with established guidelines, specifications, or legislation or the process of becoming so. Software, for example, may be developed in compliance with specifications created by some standards body, such as the Institute of Electrical and Electronics Engineers (IEEE). Sub-menu
  • 22.
    • To counterfeitmeans to imitate something. Counterfeit products are fake replicas of the real product. Counterfeit products are often produced with the intent to take advantage of the superior value of the imitated product. Sub-menu
  • 23.
  • 24.
    • Is anincident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. Sub-menu
  • 25.
    • Is acontrol panel placed in front of the driver of an automobile, housing instrumentation and controls for operation of the vehicle. Sub-menu
  • 26.
    • Is amathematical technique used to validate the authenticity and integrity of a message, software or digital document. Sub-menu
  • 27.
    • Data cantravel through a serial or parallel interface, simply consists of a suitable physical connection, such as a cable. Sub-menu
  • 28.
    • The DynamicHost Configuration Protocol (DHCP) is a standardized network protocol used on Internet Protocol (IP) networks for dynamically distributing network configuration parameters, such as IP addresses for interfaces and services. Sub-menu
  • 29.
    • A digitis a type of symbol (a numeral symbol, such as "2" or "5") used in combinations (such as "25") to represent numbers (such as the number 25) in positional numeral systems. Sub-menu
  • 30.
    • The DomainName System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. Sub-menu
  • 31.
    • The termdownloading is distinguished from the related concept of streaming, which indicates the receiving of data that is used nearly immediately as it is received, while the transmission is still in progress and which may not be stored long-term, whereas in a process described using the term downloading, this would imply that the data is only usable when it has been received in its entirety. Sub-menu
  • 32.
  • 33.
    • Electronic mailor email is a quick way of sending messages to people using the internet. Sub-menu
  • 34.
    • Is theconversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties. Sub-menu Video
  • 35.
  • 36.
    • Random variationsin potential, current, or voltage in electric circuits and communications lines. It can damage your devices. Sub-menu
  • 37.
    • In computing,a character encoding is used to represent a repertoire of characters by some kind of an encoding system. Depending on the abstraction level and context, corresponding code points and the resulting code space may be regarded as bit patterns, octets, natural numbers, electrical pulses, etc. Sub-menu
  • 38.
  • 39.
    • Is atype of constantly-powered nonvolatile memory that can be erased and reprogrammed in units of memory called blocks. Sub-menu
  • 40.
    • Vehicle mountmobile computers put robust computing power in a rugged form factor designed to handle the vibration of forklifts, fleet cars, delivery trucks and other vehicles. Sub-menu
  • 41.
    • In computing,a firewall is a network security system that controls the incoming and outgoing network traffic based on applied rule set. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet). Sub-menu
  • 42.
  • 43.
    • A geographicinformation system (GIS) is a computer system designed to capture, store, manipulate, analyze, manage, and present all types of spatial or geographical data. Sub-menu
  • 44.
    • The GlobalPositioning System (GPS) to determine the position of an object, person or vehicle to centimeter precision worldwide. Sub-menu
  • 45.
  • 46.
    • The termrefers to all hardware tangible parts of a computer system; its components are: electrical, electronic, electromechanical and mechanical. Sub-menu
  • 47.
    • A computersystem that is accessed by a user working at a remote location. Typically, the term is used when there are two computer systems connected by modems and telephone lines. The system that contains the data is called the host, while the computer at which the user sits is called the remote terminal. Sub-menu
  • 48.
  • 49.
    • Internet isa network of networks that allows the decentralized networking of computers through a set of protocols called TCP / IP. Sub-menu
  • 50.
    • An iconis a small graphic representation of a program or file. Sub-menu
  • 51.
    • The Internetservice provider is the company that provides Internet access to their customers. Sub-menu
  • 52.
    • The Instituteof Electrical and Electronics Engineers is an organization that develops global standards in a broad range of industries including: power and energy, biomedicine, information technology, telecommunications, transportation, nanotechnology, insurance information, and many more. Sub-menu
  • 53.
    • Is aform of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, usually as a method to gain access to resources or obtain credit and other benefits in that person's name. Sub-menu Video
  • 54.
  • 55.
    • Internet Protocolversion 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) Internet, and routes most traffic on the Internet Sub-menu
  • 56.
    • Internet Protocolversion 6 (IPv6) is the latest version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. Sub-menu
  • 57.
  • 58.
    • A jumperis a short length of conductor used to close a break in or open, or bypass part of, an electrical circuit. Jumpers are typically used to set up or configure printed circuit boards, such as the motherboards of computers. Sub-menu
  • 59.
  • 60.
    • A keyboardis for putting information such as letters, words and numbers into your computer. Sub-menu
  • 61.
    • Keywords areused on the Web in two different ways: 1) as search terms for search engines, and 2) words that identify the content of the website. Sub-menu
  • 62.
  • 63.
    • When youare browsing the Web and you see a highlighted and underlined word or phrase on a page, there is a good chance you are looking at a link. By clicking on a link, you can "jump" to a new Web page or a completely different Web site. Sub-menu
  • 64.
    • A LANis a computer network limited to a small area such as an office building, university, or even a residential home. Sub-menu
  • 65.
  • 66.
    • M2M (Machineto Machine) is a generic term that refers to the exchange of information or data format communication between two remote machines. Sub-menu
  • 67.
    • It isa computerized device used in public transport vehicles and are used to display the mapping and information relevant to the tasks and actions taken by the vehicle, such as CAD drawings, diagrams and safety information. Sub-menu
  • 68.
    • Mobile broadbandis a wireless technology that allows you to connect a mobile device such as your smartphone or tablet to a broadband internet connection wirelessly through a mobile phone network. Sub-menu
  • 69.
    • Is anysoftware used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Sub-menu
  • 70.
    • A mediaaccess control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used as a network address for most IEEE 802 network technologies, including Ethernet and Wi-Fi. Logically, MAC addresses are used in the media access control protocol sub layer of the OSI reference model. Sub-menu
  • 71.
  • 72.
    • The nodesare devices or data points in a network. Devices such as a personal computer, cell phone, or printer are nodes. Sub-menu
  • 73.
    • A networkis a group of two or more computer systems linked together. Sub-menu
  • 74.
  • 75.
    • Online isthe condition of being connected to a network of computers or other devices. Sub-menu
  • 76.
    • Data generatedby a computer is referred to as output. Sub-menu
  • 77.
  • 78.
    • The platformsrefer to the technology used for the creation and development of courses or course modules in the Web used more broadly on the Web. Sub-menu
  • 79.
    • A passwordis an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is really that particular user. Sub-menu
  • 80.
    • An electronicdevice that is easily transported. It may refer to a pocket-sized handheld device or to a laptop that weighs several pounds. Sub-menu
  • 81.
    • In itssimplest form, a peer-to-peer (P2P) network is created when two or more PCs are connected and share resources without going through a separate server computer. Sub-menu Video
  • 82.
  • 83.
    • Is acollection of software tools that automates the process of installing, upgrading, configuring, and removing software packages for a computer's operating system in a consistent manner. Sub-menu
  • 84.
    • Is theattempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Sub-menu Video
  • 85.
  • 86.
  • 87.
    • A quad-coreCPU has four processing cores in a single chip. It is similar to a dual-core CPU, but has four separate processors (rather than two), which can process instructions at the same time. Sub-menu
  • 88.
    • This isa multimedia technology developed by our friends at Apple Computer. It is a popular format for creating and storing sound, graphics, and movie (.mov) files. Sub-menu
  • 89.
    • This termis used to describe a standard (Latin alphabet-based) keyboard. Why? Because the first six keys in the upper-left part of the keyboard spell out Q-W-E-R-T-Y. Sub-menu
  • 90.
  • 91.
    • Is theplace in a computer where the operating system, application programs, and data in current use are kept so that they can be quickly reached by the computer's processor. Sub-menu
  • 92.
    • Is "built-in"computer memory containing data that normally can only be read, not written to. ROM contains the programming that allows your computer to be "booted up" or regenerated each time you turn it on. Sub-menu
  • 93.
    • Is theprocess of backing up data created by remote and branch offices (ROBOs) and storing it securely. Sub-menu
  • 94.
    • A remotesystem is a workstation or server that is connected to the local system with any type of physical network and configured for TCP/IP communication. Sub-menu
  • 95.
    • Also calledhomecare telehealth) is a type of ambulatory healthcare that allows a patient to use a mobile medical device to perform a routine test and send the test data to a healthcare professional in real-time. Sub-menu
  • 96.
    • Radio frequencyidentification (RFID) is a form of wireless communication that uses radio waves to identify and track objects. Sub-menu
  • 97.
    • A routeris a networking device, commonly specialized hardware that forwards data packets between computer networks. This creates an overlay internetwork, as a router is connected to two or more data lines from different networks. Sub-menu
  • 98.
  • 99.
    • Is acommunications center that provides a single point of contact (SPOC) between a company and its customers, employees and business partners. The purpose of a service desk is to ensure that users receive appropriate help in a timely manner. Sub-menu
  • 100.
    • Is acomputer program that blanks the screen or fills it with moving images or patterns when the computer is not in use. Sub-menu
  • 101.
    • Sequential accessmemory (SAM) is a class of data storage devices that read their data in sequence. Sub-menu
  • 102.
    • In computing,a service pack or SP (in short SP) comprises a collection of updates, fixes, or enhancements to a software program delivered in the form of a single installable package. Sub-menu
  • 103.
    • It isdefined unsolicited SPAM messages, normally containing advertising sent in masse. Sub-menu
  • 104.
    • Software isa set of programs, instructions and rules that allow computer to run various tasks on a computer. Sub-menu
  • 105.
    • El spywareo programa espía es un software que recopila información de un ordenador y después transmite esta información a una entidad externa sin el conocimiento o el consentimiento del propietario del ordenador. Sub-menu Video
  • 106.
  • 107.
    • A serveris a running instance of an application (software) capable of accepting requests from the client and giving responses accordingly Remote System. Sub-menu
  • 108.
    • These devicesare very useful for the modern man, are the main protagonists of communications in the world; Thanks to them, we receive TV signals, radio and telephone, internet and have valuable information on climate, our environment and space. Sub-menu
  • 109.
    • Is aspyware and adware removal computer program compatible with Microsoft Windows 95 and later. It scans the computer hard disk and/or RAM for malicious software. Sub-menu
  • 110.
  • 111.
    • Generally atracking system is used for the observing of persons or objects on the move and supplying a timely ordered sequence of respective location data to a model e.g. capable to serve for depicting the motion on a display capability. Sub-menu
  • 112.
    • A telematiccontrol unit (TCU) in the automobile industry refers to the embedded system on board a vehicle that controls tracking of the vehicle. Sub-menu
  • 113.
    • Telematics arean interdisciplinary field encompassing telecommunications, vehicular technologies, road transportation, road safety, electrical engineering (sensors, instrumentation, wireless communications, etc.). Sub-menu
  • 114.
    • A toolbaris a graphical control element on which on-screen buttons, icons, menus, or other input or output elements are placed. Sub-menu
  • 115.
  • 116.
    • Username isthe name given to a user on a computer or computer network. Sub-menu
  • 117.
    • Updates areadditions to software that can prevent or fix problems, enhance computer security or improve the performance of it. Sub-menu
  • 118.
    • A uniformresource locator (abbreviated URL; also known as a web address, particularly when used with HTTP) is a specific character string that constitutes a reference to a resource. Most web browsers display the URL of a web page above the page in an address bar. A typical URL might look like: http://www.example.org/wiki/Main_Page. Sub-menu
  • 119.
  • 120.
    • Is afeature of an operating system (OS) that allows a computer to compensate for shortages of physical memory by temporarily transferring pages of data from random access memory (RAM) to disk storage. Sub-menu
  • 121.
    • Computer systemsthat can recognize spoken words. Note that voice recognition implies only that the computer can take dictation, not that it understands what is being said. Sub-menu
  • 122.
    • Not real.The term virtual is popular among computer scientists and is used in a wide variety of situations. In general, it distinguishes something that is merely conceptual from something that has physical reality. Sub-menu
  • 123.
    • A virtualprivate network (VPN) extends a private network across a public network, such as the Internet. It enables a computer or Wi- Fi-enabled device to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security and management policies of the private network. Sub-menu
  • 124.
    • Is adecreased ability to see to a degree that additional it causes problems that are not fixable by usual means, such as glasses or medication. Sub-menu
  • 125.
  • 126.
    • Computer networkis a device that interconnects wired communication device to form a wireless network. Sub-menu
  • 127.
    • Wireless communicationis the transfer of information between two or more points that are not connected by an electrical conductor. Sub-menu
  • 128.
    • An Internetforum is an online discussion site where people can hold conversations in the form of posted messages. Sub-menu
  • 129.
    • Windows Update,a service offered by Microsoft, provides updates for Windows components. Sub-menu
  • 130.
    • In computing,a web widget is a software widget for the web. It's a small application with limited functionality that can be installed and executed within a web page by an end user. A widget has the role of a transient or auxiliary application. Sub-menu
  • 131.
  • 132.
    • x86 isthe generic name for Intel processors released after the original 8086 processor. If a computer's technical specifications state that is based on the x86 architecture, that means it uses an Intel processor (not AMD or PowerPC). Sub-menu
  • 133.
  • 134.
    • YouTube isa video sharing service that allows users to watch videos posted by other users and upload videos of their own. Sub-menu
  • 135.
    • Yahoo! isone of the Internet's leading search engines. It is also the largest Web portal, providing links to thousands of other websites. These links include sites from the Yahoo! Directory as well as news stories that are updated several times a day. Sub-menu
  • 136.
  • 137.
    • A zonefile is stored on a name server and provides information about one or more domain names. Each zone file contains a list of DNS records with mappings between domain names and IP addresses. Sub-menu
  • 138.
    • Windows userswill see this term a lot when looking for files on the Internet. A zip file (.zip) is a "zipped" or compressed file. For example, when you download a file, if the filename looks like this: "filename.zip," you are downloading a zipped file. Sub-menu