Glossary of Computer Terms
Glossary of Computer Terms
“Kleber Ramírez”
Núcleo/Tucaní
Glossary
of
computer terms
Profesor: Integrantes:
Alian Rivas
Jesús Serrano
Katherin Peña
El Pinar
A
Antivirus: An antivirus is a computer program that has the purpose of detecting and
eliminating viruses and other harmful programs before or after they enter the
system.
At: Graphic symbol used to separate the domain user name (server name) in the
email addresses. It is written through the keyboard, usually by combining the AltGr
key with one of the first row of characters. It is the following:
B
Bit: It is the smallest unit of digital information. Its name comes from binary digit. It
can have two values: 0 and 1. Actually, one bit is each of the two digits of the
binary numbering system. Every 8 bits form a byte.
Browser: A web browser is a software, application or program that allows access to
the Web, interpreting the information of different types of files and websites so that
they can be viewed.
C
CD-ROM: External storage device in the form of an optical disk that only allows
data reading (not writing) on our computer. The acronyms respond to Compact
Disc Read Only Memory. Its capacity to store data reaches 700 MB. If we want to
be able to add data from our equipment we will have to use a CD-R or a CD-RW.
Chat: Internet service that allows to converse in real time to two or more
geographically distant people. To make use of this service it is necessary to have
an email account and a software called chat client. Some of the best known are
Windows Live, Yahoo! Messenger and ICQ that was the first to offer these
services.
CPU: Central Processing unit of a Computer. It is the part to which the information
arrives from the input peripherals, executes the tasks and returns the results to the
output peripherals. Apparently it is a box inside which is the processor, memory,
etc ...
D
Deep Web: Is a term used to refer to all the Internet pages that are not indexed by
the Internet search engines that we know and in which we surf every day.
Direct Access: Icon that appears on the desktop of the computer and serves to
open a program or a document more quickly. It differs from the file icons in that
they carry a small curved arrow in the lower left. If they are removed from the
Desktop, the file or program to which they give access is not deleted.
E
E-mail: Internet service that allows the rapid exchange of messages between
remote people who do not necessarily have to be connected at the same time. To
be able to use, both people must have an account, offered by a provider of these
services. To determine one of these accounts an "email address" is used, formed
by two parts separated by an @. The first is the username and the second is the
service provider, followed by a period and the domain. For example:
user@proveedor.es.
Through a mail manager program installed on the computer itself. When the mail is
"downloaded", messages and attachments are recorded on the hard disk. An
example of these programs is Microsoft Outlook Express that is installed together
with the Internet Explorer browser. This system is advantageous in that there is no
limit to the space dedicated to the messages (they are in the computer itself). But it
presents the problem that the mail must always be read from the same computer,
and that the virus analysis must be done by the user himself.
F
File: Virtual area of the disk where they store several files. It is so called because it
allows organizing the information files as a physical folder (the files would be the
folios that get into the folder). It is given a name that refers to the type of
documents it contains.
Firewall: Security program that protects the team from accessing the Internet from
unwanted intruders. It can come integrated with the operating system.
GIF: Format of images and animations very used to transmit images on the
internet. The acronym comes from Graphics Interchange Format. Optimizes the
size of the drawings (not so much of the photographs, for which the .jpg format is
more convenient). Supports the transparency of a color and allows the construction
of animations
Gigabyte: Multiple byte, storage unit. It is used for high-capacity devices, such as
hard drives and DVDs.
Gmail: Gmail is a free email service provided by Google that combines the best
features of traditional email with Google's search technology. Gmail offers a free
15GB message storage capacity shared with Google Drive and Google Photos.
H
Hard Disk: Disk that is inside the CPU and that stores, both the information
generated by the user, and the files necessary for the programs to work. It is
identified by the letter C in the operating system, and is usually represented by its
initials HD. Its capacity is variable, but at present it is of the order of GB.
Hardware: Any of the physical elements that make up a computer: hard drive,
motherboard, graphics card, ports ...
HTLM: Language of hypertext marks. It is the language in which the web pages are
written. It really is a text in which there are inserted labels that begin with the
symbol <and end with the symbols /> When our computer downloads a page to
view it, download this code and the browser interprets the meaning of the labels
showing on screens pages as we see it.
The Internet Explorer browser shows us this code if we open the View / Source
code menu. It opens to the Notepad with the code corresponding to the page we
are looking at.
I
Icon: Small image that represents a software element (a program, a file, a folder, a
shortcut ...) By double clicking on it, the element is accessed.
Internet: It is a network of connected computers that exchange information through
telephone lines. It offers a multitude of services such as the world wide web (www),
the transfer of files, real-time chats or chats, forums, email, etc ...
The initials respond to the Internet Protocol. The IP of a computer that access
service to the Internet has a fixed IP, that is, assigned permanently. It is the way to
recognize it in the network. To facilitate identification, the IP address is replaced by
a domain name in the Internet address. The translation of IP to domain name is
done by domain name servers (DNS) However, when this server gives us access
to a personal computer to the internet, assign us an IP temporarily to identify us
while we are connected. If we disconnect and reconnect, we will be assigned a
different one. It is what is called dynamic IP
j
JPEG: Acronym of Joint Photographic Experts Group, which gives name to the
algorithm developed by this group to compress images in order to send them
online. It is a compression with loss of information.
That is, when an image is compressed, a part of the information it contains is lost
and can no longer be recovered.
Files compressed with this format have the extension .jpeg or .jpg.It is the most
widespread format in the use of photographs on the internet.
K
Keyboard: The keyboard is an input peripheral partly inspired by the keyboard of
typewriters, which uses a system of buttons or keys, to act as mechanical levers or
electronic switches that send all information to the computer or mobile phone.
Kilobyte: Storage unit multiple of the byte. It is abbreviated as KB, and its
equivalence is:1KB = 1024B
L
LAM: Acronyms corresponding to Local Area Network. It is a network
composed of physically close computers, connected to each other by a
network cable or by a WIFI (wireless network). If the computers are far
from each other, they form a WAN.
Link:Element of a web page that gives access to another document (or another
part of the same document) by clicking on it with the left mouse button. It is the
basis of access to information on the World Wide Web. A link can be on text or on
an image. They are recognized because the mouse pointer becomes a hand when
passing over a link.
M
Malware: Malwares are programs designed to infiltrate a system in order to
damage or steal data and information. Malware is called all programs that execute
unwanted actions in a computer system and is one of the main concerns in the
field of computer security.
Megabyte: Storage unit multiple of the byte. It is abbreviated as MB, and
sometimes it is simply called "mega". Its equivalence is:1MB = 1024KB = 1048576
B
Monitor: The computer monitor is the main output device (interface), which shows
data or information to the user. An input / output peripheral can also be considered
if the monitor has a touch screen or multitouch.
Mouse Ponter: Image that moves through the computer screen when we move the
mouse. It tells us about which element is going to execute the action of the same.
With Windows operating systems, you can choose between several models
O
Online: State of a computer when it is connected to the internet. This expression is
used when talking about activities in which you get a response from the server that
gives us access to the internet.
- Linux and its modalities, which is open source and, therefore, free.
Password: It is a word, known only by the user, which allows access and use to
private areas, either from the web or from specific programs. When you type,
asterisks or dots appear on the screen instead of the characters, to prevent other
people from knowing it.
The printers can be of various types: inkjet or laser, in color or black and white ...
The multifunction printers incorporate a scanner, so they can be used as
photocopier or fax.
Processor: Electronic circuits included in a tablet that execute the basic instructions
of a computer. It is the nucleus that allows you to perform all the operations that we
use. It is also called a microprocessor, due to its small size.
R
RAM: Part of the memory of a computer in which it stores information temporarily
and automatically to perform its operations. When we turn off the computer, this
information is erased, reloading the RAM memory with the necessary when turning
it on again. The acronym corresponds to "Random Access Memory".
Recycle Bin: Part of the memory of a computer in which the files that are deleted
are stored, as a security measure to be able to recover them in case of error. If the
trash is emptied, then they can no longer be recovered. The most common icon
that appears on the desktop is that of the image. It behaves like a folder. To empty
it completely (that is, to make its content disappear completely) just press the right
mouse button on it and, in the context menu, choose Empty Trash.
ROM: Part of the memory of a computer in which it stores the basic information to
start and run. This is not cleared when the equipment is turned off. It is recorded
from the factory, and can not be modified. The initials respond to "Read Only
Memory".
Router: It is a device equipped with certain programming, which allows to
communicate a computer or a network of computers with the Internet network. The
way used for this connection is a telephone line of the ADSL type.
s
Scanner: Input peripheral that allows you to scan images and texts. To do this,
they are placed on their tray, the device performs a reading and sends to the
computer to which a file with the data is connected in digital format.
Spam: Receive this name the email that is received without being requested. It is
considered unethical, and on occasion, can be a carrier of viruses. Normally its
purpose is that of advertising.
T
Terabyte: Multiple byte, storage unit. It is used for very large capacity devices, such
as hard drives.
Trojan: It is a program capable of being installed on a computer to allow access to
external users, through the Internet, in order to collect information and / or remotely
control the machine on which it has been installed.
It really is not a virus, even when it is distributed and works in a similar way. The
difference is that the Trojan has no specific interest in causing destructive damage
to the machine that hosts it, but control it. On the contrary, the virus does.
Most antivirus products on the market also eliminate Trojans, although sometimes
they "hide" and are difficult to detect.
U
Upload: Action to transfer information from our computer to a server, usually from
the internet network. It is carried out when files are contributed to a page, blog,
wiki, etc ...
V
Virus: They are programs able to autocopiarse in the means of storage of the
computers (hard disk, pendrives ...) This capacity to be copied in the new medium
is what has given them the name of "virus", since it can be considered that " they
multiply "and" infect "the computer on which they do it. Once copied, when its code
is executed, it will carry out in the new computer all the actions indicated by its
instructions. They can be very harmful, as they can destroy data and even damage
the information needed to use the computer. Damage occurs at the software level.
W
Web: Set of two or more computers connected together, which are capable of
exchanging data and information.
Depending on the distance between the connected computers, we can talk about a
LAN (Local Area Network) if the connected computers are physically close. An
example of LAN would be the network of any company located in a building. In the
case that the connected computers are far away, we speak of WAN (Wide Area
Network, or Wide Area Network). The Internet network is a case of WAN.
In order for the connected computers to be understood, they must "speak" the
same language, that is, they must use the same code. The code used by the
Internet is called TCP-IP (Transmission Control Protocol - Internet Protocol).
Webcam: Video camera that connects to a computer and whose images can be
transmitted over the internet
WIFI: Abbreviation of Wirless Fidelity, also called WLAN (Wireless LAN = wireless
network). It is a wireless network to connect computers-
WIKI: Website whose pages can be edited by many users, allowing the
construction with content contributed between all.
World Wide Web:It is an internet service that offers the transmission of data in the
form of hypertext (in HTML code), that is, web pages and all the multimedia
information that is normally associated with them. This Global Information System
was developed in 1990 by Robert Cailliau and Tim Berners-Lee at CERN
(European Council for Nuclear Research). It is usually abbreviated as www.Access
to the contents of the www is carried out through a browser.
Z
Zip: File compression format that allows you to reduce the memory they occupy,
with a view to sending or storing them. Later they can be recovered without loss of
information. To use this format it is necessary to use a specific program, such as
WinZip or WinRar.