Updated 10/01 Copyright 2001 J.Graham; All rights reserved.
RAID (Redundent Array of Inexpensive Disks): Multiple disks are used at the same time to protect against data loss. For more information on RAID, click here.
Radio Dead Zone: A place where wireless devices such as cell phones or wireless computers will not work.
RAM (Random Access Memory): Memory which can be reused, like a blackboard is reused. For more information on RAM and how to buy it, click here.
Removeable Storage: Storage media which can be removed from the computer. This would include floppy disk, Zip Disk, Jazz Disk, CD, and DVD.
Registers: Places in the CPU where numbers can be held, and operations such as calculations can be performed on them.
Repetitive Motion Disorder: Health problems caused by repetitive motions, such as keyboard and mouse use. Such disorders may, in the worst cases, require surgery. For more information on repetitive motion disorder, click here.
Repetitive Stress Injury: See Repetitive Motion Disorder.
RISC (Reduced Instruction Set Computing): CPU's which are designed with a smaller instruction set in order to increase the speed of certain processes.
RMI (Remote Method Invocation: A technique where a program can start a program on a different machine at another physical location. Can be used for distributed processing. For more information on RMI, click Java & RMI: Remote Method Invocation.
ROM (Read Only Memory): A type of memory where the contents cannot be modified. They are written once and stay there permanently.
Router: A special purpose computer that routes traffic between multiple networks. Used for routing traffic on the Internet.
Routing: Directing the traffic of information on a network or inbetween multiple networks.
Scalability: Machines that are designed so that their capacity can be increased by buying additional hardware when their owner decides to do so.
Scanner: A device used to input printed, written, or graphics from paper, into the computer. To see examples of scanners, click here and scroll down.
Search Engine: A program that helps people search the Internet or a website for specific information. For more information on search engines, click here.
Serial Connection: A connection through which the data must flow throught one bit at a time.
Server: A computer which provides a service to users at various location on a network. For example a web server provides web pages to people at various locations on the Internet. Most midrange and large computers are used as servers, but a server could also be a microcomputer.
Server Push Technology: A technology where information is sent out by the server without the user having to request each item. Examples might be a chat system, a stock ticker, and ads on webpages that change as the user watches due to new ads being sent by the server.
Shell: The part of the operating system that the user interfaces with. The word is used in connection with the UNIX operation system.
Simulation: Using a computer to simulate (make something similar to) something that a occurs in reality. Virtual Reality simulations simulate a scenario using sound and graphics and are used for education, training, and entertainment. Numerical simulations are used in science, engineering, finance, and for predicting the weather.
Software: Programs. For various examples of software, click here.
Software Package A collection of software that is sold together.
Software Piracy: Copying software without permission of the copyright holder. For more information on software piracy, click here.
Storage: Containers for programs and data where unlike memory, moving parts are used along with electronics to store and retrieve data. Disks and CDs are examples of storage. To see examples of storage devices and media, click here and scroll down.
Storage Device: A device used for storing and retrieving data, excluding memory. A storage device reads, writes and manipulates storage media.
Storage Media: Material or items on which data is stored, excluding memory. To see examples of storage media click here and scroll down.
Source Program or Source Code: The program written by the programmer in a programming language.
Speech Recognition: A form of Artificial Intelligence which involves translating spoken language into text.
Spreadsheet: A file used with a spreadsheet program, which represents data as being used in rows and columns.
Spreadsheet Package (or spreadsheet program): A program used for mainly for mathematical calculations. The files that is handles are called spreadsheets or worksheets. It displays data in a grid of rows and columns. In order to facilitate calculations, it keeps the numbers on the spreadsheet in memory rather than on disk.
SQL (Standard Query Language): A language used to request specific data from a database. Often used for communications between an applications program and a database engine.
SQL Database: A database which is accessed using SQL. See above.
Streaming Media: Audio and/or video being sent over a network so that it can be viewed at it is being sent.
Suite: A set of different programs designed to be used together. There are application suites or applications and protocol suites of telecommunications protocols.
Supercomputers: The fastest computers. In the past, supercomputers have only been used for scientific purposes, code breaking, and other quazi-military purposes. Supercomputers have been too expensive and unnecessary for business use. For more information on supercomputers, click here and scroll down.
Switch: A data-link level device which filters and forwards frames of data between networks.
Syntax: The rules for arranging words and symbols in order to make a statement in a given language.
System: A set of elements that interact to meet a goal.
Systems Analysis: Studying an existing system or the specifications needed for a new system.
System Development: The process of developing a new system or modifying an existing one.
System Boundary: The deliniation between what is in the system and what is outside it. Useful concept for systems analysis and systems design.
Systems Design: Designing a new system or a modification to an existing system. System Design is one of the stages of System Development
System Implementation: Physically creating a system or adding to an existing system.
System Maintenance and Review: The ongoing process of maintaining a system, and reviewing it to see whether changes should be made.
System Parameter: A numeric property of a system that the operator of the system cannot control. For example, a retailer cannot control how many items customers will purchase.
System Software: Software which is used to operate or maintain the computer system. This would include, but is not limited to the Operating System.
System Unit: The main unit of the computer system; The main box and the items in it. The system unit is sometimes mistakenly called the cpu.
System Variable: A number which the person in charge of a system has the power to vary. For example, a factory owner can decide how many machines to purchase or how many employees to hire.
TCP/IP: The protocol suite used for sending packets of information over the Internet.
Telecommunications: Electronic communications.
Telnet: A method of accessing a computer at another location which generally allows you to give commands to that computer, subject to certain restrictions. Telnet is used by computer operators, webmasters, and hackers to control computers at other locations. Telnet is used on UNIX based networks and the Internet.
Time sharing: When multiple users share the same computer at the same time. This is usual with minicomputers and mainframes.
Transistor: Transistors are completely electronic switches which are the basis of
contemporary computer technology. The second generation of computers was known as the
transistor generation. The third and fourth generations (integrated circuits and microprocessors
respectively) make use of many transistors etched into a silicon wafer or chip.
Tunneling: Having a secure communications connection on a common carrier network such as the Internet.
Transaction Processing System: Systems that are designed to process and record business transactions. For example they may process purchases, sales, payments, or deposits and withdrawls. Book suggestion: Principles of Transaction Processing (Morgan Kaufman Series in Data Management Systems)
Trojan Horse: A macro or a program (usually a harmful one) hidden inside a seemingly legitimate program or file.
UCITA: A model law which is intended to prevent software piracy. UCITA has been adopted in at least two states and is being proposed as a federal law. It allows software publishers to shut down user's programs by remote control and also allows software publishers to establish an agreement with users when the user clicks on the text of an agreement provided in the software. While software publishers favor this law, some other industries which use software are against it.
UNIVAC: One of the earliest electronic computers.
It was designed by J. Presper Eckert and John W. Mauchly. The first UNIVAC
computer was installed at the U.S. Census Bureau in 1951. For more information
click
here.
UNIX: An operating system invented by Bell Labs. Versions of UNIX are available for various types and sizes of computers. Linux is based on UNIX. Book suggestion: Learning the Unix Operating System (Nutshell Handbook).
User interface: The part of the computer system (both hardware and software) that allows the user to interact with the computer.
US PATRIOT Act: A federal law, adopted after the September 11th attacks, which gives law enforcement officials broader powers to intercept email and other electronic communications.
Utilities: Programs other than the main parts of the operating system that help with the use or maintenance of the computer system. Sometimes small simple applications are called utilities. For examples of utilities, click here.
Variable: A data element whose value is subject to change. In computer programming, the programmer generally specifies a name, data type, and in some cases a size, for each variable. The size would be the amount of space in memory it uses. The number or symbols the the variable contains are called its value.
Virtual Private Network: An Intranet or Extranet system which makes use of a common carrier such as the Internet or the phone system. The Internet is used to save the expense of a private or semi-private physical network. At the same time passwords, encrption, and/or the use of privately distributed software prevent the general public from using the system. Book suggestion: Ipsec: The New Security Standard for the Inter-net, Intranets, and Virtual Private Networks.
Virtual Reality: A computer uses 3-dimensional graphics and sound to simulate
a scenario which could occur in reality. Usually the user can interact with the scenario.
Virtual Reality is used for training, education, and entertainment.
Virus: A that replicates, transferring itself from to computer to computer without the owners' knowledge. Book suggestion: Bigelow's Virus Troubleshooting Pocket Reference.
Visual Basic: A popular object-oriented programming language
which enables programmers to make use of Windows' graphical user interface.
Voice over IP: Using Internet Protocol (IP) for voice (telephone) as well as for Internet and data networks.
For more information on Voice over IP click here. Book suggestion: http://www.amazon.com/exec/obidos/ASIN/0071363262/newyorkstarwebad">
Carrier Grade Voice Over IP
Voice Recognition: The ability of a computer system to convert spoken words into text. The text can then be used as input word processing or other computer applications, or it can be used to give commands to the computer. Also called speech recognition. Voice recognition is a form of artificial intelligence.
Web Browser: A program used for viewing web pages. The web browser is a type of client program. The two most popular web browsers are Internet Explorer and Netscape.
Webmaster: The person in charge of a website. Book suggestion: Webmaster in a Nutshell (Nutshell Handbook).
Web Page: A document, that can be linked with other documents, on the World Wide Web, or on a web of interlinked documents which is internal to a company. Book suggestion: Create Your First Web Page In a Weekend, 3rd Edition.
Web Server: A computer that serves web pages to users at other computers on a network.
Website: A set of related and interlinked web pages owned by the same person or organization.
Wide Area Network (WAN): A network which is larger than a city. Generally refers to a network where the physical paths are owned or leased privately as opposed to the Internet or a Virtual Private Network.
Windows: A family of operating systems for IBM compatible computers from Microsoft. Book suggestion: Microsoft Windows Millennium Edition Fast & Easy.
Windows 95 A version of MS Windows released in 1995. Windows 95 was the first version of MS Windows which was an operating system.
Windows XP: The version of the Windows operating system which Microsoft is releasing in 2001. The operating system includes more multimedia facilities and also a strong anti-hacker mechanism. Users must use the Internet to register their programs in order to activate them.
Wireless: Using microwaves or other techniques for communication, instead of using wire or cables.
Wireless Base Station: A device which relays messages between users of a wireless network.
Wireless Network A network which is wireless. Computers communicate by means of microwave or other technique which does not use wires.
World Wide Web (WWW): A huge set of interlinked documents owned by a great many different users and located at many locations throughout the world.
Worm: A type of program that replicates. Unlike a virus, a worm does not need a host program. Often the purpose of a worm is to clutter up a system and use its resources in order to make the system unavailable for normal use.
A-D|E-H|I-L|M-P|Q-Z