Well come!

Sunday, 25 November 2012

Computer Terms and their Meanings - Computer Tips


Here is a quick list pc conditions, most being demands from Tips4pc members. To see more pc explanations please see the Computer Terms web page. You can also get a free 59 web page PDF Computer Terms Thesaurus when you sign up for the Tips4pc news letter at the bottom of every post.

If you are new to using computer systems you should also see my article about primary pc language which explains pc conditions such as program, components, and so on, in details.

Basic Computer Terminology:

1. Bit: A binary unit of details storage space with only 2 numbers 0 and 1.

2. BIOS: Abbreviation for primary input/output system, the built-in program that decides what a pc can do without obtaining applications from a drive.

3. Boot: Another Computer phrase for “Starting a Computer”. In the same way reboot means reboot.

4. Byte: 8 pieces of details which has a possible value from 0 to 255.

5. Program: A series of guidelines to the pc from a customer to process different types of tasks according to our need and necessity.

6. Managing System (OS): A practical system works an user interface between User and the components. It is basically the foundation on which customers work. Various OS consist of Windows, MAC OSX, and Linux system etc.

7. Application: Application is system that operates on an Managing System. For ex. ipod, internet browser, messengers etc.

8. Internet: It is a globally system pc systems – a system of systems in which customers at any one pc can get details from any other pc.

9. Browser: It is a system that shows the data files and details on online through World Wide Web. Examples Include Mozilla Firefox, Google Firefox etc.

10.  Driver: A specially published system which is aware of the operation of the product it connections to, such as a printer, video cards, sound cards or CD ROM generate. It provides an user interface for the operating system to use the product.

11.  File: A collection of details into a permanent storage space structure saved on the drive generate.

12.  Weak disk: A very low capacity storage space press which can be published to as easily as it is study. It is highly out of date.

13.  Weak Drive: The components component that is used to study or write to a floppy drive.

14.  Hardware: Explains the physical parts of your pc which you can physically touch or see such as your monitor, case, difficult disk pushes etc.

15.  Memory: Used to offer the short-term storage space of details function.

16.  Network: A general phrase explaining to the cords and electronic components that carry details between computer systems. It is also generally used to refer to the server computer systems that offer solutions such as printing, data file discussing, e-mail, and other solutions.

17.  Protocols: A standard technique used for devices or other online and system functions.

18.  Security flaw: A program bug allowing an enemy a technique to gain unwanted entry to a system.

19.  Serial: A details transmitting technique where details is sent on a single range and one bit is sent at a time. This is similar to a range which one item must come one after another.

20.  Software: Explains the applications that run on your system.

21.  SPAM: A phrase used to explain junk and unwanted e-mail.

22.  Storage Media: A phrase used to explain any magnetic system that details can be completely saved on such as a drive generate or floppy generate.

23.  URL: Consistent Resource Locator is the phrase used to explain a link which points to a location of a data file online.

24. Virus: A system that operates on a system against the owner’s or person's wishes and knowledge and can spread by infecting data files or delivering itself through e-mail.

25.  Vulnerability: Software mistakes that allow some kind of unwanted accessibility when they are used or utilized.

26.  Word: Two bytes or 16 pieces of details with a possible unsigned value from 0 to 16535.

27.  Worm: A phrase used to explain an unwanted system that uses system or program weaknesses to contaminate a pc without the customer doing anything but linking to an contaminated system.