0% found this document useful (0 votes)
83 views14 pages

English For Computer Specialists

The document provides definitions for common computer and technology related terms. It includes over 50 terms across topics like hardware, software, networking and computer security. Example terms defined are antivirus software, backup, bit, bytes, browser, bug, cache, CD-ROM, CPU, data, DOS, driver, ebook, email, file, folder, font, graphics card, hard disk, icon, Internet, memory, modem, operating system, pixel, program, resolution, scanner, USB, virus, Windows and World Wide Web.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views14 pages

English For Computer Specialists

The document provides definitions for common computer and technology related terms. It includes over 50 terms across topics like hardware, software, networking and computer security. Example terms defined are antivirus software, backup, bit, bytes, browser, bug, cache, CD-ROM, CPU, data, DOS, driver, ebook, email, file, folder, font, graphics card, hard disk, icon, Internet, memory, modem, operating system, pixel, program, resolution, scanner, USB, virus, Windows and World Wide Web.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

1

English for computer specialists


I.

Computer key vocabulary:

Computer Vocabulary
anti-virus software - A program that finds and removes viruses from a computer.
backup - A copy of files from a computer's hard disk, usually made on some external medium
such as CD-ROM or flash drive. A backup is made in case the hard disk file(s) are erased or
damaged.
bit, bytes - A bit is the smallest piece of information that computers use. For simplicity, a PC
uses bits in groups of 8 called bytes (8 bits = 1 byte).
Bluetooth - a way of communicating wirelessly over short distances between electronic devices
(for example computer and mobile telephone)
boot, boot up, boot disk - You boot (or boot up) your computer when you switch it on and wait
while it prepares itself. Instructions for startup are given to the computer from the boot disk,
which is usually the hard disk.
browser, to browse - A browser is a program like Firefox or Internet Explorer. You use it to view
or browse the Internet.
bug - A (small) defect or fault in a program.
cache - A kind of memory used to make a computer work faster.
CD-ROM - A disk for storing computer information. It looks like an audio CD.
CPU - Central Processing Unit. This is a PC's heart or "brains".
data - usually means the information (text, pictures, audio etc) that you create or share on a
computer, as opposed to the programs that manipulate the data.
DOS - Disk Operating System. The original system used for PCs, where you typed in commands
instead of pointing and clicking.
driver - A small program that tells a PC how a peripheral works.
ebook - an electronic book that can be downloaded and read on a computer or other device.
electronic mail (email, e-mail) - Messages sent from one computer to another. You can see
email on the screen or print it out.
file - a specific computer record; it could contain data such as text (eg essay.doc), or a program
such as paint.exe.
floppy disk - A cheap, removable disk used for storing or transferring information. It is floppy
(soft) because it is plastic. (Now virtually obsolete.) See hard disk.
floppy drive - The device used to run a floppy disk (usually drive "A".) (Now virtually
obsolete.)
folder (directory) - A sub-division of a computer's hard disk into which you put files.
font - A particular sort of lettering (on the screen or on paper). Arial is a font. Times New Roman
is another.
format - All hard disks and floppy disks have to be electronically prepared for use by a process
called formatting. Hard disks are pre-formatted by the computer manufacturer. If you buy a
floppy disk that is not pre-formatted, you format it yourself, using a program that comes with
your PC.

graphics card - The equipment inside a computer that creates the image on the screen.
hard disk - The main disk inside a computer used for storing programs and information. It is
hard because it is metal. See floppy disk.
hotspot - an area that has an available wireless signal for Internet access (usually public).
icon - A small image or picture on a computer screen that is a symbol for folders, disks,
peripherals, programs etc.
Internet - International network of computers that you connect to by telephone line. Two
popular services of the Internet are the World Wide Web and electronic mail.
iPad - a tablet computer created by Apple.
Kb, Mb, Gb - kilobytes, megabytes, gigabytes. Used to measure computer memory and storage.
Kindle - a device for downloading and reading ebooks, developed by Amazon.com.
memory - Memory is for the temporary storing of information while a computer is being used.
See RAM, ROM and Cache.
MHz - Megahertz. This describes the speed of computer equipment. The higher the MHz the
better the performance.
modem - Equipment connected to a computer for sending/receiving digital information by
telephone line. You may need a modem to connect to the Internet, to send electronic mail and to
fax.
notebook - a notebook computer; a laptop computer; a folding, portable computer.
operating system (OS) - The basic software that manages a computer (for example, Windows 7,
OS X, Unix, iOS).
OCR - Optical Character Recognition. OCR lets a PC read a fax or scanned image and convert it
to actual lettering.
palmtop - a computer that is small enough to sit on the palm of the hand.
parallel port - A socket at the back of a computer for connecting external equipment or
peripherals, especially printers.
PC card - A device that is the same size as a thick credit card, for plugging into a slot on
notebook computers. You can buy memory, modems and hard disks as PC cards.
PDA - abbreviation of "personal digital assistant".
peripheral - Any equipment that is connected externally to a computer. For example, printers,
scanners and modems are peripherals.
pixel - The image that you see on the screen is made of thousands of tiny dots, points or pixels.
program Software that operates a PC and does various things, such as writing text (wordprocessing program), keeping accounts (accounts program) and drawing pictures (graphics
program).
QWERTY - The first 6 letters on English-language keyboards are Q-W-E-R-T-Y. The first 6
letters on French-language keyboards are A-Z-E-R-T-Y.
RAM, ROM - Two types of memory. RAM (Random Access Memory) is the main memory
used while the PC is working. RAM is temporary. ROM (Read Only Memory) is for information
needed by the PC and cannot be changed.

resolution - The number of dots or pixels per inch (sometimes per centimeter) used to create the
screen image.
scanner - Equipment for converting paper documents to electronic documents that can be used
by a computer.
serial port - Socket at the back of a PC for connecting peripherals (obsolescent).
smartphone - a mobile phone that includes a palmtop computer or PDA and also gives access to
Internet and email.
tablet - a tablet computer; a mobile computer consisting of a screen only, and controlled by
touching the screen.
TFT - Thin Film Transistor, a type of high quality screen for notebook computers.
USB - abbreviation of "universal serial bus"; a standardized connection for attaching devices to
computers etc.
USB flash drive - a small, external device for storing data; it connects through the USB socket.
virus - A small, unauthorized program that can damage a PC.
Wi-Fi - a system for communicating without wires over a computer network.
Windows - An operating system used by the majority of PCs.
World Wide Web, WWW, the Web - WWW are initials that stand for World Wide Web. The
Web is one of the services available on the Internet. It lets you access millions of pages through a
system of links. Because it is "world-wide", it was originally called the World Wide Web or
WWW.
WYSIWIG - "What You See Is What You Get." With a WYSIWIG program, if you print a
document it looks the same on paper as it looks on the screen.

II.

Vocabulary for computer protection:

Antivirus software was initially developed to clean computer systems and data media from
infectious software. The central task of detecting and removing viruses has remained a major

function of virus defense software. As hardware and software technologies have developed the
functions and requirements of antivirus software as also expanded. Most anti-virus software also
includes protection from malware, spyware, pop-ups and dialers.
Adware is typically designed to interact with web browsers to display banner ads or pop-ups
when a computer is in use. Adware disrupts users and can interrupt the Internet connection and
system operations.
Backdoor is used to describe an application that permits remote access to an infected computer.
Backdoors generally embed themselves in the operating system and opens up a port to
circumvent other security mechanisms. Backdoors can also spread via e-mail or by riding
piggyback on other malware or are included in shareware or freeware. Once infected, the
computer responds to programs by executing various processes. Backdoors are often one
component in a series of malware types that set up controlled computer networks.
Dialers are dialing programs used to dial up a preset pay-per-call sites. The user is then liable for
the overpriced long distance and access fees.
Grayware opens vulnerabilities and some applications have been misused for malicious activity,
while others gather information about the user's behaviour. This data is then either sold or used to
display targeted advertising.
Hacking tools are grayware because they are primarily used to test the security of networks.
Hacking tools make it easy to exploit vulnerabilities as they simulate hacking.
Malware is the name given to software that runs computer processes that are unauthorised and
usually harmful. The term "malware" includes viruses, worms and Trojan horses.
Phishing refers to a method of stealing personal data using an authentic-looking e-mail. The idea
is to trick the recipient into sending secret information such as account information or login data
to the criminal. This typically includes a prompt to make some change to your account login
using a link that is provided.
Remote Access Tools RATs are generally identified as grayware. RATs are not malicious
programs but legitimate tools for managing data and program sequences on external computers
linked through a network connection. RATS are potential vulnerabilities used by scammers or
other malware.
Spyware is software that monitors and collects a user's data and eventually transmits it to a
company for various purposes. This activity is invisible to most users.
Trojan horse or Trojan comes from Greek legend and refers to covert infiltration by malware or
malicious software under the guise of a useful program. Trojans usually embeds itself directly in
the computer's operating system. Trojans may be designed to collect personal or financial data.
Most Trojans are not equipped to reproduce and spread instead they act as land mines waiting in
e-mails or web pages.
Viruses can spread by attaching themselves to many types of files as soon as these files are
executed, copied or sent. Viruses generally reproduce within a system, though like worms some
virus types can also reproduce through automated propagation. ActiveX viruses infect only
browsers that support ActiveX. Boot sector viruses infect the data needed to boot up a computer.

Java viruses exploit vulnerabilities in outdated versions of the Java Runtime Environment.
Macro viruses can occur in all file types that permit storage of document-related macros. Script
viruses spread by exploiting script languages. File infector viruses infect executable programs.
Vulnerabilities usually consist of opportunities to either operate the computer remotely without
input from the user or to spy on data. Vulnerabilities to many types of attack occur as soon as a
connection exists to a network such as the Internet. Any program that needs a network
connection has vulnerabilities. Operating systems, E-mail programs, Browsers, ICQ, messenger
are susceptible to being manipulated over the network,
Worms are specialists in spreading and reproducing by exploiting all known vulnerabilities. A
worm does not have a payload of its own but is often used as a transport mechanism for viruses.
Worms can be dispersed through e-mail, instant messaging programs or network connections.
Worms spread through automatically sent e-mails to all available address book lists as an
attachment. Worms spread through network connections or connected computers by exploiting
network vulnerabilities.

III.
to
to
to
to
to
to
to
to

Computer related verbs:

update
turn off / on
switch off / on
plug in
unplug
install
hook up
browse

IV.

to
to
to
to
to
to
to
to

connect
disconnect
boot up
cut
paste
copy
surf
fix

Idioms:

I need to underclock. Time for holidays!


2007-03-20 23:01 by drx

Most knowledge workers of our information society face a lot of stress. All the time the
cellphone rings and emails arrive, then the WLAN is down, airplanes are late and the video
projectors lamp breaks just before the important PowerPoint presentation.
When it all gets too much its time to relax. But the word relax is a bit spoiled because it was
taken over by the wellness industry. And some IT professionals wouldnt like their colleagues
imagining them laying in a hot tub with slices of cucumber on the eyelids.
This is where the word underclocking can help out. Overclocking means to run a computer
processor at a higher speed than it was intended by modifying hardware or toggling switches in
hidden menus: Only for real phreax! So underclocking is the way for the competent computer
user to chill out a bit, making everything go slower.
You might express your need to underclock on Fridays, after Xmas or when an tight project
deadline was met.

Lets enlarge. Committing a small sin.


2007-03-13 11:19 by drx

A system administrator working for a large company once told me the story that if the IT staff
was about to decide whether to buy licenses for a new piece of software, first they would use a
cracked version to try it out. This process was internally called enlarging because there were
numerous offers for enlarging certain male body parts on the well known Armenian website they
got their cracks from. The saying went: Before we buy it we should enlarge it.
To crack the copy protection of a commercial software is not exactly a legally endorsed activity,
but the IT staff was feeling little guilt. They had the intention of buying big amounts of licenses
after this evaluation process. The small sin they committed would lead to a greater good.
If something is only in doubt of being legal, on the internet this thing will be very likely

combined with enlargement offers. This common knowledge should finally enter everyday
language.
You can use to enlarge in a sympathetic way for any activity that is a small sin. For example you
can say I enlarged the CD for you, Alice enlarged during the exam or I had to enlarge my
iPod to get my songs back.

Its a norton thing. Its a two-faced case.


2007-03-07 11:03 by drx

Many computer users are concerned about the dangers viruses and worms are causing on the
internet. They read in computer magazines and see on the TV news that all the time new threats
are appearing and their computer is under constant attack.
Some are driven into the entwined arms of Peter Norton, a software publisher that earned his
reputation in the 1980s with Norton Commander, a software that could almost make you think
MS-DOS was an operating system.
But this was a long time ago. Today you can ask yourself if it is worse to have your computer
slowed down by a virus itself or by Norton AntiVirus, a software so heavy and baroque that it
makes the latest Duo Core processors scream. A virus at least needs your computer to send spam
messages and therefore keeps a minimum level of operability. Norton AntiVirus just makes sure
nothing works anymore, including viruses.
Norton, once the synonym for really enhancing the computing experience, became the icon of
the schizophrenic software business logic that once you really solve a problem you destroyed
your own job.
Use Norton to express ambivalence, conflict within, split personality and day-to-day selfdeception.

This is a screenshot of the ancient Norton Commander. Its killer feature was to split the text-only

display of MS-DOS into two pseudo windows. This clearly shows that dispartment has always
been a core idea in the Norton product line.

Read my blog! Get lost!


2007-03-06 10:32 by drx

You can use Read my blog! to end any ongoing face to face conversation. It expresses that you
do not want to spend more time on your conversation partner because this person is getting on
your nerves and is wasting your time.
This phrase suggest that your conversation partner should switch from personal talk to a mass
medium. Before the internet came along, only celebrities could say things like I have to go, why
dont you read up on me in Vanity Fair? Bye! Today everybody can act with the same arrogance
by quickly setting up a mass medium and refer annoying people to it.

The Hand Moves the Mouse. You control your


destiny.
2007-03-04 22:54 by drx

The Hand Moves the Mouse


I guess I just always thought that if it was wrong, Word would underline it or something. I.e.,
youre responsible for the mistakes you make while using a computer.Nathan Johnson
Nathan projects this idiom applied to mistakes made with a computer, but I suggest it should be
used to express that people control their complete destiny. After learning that they can decide if
they want to use Worms&Viruses Internet Explorer or install bloated crap Norton virus scanners,
they can also decide what directions their lives should take in general.

I defragged all the morning. I pretended to work.


14:52 by drx

10

Fragging an enemy in a shooter game means to kill it, to blow it into pieces.
But there is also defragging, an activity mostly conducted in offices: employees are not actually
working but just pretending to do so.
The term refers to defragmenting the file system, a maintenance function built into Microsoft
Windows. Originally it was serving the purpose of optimizing how the content of files is laid-out
on the hard disk by moving parts of the same file close together so the read/write head of the
hard disk wouldnt have to move so much. If management personal would drop by and see the
defragmentation running, they wouldnt notice that no work is being done as managers of course
lack any technical knowledge and the classic defrag visualization in Windows 95 and 98 looked
really complicated and active (see animation above).
In later versions of Windows the visualization changed to boring and useless lines. But history
demands that you should use the verb defragging all the time you are pretending to work, no
matter what tactic you apply.

The blocks didnt fall right Something did not


work out as it should have
2007-02-25 21:46 by drx

Tetris is one of the most played games of all time. The player is up against a (pseudo) random
generator that determines what kind of block will be the next to fall down. And when the
stones do not fall right, there is little else for the player to do than taking it with pride and trying
to close the gap later on. (Or playing in a way that no matter what block should fall, there will
always be a place for it, right!)
Tetris has been described to depict life already in many cases. Its time to shake of
the novelty of this comparison and just use it as an idiom as often as possible.
Interestingly, newer variants of Tetris include their own story, with anthropomorphic

11
cubes called Minos and the blocks themselves called Tetrions However, this
effort never catched on because these stories take away too much of associative
potential. Tetris serves better as a projection ground for real life than for for Roger
Dean type fantasy worlds.

Update: After seeing it quoted the blocks didnt fall right instead of the stones
didnt fall right I started to believe that blocks is the more correct word and
changed this posts title and content.

That lady was bitmapped! This woman is stupid.


2007-02-20 21:48 by drx

In 2001, Dwayne from Beige Records asked a woman in a Chicago Transit Authority booth for a
hint on what train to take to get home. The lady did not know anything and gave completely
wrong directions. Later Dwayne said That lady was bitmapped, a nice way of vilifying her
intellectual capabilities.
Bitmaps are computer graphics that are composed from two colors. Every pixels color is
determined by just one bit. For example, if the bit is zero the pixel is white, if it is one the pixel
is black. Computer images of today use at least 24 bits for every pixel and are referred to as true
color. This was already the case in 2001, therefore calling somebody bitmapped could be
considered a proper insult even back then. The picture of a brain as a bitmap serves well to
express simple-mindedness.
Now follows an image of one of the most well known bitmapped ladies ever:

12

This bitmap was made in 1983 by Susan Kare who is not bitmapped at all.

I gonna bang the bricks! I will draw money from


an ATM
2007-02-08 13:47 by drx

Everybody knows how Mario from the Super Mario Brothers is getting money: He bangs against

13

a brick with his head. In real life you can say that you bang the bricks if you go to an ATM to
draw money from your bank account.
Through this you can not only express your taste in video gaming, but also hint to the fact that
ATMs are in fact computers and operate by arbitrary rules. There could theoretically run any
software inside. Maybe once you can play Super Mario on them, and if you win your mortgage
rates will be lowered.
In the stupid video Mario in Vice City, at 00:37, Mario tries to bang bricks for coins in another
game and fails. This video is bad because if favors a realistic game Grand Theft Auto
over a more simple one Super Mario Brothers. Mario is pictured as helpless because his
known rules do not work anymore, and Grand Theft Auto is not pictured as a game at all.

V.

Dialogue:
Hooking up my computer
You

Hi Jack. Can you give me a hand?

AE

Sure. Whats up?

You

Ive just bought a new computer and I have some


problems hooking everything up.

AE

And Im a geek. Yeah, I know. Id be happy to help.

You

Thanks! Ive connected all the cables from my monitor,


mouse and keyboard, and Ive plugged it in.

AE

Have you installed the software yet?

You

No, I havent. Do I need to?

AE

Not always, but Its best to install drivers for your


keyboard and mouse, as well as your printer.

You

Will the computer boot up without those?

14
AE

Of course. Boot up the computer and then we can


update the drivers.

You

Ok. Whats that thing (points to a computer


component).

AE

Oh, thats a memory reader. You can insert things like


SD cards from your camera and mp3 players into it.

You

Thats handy.

AE

Youve bought a nice system. How big is the hard drive?

You

I think its 750 gigabyte.

AE

GoodThe computers booted up. Lets install those


drivers.

You

Before we do that, can I get online?

AE

Do you have a modem?

You

Yes, I do. I think I have a cable modem.

AE

Hmmmyes you do. Is the Ethernet cable plugged in?

You

Whats that?

AE

Its the cable that connects your modem to your


computer.

You

Lets surf the internet!

AE

Just a momentfirst we need to launch the browser.

You

The browser?

AE

Its the program that allows you to surf the internet.

AE

OhIve got a lot to learn.

You

Yes, you do. I can see Im going to be here all day.

You might also like