IT Glossary
IT Glossary
1. access point:
A device that allows wireless-equipped computers and other devices to communicate with a
wired network.
2. address:
Identifies the location of an Internet resource. Examples: an e-mail address
(sales[@]dataprise.com); a web address (http://www.dataprise.com); or an internet address
(192.168.100.1).
3. applet:
A program capable of running on any computer regardless of the operating system. Many
applets can be downloaded from various sites on the Internet.
4. application:
A program designed for a specific purpose, such as word processing or graphic design.
5. authentication:
The process of identifying yourself and the verification that you're who you say you are.
Computers where restricted information is stored may require you to enter your username and
password to gain access.
B
6. bandwidth:
A measurement of the amount of data that can be transmitted over a network at any given time.
The higher the network's bandwidth, the greater the volume of data that can be transmitted.
7. bit:
A binary digit (either 0 or 1); it is the most basic unit of data that can be recognized and
processed by a computer.
8. bluetooth:
A wireless networking technology that allows users to send voice and data from one electronic
device to another via radio waves.
9. browser:
A program used to access World Wide Web pages. Examples: Firefox, Safari, or Internet Explorer.
10. byte:
A group of adjacent binary digits that a computer processes as a unit to form a character such as
the letter "C". A byte consists of eight bits.
11. cache:
Refers to: 1) a region of computer memory where frequently accessed data can be stored for
rapid access; or 2) a optional file on your hard drive where such data also can be stored.
Examples: Internet Explorer and Firefox have options for defining both memory and disk cache.
The act of storing data for fast retrieval is called "caching".
12. captcha:
A challenge-response test in the form of an image of distorted text the user must enter that to
determine whether the user is human or an automated bot.
13. chat:
Real-time communication between two or more users via networked-connected computers.
After you enter a chat (or chat room), any user can type a message that will appear on the
monitors of all the other participants. While most ISPs offer chat, it is not supported by OIT.
However, the campus CMS (Carmen) supported by TELR does provide the capability for live chat
among students participating in online courses.
14. compress:
The process of making a file smaller so that it will save disk space and transfer faster over a
network. The most common compression utilities are Winrar for PC or compatible computers
(.zip files) and or Stuffit (.sit files) for Macintosh computers.
15. CPU:
Central processing unit; the part of a computer that oversees all operations and calculations.
D
16. database:
A collection of information organized so that a computer application can quickly access selected
information; it can be thought of as an electronic filing system. Traditional databases are
organized by fields, records (a complete set of fields), and files (a collection of records).
Alternatively, in a Hypertext database, any object (e.g., text, a picture, or a film) can be linked to
any other object.
17. desktop:
On computers like IBM PC or compatibles and Macintoshes, the backdrop where windows and
icons for disks and applications reside.
18. DNS:
Domain Name System; a service for accessing a networked computer by name rather than by
numerical, (IP) address.
19. domain:
Part of an Internet address. The network hierarchy consists of domains and subdomains. At the
top are a number of major categories (e.g., com, edu, gov); next are domains within these
categories (e.g., ohio-state); and then there are subdomains. The computer name is at the
lowest level of the hierarchy.
20. download:
The process of transferring one or more files from a remote computer to your local computer.
The opposite action is upload.
21. e-mail:
Electronic mail; the exchange of messages between users who have access to either the same
system or who are connected via a network (often the Internet). If a user is not logged on when
a new message arrives, it is stored for later retrieval.
22. emulation:
Refers to the ability of a program or device to imitate another program or device;
communications software often include terminal emulation drivers to enable you to log on to a
mainframe. There also are programs that enable a Mac to function as a PC.
23. encryption:
The manipulation of data to prevent accurate interpretation by all but those for whom the data
is intended.
24. Ethernet:
A popular network technology that enables data to travel at 10 megabits per second. Campus
microcomputers connected to a network have Ethernet cards installed that are attached to
Ethernet cabling. An Ethernet connection is often referred to as a "direct connection" and is
capable of providing data transmission speeds over 500 Kbps.
25. extension:
A suffix preceded by a period at the end of a filename; used to describe the file type. Example:
On a Windows computer, the extension ".exe" represents an executable file.
41. GIF:
Graphics Interchange Format; a format for a file that contains a graphic or a picture. Files of this
type usually have the suffix ".gif" as part of their name. Many images seen on web pages are GIF
files.
42. gigabyte (Gig or GB):
1024 x 1024 x 1024 (2 to the 30th power) bytes; it's usually sufficient to think of a gigabyte as
approximately one billion bytes or 1000 megabytes.
43. GPS:
Global Positioning System; a collection of Earth-orbiting satellites. In a more common context,
GPS actually refers to a GPS receiver which uses a mathematical principle called "trilateration"
that can tell you exactly where you are on Earth at any moment.
44. greyware:
Greyware (or grayware) refers to a malicious software or code that is considered to fall in the
"grey area" between normal software and a virus. Greyware is a term for which all other
malicious or annoying software such as adware, spyware, trackware, and other malicious code
and malicious shareware fall under.
45. GUI:
Graphical user interface; a mouse-based system that contains icons, drop-down menus, and
windows where you point and click to indicate what you want to do. All new Windows and
Macintosh computers currently being sold utilize this technology.
46. handshaking:
The initial negotiation period immediately after a connection is established between two
modems. This is when the modems agree about how the data will be transmitted (e.g., error
correction, packet size, etc.). The set of rules they agree on is called the protocol.
47. hard disk:
A storage device that holds large amounts of data, usually in the range of hundreds to thousands
of megabytes. Although usually internal to the computer, some types of hard disk devices are
attached separately for use as supplemental disk space. "Hard disk" and "hard drive" often are
used interchangeably but technically, hard drive refers to the mechanism that reads data from
the disk.
48. hardware:
The physical components of a computer including the keyboard, monitor, disk drive, and internal
chips and wiring. Hardware is the counterpart of software.
49. header:
The portion of an e-mail message or a network newsgroup posting that precedes the body of the
message; it contains information like who the message is from, its subject, and the date. A
header also is the portion of a packet that proceeds the actual data and contains additional
information the receiver will need.
50. help desk:
A help desk is an information and assistance resource that troubleshoots problems with
computers or similar products. Corporations often provide help desk support their employees
and to their customers via a toll-free number, website and/or e-mail. Dataprise offers 3 types of
help desk service: 24 x 7 Support365™, Oustsourced and private labeled. To learn more about
our services please click here.
51. helper application:
A program used for viewing multimedia files that your web browser cannot handle internally;
files using a helper application must be moved to your computer before being shown or played.
Contrast to a plug-in which enables you to view the file over the Internet without first
downloading it.
52. home page:
A document you access using a web browser like Firefox or Internet Explorer. It usually refers to
the first page of a particular web site; it also is the page that automatically loads each time you
start your browser.
53. host:
A computer accessed by a user working at a remote location. Also refers to a specific computer
connected to a TCP/IP network like the Internet.
54. HTML:
HyperText Markup Language; a language used for creating web pages. Various instructions and
sets of tags are used to define how the document will look.
55. HTTP:
HyperText Transfer Protocol; a set of instructions that defines how a web server and a browser
should interact. Example: When you open a location (e.g., enter a URL) in your browser, what
actually happens is an HTTP command is sent to the web server directing it to fetch and return
the requested web page.
56. hyperlink:
Connects one piece of information (anchor) to a related piece of information (anchor) in an
electronic document. Clicking on a hyperlink takes you to directly to the linked destination which
can be within the same document or in an entirely different document. Hyperlinks are
commonly found on web pages, word documents and PDF files.
57. hypertext:
Data that contains one or more links to other data; commonly seen in web pages and in online
help files. Key words usually are underlined or highlighted. Example: If you look for information
about "Cats" in a reference book and see a note that says "Refer also to Mammals" the two
topics are considered to be linked. In a hypertext file, you click on a link to go directly to the
related information.
58. hypervisor:
A hypervisor, also called virtual machine manager (VMM), is one of many hardware virtualization
techniques that allow multiple operating systems, termed guests, to run concurrently on a host
computer. It is so named because it is conceptually one level higher than a supervisory program.
The hypervisor presents to the guest operating systems a virtual operating platform and
manages the execution of the guest operating systems. Multiple instances of a variety of
operating systems may share the virtualized hardware resources. Hypervisors are installed on
server hardware whose only task is to run guest operating systems. Non-hypervisor virtualization
systems are used for similar tasks on dedicated server hardware, but also commonly on desktop,
portable and even handheld computers.
59. IaaS:
Infrastructure as a Service; In the most basic cloud-service model, providers of IaaS offer
computers - physical or (more often) virtual machines - and other resources.To learn more please
click here.
60. icon:
On a system like Windows or Macintosh that uses a graphical user interface (GUI), a small picture
or symbol that represents some object or function. Examples: a file folder for a directory; a
rectangle with a bent corner for a file; or a miniature illustration for a program.
61. ICS:
Internet Connection Sharing; a feature in Windows that when enabled, allows you to connect
computer on your home network to the Internet via one computer.
62. IEEE 1394 port:
An interface for attaching high-speed serial devices to your computer; IEEE 1394 connectors
support plug and play.
63. image map:
A graphic overlay that contains more than one area (or hot spot) which is clickable and links to
another web page or anchor. Image maps provide an alternative to text links for directing the
user to additional information.
64. IMAP:
Internet Message Access Protcol. A method of accessing e-mail messages on a server without
downloading them to your local hard drive; it is the main difference between IMAP and POP3
which requires messages to be downloaded to a user's hard drive before the message can be
read.
65. Internet:
A worldwide network based on the TCP/IP protocol that can connect almost any make or model
of popular computers from micros to supercomputers. Special programs called "clients" enable
users with a network connection to do things like process e-mail or browse web sites using the
familiar interface of a desktop computer.
66. Internet Domain Management:
For a comprehensive overview of Dataprise's cloud and Internet Domain Management services,
please click here.
67. Internet Explorer:
A client program from Microsoft that comes pre installed on most new PC or compatible
computers; enables you to browse the World Wide Web.
68. Internet radio:
An audio broadcasting service transmitted via the Internet; broadcasts consist of a continuous
stream. A drawback is the inability to control selection as you can when listening to traditional
radio broadcasting.
69. IP address:
Internet Protocol address; every computer connected to the Internet has a unique identifying
number. Example: 192.168.100.2.
70. IRC:
Internet Relay Chat; a system that enables two or more Internet users to conduct online
discussions in real time.
71. IRQ:
Interrupt request; refers to a number associated with a serial port on an PC or compatible
computer. It usually can be changed by flipping a dip switch. Occasionally, when you're using a
modem connect to the Internet, you may need to adjust the IRQ number assigned to the serial
port which connects the modem to avoid conflicts with another device like your mouse.
72. ISP:
Internet Service Provider; an organization or company that provides Internet connectivity.
73. IT Assessment:
An IT Assessment is the practice of gathering information on part or whole of a IT network
infrastructure, and then presented in a detailed report. This report typically analyzes the current
state or health of technology or services and identifies areas needing improvement or prepare
for a some type of system or application upgrade. A IT Assessment can be performed in-house or
outsourced to an IT vendor. Dataprise has developed a comprehensive assessment process that
includes conducting thorough, in-depth reviews all of your critical technology areas, evaluating
them against best practices and then providing you with a roadmap to better leverage your IT as
a competitive advantage. To learn more please click here.
74. IV&V:
Independent Verification and Validation (IV&V) is the process of checking that a project, service,
or system meets specifications and that it fulfills its intended purpose. If you’ve recently
implemented a new technology solution, you may want an independent party to assess the
quality of the work. To learn more please click here.
75. ava:
A general purpose programming language commonly used in conjunction with web pages
that feature animation. Small Java applications are called Java applets; many can be
downloaded and run on your computer by a Java-compatible browser like Firefox or
Internet Explorer.
76. JavaScript:
A publicly available scripting language that shares many of the features of Java; it is used to
add dynamic content (various types of interactivity) to web pages.
77. JPEG:
Joint Photographic Experts Group; a graphics format which compresses an image to save
space. Most images imbedded in web pages are GIFs, but sometimes the JPEG format is
used (especially for detailed graphics or photographs). In some cases, you can click on the
image to display a larger version with better resolution.
78. justified:
A word processing format in which text is formatted flush with both the left and right
margins. Other options include left justified (text is lined up against the left margin) and
right justified (text is lined up against the right margin).
79. K:
An abbreviation for kilobyte; it contains 1,024 bytes; in turn 1,024 kilobytes is equal to one
megabyte.
80. Kbps:
Kilobits per second; a measure of data transfer speed; one Kbps is 1,000 bits per second.
Example: a 28.8 Kbps modem.
81. Kerberos:
An authentication system developed at the Massachusetts Institute of Technology (MIT); it
enables the exchange of private information across an open network by assigning a unique
key called a "ticket" to a user requesting access to secure information.
82. kerning:
The amount of space between characters in a word; in desktop publishing, it is typically
performed on pairs of letters or on a short range of text to fine-tune the character spacing.
83. keyword:
Most often refers to a feature of text editing and database management systems; a
keyword is an index entry that correlates with a specific record or document.
84. kilobyte (K, KB, or Kb):
1,024 (2 to the 10th power) bytes; often used to represent one thousand bytes. Example: a
720K diskette can hold approximately 720,000 bytes (or characters).
85. knowledge base:
A database where information common to a particular topic is stored online for easy
reference; for example, a frequently-asked questions (FAQ) list may provide links to a
knowledge base.
86. LAN:
Local area network; a network that extends over a small area (usually within a square mile
or less). Connects a group of computers for the purpose of sharing resources such as
programs, documents, or printers. Shared files often are stored on a central file server.
87. laser printer:
A type of printer that produces exceptionally high quality copies. It works on the same
principle as a photocopier, placing a black powder onto paper by using static charge on a
rolling drum.
88. leading:
The vertical space between lines of text on a page; in desktop publishing, you can adjust
the leading to make text easier to read.
89. learning management system (LMS):
Software used for developing, using, and storing course content of all types. Information
within a learning management system often takes the form of learning objects (see
"learning object" below).
90. learning object:
A chunk of course content that can be reused and independently maintained. Although
each chunk is unique in its content and function, it must be able to communicate with
learning systems using a standardized method not dependent on the system. Each chunk
requires a description to facilitate search and retrieval.
91. link:
Another name for a hyperlink.
92. LINUX:
An open-source operating system that runs on a number of hardware platforms including
PCs and Macintoshes. Linux is freely available over the Internet.
93. ListProcessor:
A program that manages electronic mailing lists; OIT is responsible for the ListProcessor
software and also handles requests from the OSU community or new mailing lists.
94. LISTSERV, Listserver:
An electronic mailing list; it provides a simple way of communicating with a large number
of people very quickly by automating the distribution of electronic mail. At OSU, mailing
lists are used not only for scholarly communication and collaboration, but also as a means
of facilitating and enhancing classroom education.
95. log in, log on:
The process of entering your username and password to gain access to a particular
computer; e.g., a mainframe, a network or secure server, or another system capable of
resource sharing.
M
96. MaaS:
Metal-as-a-Service; The dynamic provisioning and deployment of whole physical servers, as
opposed to the provisioning of virtual machines.
97. MAC:
Media Access Control; The hardware address of a device connected to a shared network.
98. Macintosh:
A personal computer introduced in the mid-1980s as an alternative to the IBM PC.
Macintoshes popularized the graphical user interface and the 3 1/2 inch diskette drive.
99. mail server:
A networked computer dedicated to supporting electronic mail. You use a client program
like Microsoft Outlook for retrieving new mail from the server and for composing and
sending messages.
100. mailing list:
A collection of e-mail addresses identified by a single name; mailing lists provide a simple
way of corresponding with a group of people with a common interest or bond. There are
two main types of lists: 1) one you create within an e-mail program like Outlook that
contains addresses for two or more individuals you frequently send the same message; and
2) a Listserve type that requires participants to be subscribed (e.g., a group of
collaborators, a class of students, or often just individuals interested in discussing a
particular topic).
101. main memory:
The amount of memory physically installed in your computer. Also referred to as "RAM".
102. mainframe:
A very large computer capable of supporting hundreds of users running a variety of
different programs simultaneously. Often the distinction between small mainframes and
minicomputers is vague and may depend on how the machine is marketed.
103. male connector:
A cable connector that has pins and plugs into a port or interface to connect one device to
another.
104. malware:
Software programs designed to damage or do other unwanted actions on a computer;
common examples of malware include viruses, worms, trojan horses, and spyware.
105. Managed Workstations:
A Managed Workstation reduces downtime, improves maintenance, increases productivity
and data security through an effective blend of Help Desk and on-site support and
centralized deployment of software patches and virus protection updates. Dataprise can
deliver expert support at the workstation level for all of your users, at any location. Using
our DesktopStreaming™ live online support technology, our highly qualified certified
technical staff, working remotely, are able to see exactly what is happening on a user’s
computer screen — allowing us to quickly isolate issues and begin remediation.
106. MAPI:
Messaging Application Programming Interface; a system built into Microsoft Windows that
enables different e-mail programs to interface to distribute e-mail. When both programs
are MAPI-enabled, they can share messages.
107. MDM:
Mobile Device Management; Any routine or tool intended to distribute applications, data,
and configuration settings to mobile communications devices. The intent of MDM is to
optimize the functionality and security of a mobile communications network. MDM must
be part of a coherent BYOD strategy.
108. megabyte (Meg or MB):
1,024 x 1,024 (2 to the 20th power) bytes; it's usually sufficient to think of a megabytes as
one million bytes.
109. MHz or mHz:
Megahertz; a measurement of a microprocessor's speed; one MHz represents one million
cycles per second. The speed determines how many instructions per second a
microprocessor can execute. The higher the megahertz, the faster the computer.
110. menu:
In a graphical user interface, a bar containing a set of titles that appears at the top of a
window. Once you display the contents of a menu by clicking on its title, you can select any
active command (e.g., one that appears in bold type and not in a lighter, gray type).
111. Microsoft Exchange:
Microsoft Exchange Server is the server side of a client–server, collaborative application
product developed by Microsoft. It is part of the Microsoft Servers line of server products
and is used by enterprises using Microsoft infrastructure products. Exchange's major
features consist of electronic mail, calendaring, contacts and tasks; support for mobile and
web-based access to information; and support for data storage. Dataprise has a 100%
hosted Exchange solution that includes clustered and redundant Microsoft Exchange
servers that provide more then enough horsepower to support all of your organization’s
messaging needs. And we handle the entire set-up and configuration for you. To learn more
please click here.
112. Microsoft Windows:
A group of operating systems for PC or compatible computers; Windows provides a
graphical user interface so you can point and click to indicate what you want to do.
113. MIME:
Multipurpose Internet Mail Extensions; a protocol that enables you to include various types
of files (text, audio, video, images, etc.) as an attachment to an e-mail message.
114. modem:
A device that enables a computer to send and receive information over a normal telephone
line. Modems can either be external (a separate device) or internal (a board located inside
the computer's case) and are available with a variety of features such as error correction
and data compression.
115. moderator:
A person who reviews and has the authority to block messages posted to a supervised or
"moderated" network newsgroup or online community.
116. monitor:
The part of a computer that contains the screen where messages to and from the central
processing unit (CPU) are displayed. Monitors come in a variety of sizes and resolutions.
The higher the number of pixels a screen is capable of displaying, the better the resolution.
Sometimes may be referred to as a CRT.
117. mouse:
A handheld device used with a graphical user interface system. Common mouse actions
include: 1) clicking the mouse button to select an object or to place the cursor at a certain
point within a document; 2) double-clicking the mouse button to start a program or open a
folder; and 3) dragging (holding down) the mouse button and moving the mouse to
highlight a menu command or a selected bit of text.
118. MPEG:
Motion Picture Experts Group; a high quality video format commonly used for files found
on the Internet. Usually a special helper application is required to view MPEG files.
119. MRB:
Managed Remote Back Up; a service that provides users with a system for the backup,
storage, and recovery of data using cloud computing.
120. MSP:
Managed Service Provider; A business model for providing information-technology
services.To learn more please click here.
121. multimedia:
The delivery of information, usually to a personal computer, in a combination of different
formats including text, graphics, animation, audio, and video.
122. multitasking:
The ability of a CPU to perform more than one operation at the same time; Windows and
Macintosh computers are multitasking in that each program that is running uses the CPU
only for as long as needed and then control switches to the next task.
123. NaaS:
Network as a Service; a category of cloud services that provides users with the capability of
where the capability provided to the cloud service user is to usinge network/transport
connectivity services and/or inter-cloud network connectivity services.
124. nameserver:
A computer that runs a program for converting Internet domain names into the
corresponding IP addresses and vice versa.
125. NAT:
Network Address Translation; a standard that enables a LAN to use a set of IP addresses for
internal traffic and a single IP address for communications with the Internet.
126. network:
A group of interconnected computers capable of exchanging information. A network can be
as few as several personal computers on a LAN or as large as the Internet, a worldwide
network of computers.
127. network adapter:
A device that connects your computer to a network; also called an adapter card or network
interface card.
128. network hub:
A common connection point for devices on a network.
129. NNTP:
Network News Transport Protocol; the protocol used for posting, distributing, and
retrieving network news messages.
130. network monitoring:
Dataprise Cloud-based Network Monitoring service, can configure and remotely monitor all
of your important network systems (e-mail, servers, routers, available disk space, backup
applications, critical virus detection, and more). If our system detects a problem, it alerts
the Dataprise Technical Support Center, so we can take corrective action. Depending on
prearranged instructions from your own network engineers, we’ll correct the problem
immediately, wait until the next business day or simply notify you of the issue. To learn
more please click here.
131. network security:
Network security consists of the provisions and policies adopted by a network
administrator to prevent and monitor unauthorized access, misuse, modification, or denial
of the computer network and network-accessible resources. Network Security is the
authorization of access to data in a network, which is controlled by a network
administrator. Dataprise uses state-of-the-art network security techniques while providing
authorized personnel access to important files and applications. Every organization’s needs
are different and hackers are always adapting their techniques, so we are extremely serious
about staying up to date with the latest network security tools, threats and industry
developments. To learn more please click here.
132. OCR:
Optical character recognition; the act of using a visual scanning device to read text from
hard copy and translate it into a format a computer can access (e.g., an ASCII file). OCR
systems include an optical scanner for reading text and sophisticated software for analyzing
images.
133. on-Cloud:
Dataprise realizes that businesses are moving more and more of their critical infrastructure
to Cloud-based providers. 'On-Cloud' is currently our own term coined for providing
management and support for your Cloud-based systems and processes.
134. on-site:
At-place-of-work-or-business support, typically provided by a technically qualified
individual.
135. online:
A term that has commonly come to mean "connected to the Internet". It also is used to
refer to materials stored on a computer (e.g., an online newsletter) or to a device like a
printer that is ready to accept commands from a computer.
136. OpenType:
OpenType is a format for scalable computer fonts. It was built on its predecessor TrueType,
retaining TrueType's basic structure and adding many intricate data structures for
prescribing typographic behavior. OpenType is a registered trademark of Microsoft
Corporation.
137. PaaS:
Platform as a Service, in the PaaS model, cloud providers deliver a computing platform that
typically including an operating system, programming language execution environment,
database, and web server.
138. packet:
A unit of transmission in data communications. The TCP/IP protocol breaks large data files
into smaller chunks for sending over a network so that less data will have to be re-
transmitted if errors occur.
139. palette:
The range of colors a computer or an application is able to display. Most newer computers
can display as many as 16 million colors, but a given program may use only 256 of them.
Also refers to a display box containing a set of related tools within a desktop publishing or
graphics design program.
140. page:
Refers to an HTML document on the World Wide Web or to a particular web site; usually
pages contain links to related documents (or pages).
141. parallel port:
An interface on a computer that supports transmission of multiple bits at the same time;
almost exclusively used for connecting a printer. On IBM or compatible computers, the
parallel port uses a 25-pin connector. Macintoshes have an SCSI port that is parallel, but
more flexible in the type of devices it can support.
142. password:
A secret combination of characters used to access a secured resource such as a computer, a
program, a directory, or a file; often used in conjunction with a username.
143. PC:
Usually refers to an IBM PC or compatible, or when used generically, to a "personal
computer". In a different context, PC also is an abbreviation for "politically correct."
144. PDA:
Personal Digital Assistant; a small hand-held computer that in the most basic form, allows
you to store names and addresses, prepare to-do lists, schedule appointments, keep track
of projects, track expenditures, take notes, and do calculations. Depending on the model,
you also may be able to send or receive e-mail; do word processing; play MP3 music files;
get news, entertainment and stock quotes from the Internet; play video games; and have
an integrated digital camera or GPS receiver.
145. PDF:
Portable Document Format; a type of formatting that enables files to be viewed on a
variety computers regardless of the program originally used to create them. PDF files retain
the "look and feel" of the original document with special formatting, graphics, and color
intact. You use a special program or print driver (Adobe Distiller or PDF Writer) to convert a
file into PDF format.
146. peer-to-peer:
A type of connection between two computers; both perform computations, store data, and
make requests from each other (unlike a client-server connection where one computer
makes a request and the other computer responds with information).
147. Perl:
Practical Extraction and Report Language; a programming language that is commonly used
for writing CGI scripts used by most servers to process data received from a client browser.
148. personality:
A method of setting up a computer or a program for multiple users. Example: In Windows,
each user is given a separate "personality" and set of relevant files.
149. PGP:
Pretty good privacy; a technique for encrypting e-mail messages. PGP uses a public key to
give to anyone who sends you messages and a private key you keep to decrypt messages
you receive.
150. Ph:
A type of directory service often referred to as a "phone book". When accessing this type of
directory service, follow the directions from the particular site for looking up information.
151. phishing:
A con that scammers use to electronically collect personal information from unsuspecting
users. Phishers send e-mails that appear to come from legitimate websites such as eBay,
PayPal, or other banking institutions asking you to click on a link included in the email and
then update or validate your information by entering your username and password and
often even more information, such as your full name, address, phone number, social
security number, and credit card number.
152. PING:
Packet Internet Groper; a utility used to determine whether a particular computer is
currently connected to the Internet. It works by sending a packet to the specified IP
address and waiting for a reply.
153. pixel:
Stands for one picture element (one dot on a computer monitor); commonly used as a unit
of measurement.
154. plug-in:
A program used for viewing multimedia files that your web browser cannot handle
internally; files using a plug-in do not need to be moved to your computer before being
shown or played. Contrast to a helper application which requires the file to first be moved
to your computer. Examples of plug-ins: Adobe Flash Player (for video and animation) and
Quicktime (for streamed files over the Internet).
155. plug and play:
A set of specifications that allows a computer to automatically detect and configure a
device and install the appropriate device drivers.
156. POP:
Post Office Protocol; a method of handling incoming electronic mail. Example: E-mail
programs may use this protocol for storing your incoming messages on a special cluster of
servers called pop.service.ohio-state.edu and delivering them when requested.
157. pop-up blocker:
Any application that disables the pop-up, pop-over, or pop-under ad windows that appear
when you use a web browser.
158. post:
The act of sending a message to a particular network newsgroup.
159. PostScript:
A page description language primarily used for printing documents on laser printers; it is
the standard for desktop publishing because it takes advantage of high resolution output
devices. Example: A graphic design saved in PostScript format looks much better when
printed on a 600 dpi printer than on a 300 dpi printer.
160. PostScript fonts:
Called outline or scalable fonts; with a single typeface definition, a PostScript printer can
produce many other fonts. Contrast to non-PostScript printers that represent fonts with
bitmaps and require a complete set for each font size.
161. PPP:
Point-to-Point Protocol; a type of connection over telephone lines that gives you the
functionality of a direct ethernet connection.
162. program:
A set of instructions that tells a computer how to perform a specific task.
163. private cloud
Private cloud (also called internal cloud or corporate cloud) is a term for a proprietary
computing architecture that provides hosted services to a limited number of users behind a
secure and robust infrastructure. A Dataprise private cloud solution is designed to offer the
same features and benefits of shared cloud systems, but removes a number of objections
to the cloud computing model including control over enterprise and customer data, worries
about security, and issues connected to regulatory compliance. Dataprise Private clouds"
are designed to facilitate organizations that needs or wants more control over their data
than they can get by using a third-party shared cloud service.
164. protocol:
A set of rules that regulate how computers exchange information. Example: error checking
for file transfers or POP for handling electronic mail.
165. proxy:
Refers to a special kind of server that functions as an intermediate link between a client
application (like a web browser) and a real server. The proxy server intercepts requests for
information from the real server and whenever possible, fills the request. When it is unable
to do so, the request is forwarded to the real server.
166. public domain software:
Any non-copyrighted program; this software is free and can be used without restriction.
Often confused with "freeware" (free software that is copyrighted by the author).
167. pull:
Frequently used to describe data sent over the Internet; the act of requesting data from
another computer. Example: using your web browser to access a specific page. Contrast to
"push" technology when data is sent to you without a specific request being made.
168. push:
Frequently used to describe data sent over the Internet; the act of sending data to a client
computer without the client requesting it. Example: a subscriptions service that delivers
customized news to your desktop. Contrast to browsing the World Wide Web which is
based on "pull" technology; you must request a web page before it is sent to your
computer.
169. QoS:
Quality of service; is the ability to provide different priority to different applications, users,
or data flows, or to guarantee a certain level of performance to a data flow. For example, a
required bit rate, delay, jitter, packet dropping probability and/or bit error rate may be
guaranteed. Quality of service guarantees are important if the network capacity is
insufficient, especially for real-time streaming multimedia applications such as voice over
IP, online games and IP-TV, since these often require fixed bit rate and are delay sensitive,
and in networks where the capacity is a limited resource, for example in cellular data
communication.
170. QuickTime:
A video format developed by Apple Computer commonly used for files found on the
Internet; an alternative to MPEG. A special viewer program available for both IBM PC and
compatibles and Macintosh computers is required for playback.
171. RAM:
Random Access Memory; the amount of memory available for use by programs on a
computer. Also referred to as "main memory". Example: A computer with 8 MB RAM has
approximately 8 million bytes of memory available. Contrast to ROM (read-only memory)
that is used to store programs that start your computer and do diagnostics.
172. record:
A set of fields that contain related information; in database type systems, groups of similar
records are stored in files. Example: a personnel file that contains employment
information.
173. registry:
A database used by Windows for storing configuration information. Most 32-bit Windows
applications write data to the registry. Although you can edit the registry, this is not
recommended unless absolutely necessary because errors could disable your computer.
174. remote backup:
A remote, online, or managed backup service is a service that provides users with a system
for the backup and storage of computer files. Dataprise remote backup solution
incorporates automatic data compression and secure data encryption. This means that your
critical system data backs up safely and efficiently. For additional peace of mind, our
backup service features proprietary dual tapeless backup protection, including fast
incremental backup to a secure on-site hard drive and a second backup to our carrier-grade
data center. Our remote backup service is completely automated and immensely secure.
You’ll never have to think about the safety of your data again. To learn more please click
here.
175. remote desktop:
A Windows feature that allows you to have access to a Windows session from another
computer in a different location (XP and later).
176. remote login:
An interactive connection from your desktop computer over a network or telephone lines
to a computer in another location (remote site).
177. remote monitoring:
See: "network monitoring" or click here.
178. remote support:
See: "help desk" or click here.
179. RGB:
Red, green, and blue; the primary colors that are mixed to display the color of pixels on a
computer monitor. Every color of emitted light can be created by combining these three
colors in varying levels.
180. RJ-45 connector:
An eight-wire connector used for connecting a computer to a local-area network. May also
be referred to as an Ethernet connector.
181. ROM:
Read Only Memory; a special type of memory used to store programs that start a computer
and do diagnostics. Data stored in ROM can only be read and cannot be removed even
when your computer is turned off. Most personal computers have only a few thousand
bytes of ROM. Contrast to RAM (random access or main memory) which is the amount of
memory available for use by programs on your computer.
182. router:
A device used for connecting two Local Area Networks (LANs); routers can filter packets
and forward them according to a specified set of criteria.
183. RTF:
Rich Text Format; a type of document formatting that enables special characteristics like
fonts and margins to be included within an ASCII file. May be used when a document must
be shared among users with different kinds of computers (e.g., IBM PC or compatibles and
Macintoshes).
184. SaaS:
Software as a Service; a software delivery model in which software and associated data are
centrally hosted on the cloud. SaaS is typically accessed by users using a thin client via a
web browser.
185. safe mode:
A way of starting your Windows computer that can help you diagnose problems; access is
provided only to basic files and drivers.
186. SAN:
A storage area network (SAN) is a dedicated storage network that provides access to
consolidated, block level storage. SANs primarily are used to make storage devices (such as
disk arrays, tape libraries, and optical jukeboxes) accessible to servers so that the devices
appear as locally attached to the operating system. A SAN typically has its own network of
storage devices that are generally not accessible through the regular network by regular
devices.
187. SATA:
Serial Advanced Technology Attachment or Serial ATA. An interface used to connect ATA
hard drives to a computer's motherboard that provides a better, more efficient interface;
Serial ATA is likely to replace the previous standard, Parallel ATA (PATA), which has become
dated.
188. satellite transmission:
A method of data transmission; the sender beams data up to an orbiting satellite and the
satellite beams the data back down to the receiver.
189. screen reader:
A software program that translates text on a Web page into audio output; typically used by
individuals with vision impairment.
190. scroll bar:
In a graphical user interface system, the narrow rectangular bar at the far right of windows
or dialog boxes. Clicking on the up or down arrow enables you to move up and down
through a document; a movable square indicates your location in the document. Certain
applications also feature a scroll bar along the bottom of a window that can be used to
move from side-to-side.
191. search engine:
A tool that searches documents by keyword and returns a list of possible matches; most
often used in reference to programs such as Google that are used by your web browser to
search the Internet for a particular topic.
192. secure server:
A special type of file server that requires authentication (e.g., entry a valid username and
password) before access is granted.
193. security token:
A small device used to provide an additional level of authorization to access a particular
network service; the token itself may be embedded in some type of object like a key fob or
on a smart card. Also referred to as an authentication token.
194. Section 508:
A 1998 amendment to the Workforce Rehabilitation Act of 1973; it states after June 25,
2001, all electronic and information technology developed, purchased, or used by the
federal government must be accessible to those with disabilities. Refer to the Section 508
website for more information.
195. self-extracting file:
A type of compressed file that you can execute (e.g., double-click on the filename) to begin
the decompression process; no other decompression utility is required. Example: on IBM
PC or compatibles, certain files with an ".exe" extension and on Macintoshes, all files with a
".sea" extension.
196. serial port:
An interface on a computer that supports transmission of a single bit at a time; can be used
for connecting almost any type of external device including a mouse, a modem, or a
printer.
197. server:
A computer that is responsible for responding to requests made by a client program (e.g., a
web browser or an e-mail program) or computer. Also referred to as a "file server".
198. shareware:
Copyrighted software available for downloading on a free, limited trial basis; if you decide
to use the software, you're expected to register and pay a small fee. By doing this, you
become eligible for assistance and updates from the author. Contrast to public domain
software which is not copyrighted or to freeware which is copyrighted but requires no
usage fee.
199. signature:
A file containing a bit of personal information that you can set to be automatically
appended to your outgoing e-mail messages; many network newsreaders also have this
capability. Large signatures over five lines generally are frowned upon.
200. SIMM:
Single In-line Memory Module; a small circuit board that can hold a group of memory chips;
used to increase your computer's RAM in increments of 1,2, 4, or 16 MB.
201. SMTP:
Simple Mail Transfer Protocol; a method of handling outgoing electronic mail.
202. software:
Any program that performs a specific function. Examples: word processing, spreadsheet
calculations, or electronic mail.
203. spam:
Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of spam
that involves nearly identical messages sent to numerous recipients by email. Definitions of
spam usually include the aspects that email is unsolicited and sent in bulk. Spammers
collect email addresses from chatrooms, websites, customer lists, newsgroups, and viruses
which harvest users' address books, and are sold to other spammers. They also use a
practice known as “email appending” or "epending" in which they use known information
about their target (such as a postal address) to search for the target's email address. Also
see "Anti-Spam".
204. SSID:
Service Set Identifier; a name that identifies a wireless network.
205. streaming (streaming media):
A technique for transferring data over the Internet so that a client browser or plug-in can
start displaying it before the entire file has been received; used in conjunction with sound
and pictures. Example: The Flash Player plug-in from Adobe Systems gives your computer
the capability for streaming audio; RealPlayer is used for viewing sound and video.
206. spyware:
Any software that covertly gathers user information, usually for advertising purposes,
through the user's Internet connection.
207. subdirectory:
An area on a hard disk that contains a related set of files; on IBM PC or compatibles, a level
below another directory. On Macintoshes, subdirectories are referred to as folders.
208. SVGA:
Super VGA (Video Graphics Array); a set of graphics standards for a computer monitor that
offers greater resolution than VGA. There are several different levels including 800 x 600
pixels, 1024 by 768 pixels, 1280 by 1024 pixels; and 1600 by 1200 pixels. Although each
supports a palette of 16 million colors, the number of simultaneous colors is dependent on
the amount of video memory installed in the computer.
234. VDI:
Virtual Desktop Infrastructure or "VDI," is a desktop-centric service that hosts users'
desktop environments on remote servers and/or blade PCs, which are accessed over a
network using a remote display protocol.
235. virtual classroom:
An online environment where students can have access to learning tools any time.
Interaction between the instructor and the class participants can be via e-mail, chat,
discussion group, etc.
236. virtualization:
Virtualization is the creation of a virtual (rather than actual) version of something, such as a
hardware platform, operating system, a storage device or network resources. In hardware
virtualization, the term host machine refers to the actual machine on which the
virtualization takes place; the term guest machine, however, refers to the virtual machine.
Likewise, the adjectives host and guest are used to help distinguish the software that runs
on the actual machine from the software that runs on the virtual machine. The software or
firmware that creates a virtual machine on the host hardware is called a hypervisor or
Virtual Machine Monitor.
237. virtual classroom:
An online environment where students can have access to learning tools any time.
Interaction between the instructor and the class participants can be via e-mail, chat,
discussion group, etc.
238. virtual hosting:
Virtual hosting is a method for hosting multiple domain names on a computer using a single
IP address. This allows one machine to share its resources, such as memory and processor
cycles, to use its resources more efficiently. Dataprise Virtual Hosting provides a high-
performance hosting platform for your organization's online presence. Maintained by our
specialist support staff and 24x7 active monitoring systems, we work hard to meet all of
your hosted Web server needs.
239. virtual memory:
A technique that enables a certain portion of hard disk space to be used as auxiliary
memory so that your computer can access larger amounts of data than its main memory
can hold at one time.
240. virtual reality:
An artificial environment created with computer hardware and software to simulate the
look and feel of a real environment. A user wears earphones, a special pair of gloves, and
goggles that create a 3D display. Examples: manipulating imaginary 3D objects by
"grabbing" them, taking a tour of a "virtual" building, or playing an interactive game.
241. virus:
A program intended to alter data on a computer in an invisible fashion, usually for
mischievous or destructive purposes. Viruses are often transferred across the Internet as
well as by infected diskettes and can affect almost every type of computer. Special antivirus
programs are used to detect and eliminate them.
242. VoIP:
Voice over Internet Protocol; a means of using the Internet as the transmission medium for
phone calls. An advantage is you do not incur any additional surcharges beyond the cost of
your Internet access.
243. VPN:
Virtual Private Networking; a means of securely accessing resources on a network by
connecting to a remote access server through the Internet or other network.
244. VT100:
A type of terminal emulation required when you open an interactive network connection
(telnet) to a UNIX system from your desktop computer.
245. WAIS:
Wide Area Information Server; a program for finding documents on the Internet. Usually
found on gopher servers to enable searching text-based documents for a particular
keyword.
246. WAN:
Wide Area Network; a group of networked computers covering a large geographical area
(e.g., the Internet).
247. WAP:
Wireless Application Protocol; a set of communication protocols for enabling wireless
access to the Internet.
248. WEP:
Wired Equivalent Privacy; a security protocol for wireless local area networks defined in
the 802.11b standard. WEP provides the same level of security as that of a wired LAN.
249. wi-fi:
Wireless Fidelity; A generic term from the Wi-Fi Alliance that refers to of any type of 802.11
network (e.g., 802.11b, 802.11a, dual-band, etc.). Products approved as "Wi-Fi Certified" (a
registered trademark) are certified as interoperable with each other for wireless
communications.
250. wild card:
A special character provided by an operating system or a particular program that is used to
identify a group of files or directories with a similar characteristic. Useful if you want to
perform the same operation simultaneously on more than one file. Example: the asterisk
(*) that can be used in DOS to specify a groups of files such as *.txt.
251. window:
On a graphical user interface system, a rectangular area on a display screen. Windows are
particularly useful on multitasking systems which allow you to perform a number of
different tasks simultaneously. Each task has its own window which you can click on to
make it the current process. Contrast to a "dialog box" which is used to respond to prompts
for input from an application.
252. Windows:
A casual way of referring to the Microsoft Windows operating systems.
253. wireless (networking):
The ability to access the Internet without a physical network connection. Devices such as
cell phones and PDAs that allow you to send and receive e-mail use a wireless Internet
connection based on a protocol called WAP (Wireless Application Protocol). At this point,
web sites that contain wireless Internet content are limited, but will multiply as the use of
devices relying on WAP increases.
254. wizard:
A special utility within some applications that is designed to help you perform a particular
task. Example: the wizard in Microsoft Word that can guide you through creating a new
document.
255. WLAN:
Wireless Local Area Network; the computers and devices that make up a wireless network.
256. workstation:
A graphical user interface (GUI) computer with computing power somewhere between a
personal computer and a minicomputer (although sometimes the distinction is rather
fuzzy). Workstations are useful for development and for applications that require a
moderate amount of computing power and relatively high quality graphics capabilities.
257. World Wide Web:
A hypertext-based system of servers on the Internet. Hypertext is data that contains one or
more links to other data; a link can point to many different types of resources including
text, graphics, sound, animated files, a network newsgroup, a telnet session, an FTP
session, or another web server. You use a special program called a "browser" (e.g., Firefox
or Internet Explorer) for viewing World Wide Web pages. Also referred to as "WWW" or
"the web".
258. worm:
A program that makes copies of itself and can spread outside your operating system worms
can damage computer data and security in much the same way as viruses.
259. WPA:
Wi-Fi Protected Access; a standard designed to improve on the security features of WEP.
260. WWW:
An abbreviation for World Wide Web.
261. WYSIWYG:
What You See Is What You Get; a kind of word processor that does formatting so that
printed output looks identical to what appears on your screen.
262. X2:
A technology that enables data transmission speeds up to 56 Kbps using regular telephone
service that is connected to switching stations by high-speed digital lines. This technology
affects only transmissions coming into your computer, not to data you send out. In
addition, your ISP must have a modem at the other end that supports X2.
263. XHTML:
Extensible Hypertext Markup Language. A spinoff of the hypertext markup language (HTML)
used for creating Web pages. It is based on the HTML 4.0 syntax, but has been modified to
follow the guidelines of XML and is sometimes referred to as HTML 5.0.
264. XML:
Extensible Markup Language; A markup language for coding web documents that allows
designers to create their own customized tags for structuring a page.
Z
265. zip:
A common file compression format for PC or compatibles; the utility WinZip or Winrar is
used for compressing and decompressing files. Zipped files usually end with a ".zip" file
extension. A special kind of zipped file is self-extracting and ends with a ".exe" extension.
Macintosh OSX also supports the .zip format and has tools that can compress and
decompress zip files.
266. zoom:
The act of enlarging a portion of an onscreen image for fine detail work; most graphics
programs have this capability.