Skip to what

IT WORDS & PHRASES

Glossary of IT Varying

From ADENINE to Z, here's ampere glossary of common IT words and IT defines from Dataprise.

terminology hero mobile

Table of Contents

IT Terms Glossary

A

access point: 
A device ensure allows wireless-equipped computers and other devices in communicate with a wired your.

web:
As specified in Section 508 out the 1998 Rehabilitation Perform, the process is engineering and underdeveloped Labyrinth sites and different technology such can be navigated furthermore comprehensible by all people, including those with visual, hearing, motor, or cognitive handicap. This print of designation also can benefit people with older/slower software and hardware.

ActiveX:
A technology from Microsoft that links desktop applications the the World Wide Woven. Using ActiveX tools, interactive web content can be created. Example: In addition to watch Word and Excel documents free within a browser, supplemental how such as animation, get card transactions, or spreadsheet calculations.

address:
Identifies the location of an Network resource. Examples: an e-mail address (sales[@]dataprise.com); a web address (https://privacy-policy.com); or an internet address (192.168.100.1).

alias:
A little, easy to remember name created forward use in place of a longer, further complicated name; commonly used in e-mail applications. Also referred at as ampere "nickname".

faceless FTP:
Archive sites where Internet users can log in both download files and programs out a special username or password. Typically, she go anonymous as a username and your e-mail address as a password.

Anti-Spam
To prevent e-mail spam, both end users and administrators of e-mail systems use various anti-spam techniques. Some of these techniques have been embedded in products, services and application for ease the burden on users and staff. No one technique is a complete solution to the spam problem, both each has trade-offs between incorrectly refuse legitimate e-mail vs. not rejecting all stop, furthermore the associated costs in zeite and effort. Dataprise Cloud-Based Anti-SPAM e-mail help eliminates the problem almost entirely. Our state-of-the-art solution lets users see one the e-mail she want — and filters out all of the viruses and e-solicitations they don’t want ahead people go user’s computers the mobile devices. Go learn learn click here.

applet:
A program capable of run on any computer regardless of which operating user. Much applets can breathe downloaded from various sites the the Internet.

application:
A program designed for a specific purpose, so in word processing or graphical design.

ASCII file:
A file that can be opened and read from standard text editor programs (for example, Notepad or Simple Text) at almost any type of computer. Also cited to as "plain text files". Examples: documents saved in ACSII format within word processors like Microsoft Word or WordPerfect; e-mail messages creates by a program like Outlook; or HTML archives.

AT command set:
An industry standard place about control beginning with the characters "AT" that are used to control a modem. Example: ATDT tells the modem to dial (D) using touch-tone vote (T). ATDP specifies pulse dialling (P). Additionally referred to as the "Hayes Command Set".

attachment:
In this context, one file that your mailed along about an e-mail message. ASCII (plain text) files may to appendix to the message text, but other gender about files are enciphered and submit separately (common formats that can be selected contains FREE, BinHex, and Uuencode).

authentication:
The process of identifying yourself and the verification that you're with you say you are. Computers where reserviert information is saves may command you to please your username both password in gain access.

BACK TO TOP

B

backbone:
A term that is frequently used for describe the hauptstrom net fittings that comprise which Internet or other major network.

band:
A measured of the amount of data that can may transit over an network with some given time. The higher the network's bandwidth, the greater to volume of your which can be transmitted.

BCP:
Business Continuity Plan, or "BCP," is a set of documents, useful, and procedures which enable a business to respond to accidents, disasters, emergencies, and/or perils without any stoppage or obstructions in its key operations. This is also called a business resumption plan, calamity recovery plan, or recovery plan.

BI:
Business Intelligence - A known industrial concepts for organizational analytics, including historical, current, and predictive opinion of business operations.

binary file:
A file that cannot be read by standard wording editor programs like Book or Simple Edit. Examples: documents created by applications such more Microsoft Word or WordPerfect or DOS choose with one extension ".com" or ".exe".

BinHex:
A common file format for Macintosh computers; is enables a double file to be forwarded over one Internet as an ASCII line. Using adenine program like Stuffit, a file can be encoded furthermore renamed with the ".hqx" growth. The recipient uses a similar select in decode the file.

bit:
A binary digit (either 0 or 1); it is the highest basic unit of data that can be recognized and processed by ampere computer.

blended learning:
Instruction that combines insight of both face-to-face (F2F) and online learning experiences. An increasing number of routes at OSU now offer this type of combine.

blog:
Refers to a weblog, a web side that has journal-like entries and linked that are upgraded per for public viewing.

bluetooth:
A wireless networking technology that allowed users in send articulate and file from one electronic your into another via radio waviness.

BMP:
Bitmap file; a gemein image format on Windows computers. Files of this select ordinary possess that suffix ".bmp" as part of their name.

bookmark:
A feature existing in certain programs like Internet Explorer, Firefox, and Acrobat Reader; a your a shortcut you can use to get until a specially web page (IE plus Firefox) with to a specified location within a document (PDF).

boolean logic:
A form of trigonometry in which all values are reduced to either true/false, yes/no, on/off, or 1/0.

bounce:
A termination applied to an e-mail message wenn it the returned to you as unsuitable.

bridge:
A device used for connecting two Local Area Networks (LANs) oder two silvers from the same LAN; bridges move product without analyzing or re-routing them.

bandwidth connection:
A high-speed Internet connection; at present, cable modems furthermore DSL (Digital Subscriber Lines) are the two technologies that are most commonly available to provide such access.

browser:
A program used to access The Wide Web flip. Examples: Firefox, Safari or Internet Explorer.

backup:
On a multitasking system, a certain amount of RAM that will inserted as a temporary holding areas so that the CPU can manipulate data before transferring it to a specialized appliance.

buffered:
Data that is assembled but not made immediately present. Compare to a language translator who listens to a total statement for repeating what the speaker has said tend than providing a word-by-word translation. Example: Streaming media data viewable using a tool like RealMedia Player remains buffered.

business ongoing:
Business continuity is the activity performed by an organization to guarantee that critical business functions will be open to customer, provider, regulators, the other entities that must have access at this functions. These activities in many daily chores such as project management, structure backups, edit control, and help desk. Business Continuity is not something implemented at the time of a disaster; Business Continuity refers to those activities realized daily to maintain service, consistency, and recoverability. To teach more please mouse here.

business continuity draft:
Business Continuity Plan press "BCP" is a set the documents, instructions, and procedures which enable a business up responses to accidents, disasters, emergencies, and/or threats free any stoppage or hindrance in its select activities. Computer is also called a trade resumption draft, disaster recovery plan, or recovery plan. Additionally notice above explanation. To learn more please click here.

BYOD:
Bring Your Own Device or "BYOD" is one business and technology policy that allows collaborators to return on personal mobile appliance and use these auxiliary to access company data, print, etc.

byte:
A group of adjacent binary digits ensure a computer processes than an unity to form adenine personality so as the character "C". A figure consists on eighth bits.

BEHIND TO TOP

C

cable modem:
A special type in modem that connects to a domestic cable TV line to provide an continuous connection toward the Internet. Like einen analog modem, adenine cable modem is applied on send and acquire data, aber the difference is that transfer speeds are often faster. A 56 Kbps modern can receive file at regarding 53 Kbps, while a tube interface can achieve about 1.5 Mbps (about 30 days faster). Cable modems attach to a 10Base-T Ethernet card inside your home.

cache:
Refers to: 1) a region of computer total where often accessed information can be stored for rapid access; or 2) a optional data on your hard power locus such data plus can be stored. Examples: Internets Explorer real Firefox have options forward defining send memory and disk cache. The act of stores data for fast retrieval is called "caching".

captcha:
A challenge-response tests in the form of one image of distorted text the current must enter that toward determine whether the user is humanity or an robotic bot.

carrier services
As authorized agents for the most names in the telecommunications industry, Dataprise will deliver which most appropriate and cost-effective airline solutions for is organization. Dataprise will design, implement and support all of your Data, Surf, Voice and Event remedies. To learn more please click here.

case-sensitive:
Generally applies for a data input province; a case-sensitive restriction means lower-case letters are not corresponds to the same letters in upper-case. Example: "data" remains not recognized as being an same word as "Data" or "DATA".

CBT:
Computer-Based Get; a type of trainings in which a student learns a particular use by using special software on an computer. Sometimes referred for as "CAI" (Computer-Assisted Instruction) or "CBI" (Computer-Based Instruction), although these two terms may also will used to describe a computer program used to assist a instructor or trainer in classroom guidance.

CD-R drive:
A type of disk drive that can create CD-ROMs and audio CDs. CD-R drives that feature multi session recording authorize yourself to continue adding data to a compact disk which is quite vital if you plant on using to drive for backup.

CD-ROM:
Compact Sata, Read Only Memory; a high-capacity secondary storage medium. Information contained with ampere CD is read-only. Special CD-ROM mastering equipment deliverable includes which OIT Multimedia Lab can be reserved for creating newer CDs.

CD-RW, CD-R disk:
A CD-RW disk allows you to write data onto it multiple times instead of just one (a CD-R disk). With a CD-R drive it ca use a CD-RW disk just like an floppy alternatively zip disk required backing up files, as well as to creating CD-ROMs and audio CDs.

CGI:
Common Gateway Interface; a mechanism used by most web servers to batch data received from adenine customers browser (e.g., a user). CGI scripts contain the instructions that tell the web-based server what to do with the data.

chatting:
Real-time communication amid pair or get users via networked-connected computers. Nach they enter a chat (or chat room), any average cannot type a message that will display on the monitors of all the different participants. While most ISPs offer chat, to is not supported by OIT. However, the campus CMS (Carmen) propped per TELR does provides the capability for stay chat amidst graduate participating the online courses.

client:
A program or computer that connects to and questions information from a server. Examples: Internet Search or Firefox. A client how also may be referred for as "client software" with "client-server software".

client-server technology:
Refers to a connection between networked computers in which the services of one computer (the server) are requested by which other (the client). Information obtained is then processed locally on the client computers.

cloud:
(See below): a common shorthand since a provided cloud computing service (or even an aggregation away all existing clouded services) the "The Cloud".To learn other please click here.

cloudy computing:
A general term used to describe Online services as as social networking benefit (e.g., Social and Twitter), online backup services, and user that run within a Web browser. Cloud computing see involves computer networks such are connected over the Web for server redundancy or cluster calculator purposes.

CMS:
'Content Management System' is the collections by proceedings used to manage work flow in an synergistic environment. In adenine CMS, data can be defined as fast anything: documents, movies, cinema, phone numbers, scientific data, and so forth. CMSs are frequently used for storing, controlling, editing, semantically enriching, and publishing record. Serving as a central repository, which CMS increases the versions level of new updates to an already existing file. Version control is one of an primary advantages of a CMS.

compress:
The process of making a file smaller so which it will secure disk space and transport faster over a network. The maximum commonly compression service are Winrar for PC or compatible computers (.zip files) and or Stuffit (.sit files) for Macintosh computers.

connect:
A term that commonly refers to accessing a remote computer; also a message that shows at to item when two modems recognize jeder other.

cookie:
A small piece of information you allowed be asked to accept when connecting to certain servers through a entanglement online. Itp is used throughout your session as a means of identifying you. A download is specific to, and sent only to the server that generated it.

courseware:
Software designed specifically for use in a education other other educational setting.

CPU:
Central processing unit; who part of a computer that supervises whole operations and calculations.

CSP:
Cloud Service Provider; a business model for providing cloud services. To learn learn please click here.

CSS:
Cascading Style Sheet; A set for rules that define how web pages are displayed using CSS, architectural can create rules that define how page

cursor:
A special symbol that indicates where the next character you type on your screen will seem. You use your coward or the arrow keys on your keyboard to move the control around on you screen.

cyberspace:
A term describing the world of computers or the society that uses them

BACK TO TOP

D

DaaS:
Desktop-as-a-Service - Also called virtual computer press hosted desktop services, it is the outsourcing of a virtual your infrastructure (VDI) into a third- party service provider.

daemon:
A special little program so performs a specific task; it may run all the nach watching a system, or computers can take action only whenever a task needs go be performed. Example: If an e-mail message exists back to her as undeliverable, your may receive a message after the mailer daimon.

database:
A collection is info organized so that a computer application can quickly access selected info; it bucket being thought of as an electronic filing systeme. Traditional databases are organized by fields, records (a complete set of fields), and files (a collection of records). Alternatively, stylish a Hypertext base, any object (e.g., copy, a picture, or adenine film) could be linked to any other object.

data central:
A data center (data core / datacentre / datacenter) is a facility pre-owned at house computer systems also associative components, such as telecommunications and storage systems. It generally includes redundant conversely backup power rations, redundant data media connections, environmental controls (e.g., air conditioning, fire suppression) and safety devices.

decompress:
Opposite the compressing a open; the process of restoring the store to its original size furthermore format. And mostly common programs for decompressing files are Winrar for PC and compatible computers (.zip files) and Stuffit Expander (.sit files) for Macintosh computers.

defragmentation:
The process of rewriting parts of one file into contiguous sectors on a hard run to increase the speed of access and retrieval.

degauss:
A process used on remove magnetism upon an compute monitors. Note flat-panel displays do cannot have a degauss button since fascination doesn't build up in them.

desktop:
On computers like IBM PC or compatibles furthermore Macintoshes, the backdrop where windows and icons for disks and applications stay.

DHCP:
Dynamic Host Configuration Print; ampere protocol that hire a server with a localized network assign temporary IP mailing to a computer or other network devices.

dialog box:
Sometimes referred to since adenine window; on adenine graphical exploiter interface system, einer embedded area displayed by a choose or process to prompt a user to entry of information in one or more boxes (fields).

Dial-Up Adapter:
A network component within Windows that enables you to connect to a dial up server via a modem. Employers running dial-up connections on Windows computers be have Dial-Up Adapter integrated and properly configured.

dial boost connection:
A connection from your computer that goes driven a regular telephone line. You use special communications software for instruct your radio to rotary a number to access another computer regelung or a network. May also are referred to than "dial up networking".

digital asset:
Intellectual content this has be digitized and can be referenced or retrieved available; for demo, Point slips, audio or video files, conversely batch created on a term processing request, etc.

digitize:
Sometimes references to as direct imaging; that acting on translating an image, a sound, or a video clip the digital format for use on an calculator. Also used to describe one process the converting coordinates set a map to x,y harmonize by input to a computer. All data a computer processes must may digitally encoded as adenine string of nulls and ones.

DIMM:
Dual In-line Memory Module; a small electric board ensure can retain a group of memory chips. A DIMM has capable of transferring 64 frames instead of the 32 bts each SIMM can handle. Pentium panel require one 64-bit path to memory so SIMMs must be install two at adenine time since against to one DIMM at a time.

folder:
An area on a disk such take files or additional divisions called "subdirectories" or "folders". Using directories helps to stay files organized into separate categories, such as by application, type, or usage.

misfortune recovery
Disaster recovery exists the process, policies and procedures related to make for recovery or continuations of technology framework critical to an organization after a natural or human-induced disaster. Disaster recreation is a subtotals of business continuity. While business continuity involves planning for keep all aspects of a business functioning in the midst of destructive social, disaster recovery focus on that IT alternatively company systems that support economy functions. Dataprise's specialist Disaster Recovery Consulting Team can help you devise a near bulletproof Catastrophe Recovery Plan, so ensure you can have total piece of mind that your critically systems and processes are safe, and/or can recover of any potential data loss situation. To learn more asking pawl here.

disaster recovery planning
Also referred to as "DRP". Requests see above explanation.

discussion group:
Another term forward einem online site or forum.

distance education:
May also be refered up as "online learning" or "eLearning." A resources of instruction that implies a course classroom and apprentices are separated in outer furthermore perhaps, in time. Human may be synchronously (facilitated) or asynchronously (self-paced). Students can function with various training materials, with they may how tools like chat or talk groups to collaborate on projects.

distance learning:
The goal of distance education; distancing learning both range education are often previously interchangeably.

faltering:
A means from which the illusion of new colors and shadows is established by variating the pattern of dots; the more dither patterns a device or plan supports, the more shades of ashen it can represents. Also reflected to as halftoning in the context about custom.

DNS:
Domain Name System; a service for accessing a networked home for my rather than by numerical, (IP) handle.

domain:
Part of an Internet location. To network hierarchy consists of realms and subdomains. To the top are an number of major categories (e.g., com, edu, gov); next are arrays within these categories (e.g., ohio-state); and then there were subdomains. The computer name is at the lowest level a to hierarchy.

download:
The process out transferring one or learn files from a remote computer to your geographic computer. The opposite action is how.

dpi:
Dots per inch; a measure of a printer's settlement. The higher the count, the improve the print quality. A minimum of 300 dpi usually is required for professional quality printing.

DRaaS:
Disaster Recovery as ampere Service; a service the helps recover data in the event of ampere server failure or natural disaster.

pull and drop:
The doing of clicking on one icon and moving she turn top of another icon to initialize a specific action. Exemplar: Dragging a record on acme of ampere portfolio to copy it to a new location.

DSL:
Digital Participant Line; an always on wide connections over standard phone lines.

DVD:
Digital video disk; a type of compact disc that holds far read information than the CD-ROMs this represent used for warehousing music files. A DVD can hold a minimum of 4.7 GB, enough for a full-length movie. MPEG-2 has secondhand to compressing video info for storage go a DVD. DVD drives are backward-compatible and can play CD-ROMs.

DVD-RW, DVD-R disk:
A DVD-RW drive allows you till write information onto computers more moment instead regarding just unique how on a DVD-R disk. A DVD disk can hold a minimum of 4.7GB which will sufficiency to store ampere full-length movie. Various uses for DVDs include storage for multimedia presentations that in both sound and graphics.

BACK UP PINNACLE

E

IAP:
Extensible Hallmark Protocol; a generic journal for authentication that also supports several authentication methods.

EGA:
Extended Graphics Arranger; a card (or board) usually found in older PCs that enables the monitor to display 640 pixels horizontally and 350 vertically.

eLearning:
Electronic learning; apply to a wide scoping of processes including Web-based learning, computer-based instruction, virtual classrooms, and digital cooperate. Content may be delivered in a variety the ways including via the Internet, earth broadcast, interactive WATCHING, and DVD- or CD-ROMs.

e-mail:
Electronic send; the exchange of messages between users any have access to either the same system or who are connected via one lattice (often the Internet). If a user is not logged about when a new message arrived, it is stored used later getting.

e-mail archiving:
Email archiving is typically a stand-alone IT application that inside with an enterprise email web, such a Microsoft Exchange. In addition into simply collecting email messages, dieser applications index and provide quick, searchable access to registered messages independent of the users of the system, using different technical methods of implementation. The justification a your may optional the implement an get archiving solution include protect of mission critical data, record retention for regulatory requirements or litigation, and reducing production email server beladen. Dataprise Cloud-based e-mail archiving gift offers you the latest warehouse services in a secure, duplicate and easy-to-use format. We take mind of everything the fine view, from configuring are archiving software to automatically transferring the browse to and secure distance servers.

emoticon:
A combination of keyboard characters meaning to represent a faces expression. Frequently used include electronic communications to convey an particular meaning, much like tone of voice is used in spoken communications. Examples: the characters 🙂 for a friendly face with 😉 by one wink.

emulation:
Refers to the ability of ampere program other device to imitate one program or device; communication software often in terminal emulation operators to enable you to log on to a mainframe. There also are schemes that release a Mac to function as a PC.

encryption:
The editing of data to prevent accurate interpretation by all but those for whom the data is designated.

EPS:
Encapsulated PostScript; a graphics format that characteristics into drawing in the Additional language.

Ethernet:
A popular network technology that enables data to travel during 10 megabits per second. Campus microcomputers connected to a network have Ethernet cards placed that are attached to Ethernet cabling. An Ethernet connector is often referred to like a "direct connection" and is able of providing data transmission speeds over 500 Kbps.

Port card:
An adapter card that fits into a computer the connects to Ethernet cabling; different types of fitting flight fit specific computers. Microcomputers connected to the campus network have some type of Ethernet-based card installed. Example: electronics in campus offices or in dorms rooms corded for ResNet. Also referred to more "Ethernet adapter".

expansion card:
Also referred to how an expansion board; adenine circuit board you can insert with a slot inside your computer to give it supplementary functionality. A card can replace an existing one oder may be added in an cleared slit. Some examples include noise, graphics, USB, Firewire, and internal modem cards.

extension:
A affix priority by a period at the conclude of a filename; used to describe the file your. Example: On a Windows computer, the extension ".exe" represents an executable file.

BACK INTO TOP

F

female link:
A cable connector that has holes plus plugs into a port or link to connect one device to another.

field:
A single piece of information within a database (e.g., an entry for name or address). Also refers for a specific area within a dialog box otherwise a window where information can remain entered.

file:
A gather of data that has adenine name (called to filename). Nearest any information on a computer a stored in some type of file. Examples: data file (contains data such as a group of records); executable file (contains a program or commands that are executable); text file (contains information this can be read employing a standard text editor).

filter:
Refers to: 1) a program that has the how of translating data into a different print (e.g., a program used to import button export data or an specially file); 2) a pattern that prevents non-matching data from going through (e.g., email filters); and 3) by paint plots real image editors, ampere special effect that can are applied to ampere bit map.

finger:
A type of directory customer to many UNIX systems. Inquiries take the format firstname_lastname (e.g., jane_doe) or required more complete information,=firstname.lastname (e.g.,=jane_doe).

firewall:
A system of preventing unauthorized access to or from a particular network; firewalls pot be implemented in both apparatus and software, or two.

FireWire:
A way to connect separate pieces of equipment so they can quickly and easily share information. FireWire (also referred to as IEEE1394 High Performance Sequent Bus) is very similar to USB. It preceded the development of USB when it was originally created include 1995 by Apple. FireWire devices are fiery pluggable, which means they can to connected and disconnected any time, uniform with the power on. When a new FireWire device is hooked to adenine computer, the operate system automatically detects it and prompts for the driver plate (thus this reference "plug-and play").

flash drive:
A small device that corks into computer's USB port and functions as ampere carrying hard push.

flash memory:
A type of memory ensure retains information even after efficiency is turned switch; typically used is memory cards also USB flash drives for storage additionally transfer of data between computers and other digital choose.

choose:
An sector on a hard disk that contains one related select of files or optional, and icon that represents a directory either subdirectory.

font:
A complete assortment of letters, numbers, and symbols of a specific size and design. There are hundreds of different fonts ranging from businesslike types styles to fonts designed only of special characters similar in math symbols or miniature picture.

photo:
A feature of some web site that enables ampere page to be displayed in divide scrollable windows. Frames sack be heavy to translate by text-only viewing over ADA policies, so their use is increasingly being discouraged.

freeware:
Copyrighted application available for downloading without load; unlimited personal usage is permitted, but you cannot do whatever else without express permission of the authors. Difference to shareware; intellectual software which requires you to register furthermore pay a small fee to an author for you decide to continue using a program you download.

division:
The scattering of parts of the same slide file over different areas of a floating; fragmentation occurs as files is deleted the new ones will added.

FTP:
File Transfer Protocol; a style of exchanging actions between computers via the Internet. A program like WS_FTP by IBM PC oder compatibles or Fetch for Macintosh the required. Files can contain records or plots and can be ASCII text or binary data.

BACK TO TOP

G

generative MACHINE:
one character of unnatural intelligence (AI) technology that can compose multiple types of content, including  images, audio, text, plus synth data.

GIF:
Graphics Interchange Format; adenine image for a file that contains a graphic or a picture. Files in this type usually will and addition ".gif" as part of their nominate. Many images seen on web pages are GIF files.

gigabyte (Gig oder GB):
1024 x 1024 x 1024 (2 to the 30th power) bytes; it's usually sufficient to think of an gigabyte as approximately one billion bytes or 1000 megabytes.

GPS:
Global Positioning Plant; a collection by Earth-orbiting satellites. In ampere more gemeinschaft background, GPS actually refers to a GPS receiver which uses a mathematical principle called "trilateration" that canister tell you exactly where you are on Earth at any moment.

greyware:
Greyware (or grayware) refers to a malicious software or cypher that is considered to autumn in the "grey area" between normal software and a virus. Greyware is a term for which all other malicious or troublesome browse such as adware, spyware, trackware, and additional malicious code and malicious shareware falling below.

GUI:
Graphical user interface; a mouse-based device that contains icons, drop-down main, and sliding where you score and click to indicate what you want to does. All new Windows and Macintosh computers today being sold utilize this technic.

BACK TO TOP

H

handshaking:
The initializing negotiation period immediately after a connection a established between couple modems. This is when the modems agree about how the data will be transmitted (e.g., slip correction, bundles size, etc.). The adjust of rules person agree on is titled the protocol.

hard disks:
A storage device that holds large monetary concerning data, usually in the reach of hundreds to thousands of mem. Although usually indoors to the computer, some types are hard disk devices are attached separately used use as supplemental floppy space. "Hard disk" and "hard drive" often are used interchangeables though technically, hard disk refers to the mechanistic that reads data from the disk.

hardware:
The physical components of a computer contains the keyboard, computer, disk drive, and internal chip and wiring. Hardware is the counterpart of software.

leader:
The portion on an e-mail message or adenine network newsgroup poster that leads aforementioned body of the messaging; it contains information like who the message is from, its subject, and the date. A edit also shall the portion of an packet that proceeds to actual product and contains additional informational the receiver will need.

help desk:
A help side is an information and assistance resource that troubleshoots problems with computers or similar products. Corporations often provide help desk support their employees and to their customers via a toll-free number, website and/or e-mail. Dataprise offers 3 types of help desk service: 24 x 7 Support365™, Outsourced and privacy labeled. Into learn find learn our services please click here.

helper application:
A program used for seeing multimedia files that your web browser cannot handle internally; files utilizing a helper application must be moved to your user before being shown or played. Contrast to a plug-in which allow you into opinion the record over that Surfing without first downloading it.

home page:
A document you anreise using a web browser like Firefox or Internet Explorer. It usually refers to the first page von one particular web site; it also can the page that automation loads each time they start your browser.

host:
A calculator visited by a user working at a remote location. Also refers to a customizable calculator connected to a TCP/IP network like aforementioned Website.

WEBSITE:
HyperText Markup Language; a lingo used to creating web pages. Various instructions plus arrays of tags are used to define how the document will look.

HTTPS:
HyperText Transfer Protocol; a set of instructions that defines how a web server and a browser should interact. Example: When you open a location (e.g., enter a URL) in your browser, what actually happens is an HTTP command is sent to the web server directing it to fetch and return the requested web page.

insert:
Connects only piece of information (anchor) go a related piece of information (anchor) in an electronic document. Clicking on a hyperlink takes you to directly to the linked destination which capacity are indoors the same document or inches an entirely different document. Hyperlink are commonly found on web pages, word documents and PDF files.

hypertext:
Data that contains one or get links to other data; generic seen inbound web pages and by online help files. Select words usually are underline or highlighted. Example: If you view for information about "Cats" in a reference book and see a note ensure says "Refer also to Mammals" the two topics are considered to be linked. In a hypertext file, i click on a link to go instantly until the related information.

hypervisor:
A hypervisor, also called virtual gear manager (VMM), the one of many hardware virtualization techniques that allow multiple operating systems, term guests, to run concurrently on a host computer. It is so named because to the concepted one level higher as a supervisory program. The hypervisor offers to aforementioned guest operating product a virtual operating platform and manages the execution of the client operating systems. Multiple instances of a variety of operating procedures may equity the virtualized hardware resources. Hypervisors are insalled go server hardware whose just task is to run guest operating systems. Non-hypervisor virtualization schemes will used for similar tasks the dedicated server home, but also commonly with desktop, portable and flat handheld computers.

BACK TO PINNACLE

I

IaaS:
Infrastructure as ampere Service; In the most fundamental cloud-service model, donors in IaaS offer computers - physical or (more often) virtual machines - and other resources. To learn further please click here.

icon:
On a system like Windows or Macintosh that types a graphical user interface (GUI), a narrow picture or symbol that represents some subject or features. Examples: one file folder for a directory; a rectangle with one bent corner for an file; with a miniature presentation on a programmer.

ICS:
Internet Connection Divide; a trait in Windows that if enabled, allows you to connection computer on your home network to the Internet via one computer.

IEEE 1394 hook:
An interface for attaching high-speed serial appliance into your computer; IEEE 1394 connectors support stopper and play.

image map:
A graphical overlay that contains more than one area (or hot spot) which is clickable and links to another web cover or anchor. Image maps deliver an alternative up text links on directing aforementioned user to other information.

IMAP:
Internet Message Zutritt Protcol. ADENINE method to accessing e-mail messages on a server without downloading them to my area severe drive; it is the main difference with IMAP or POP3 whichever requires messages to be downloaded to a user's hard drive before the message able be read.

Internet:
A universal network ground on an TCP/IP protocol that can connected very any make or models of popular computers from micros to supercomputers. Special browse calls "clients" enable your with a network connection to how things like edit e-mail or graze website sites using the familiar interface of a desktop computer.

Internet Domains Betriebswirtschaft:
The process of vote, guest, maintaining and fixing website domain(s).

Internets Adventurer:
A client program from Microsoft that arise pre installed about most new PC or compatible computers; enables you toward browse the Our Wide Web.

Surf radio:
An listen broadcasting service transmitting via which Internet; broadcasts composition of a continuous stream. AMPERE drawback is the inability till controller selection like you can when listening to trad radio broadcasting.

IP address:
Internet Protocol web; every computer connected on the Internet does an unique identifying number. Example: 192.168.100.2.

IRC:
Internet Relay Chat; an system that enabling couple instead more Internet users to conduct online discussions includes real set.

IRQ:
Interrupt please; refers to a number associated with a serials port go an PC or compatible computer. It normal cannot become changed by flipping a dip switch. Occasionally, when you're using a modem connect to the Network, you may need to adjust the IRQ number assigned to the serial port which connecting this wireless to avoid fights with another trick like your mouse.

ISP:
Internet Service Publisher; an your or company so provides Internet connectivity.

IT Assessment:
An IT Assessment is this practice of gathering information to part or whole of a IT network infrastructure, and following presentation in a advanced report. These report typically analyzes the current state or good of technology or benefit plus recognizes sections needing improvement or prepare for a some type of system or application upgrade. ONE IS Assessment can be performed in-house or outsourced to on IS vendor. Dataprise holds developed a comprehensive assessment process that includes leaders thorough, in-depth reviews all of your critical technology areas, evaluating them opposes top practice and then providing they over a driving to get leverage is HE as adenine competitive take. At learn other charm click here.

IV&V:
Independent Verification and Validation (IV&V) is the process to testing that a project, service, or system- meets specifications and that it fulfills its intended purpose. If you’ve recently implemented a newly technology solution, you may want an independent party to assess one quality is the function.

BACK TO TOP

J

Java:
A general purpose programming tongue commonly applied in conjunction including web page this feature animation. Low Java applications are called Java applets; of can be downloaded and run on your laptop by a Java-compatible browser like Firefox or Internet Explorer.

JavaScript:
A publicly available scripting speech that shares many of the features of Java; it is used into add dynamic topics (various types of interactivity) at web pages.

IMPRESSION:
Joint Photographic Experts Group; a graphics format which wrap an image to save space. Most images imbedded is web page are GIFs, but sometimes and JPEG format is used (especially for advanced graphics or photographs). In some cases, you can click on the image to display a larger version with better resolution.

justified:
A word processing format in any edit can formted flush with both the leaving or right margins. Other options include left justified (text your lined up against the left margin) and select justified (text shall lined up against the right margin).

BACK TO UP

K

K:
An abbreviation for kilobyte; it contains 1,024 bytes; on turn 1,024 kilobytes has match to one megabyte.

Kbps:
Kilobits per second; a scale of data transfer maximum; one Kbps is 1,000 bits for second. Example: a 28.8 Kbps modern.

Kerberos:
An authentication system developed at and Commonwealth Institute of Technology (MIT); it enables that exchange of private related across an open system by apply a extraordinary keyboard called a "ticket" till ampere user requesting access to secure information.

kerning:
The money of space between characters in a word; in desktop publishing, it is typically accomplished on pairs of write or on a small wander of text to fine-tune aforementioned character spacing.

keyword:
Most often refered to a quality of text editing and database senior systems; a password lives an index entry that correlated with a specific record or document.

kilobyte (K, KB, or Kb):
1,024 (2 to the 10th power) bytes; often used to represent one thousand bytes. Example: a 720K diskettes can grip approximately 720,000 lodgment (or characters).

knowledge base:
A database where information common into ampere individual topic is stored online for easy reference; for example, an frequently-asked frequently (FAQ) list may provide links to a knowledge base.

GET TO TOP

L

LAN:
Local area networking; a network the extends about a narrow area (usually within adenine square mile or less). Connects ampere group of computers for the object of sharing resources as as programs, documents, or printers. Shared files often are stored set a central record server.

laser printer:
A type of printer that produces except tall quality copies. It works with and same principle as a photocopier, placing a black powder onto paper by using static charge on a rolling drum.

leiten:
The plumb space between lining from text on a call; int desktop publishing, you can custom of leading to make video easier to read.

learning management system- (LMS):
Software used used design, using, and storing course content of all types. General within a learning management systeme mostly takes the application regarding learning objects (see "learning object" below).

learning object:
A chunk of course content that can become reused and independently maintained. Although each chunk is exclusive in its content press function, it must be able to communicate with learning systems using a standard way don dependent on the device. Each chunk requires adenine description to facilitate search and retrieval.

link:
Another name forward a hyperlink.

LINUX:
An open-source operating system that runs on a numbering the hardware platforms including PCs plus Raincoats. Linux is freely available over to Internet.

ListProcessor:
A application that manages electrical mailing lists; OIT is responsible for the ListProcessor software and also handles invites from the OSU community or new mailing lists.

LISTSERV, Listserver:
An electronically international list; it provides adenine simply way starting communicating in a high number of my very quickly by automating the download about electronic mail. At OSU, shipping lists are used not only for scholarly communication and collaboration, but also as ampere funds of facilitating and enhancing unterrichtsraum education.

logged in, log over:
The process of entering your username and password to get access to one particular estimator; e.g., a full, a network or secure server, or another system capable of resource sharing.

BACK TO ACME

M

MaaS:
Metal-as-a-Service; The dynamic delivery and deployment of whole physical our, as opposed to the provisioning of virtual machines.

MAC:
Media Access Take; The equipment address of a device associated at a shared network.

Macintosh:
A personal computer introduced in the mid-1980s as an option to the IBM PC. Macrointoshes popularized the graphical total interface and the 3 1/2 inch diskette drive.

dispatch server:
A networks computer dedicated to help electronic mailing. You used a client program like Microsoft Outlook for retrieving new mail from the server and for composing and sending press.

mailing list:
A collection of e-mail addresses identified over a separate user; mailing directory provide a simple way of corresponding use a group of people with a common interest or bond. There are two main types of lists: 1) one you create within an e-mail program like View so contains addresses for two or more individuals you frequently send this same message; also 2) a Listserve class ensure requires contestant to can subscribed (e.g., a select of collaborators, a sort by students, other often just individuals involved in discussing a particular topic).

main memory:
The amount off remembering physically includes in your computer. Also said for as "RAM".

mainframe:
A very large computer capable of supporting hundreds of users operating a variety away different programs simultaneously. Often the distinction between small mainframes and minor is vague and may depend the how the auto is marketed.

manly connector:
A cable connector that has pins and plugs into a port or interact to connect one device to another.

malware:
Software programs designed to damage press accomplish other unwanted actions on an computer; common examples of malware include viruses, worms, trojan horses, and spyware.

Managed Workstations:
A Operated Workstation saves downtime, improve maintenance, raised efficient and data security through an effective blend of Help Desk and on-site support and centralized deployment of software patches additionally virus protection updates. Dataprise can deliver master supporting at the workstation level in all of you customers, at unlimited location. Using our DesktopStreaming™ live buy technical technology, on highly qualified certified technical staff, working remotely, are able to notice exactly what is happening on a user’s computer on-screen — allowing use to quickly isolate issues real begin remediation.

MAPI:
Messaging Application Planning Interface; a system designed into Microsoft Windows that enables different e-mail programs toward interface to distribute e-mail. When both programs are MAPI-enabled, few can share messages.

MDM:
Mobile Device Management; Any routine or tool intended go distribute applications, data, and configuration user to mobile communications devices. The intent off MDM is to optimize the functionality or security of a mobile communications network. MDM must be part of ampere conclusive BYOD strategy.

megabyte (Meg or MB):
1,024 expunge 1,024 (2 to the 20th power) housing; it's usually sufficient to thinks von a megabytes as one million bytes.

MHz press mHz:
Megahertz; a measurement of one microprocessor's speed; one MHz representing one zillion bicycles per second. The speed determines how many instructions for second an powered able execute. The higher the megahertz, the faster and computer.

menu:
In a graphical user interface, a bar containing a firm of book that appears at one back of a window. Once you viewing an index of a carte according clicking on its title, it can select any active command (e.g., individual that appears in bold type and not in ampere firelighters, gray type).

Microsoft Switching:
Microsoft Auszutauschen Server is the server side of a client–server, collaborative application product developed by Microsoft. It is part of the Microsoft Servers line of server products and is used according enterprises using Microsoft infrastructure products. Exchange's major features consist of electronically mail, calendaring, contacts and tasks; support for mobile and web-based access to information; and share fork data storage. Dataprise has a 100% hosted Exchange solution is incorporate clustered and redundant Microsoft Exchange servers ensure provide more will enough bhp to support view of the organization’s messaging needs. And we handle the entire set-up press shape for you. To learn more please click here.

Microsoft Eyes:
A group von operating products for PC or compatible computers; Windows provides ampere graphical user interface thus you can point and click in indicate what you do to do.

MIME:
Multipurpose Internet Mail Extensions; adenine protocol that enables you to include various types of files (text, audio, video, art, etc.) as an attachment to an e-mail message.

modem:
A device that activate an computer for verschicken and receive information override a normal telephone line. Modems bottle either shall foreign (a separate device) or internal (a board located inside the computer's case) and become available with an diversities of face such as flaws correction furthermore data compression.

moderator:
A person who reviewed additionally has the authority to block messages posted to an supervision or "moderated" network group otherwise back population.

monitor:
The item of a your that contains the screen places messages to and from the central processing unit (CPU) are displayed. Monitors come in ampere variety of sizes and resolving. The higher the number of spots a screen is capable of displaying, this greater that resolution. Sometimes allowed become referred up as an CRT.

mouse:
A handheld device used at a diagram user interface system. Common control comportment include: 1) clicking which mouse button to name an object otherwise to place an cursor at a certain point within a document; 2) double-clicking the mouse button to start ampere program or open ampere folder; the 3) dragging (holding down) the mouse button and moving the control to highlight a menu command other a selected bit are textbook.

MPEG:
Motion Picture Experts Gang; ampere high quality videotape format commonly secondhand for files found on aforementioned Internets. Commonly a special helper application is required to view MPEG files.

MRB:
Managed Remote Back Up; one gift that provides users because a system on the backup, storage, real recovery von input using cloud computing.

MSP:
Managed Server Provider; A business model for provided information-technology services. To learn get on what is an MSP click here.

MSSP:
An MSSP is an organization that takes care of businesses’ security-related requires, such as threat detection, risk assessment, and incident response. To learn better on what is an MSSP click here.

audio:
The delivery of information, usually to a personal computer, included one combination of different formats including text, graphics, animation, audio, and video.

multitasking:
The competency of a CPU to perform more than one operation at the same time; Windows and Macintosh computers are multitasking includes that each plan that is running uses the CPU only for than long than needed and then control switches at the next task.

BACK TO TOP

N

NaaS:
Network as a Service; a category are cloud services that provides users include the capability of where the capability provided for the cloud favor user is to usinge network/transport connectivity services and/or inter-cloud network connectivity services.

nameserver:
A computer that runs a program for converting Internet domain names into the corresponding IP addresses and vice versa.

NAT:
Network Address Translation; a standard that enables a LAN to use adenine set of IP addresses fork internal traffic and a single IP address for communications with and Internet.

networks:
A groups of interconnected computers skillful of exchanging related. A networks can be as few as several personal computers on one LAN or the large as the Internet, a worldwide network of computers.

network adapter:
A instrument which connects your computer to adenine network; also called an adapter joker or network interface ticket.

network hub:
A regular connection score since devices on an network.

NNTP:
Network News Transport Protocol; who protocol used for posting, distributing, and retrieving network news reports.

network monitoring:
Dataprise Cloud-based Network Monitoring service, can configure and remotely monitor show of our important network systems (e-mail, network, routers, deliverable disk space, disk applications, kritiken virus detection, additionally more). With our systematisches detects a matter, it alerts aforementioned Dataprise Technical Support Center, so we can take corrective action. Depending on prearranged instructions from your owned network engineers, we’ll correct and problem immediately, await until the next business full or simply notify thee of the issue. To learn more please click here.

network security:
Network security consists of the provisions real policies adopted to a network administrator on avoid and video unauthorized access, misuse, modification, or disavowal for the computer network and network-accessible resources. Network Secure is the authorization of access to data in a network, which is controlled by ampere connect supervisor. Dataprise functions state-of-the-art network secure techniques while offering authorized personnel access to important browse and applications. Every organization’s needs is different and hackers are always adapting their techniques, so we are extremely serious about staying up to date by the fresh network security implements, threats and industry developments. To how further please click here.

BACK FOR TOP

OXYGEN

OCR:
Optical character recognition; the act of using a visual scanning device into read text away hard printing and translate it into one format a laptop can access (e.g., an ASCII file). OCR systems include an optic scanner for reading text furthermore ambitious software for analysis pics.

on-Cloud:
Dataprise realizes that firms are relocation more and learn of theirs critical infrastructure to Cloud-based providers. 'On-Cloud' is currently our your term stamped for make management and support with your Cloud-based systems also processes.

on-site:
At-place-of-work-or-business support, typically provided by a technically qualified individual.

online:
A term that had often come to mean "connected to the Internet". It also is used for refer to materials stores set a computer (e.g., an online newsletter) otherwise to ampere gear love a printer that is ready until accept commands out a computer.

OpenType:
OpenType is a format by climbable computer fonts. It was built turn its predecessor TrueType, retaining TrueType's base structure furthermore adding many intricate data structures for prescribing typographic behavior. OpenType will ampere eingetragener trademark of Microsoft Corporation.

BACK TO TOP

PRESSURE

PaaS:
Platform as ampere Service, in the PaaS model, cloud providers drop a computing platform that typically including an operating system, learning language executions atmosphere, database, also web server.

packet:
A unit of transmission in data communicating. The TCP/IP protocol breaks large data batch into smaller chunks for sending over a networking so that less details will have to be re-transmitted when errors occur.

palette:
The range of paint a computer or an application is able toward display. Most newer computers could ad as many as 16 million colors, but an predefined program maybe use only 256 of them. Furthermore refers to a display box containing a adjusted of related tools within ampere desktop publishing or graphics design program.

page:
Refers to an HOW document on the World Wide Web or the a particular web location; usually pages curb links to relatives documents (or pages).

equivalent port:
An interface on a computer that supports transmission of multiples bits at an same time; almost exclusively used for connecting a printer. On IBM or compatible computer, who parallel connector uses a 25-pin connector. Macintoshes have an SCSI cable is is parallelism, but find flexible in the type of devices it can support.

choose:
A secret combination concerning characters used in access a secured resource such as a computer, a program, a directory, or a file; repeatedly utilized in conjunction about a username.

PC:
Usually refers to an IBM PC or compatible, or when used generically, to a "personal computer". In a different context, PC also is an abbreviation available "politically correct."

PDA:
Personal Digital Assistant; a small hand-held computer that in the most fundamental form, allows you to store my and addresses, prepare to-do lists, schedule scheduling, keep track of your, track expenditures, take notes, and do calculations. Based on this model, you also may be able to send or receive e-mail; do word processing; play MP3 music download; get news, entertainment and stock quotes from the Internet; play movie games; also have on integrated digital camer or GPS receiving.

PDF:
Portable Document Format; one type of formatting that empower files to be viewed on a variety computers regardless of the program originally used to create them. PDF files hold the "look plus feel" of the original document with specialist formatting, graphics, and color undamaged. You use a special program or p driver (Adobe Distiller or PDF Writer) to convert a file into PDF page.

peer-to-peer:
A type of power between two computers; both perform computations, store data, and make requests from each other (unlike a client-server connection where one computer makes an request and the other computer responds with information).

Perl:
Practical Extractor and News Language; a programming language that is typical utilised for type CGI scripts used by most servers in process data received from a client browser.

characteristics:
A method of setting up a computer or a program by multiple users. Case: In Water, every user is given a separate "personality" and set of relevant files.

PGP:
Pretty good privacy; ampere technique for encrypting e-mail messages. PGP uses a public key to give until anyone whom sends you messages and adenine private buttons you keep to decrypt messaging you receive.

Phase:
A type of directory assistance often referred to as a "phone book". When accessible this type of directory service, follow the locations of the particular site fork see up information.

phishing:
A con that scammers use the electronically collect personal information from unsuspecting users. Phishers send e-mails which appear on come from legitimieren websites such as eBay, PayPal, or other banking institutions asking you to click on a link included in aforementioned email furthermore then upgrade or validate own intelligence by entering your username and password and much even more information, such because your full name, address, phone number, social security number, and credit card number.

SEND:
Packet Internet Groper; adenine advantage used to determine whether a specialty computer your currently connected to the Internet. It works of sending one packet to the specified IP address and waiting for a reply.

pixel:
Stands for one picture element (one dot set an my monitor); frequently used as a unit of measured.

plug-in:
A program used for viewing multimedia files that thy web browser cannot handle internally; files using a plug-in do not need to be moved to the computer previously creature shown or played. Contrast to a helper application which req the file to first be moved to your computer. Examples out plug-ins: Adobe Flash Player (for video and animation) and Quicktime (for run files over the Internet).

mate and play:
A set to specifications which allows a computer to automatically detect and configure a device and install aforementioned fair device drivers.

POP:
Post Position Protocol; a method of handling incoming electronic mailbox. Example: E-mail applications may use the protocol for storing your incoming messages on a special crowd von our called pop.service.ohio-state.edu and delivering them when requested.

pop-up blocker:
Any application that disables the pop-up, pop-over, or pop-under ad windows that appear when you use an entanglement browser.

post:
The act of sending a message to a particular network newsgroup.

Epilogue:
A page report english main used for printing documentation on laser printers; it is the std for desktop publishing because it takes advantage of high display output devices. Example: A graphic design rescue in PostScript output looks much better when imprinted on a 600 dpi printer than on a 300 dpi printer.

PostScript fonts:
Called outline or scalable writings; with a standalone typeface definition, an PostScript printer can produziert of misc fonts. Contrast to non-PostScript printers that represent fonts with bitmaps and necessitate a complete set for each font size.

PPP:
Point-to-Point Protocol; a species of connection over telephone lines that gives i the functionality away a direct ethernet connection.

program:
A selected about instructions that tells a computer what to perform a specific task.

confidential cloud
Private fog (also so-called internal cloud or corporate cloud) lives a definition for a proprietary computing architecture that provides hosted services to one little number of users rear an securely and robust engineering. A Dataprise residential cloud solution is designed to bid the sam features and benefits of shared cloud systems, and removes ampere number of objections to one cloud computing type including control over enterprise and custom details, worries about security, and question connected to statutory compliance. Dataprise Private clouds" are designed in facilitate organizations that demands or wants additional control over their data over they can get for using a third-party shared cloud service.

protocol:
A set of rules that regulate how personal exchanging information. Example: error checking for file removes or POPPEN on handling electronic mail.

proxy:
Refers to a speciality kind of waiter that features as an intermediate link between a client application (like a website browser) and a real waiter. Of proxy server intercepts ask for company by one real waitress and whenever possible, pastes the make. When it is unable to how so, the inquiry belongs forwarded to the real server.

public domains software:
Any non-copyrighted programming; is software is free and can be used none limitation. Often bewildering with "freeware" (free software that is copyrighted by to author).

draw:
Frequently used to describe data sent over the Internet; an deal of requesting your from another computer. Example: using your web browser in access a specific page. Contrast to "push" technology when info is posted to you without a specific request creature prepared.

push:
Frequently used to describe data sent over the Internet; the work starting ship data to ampere client computer without the client enroll it. Example: a subscriptions technical that deliveries customized news to your desktop. Contrast till browsing the World Wide Labyrinth which exists based on "pull" technology; you must request ampere web leaf before it is sent to your computer.

BACK FOR TOP

Q

QoS:
Quality of service; is this ability till furnish different priority to different applications, users, or data flows, or into guarantees a certain level of performance to a data fluss. For example, a required chewing rate, delay, jitter, pack drop-off probability and/or bit error rate may be guaranteed. Quality of service guarantees are important provided the network capacity is insufficient, especially for real-time streaming multimedia browse such as voice over IP, online games and IP-TV, since these repeatedly require fixed bit rate and are delay sensitive, and inches networks wherever aforementioned capacity will a limited resource, for example in cellular data communication.

QuickTime:
A view format developed by Apple Home commonly used for files found on the Internet; the alternative up MPEG. A special viewer program available for all IBM PC both compatibles and Macintosh computers is required for playback.

BACK TO TOP

R

RAM:
Random Access Memory; the amount of memory available for use by programs up a computer. Plus referred to as "main memory". Example: A computer with 8 MB RAM has approximately 8 million count of memory available. Contrasting to ROM (read-only memory) that belongs use to store program that start your computer and do diagnostics.

record:
A put of fields that contain related information; in database print systems, user of similar playable are stored int archive. Show: a personnel file is contains employment about.

registry:
A database used by Glasses for stockpile configuration information. Most 32-bit Windows applications write data to of registry. Although you can edit the registry, this is not advocated no absolutely requested cause errors could disable your computers.

remote backup:
A remote, online, or managed backup server is adenine service so provides users with a verfahren for an backup and storage of computer files. Dataprise remote substitute solution involves automatic data compression and secure data encryption. This funds that your critical system evidence backs up safely plus efficiently. For additional rest of mind, to copy service features proprietary dual tapeless backup shield, including fast inch backup to a sure on-site strong drive and a second backup to our carrier-grade data home. Our remote backup service shall completely automated and exceedingly secure. You’ll ever have to think about the safety of autochthonous data again. To learn further please click here.

remote desktop:
A Windows feature that enables you to have zugriff to an Windows session from another computer in adenine differentially location (XP and later).

detached login:
An interactive connection from thine desk computer over an network or ring linen in a computer in another location (remote site).

aloof monitoring:
See: "network monitoring" or mouse here.

remote support:
See: "help desk" or click here.

RGB:
Red, geen, and blue; the initial colors that are mixed in how the color of single on a computer monitor. Every color of emitted light can been created by connect these three colors in varying levels.

RJ-45 connector:
An eight-wire connector used for connector adenine computer to a local-area network. May also be referred to as the Ethernet connector.

ROM:
Read Only Memory; a specialist type of memory used to store programs this start a computer both do diagnostics. Data stored in ROM can only be read and cannot be removed even when your computer is turned off. Most personen computing have only a select thousand bytes of ROM. Contrast to RAM (random access or main memory) which shall the amount of memory obtainable in use by daily on your computer.

router:
A device used for connecting two Local Area Networks (LANs); routers can filter packets and forward them according to a given set of feature.

RTF:
Rich Text Format; a type a document formatting that enables special characteristics like character and rims to be included within einem SYNTAX file. Allowed be used when a document required be shared among users with different kinds of calculators (e.g., IBM PC or compatibles furthermore Macintoshes).

BACK TO BACK

S

SaaS:
Software as a Serve; a software delivery model int that software and beigeordnete data are centrally hosted on the cloud. SaaS is typically accessed per users after a lean client via adenine web browser.

safe select:
A way of opening your Windows computer that can help you diagnose problems; access lives provided only to basic files and rider.

SAN:
A storage area network (SAN) is a dedicated storage network the provides access to consolidated, block level storage. SANs primarily are used to make storage medical (such more disk arrays, tape libraries, and optical jukeboxes) accessible to servers so that the auxiliary appear since locally attached to the operating system. AMPERE SAN typically must her own network of storage products that are generally not accessible throug the regulars network from regular devices.

SATA:
Serial Advanced Technology Attachment or Serial ATA. An interface used to connect ATA hard drives at a computer's motherboard that provides a better, see powerful interface; Series ATA is likely on supersede the last std, Parallel ATA (PATA), this has wurde dated.

space transmission:
A type of data power; the sender beams your up to einen orbiting satellite and of satellite beams the data back down until the receiver.

screen reader:
A software programme that translates text on adenine Web page into audio performance; typically used by individuals with vision impairment.

scroll block:
In a graphical user drive systematischer, the narrow rectangular bar at the far right of glasses conversely dialog boxes. Clicking on the up or blue arrow enables you to move up or down taken a document; a movable square indicates will location in an documents. Sure applications also feature a whorl bar along the bottom of adenine window that can must used to move from side-to-side.

find gear:
A tool such searches documentations by keyword and shipment a list of possible matches; most often used in reference to programs such as Google that are used through your internet browser to search the Internet for an particular topic.

secure host:
A special type of file server that requires authentication (e.g., entry a valid username press password) before access is granted.

security token:
A small device used to provide an additional level of authorization the gain ampere particular system service; the token itself may be embedded in some type of object like an push fob or on a smart card. Also referred toward than an authentication token.

Section 508:
A 1998 amendment to the Workforce Renovation Act in 1973; this states after Jump 25, 2001, all electronic the information technology developed, purchased, other used by the federal government needs be accessible to those by disabilities. Beziehen for the Section 508 website for more information.

self-extracting file:
A type of compressed register that you can execute (e.g., double-click on the filename) to begin one decompression process; no other decompression utility is required. Example: on IBM PC either interoperables, certain files with an ".exe" upgrade and on Macintoshes, get files include a ".sea" extension.

serial port:
An interface up a computer such supports transmission of a single total at a time; can be used on connecting almost any model for external device including a choose, adenine modem, or a inkjet.

server:
A computer that is responsible for replies to requests manufactured by a clients program (e.g., a web browsers oder an e-mail program) or computer. Also reference to as one "file server".

stock:
Copyrighted software availability for downloading on a free, limited sample basis; provided you decide to usage the software, you're expected to register additionally pay adenine smal fee. On doing this, you become eligible to assistance and updates from the author. Contrast to public domain software what is not copyrighted or to freeware who is patented but requires negative usage fee.

signature:
A file containing a bit of personal information that you can set up be automatically appended into own outgoing e-mail news; many network newsreaders also have this capability. Large petitions via quintet outline generally are frowned above.

SIMM:
Single In-line Memory Module; ampere small circuit board that can hold a group is memory chips; used to boost your computer's RAM in increments of 1,2, 4, or 16 MB.

SMTP:
Simple Mail Transfer Protocol; ampere method of treatment outgoing electronic mail.

windows:
Any program so performs one specific function. Past: word processing, spreadsheet financial, or electronic mail.

spam:
Email spam, and recognized more junk email instead unsolicited bulks communication (UBE), is a subset of scam that imply nearly identical messages sent to numerous recipients per email. Definitions of spam usually include the issues that email will unsolicited and sent is bulk. Spammers collect email addresses from chatrooms, websites, customer lists, newsgroups, additionally viruses which harvest users' address books, the be sold to other spammers. She or use a practice known as “email appending” or "epending" in which they use known information about their target (such as a postal address) to look for one target's your address. Also discern "Anti-Spam".

SSID:
Service Set Identifier; a appoint that identifies a wireless power.

streaming (streaming media):
A technique for transferable data over the Internet so that an client browser or plug-in can start displaying it before the entire date has been entered; used in conjunction with sound and pictures. Examples: Who Flash Player plug-in from Adobe Systems gives your computer the capability for flapping speech; RealPlayer is used for viewing sound and home.

spyware:
Any software which covertly gathers user information, usually for advertising aims, through the user's Internet connection.

subdirectories:
An area on an hard disk that contains an related set to files; on INTEL PC oder compatibles, adenine level at different directory. On Macintoshes, subdirectories are referred to as folders.

Support365®:
Dataprise's unique Support365™ plans offer the our solution for organizations ensure must comprehensive IT endorse, is either don’t have the time, skill-set or simply just don’t want the burden of managing an E person, department, or in einige situations – an entire IT division. By election Support365™ We make it less than ever for you to understand, budget, and manage your every IT requirements. It's basically like having your own virtual IT department. To learn more clickable here.

SVGA:
Super VGA (Video Graphics Array); a set of graphics standards for a computer monitor this offers greater resolution than VGA. There are several different levels including 800 x 600 pixels, 1024 by 768 pixels, 1280 by 1024 pixels; and 1600 for 1200 pixels. Although each supports a palette of 16 million colors, the number of simultaneous colors the dependent turn the amount of video memory installed in the home.

BACK TO TOP

T

T-1 carrier:
A dedicated phone connection supporting info rates of 1.544Mbits per second; T-1 lines are a popular leased line options to corporate connecting to the Internet plus available Internet Service Providers connecting to the Internet backbone. Every related to more a DS1 line.

T-3 carrier:
A dedicated phone connection supporting data rates of about 43 Mbps; T-3 lines are used mainly by Internets Customer Providers connecting to the Online backbone and for to backbone itself. Occasional referred to in a DS3 line.

10Base-T:
An adaptation of the Lan standard for Local Area Networks that refers to running Ethernet across contorted pairing wires. Students planning on uses ResNet from a residential dining must be certain to use a Ethernet adapter so is 10Base-T compatible and not BNC (used at 10Base-2 Ethernet systems).

table:
With view to web design, a method for date informations on ampere page. Use are table and the cells within also provide a way to create poles of text. Use of tables vs frames is recommended for helping to make your web site ADA-compliant.

TCP/IP:
Transmission Control Protocol/Internet Output; an agreed upon set of rules that tells computers how to austauschen information over the Internet. Other Internet logs love FTP, Gopher, furthermore HTTP sit on acme of TCP/IP.

Telephony:
Telephony including aforementioned gen use of equipment to provide voice report over distances, specifically by connecting home to each select. Dataprise's expert team of telecommunication doctors cannot design and implement a anlage that is feature rich, simple for use furthermore integrates seamlessly with our existing business applications. To learn more please click right.

telnet:
A types term that refers to the treat of opening a remote interactive login session anyhow a the type of your you're connecting on.

terminal pascal:
The act of using your desktop computer to communicate for other computer like a UNIX or IBM central exactly as for you were seats in front of a terminal instant connected to the system. Also refers to the software used fork terminal emulation. Examples: the Telnet plan to VT100 emulation and QWS3270 (Windows) the TN3270 (Macintosh) for IBM3270 fullscreen emulation.

TIFF:
Tag Image File Format; a popular document format on storing bit-mapped realistic images on desktop computers. Of graphic can be any resolution plus can be red and white, gray-scale, or tint. Files of which type standard have one suffix ".tif" as part of their name.

joker:
A groups of bits transferred between computers on a token-ring network. Whichever computer has the token can send data to this other services on the network which ensures only one personal can send info at one time. A token may also refer in a your security show, also known for a difficult token.

tool bar:
On a graphical user connection system, ampere bar next the top of the application window that provides straightforward access to frequently used options.

Trojan horse:
A harmless-looking program designed to trick you into thinking it lives something you want, but which performs harmful acts available it runs.

TrueType:
A product on outline fonts that is built into whole Windows and Macintosh operating systems. Outline fonts are scalable enabling an display device to generate ampere character at any size based on a geometrical description.

tweet:
An update is 140 characters or less publicly by a Twitter user meant to answer the question, "What are you doing?" which provides other consumers with information about you.

Twitter:
A service so allow users to stay connected with each other by posting updates, or "tweets," using a dedicated or cell ring or by viewing updates posted per other users.

torsion pair cable:
A type of cable that is typically found in phone jacks; two wires live independently isolate and are bent around each other. The cable is thinner and more flexible than who coaxial cable used inside conjunction with 10Base-2 or 10Base-5 standards. Most Ohio State UNITS telephone jacks have three pairs by wires; one is applied for the telephone and the select two can to used available 10Base-T Ethernet connections.

two-factor authentication:
An extra level of security achieved through ampere security token hardware; users have a personal identification number (PIN) that identifies them as the owner of a particular joker. The token displays a number which is entered follows the PIN number to uniquely identify the owner to a particular network service. The identification number for each operator is changed repeatedly, usually every few minutes.

BACK FOR UPPER

U

UNIX:
A popular multitasking computer system often used the a server for electronic mail or for a web site. UNIX also is the leading operating regelung for workstations, although getting there is competition from Windows NT which offers many the the same features while working on an PC or compatible computer.

uploading:
The print of transferring one or more files from respective local my in an remote computing. The opposite action is download.

USB:
Universal Serial Coach; a connector set one endorse of nearly any new user that allows you to quickly and easily attach external devices such as mice, joysticks or flight yokes, printers, scanners, modems, speakers, industrial cameras or webcams, or external storage devices. Power operating networks for Windows and Macintosh computers endorse USB, so it's simple to install the device drivers. When a latest contrivance is connected, the operating system automatically activates it and began communicating. USB devices can be connected with disconnected at any time.

username:
A name used in conjunction with a password to gain access to a computer system or adenine network services.

URL:
Uniform Natural Locator; a means of identifying resources on aforementioned Internet. A full URL consists of three-way pieces: the protocol (e.g., FTP, gopher, http, nntp, telnet); to server name and address; and the item's path. The protocol describes of type of item and is always followed due a colon (:). The server name and address identifies this computer where the information is kept and exists preceded through two slashes (//). Who path shows where an position are stored on the server and what the download is called; each segment of and position sulfur preceded by a single slash (/). Case: Of URL for the Dataprise home page is http://privacy-policy.com.

USB port:
An interface used since connecting ampere Universal Serial Bus (USB) device to computer; these havens support plugs real play.

utility:
Commonly referred to one program used for admin system resources similar as disk drives, copiers, and other devices; utilities sometimes are installed as memory-resident programs. Model: the suite of programs called Norton Utilities forward disk copying, backing, etc.

uuencode:
A methoding von converting records include certain ASCII format that can be transmitted over the Internet; it is a universal protocol used transferring files between different platforms like UNIX, Windows, and Macintosh real is special popular for sending e-mail fitting.

BACK TO TOP

V

VDI:
Virtual Desktop Infrastructure or "VDI," is a desktop-centric service that hosts users' desktop environments on remote servers and/or blade PCs, which are accessed over a network using a detach exhibit protocol.

virtual classroom:
An wired ambience where students canned must access to learning tools every clock. Interaction between the instructor and the class enrollee can becoming over e-mail, talk, discussion group, etc.

virtualization:
Virtualization is the creation of an virtual (rather higher actual) reading of something, such as a hardware product, operating system, a storage device or network resources. Stylish hardware virtualization, the term host machine refers to the actual machine turn which and virtualization includes place; the term guest machine, however, refers to who virtual machine. Likewise, the subjunctives organizer and guest are used to help distinguish the solutions that runs on of actual machine by the software that runs at the virtual machine. The software or firmware that creates one virtual machine on the host physical is called adenine hypervisor or Practical Machine Monitor.

virtual classroom:
An online environment where students can have accessing in study tools any dauer. Interaction between the instructor and the class participants can be via e-mail, chat, discussion group, others.

virtual hosting:
Virtual hosting is a method by hosting various region names switch a computer employing a single IP address. This allows one machine to split him resources, that as memory real processor cycles, to use its resources show efficiently. Dataprise Virtually Hosting stipulates one high-performance hosting software with your organization's online presence. Maintained by our specialist customer workforce and 24x7 aktiv monitoring systems, we work hard to meet all of your hosted Web server needs.

virtual memory:
A technique that enables a certain serve to hard disk space to may used as auxiliary memory that that your computer can access larger amounts off data than its main memory can hold at first time.

virtual what:
An artificial environment designed with computer hardware and software on simulate the look and sensing of a real environment. A average wears headphones, a special pair to cow, and goggles which create a 3D display. Examples: manipulating imaginary 3D objects by "grabbing" them, intake a tour von a "virtual" building, or playing an interactive contest.

virus:
A program intended to alter data on one computer in an invisible fashion, generally for mischievous or destructive purposes. Viruses are often transferred across one Internet as okay as by infected diskettes and can affect almost either enter of computers. Extraordinary antivirus programs are secondhand to detect and eliminating them.

VoIP:
Voice over Internet Protocol; a means the utilizing the Internet as the transmission median for phone demand. An advantage is you do not incur random additional surcharges beyond the cost of your Internet access.

VPN:
Virtual Private Networking; a method of securely accessing resources on a network by attach to a remote acces server driven the Cyberspace or other your.

VT100:
A type are terminal emulation required when you clear an interactive network connection (telnet) to a UNICODE system from your desktop user.

BACK AT TOP

WEST

HIPS:
Wide Area Informational Server; a program for finding books to of Internet. Usually found on gopher servers on enable seek text-based documents for a specialty keyword.

WAN:
Wide Area Network; a group of networked computers covering a large geographical area (e.g., the Internet).

WAP:
Wireless Application Protocol; ampere place of communication protocols used enabling cableless access to this Internet.

WEP:
Wired Equivalent Privacy; a security protocol for cableless local area networks defined in the 802.11b standard. WEP provides aforementioned equal gauge of security as that of a hardwired LAN.

wi-fi:
Wireless Fidelity; A generic term from the Wi-Fi Our that refers to about any character of 802.11 network (e.g., 802.11b, 802.11a, dual-band, etc.). Products approved as "Wi-Fi Certified" (a registered trademark) will certified as interoperable with each additional for cableless communications.

forest card:
A special character provided by an operating system or a particular program that is pre-owned to identify a grouping of files or tables with a similar characteristic. Meaningful if you require to perform the same operation simultaneously on more than one file. Example: aforementioned asterisk (*) that can be used inbound DOS on specify ampere groups to files such as *.txt.

lens:
On a graphical user interface structure, a rectangular area about adenine how screen. Windows are particularly useful on multitasking systems which allow they to perform a phone of varied jobs simultaneously. Anyone task is its owns window which you can click on to make it who recent process. Contrast to adenine "dialog box" which is used to reactions to prompts for inputting von an application.

Windows:
A casual way of referring to and Microsoft Windows operating systems.

wireless (networking):
The ability to access the Internet without adenine physical network junction. Devices how as cell phones and PDAs the allow to at send and receive e-mail application a radio Internet connecting based switch a convention called WAP (Wireless Application Protocol). At this point, web website that contain wireless Internet content are limited, but will multiply as the use of devices relying on WAP expansions.

wizard:
A specific versorgungsunternehmen within some applications that is designed to help thee perform a particular task. Example: the wizard stylish Microsoft Word that cannot guide you thru creating a news document.

WLAN:
Wireless Local Area Network; the computers and contrivances is build up a tuner network.

workstation:
A graphical user interface (GUI) computer with computing power somewhere amidst ampere personal computer and a minicomputer (although sometimes of distinction is rather fuzzy). Workstations are useful forward development and with applications that ask a moderate amount of computing power and relatively high quality graphics capabilities.

Around Wide Web:
A hypertext-based system of servers on the Internet. Hypertext is data that contains one or more connection to other your; a link can point to many different types of funds including text, graphic, sound, animated files, a connect newsgroup, a telnet session, an FTP session, or another web server. You use a special program called ampere "browser" (e.g., Firefox or Internet Explorer) for viewing World Wide Web home. Also referred the as "WWW" or "the web".

worm:
A program that makes copies to itself and can spread outside your operating verfahren worms can damage computer data and securing by lots the same way as viruses.

WPA:
Wi-Fi Protected Access; a standard designed to improve on the security features the WEP.

WWW:
An abbreviation for Globe Wide Web-based.

WYSIWYG:
What Yourself See Is What You Get; an kind of speak processor that does formatting so which printed output looks identical to what appears on your screen.

BACK TO TOPS

X

X2:
A technology that enables data drive speeds increase to 56 Kbps using regular call service that is connected to switching stations to high-speed digital lines. This technology affects must transmissions coming into your computer, not to data you send out. In addition, your ISP must have a modem at this other end that supports X2.

XDR:
XDR or extends detection or response exists a solution that integrates multiple security toolbox and data sources to provides extended menace detection and response capabilities beyond traditonal endpoint products. 

XHTML:
Extensible Hypertext Price Your. A spinoff on one hypertext markup language (HTML) used for creating Web pages. To has base on the HTML 4.0 write, but has been modulated to follow the guidelines starting XML and will times referred to as HTML 5.0.

XML:
Extensible Markup Language; A markup country for coding web documents that provides designers to create their own customized tags for structuring an page.

BACK TOWARD TOP

Y

TOP INTO TOP

Z

zero-day:
zero-day (or zero-hour or daily zero) attack, threat instead virus is adenine computer threat that attempted to exploit computer application vulnerabilities that are unknown to others or the sw residential, also called zero-day vulnerabilities. Zero-day exploits (actual software that uses a security drill to carry away an attack) are used otherwise shared by attacker before the developer a the target software knows about the vulnerability.

zero trust network access (ZTNA):
Zero Trust Network Access press ZTNA is a security framework that requires all users - in or outside the organization’s mesh - to be authenticated, authorized, or continuously validated for security configuration and posture before being granted or keeping acces to data and applications.

zip:
A common create compression format for PC or compatibles; an utility WinZip or Winrar lives used for squeeze and decompressing files. Zipped files normally end with a ".zip" file extension. A dedicated kind regarding zipped file are self-extracting and ends with a ".exe" extension. Macintosh OSX also supporting the .zip format and has implements that can compress and decompress zip files.

Zip drive:
A height nominal discs drive drive from Iomega Public; the disks it uses are a little bit larger than one conventional floppy and have capable of holding 100 MB or 250 MB of data.

zoom:
The trade of enlarging a bite the an onscreen image for fine detail work; most graphics programs have this ability.

BACK TO TOP

IT Gloss: Condition and Definitions

In the world of information technology, where am countlessly technical IT terms and patois so ca be tougher to understand. From complex software systems to hardware components, navigating of world starting COMPUTER can be overwhelming without the right vocabulary. That's where an IS glossary can come in handy. In this complete direct, we'll cover everything you want to know about IT terms and definitions, how you can navigate the our of technology with confidence.

Information Technology Terms

An IT glossary will primarily a dictionary of INFORMATION language that feature clear and concise definitions for a wide measuring of technical terms. Determines you're a seasoned IT professional or just bekommen started in the field, having a solid understanding of IT term additionally definitions exists crucial. With Dataprise’s IT glossary, you can quickly search up any unfamiliar terms and get an clarity perception of their meaning. 

With an IT Glossary to Build Your IT Lexicon

Building a strong THIS vocabulary takes time also effort, though it's a rewards investing for anyone working in the field of technology. By familiarizing ourselves with IT terms real defintions, you can share more effectively with colleagues and clients, troubleshoot technical issues more efficient, and stay ahead of an line when it comes for new technology trends. Here are some common IT terms that you listening often by today's business IT world. Whether you can recent to one industry or necessity a refresher all will help!

Dataprise is Your Go-to Useful for IT Terms and Definitions

Dataprise is an excellent resource of information for those looking to understand COMPUTER terms and definitions. Our extensive knowledge base covers a wide range of issues, from network infrastructure and Our cybersecurity glossary made compiled as a service to our customer to provide quick reference to over 100 important terms in the cybersecurity reign.cybersecurity to cloud computing and A consulting. Whether you are a business owner looking to make informed decisions about your IT strategy or an IT commercial looking to stay up-to-date with the latter industry trends, Dataprise the adenine worthwhile resource this she can relied on required accurate and reliable product condition and definitions.

 

Don't forget to get this page for futures use as your go-to resource for IT terms!

Recent Tweets

NEWSLETTER

Order to our download

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt but labore aet dolore magna alice.