Date post: | 09-Apr-2018 |
Category: |
Documents |
Upload: | geby-prihandani |
View: | 226 times |
Download: | 0 times |
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 1/38
ENGLISH COURSES
TASK
Intended To Fulfill The Task Of English Language Courses
Compiled by :
Geby Prihandani 1209705059
DEPARTMENT OF INFORMATION
FACULTY OF SCIENCE AND TECHNOLOGY
STATE ISLAMIC UNIVERSITY SUNAN GUNUNG DJATI
BANDUNG
2009
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 2/38
VOCABULARY OF INFORMATIC
A
Abend (Abnormal end)
Termination of a program or process that is not normally caused by theoccurrence data input errors by the user or program crash.
ABI (Application Binary Interface)
Exposure specification hardware and operating system being used.
AbiWord
GNOME Office applications for word processing (word processing). AbiWord
classified in one of the open source software licensed under the GNU GPL (GeneralPublic License). Because it can be used freely as well as making modifications needs.
Abort
Command to cancel the course of a program by force and return to operatingsystem.
Access
Activities retrieve or store data from or to memory or to disk drives.
Accessibillity
How to set the button, voice, appearance and so forth on the Windows operatingsystem.
Access Method
The software that controls the transfer of data between primary storage andequipment inputs and outputs in a system.
Access Time
The time needed to retrieve or enter data from or to memory.
Accessories
On Windows operating systems, accessories are additional programs, such asCalculator, Notepad, Wordpad, Paint, etc..
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 3/38
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 4/38
ADSL (Asymmetric Digital Subscriber Lines)
Digital data transmission over the high-level line telephone lines. ADSL is atechnology modulation developed with Discrete Multitone (DMT) that allows
transmission tinggi.Fasilitas ADSL speed data simultaneously using a traditionaltelephone service, ISDN, and high-speed data transmission, as well as video.
DMT-based ADSL appears as a transition from copper wire to wire with the fifront. This makes ADSL more economical use for local telephone companies becausemempu ADSL device provides high-speed data services before teknologifi to useoptics.
Advertiser
Synonymous with Merchant, the merchant or company that gives commission.
Affiliate Site
Page where the ad merchants included. We can enter into the merchant¶s ad anyexisting page in the website, and it may disembarang place.
AGP (Accelerated Graphics Port)
A high-speed graphics bus that directly connects the graphics card with the mainmemory. AGP operates independently and separately with the PCI bus and generallyrunning at 66MHz which is two times the speed of PCI that runs on 33MHz. AGP 1x doone transfer per cycle for maximum data transfer 266 MB per second. AGP 2x to doublethe data transfer by one cycle is 533 MB per second, while the AGP 4x to four timesthe transfer by one cycle is 1.06 GB per second. While speed The maximum datatransfer on the PCI itself is 132 MB per second.
AGPset
A chipset that supports Accelerated Grap hics Port.
AI (Artificial Intelligence)
Develop computer science in order to work and think and take decisions likehumans.
ALGOL (Algortihmic Oriented Language)
High-level programming language that is used to solve problems in measures islimited. Generally to make science programs.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 5/38
Aliasing
An effect (aliasing) which arise due to image or signal samples performed at thelevel is too low. This effect causes the high area of texture (d neat change) in the visibleimage as a slow change. When aliasing appears it will be difficult to reproduce the
sample image into the image accurate original.
Alignment
In a computer network is a process of leveling the components of a system of other components. For example computer time synchronization of a system.
Align
From the word alignment, which orders in a word processing program to flattenmanuscript, whether to the left, right, or center.
Allocate
Instructions to put some computer memory or other units under the controlcomputer programs.
Alpha Numeric
Mixture of characters and numbers, including letters (AZ; az), punctuation andsome special characters such as @, #, $, *, and so on.
Alias
The second name of a file, usually a second shorter and easier to remember rather than first names.
ALOHA
Access control technique for medium-level transmission medium that handlesmuchaccess. Data transmission will be done at any time by a station. Shipping will berepeatedIf a NAK response (there are problems with shipping) from the destination station.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 6/38
Alt Key
Name button on the keyboard located on the right and left of the space key.Buttons These new functions when pressed in conjunction with other keys. In theWindows environment, This key together with a particular letter can be used to open
and select the command on the menu quickly.
ALU (Arithmetic and Logical Unit)
Part of the CPU that is useful for data processing logic and data requirescalculation. ALU consists of registers to store information.
AM (Amplitude Modulation)
Type of amplitude modulation using the analog signals to distinguish the situationdigital signal.
AMD760
AMD760 chipset is a chipset for the AMD Athlon processor. This chipset consistsof twoie AMD761 chip controller or bus system known as the Northbridge and AMD 766peripheral bus controller or the Southbridge. AMD760 chipset provides a new standardin technology, more powerful memory of PC1600 DDR memory and the DDR PC 2100allows high performance multitasking and multimedia applications intensively. Chipset
AMD760 support to FSB26 MHz and 266MHz DDR memory and AGP 4x.
AMD760MP
AMD made chipsets for use with the Athlon MP processor. Consists of two chipsie AMD762 chip bus system controller (Northbridge) and the peripheral bus controller
AMD766(Southbridge). AMD760MP chipset using DDR memory technology and enablesmaximum performance on the x86 processor technology in multitasking and multimediaapplications. Chipset This AMD760MP able to support two Athlon MP processors, 266MHz FSB, DDR memory PC2100, and supports AGP 4x and PCI 33MHz/32-bit and 64-bit.
AMD761
System bus controller chip, known also as the handle element Northbridge criticalsystems that affect overall system performance while also overcoming transfer data tothe processor. AMD761 main feature is the ability of the system controller to Athlonprocessor controlling the bus 266MHz, 266MHz DDR memory, 4x AGP, and PCI bus33MHz/32-bit.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 7/38
AMD762
CHIP bus system controller also known as the Northbridge to support AMD AthlonMP processors, PC2100 DDR memory up to 4GB maximum capacity, and graphicscard AGP 4x. All of these features are designed to provide high performance server
entry-level class or workstation-class dual-processor range to high-end. AMD762 has afeature supports FSB 266MHz, designed to provide increased data transfer 33 percentwhen compared with the usual AMD Athlon processors. Also this chip is also capable of handling DDR memory that supports Error Correction Control (ECC) and PCI33MHz/32-bit and 64-bit.
AMI BIOS
A PC BIOS American Megatrends Production, Inc.. AMI BIOS has been widelyused on the PC desktop.
Amorphous
Nature can not reflect light. For example, a rewritable optical disk said amorphousstate has a spot laser beam that can not be reflected through the lens.
Analog
Forms of electronic communication which uses electromagnetic wavescontinuous, such as television and radio.
Analog Signal
Continuous electromagnetic wave, has the ability to emit through a variety of media and reach far greater than the digital signal.
Analog Computer
Type of computer data processing-magnitude scale is expressed with variablephysical analog signal.
Anchor
Area of nodes between a content source or destination of a link. By clicking themouse on the anchor area, then the window will open a link or source destination. Sothe anchor of this area is a kind of highlight. Anchor area is also known as span, region,button, or extent.
Useful for text and graphics can be linked to a place in a single document same.This link requires 2 parts namely: Anchor, which aims to mark a text / graphics. Link,aims to deliver to places that have the mark earlier.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 8/38
AND
One of the logical operators of Boolean algebra to compare whether two variableswill result in true value (1) or false (0) with the following rules:
0 AND 0 0
0 AND 1 0
1 AND 0 0
1 AND 1 1
AND Gate
Electronic circuits that do data processing using an AND operation.
Anonymous FTP
Facilities transferring files between Internet sites that allow Internet users accessthe data files or documents from anywhere in the Internet without having to enter UserIDand password.
ANSI (American National Standards Institute)
Institutions that determine standards for data processing, provide standard rules inuse the code and the language of a programming language.
Answer Back
Computer or terminal capabilities are called to give his identity to computers or terminals that call.
Anti Aliasing
A technique used to eliminate the effect of the jaggies in the image produced. Byusing this anti-aliasing resulting picture will look more smooth, especially on the linesthat are not horizontal or vertical (diagonal).
Anti Virus
Tailored programs to detect files in a drive if affected virus or not. This programand eliminate the virus.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 9/38
Amplitude
High and low voltage from an analog signal.
Aperture grill
Consists of many vertical wires. Pixels on a monitor phosphor screen arranged inthe form of vertical lines. When the gun eletron scan on one line, this wire is isolatedpixels focused by each light. Aperture grill technique has two advantages whencompared shadow masking technique. First, the use of wire allows more energy canpass from the electron gun, which will produce a brighter image. Second, the resolutionvertical potential will be greater.
API (Application Programming Interface)
Application programs that provide services needed by a system, usually special
services for the application.
APL (ADA Programming Language)
A programming language designed by theorists that are designed to be appliedremote terminals.
APPC
The ability of a protocol SNA to communicate between several programs in thenetwork without the host system in general.
Append
Command in the file-processing application to add a new record on a files or merge new files with old files.
Application
Software created by a computer company to do the tasks specific, such as Ms-Word, Ms-Excel.
Application Layers
The top layer of the OSI model protocol (Op en System Interconnections). Dutyarrange everything related to the exchange of data / information between users,software applications and equipment in a system.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 10/38
Application Program
Computer program made to do or solve problems specific, such as payrollprograms.
Application Interface
A set of software that allows programmers to enter a system and use servicesprovided in a network.
Application Development Language
High-level programming language used to build an application with an easier way.
Application Package
Complete application package, consisting of specific programs included in thememory The following computer hardware support is needed (including I / O device).
Application Oriented Language
Programming language specifically developed to have the ability change thecomplex processing problems into a more simple way. By using this language,programmers no longer need to compile the code to perform calculationsdifficult.
Arbitrators
Computer unit in charge of determining the priority number of all input devices unitconnected to a storage function or other functions.
Arcade
Computer games are simple and two-dimensional shape, such as packman.
Archie
Service network that is used to place files that can be accessed by public viaanonymous FTP.
Architecture
The design of the formulation components in the computer.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 11/38
Archive
Used to make copies of a backup file in order to protect the copy original fromdamage.
Area
The inside of a computer memory which is determined by hardware or program for specific data handling.
Arguments
A value entered on a routine or order as limiting the reach of execution of commands.
ARP (Address Resolution Protocol)
Internet protocol address of the Internet to put the hardware address on the LANcontinuously.
ARPANET
Computer network, developed with the help of Advanced Research Project Agency, is a forerunner of the Internet.
Array
In a programming language. Array is a collection of data objects with identicalattributes.
Ascending
The sequence data from the smallest to the largest, for example from AZ; from 0-9.
Sort Ascending
Sequencing techniques with how to structure the data or information from thelowest to the value highest.
ASCII (American Standard Code for Information Interchange)
Standard letters and punctuation marks for the computer. ASCII is a code in theform of 8-bit characters figure 1 and 0 to represent the character alpha-numericcharacters.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 12/38
ASIC (Application Specific Integrated Circuit)Integrated circuits in a computer system used to perform the duties certain.
ASP (Active Server Pages)
Microsoft¶s programming language that combines server-side scripting and HTMLto create a dynamic web pages (dynamic pages).
ASP (Application Service Provider)
A business that offers access to software applications to individual users or officesvia the Internet facilities. Basically, ASP is a Dent independent Software Vendor (ISV) or ISP who use the Internet as a means of Submitting the application, so the program canfunction.
Assembler
Program that serves to convert the program into the Assembly language machinelanguage.
Assembly
The process of translating programs written in programming language symbolsinto the machine language.
Assembly Language
Low-level programming language that is more like machine language in the formis easy to remember.
Associative Memory
Engineering data call. Data is not retrieved from memory based on the address,but based on existing patterns in data.
Asynchronous
Method of data transmission of data transmitted by one character per unit time.Synchronization will be done every time the character is received with the help of theearly bits and bit the end.
Asynchronous Response Mode (ARM)
One of the secondary station operating model supported by the BOP (Bit OrientedProtocol). This model allows the secondary station transmitting first start without waitingcommand from the primary station.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 13/38
AT (Advanced Technology)
Type of company issued computers after IBM XT models. AT speed more higher than the XT.
ATA (Advanced Technology Attachment)
Standard interface for hard drives and use the cable 40-pin connector. Various ATA is ATA-2, ATA-3, Ultra-ATA, ATA/66, ATA/100 and ATA/133 most recently.
ATCON
Tools used in the Novell Netware environment. This tool will provide informationthe stack routers Appletalk and Appletalk networking information on the Internet.
ATM (Asynchronous Transfer Mode)
An advanced technology development in telecommunications, which uses switchthe hardware to create a direct channel between the two goals while, until data can bemoved at high speed. Data was taken in a unit with a certain length called cell (1 cell =53 octets).
ATS (Administrative Terminal System)System developed to facilitate the person who typed text for copying. ATS was
developed by IBM Corporation.
Attachment
Facility on an e-mail programs both computers and webmail programs that canused to send files, or images, which in ikutsertakan on e-mail are in send.
Attach
Command to track and put the program into memory. Network computer meansfor entering commands in a network server.
Attributes
Data that contains information about a variable or file. In computer networkingmeans of access and describe techniques propertyfil e or directory in storage systems.
Audit Trail
The concept of gradual examination of the way through past activities that effecton an estimate.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 14/38
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 15/38
Auto Indexing
Determining keywords is done by the computer automatically as an index inputs adocument.
Auto Login
A facility in a network environment governing the business of a user login (user).
Autonomous System
Series of hosts and routers under the supervision of a single authoriti.
Automatic Programming
Automatic programming to prepare commands in machine languageuse of
computers.
Automatic Programming Tool (APT)
Computer language used for numerically controlled equipment.
Automatic Repeat Request (ARQ)
Facilities in the network will automatically re-request re-transmission known if there is an error in the transmission process.
Automatic Send and Receive (ASR)
The ability of equipment to receive and send data without human assistance.
Automatic Stop
Termination of computer programs running automatically by the detector becausedetects errors in the process of program operations.
Autoplotter
A machine will automatically draw a graph based on data included.
Auto Shapes
Word processing program¶s ability to create three-dimensional text, three boxesdimensions, text boxes and others.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 16/38
Auto Text
Word processing program¶s ability to enter a key word in keyboard so that a longsentence can be written simply by pressing a button serves as the short cut.
Auxiliary Memory
Additional memory in addition to main memory, such as floppy disks.
Available on Disk
Stating the number of areas on the disk is still empty and ready for occupancydata.
B
B & W (Black and White)
Display an object in black and white only. In Lotus 123, this command color graphics will return to black and white graphics again.
Backbone
Main lines (high frequency) communications on computer network systems.
Backbone Network
The main connection system of distributed network with a hierarchical structure.
Background
Color or image that is structured to create a background effect in the page Web.
Back Orifice
Program developed and released by The Cult of the Dead Cow (CDC). BackOrifice is a remote tool admnistration, but its presence can be misused for thingsnegative. If dimanpaatkan a hacker, so he could take over control entirely on the
victim¶s computer. In addition, back orifice can also be used to steal data and e-mailfrom the victim¶s computer. This program is an extensible programs that can bechanged and developed all the time.
Backing Storage
Tools reservoir data in a computer simpannya ability greater than The main datastorage, but has a lower speed.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 17/38
Backoff delay
The length of waiting time of a medium control acces to a terminal in the networkform of CSMA / CD, before sending back a fr ame after the a collision.
Backplane
A panel in which a circuit board in a pl ug equipment included;
including all the cables that connect each circuit.
Backslash
Symbolic keys µ\¶; this button is often used when working with directories.
Backspace
Symbolic´keyboard button located above the Enter key. Work delete onecharacter before the cursor at the moment.
Backup
A copy of the program file or data files created to provide assurance that the dataThere is not lost or deleted if there is something in the original file.
Backus Normal Form (BNF)
A formal notation used to define the syntax of a language computer.
Backward Supervision
Supervision in the transmission of data signals sent from a station attendants tomaster terminal.
Bad Block Table
A list of disk block containing the location of the damaged disk and is not can beused to store data. Sometimes called the media line detect.
Balance Error
Voltage error caused by the analog sum of the computer analog and directlyproportional to the mistake.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 18/38
Balanced Error
Tolerance limits of minimum error and maximum error is acceptable. Generallyworth the same or opposite signs (positive and negative), most zero.
Balanced Transmission
Transmission method by sending signals into the form of electrical current that willsent through a conductor. The signal will then be returned through conductor different.
Bandwidth
Transmission capacity of a network connection such as electroniccommunications, computer bus and computer channels. Regular represented by bitsper second or Hertz. If written in Hertz, then the numbers become larger than if writtenin bits per second. For example, if written in bits per second is 64 Kbps, which means it
is 64 kilobits per second or 8 kilobytes per second. This is usually used to measure thespeed Internet which we¶re using. Note 1Bytes = 8 bits.
Bang path
A set of names of tools used to direct e-mail from the user to other users.
Banner
Parts that are not moving in Web documents, even if we roll scrollbar until the endof the document. Currently only Internet Explorer that supports the banner command.
Bar Code
Numeric characters displayed in the form of blocks with various thickness.
Bar Code Scanner
Tool capable of reading the blocks of bar codes into alphanumeric form.
Bascom (Basic Compiler)
Program that translates a BASIC program ends. BAS into a file. EXE that can be
executed.
BASE
The basis of the number system, is the number of digits that can be displayed in asystem. Basic example of the decimal system is ten, the basis of the binary system istwo, the basic octal system is eight, the basis of the system is sixteen hexadecimal, andso on.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 19/38
Base Band
Such a canal that uses communication channels that carry only one signal at onetime. For example the use of telephone lines as a means of sending data between
computers which is located far from each other.
Bash (Bourne Shell Againt)
The shell used in Unix and Linux klonenya like. Bash is a shell that used as thedefault shell by RedHat Linux. This is marked by the symbolic link in sh directory usedto run the bash shell. http://www.gnu.org/manual/bash-2.02/
D
DBase
Software made by Ashton Tate. With DBase, users can build, access,
process and create reports from the files homemade.
DBMS (DataBase Management System)
Program that allows the items in a database compiled, processed and
updated.
DBLSPACE
Extend the technique of hard disk space starting introduced in MS-DOS version 6,
and
versions above.
DCCU (Data Communication Controller Unit)
Unit that controls the relationship between data communications equipment.
Usually
integrated part of a data communications system.
DCE (Data Circuit terminating Equipment)
Tools that perform the conversion and encoding signals and connect to the DTE
a network.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 20/38
DCE (Distributed Computing Environment)
Op-made technology en Softw are Foundation to support the spread of the use of
computer.
DDBMS (Distributed DataBase Management System)
Database management program capable of accessing the few
databases at once.
DDL (Data Description Language)
Programming language that can be used to determine the level of the database.
E
EFT (Electronic Funds Transfer)
Transmission technique or data exchange financial transactions electronically.
EGA (Enhanced Graphics Adapter)
One of the standard monitor resolution. EGA could display 16 colors in the model
graph, the equivalent in the CGA monitor. EGA monitor with a card capable of
displaying 16 colors
in the form of text (80 x 25 characters or 40 x 25 characters), 16 colors in the form of
low resolution and
4 colors in high resolution graphics display 640 x 350 dots. The development of this
type of EGA
of them is with ATI Technologies Inc. named EGA WONDER card, can
display 132 x 25 characters. EGA monitor types are still using the same monitor
connector
with monitor type and Monochrome CGA. Everex cards issued EPGA (Enhanced
Proffesional Graphics Adap too), capable of displaying 649 x 480 dot (dot) with 256
colors, from
Basic color combinations 4096 (llette pa). EPGA and PEGA called (Proffesi onal
Enhanced
Graphics Adap too), or PGA (Proffesional Grap hics Adapter), displays a text screen
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 21/38
132 x
43 characters in multi-frequency or jubilee sync, and flexibility that can use the monitor
and enhanced monochrome monitor. This monitor uses 9-pin connector consisting
of 2 lines.
Egoless Programming
The agreement between the programmer to read and give each other criticism of
the
artificial programs other programmers. The programs are regarded as artificial
strangers that criticism is not based on sentiments expressed privately.
EIA (Electronics Industry Association)
An association of electronics manufacturers in the USA which determines the
standard interface,
eg RS-232 C and RS-422A.
EIA Inteface
EIA standard interface that connects to the computer communications equipment.
EISA (Extended Industry Standard Architecture)
The expansion of computer design with the industry standard.
Eject
Command is given to the printer to put the paper in the beginning of the page. If
currently the paper's position in the middle, then the rest of the page will be ignored and
put the paper at the beginning of the next page.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 22/38
Electric Delay Line
End delay is used to accommodate the signal by turning information
carried by a wave transmission.
F
Field Length
Eld sebuahfi length, the number of characters or bits that can be loaded in
sebuahfi Eld.
Field Programmable Logic Array
Array logic gate associated with a programmable logic returns as one
unity.
FIFO (First In First Out)
One of the queue management techniques or handling of overlapping tasks, ie
items
The first will be done first.
Fifth Generation Computer
Fifth generation computer, the computer output of the nineties until now.
The fifth-generation computers have the ability to process other things in addition to
data processing,
eg for artificial intelligence (artificial intelligence).
File
The file consists of a collection of records that are related. Each record
have adjusted the number dalamfile position.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 23/38
File Form
Binary files containing graphic images of the form, formed when the programmers
develop
program with a visual programming language. All the changes that occur withrm will be saved tampilanfo this dalamfile.
File Header
Some characters are located at the beginning of a file stored on the disk.
This header file has a relationship with the name and the sifatfi le.
Floopy and IDE connector
This connector connects the motherboard to save permanent devices such as
floppy
disk or hard drive. IDE connector on a motherboard usually consists of two, one is
primary IDE and the other is the secondary IDE. Primary IDE connector connects
motherboard with the primary master drive and the secondary master device. While
connector
secondary IDE usually connected devices to access the slave as CD-ROMs andslave hard drive.
G
Gathering Data
Combining a number of data as in data collection.
Gather Write
Operations that form a single record from the collection of a number of fields in the
memory location
main.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 24/38
GB
Derived from the word GigaByte, a unit of measurement on a computer hard disk
capacity
with 1 GB = 1024 MB.
GBT (Underground)
Term given the users the facility to refer to IRC users who seem to
silent, but was talking to someone else secretly.
GCR (Group coded recording)
Method of data recording on magnetic tape with a very high density.
General Format Identifier
Part of the general format of the data packet consists of 4 bits (ie bits 5, 6, 7, and
8) and
shows the form of packet headers. Bits 5 to 6 shows the sequence numbering is used,
bit 7
serves to deliver the confirmation procedure in the packet data and 8 bits serve todistinguish
data packet.
Generalized Routine
A routine that has the ability to process a variety of tasks.
H
HTML 3.2
Standard HTML format developed by the W3C (World Wide Web Consortium)
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 25/38
HTTP (Hyper Text Transfer Protocol)
A method or protocol to download the file to your computer. This protocol-based
hyper text, a text format commonly used on the Internet.
Hub ring
A flat ring found on the floppy disk hole size of 5.25 "and serves to
increase the strength of floppy disk.
Hue
The term which states set the color spectrum. Hue is the component thatdetermine what colors are used. In the gradient, when used color models
using hue as one of the components will be made a rainbow effect.
Hybrid Computer
A digital computer which receives the analog signal, convert it into digital data
and processing.
HydraVision
ATI Technology to be able to show two displays from one graphics card. This
feature
allows two displays can be raised with the resolution and refresh rate are different.
I
Icon
A small symbol is an image that appears on the computer screen. Usually usedto represent documents or other programs and disk drives.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 26/38
ICQ
From the word "I Seek You". Applications to chat with the exchange of files and
sending
SMS.
IDE (Integrated Drive Electronics)
A type of functioning hardware interface for connecting hard disks, CD-ROM
and tape drives on a PC. IDE is very popular and widely used because it provides a way
a comparatively economical to connect a hardware component.
IDE controller
The instrument used to regulate the hard disk, cd-rom, etc..
Idle time
The duration of time when a device in a static condition. In other words, life tools
or active, but can not be used for work.
IGP (Interior Gateway Protocol)
A protocol used by gateways in an autonomous system for
transfer route information.
ILD (Inter Layer dielectric)
Isolation / insulation installed in between the layers aluminum or copper wire
connect the transistors on a chip. Dielectric polymer found in the early
21st century greatly influenced the design of a chip.
Jaggies
A jagged effects arising from the use of digital techniques to
displaying an image. This effect is particularly visible on the diagonal line.
J
Java
Programming language to create active content in Web pages, can also be
run in all computers. Java applets retrieved / accessed from a Web page and run
total.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 27/38
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 28/38
Power Connector
Connecting pin motherboard with power supply in case of a computer.
At AT type motherboards, chassis is needed is the type of AT as well. AT Power
connector type
consists of two parts, where the two wires from the power supply will be lodged. In ATX
type, cable
power supply integrated in one complete header, so stay in menancapkannya
motherboard. This cable consists of two columns in accordance with the pin on the
motherboard which consists of
two pin array as well. There are some motherboards that provide two types of power
connectors, AT and
ATX. Most new motherboards are ATX type.
L
L1 Cache
A small number of SRAM memory used as cache or a single integrated
packages in the same module on the processor. L1 cache is locked at the same speed
processor. Useful to store temporary instructions and data, and ensure
that the processor has a stable supply of data to be processed in memory while taking
and
storing new data.
L2 CacheGenerally consists of SRAM chips near the processor, however, latest generation
Athlon processors have L2-Cache on chip. Its function is similar to the L1 cache, L2
Cache is also known as secondary cache, a memory that has a sequence of velocity
The second (type of memory is the fastest L1 Cache) which provided for the
microprocessor.
LAN
A network built at a location such as at home or building office. Can be interpreted
also as a computer communications system limited distance no more than a few miles
and using high-speed connection between 2 to 100 Mbps.
Land Attack
Attacks to the system by using a program called "land". If
attacks directed at Windows systems, the system will be protected not hang
(and get out the blue screen). Similarly, if the attack is directed to the old version of the
UNIX system,
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 29/38
then the system will hang. If the attack is directed to the Windows NT system, the
system will be busy
with the CPU usage reaches 100% for some time so the system looks like a traffic jam.
Land program intended to attack the server by sending fake packets as if
derived from the destination server. In other words, the source and destination of the
packet is made as
will come from the destination server. As a result the server that was attacked was
confused.
Layer
Layers (the concept) in networking. Various communication models such as OSI
and TCP / IP
composed of several layers that make up the protocol.
LCD (Liquid Crystal Display)Type of display screen that uses a liquid compound that has the structure
polar molecules, sandwiched between two transparent electrodes. When the electric
field is given, the molecule
adjust its position on the field, forming a crystalline structure of light mempolarisasi
whereby.
M
Mailing list
A discussion forum on the Internet by using e-mail. One message from a
members will be accepted by all members.
Mail Notifier
Features in the mailer that always tells us if there is an e-mail arrived.
Man Command
In a UNIX command that allows to obtain information about the command -
commands in the UNIX operating system (man stands for manual), and the command is
command parameters to be known.
Mandrake (http://www.linux-mandrake.com)
One of the Linux distributions, was born inspired by the Red Hat Linux, with many
prakonfigurasi application development and making it easier for beginners, both from
initial process XWindow-based installation, to use and is supported by
various languages. In the Mandrake, all packages have been compiled with CPU
optimizations for
Pentium class (Intel, AMD, cyrixm winchip) and the processor on it and make
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 30/38
optimization
more than 30%.
Member
Members. Member ID = identity of members, member name = name of a
member.
Merchant
Traders or companies in the Internet which provides the commission, which is a
strategy
online sales.
N
Network Adapter
A hardware device used to connect computers to the network.
A network adapter can be a PCI card or a computer connected to the
external via USB or parallel port.
Network Admnistrator
The person responsible for taking care of the network and help users.
Network Crawler
A type of destroyer program commonly called viruses or worms and causes slow
performance in the network.
Network Service Provider
Service providers including telecommunications companies, data carriers, ISPs,
Wireless -
Communication Service Providers and cable operators that offer a connection speed
high
Newsletter
News sheets, such bulletins. On the Internet means that pieces of news that
spread via e -
mail, with a layout like a web page, so that it can link is clicked.
NFS
Required if you want to access the remote filesystem to a server and this support
is a must.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 31/38
O
OEM (Original Equipment Manufacturer)
A slank phrase to describe a company that has a special relationship
with large-scale computer manufacturer. OEM buy products made by large companies
not yet rated brands and then packaging and selling these products with the brand'stheir company.
OLE (Object Linking and Embedding)
Way from Microsoft to be able to communicate between different computer
programs,
the basis used for the development of ActiveX.
On Now
The technology developed by Microsoft. On Now is the term for a PC
which is always alive but looks dead and immediately responds to the user or the
condition
else if requested.
Open relay
A server that allows the account to another domain to use the machine.
So contrary to close the relay.
OS / 2 HPFS
Filesystem supports OS / 2 and HPFS. Linux can not read these filesystems(read-only).
OTP (One-Time Programmable)
Part memory or a certain memory functions that only allow programming
done at one time. In this case the reprogramming is not possible.
P
Page Wizard
The steps are assigned sequentially to guide in making
a web page.
Parity
An error condition detection system that tests the integrity of data between
systems
computers and networks. Parity check using the extra bits 9 which includes the value of
0-1
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 32/38
(depending on the content of the data byte). Each time a byte is transferred or
transmitted,
test occurred parity bits.
Partitions
The process of dividing the disk into two or more, so as if there will be
more than one disk.
Payload
Effects caused by a virus. In some cases, can also be used to
calls related to virus or Trojan Horse dropper.
PCI (Peripheral Component Interconnect)
Peripheral bus commonly used on the PC, Macintosh and workstations. First time
designed by Intel and appeared on the market at the end of 1993. PCI provides a datatransfer path
quickly between the CPU with peripheral components in a PC like the other videos,
disks, network
and others. Query
An extracting data from a database and displays them for "processing" more
information.
Q
QuickStart TechnologyThis feature extended battery life by entering the low power status while
does not work or between jobs, although in a very short time.
R
Radio Button
Used in the form in order to select only one option from a list of exclusive
choice.
RAMDAC (Random Access Memory Digital to Analog Converter)VGA controller chip set color palette and converts data from memory to the signal
analog on the monitor.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 33/38
RDRAM
A dynamic chip technology from RAMBUS, Inc.. This product has a special license
to
semiconductor technology that produces chips. In the basic chip introduced in 1995 with
speed of 600 MBytes / sec. In 1997, Concurrent RDRAM speed increase
up to 700 MBps, and in 1998, Direct RDRAM reach speeds of 1.6 Gbps. Concurrent
RDRAMs widely used in video games, while the Direct RDRAM used in
computer.
Recovery CD
Recovery CD has the function to return the disk contents as originally
PC (Personal Computer) for sale, alias back to the standard from the manufacturer.
Red Hat (http://www.redhat.com)
One of the Linux distribution, a distribution (distro) the most popular. Graphicsmode
facilitate this installation. Biggest point of this distribution is RPM (Redhat Package
Manager), with
this software we can install or uninstall applications and components sisop. Current
RPM
considered a de-facto standard in terms of packaging and its use has been widespread
in various
other distributions, except for Debian.
S
SDRAM (Synchronised Dynamic RAM)
DRAM is a spectacular place. Memory access cycle is synchronized with
processor clock. Thereby reducing the waiting time between the processor and
memory.
Search Engine
A (facility) that can search the web links from other sites.
Sendmail
One of the "mail transport agent (MTA) is the most widely used on UNIX systems.The task of sendmail is to receive e-mails from outside and from the local system and
send it to the destination (such as adding e-mail to the mailbox of the user or
send it to the destination server.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 34/38
Server
1. A computer on the Internet or on any other network that stores files and
make the file available to be taken if necessary.
2. A computer network applications are used to serve many users
in one network.
Setting
A program that makes up a system or a software application.
Setup
A program that prepares a software application that can run on a
computer. Setup creates a folder with the default name on the hard drive and copying
files
files from the CD-ROM or floppy disk.
Setup Wizard
Part of the setup program that helps the user to perform the installation process
correctly.
T
Title
HTML tags are used to give the title of each HTML document.
Transmision Line
Transmission line, the physical connection from the computer through the Internetlike a telephone line or IT.
Tray Icon
In the Windows operating system, tray icon on the toolbar is located next to the
clock
can indicate the status of programs running on the computer.
Trojan Horse
An application designed to perform a fraud but veiled
with kindness. Usually the method is to put (attach a file by e -mail) a specific file that contains a Trojan Horse but with attractive packaging. If
Trojan Horse successfully infect it has a hacker can get unlimited access
to the victim's computer. Three types of Trojan horse is a popular use Bac Orifice,
Netbus,
and SubSeven.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 35/38
True Color
Real colors with 24 bits and 16.7 million color variations. The term used true color
for Macintosh systems (for the PC is not often used) in the image of the property
mentioned
display. UMSDOS
This support is needed if you want to run Linux on a DOS partition but it seems
RedHat Linux will not be able to run on a file system UMSDOS.
U
Unified Driver Architecture (UDA)
UDA ensure complete compatibility with software drivers. UDA facilitate
upgrade to the latest NVIDIA product because all NVIDIA products work made with
software
The same driver.
UNIX
The operating system used on both PC and Mainframe. Many computers and
servers are connected to the Internet using UNIX.
Upload
The process of transferring information from one computer to another computer /
server over the Internet.
URL (Uniform Resource Locator) An address indicating the route to a file on the Web or on the Internet facility
other. Typing the URL in your browser to access a Web site.
USB (Universal Serial Bus)
Socket contained in all new models for PC connection USB devices.
USB supports easy installation with Plug and Play system, and gradually
replaces the serial and parallel ports of the old. USB devices include scanners, modems
and
printer. V.32
Protocol used to transfer data modem with a maximum speed9600 bps.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 36/38
V
V.32bis
Protocol used to transfer data modem with a maximum speed28,800 bps.
V.34
Protocol used to transfer data modem with a maximum speed
28,800 bps.
V.42
Standard ITU (1989) to check the occurrence of errors (errors) in the modem
using LAP-M as the main protocol and MNP Classes 2 through a protocol
alternatives.
V.42bis
Modem protocol that is used to compress the data up to a maximum of four times
smaller.
V.90
Standard ITU (1988) for a modem that works on the downstream speed of 56
Kbps and
upstream speed of 33.6 Kbps.
W
WinWAIS
Windows-based program that allows use WAIS to track information
on the Internet.
Web Hosting
Provision of space to store the web pages by the owner of the computer / server,
which
can be accessed 24 hours via the Internet.
Web Servers
Hardware and software that is used to store and send
HTML document for use in World Wide Web.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 37/38
Web Site
A collection of HTML documents in a personal or corporate Web server. A server
Web can contain more than one site.
Webcams
Video camera designed to connect to a PC. The camera can be used to
record a video clip that can be sent via e-mail or to transmit images
directly on the Internet for video conferencing.
Whois
Free Internet program that is used to provide or compile a database
from the Internet domain name and artities someone else.
X
X2
The technology used by companies to implement a modem USRobotics
56 k.
X.25
A protocol that determines the exchange package. X.25 is the CCITT standard
defines the communication protocol to access the packet switched network. This
protocol does not
so important, because through X.25 seen that the TCP / IP is much better.
X.75
How to connect together X.25 network.
Xabre
SiS graphics chipset that supports full AGP 8x and DirectX. This chip is
The first graphics chip that supports both features.
Z
Z-Buffer
Area of graphics memory used to store the Z or depth information
or object drawn. Z-buffer value of a pixel is used to determine whether he
located behind or in front of the other pixels. Z calculations prevent background objects
in overwrite objects that are in front of the frame buffer.
8/8/2019 Vocabulary of Informatic
http://slidepdf.com/reader/full/vocabulary-of-informatic 38/38
Zip
ZIP is a common compression format used in the MS-DOS and Windows.
Some files can be merged into one and reduced in size in a single ZIP file
(zip file). There are several programs to manipulate this ZIP file, among others:
PKZip and PKUNZIP (shareware for MS-DOS)
WinZip (for Windows 95)
zip and unzip (free for UNIX)
ZIP socket (Zero Insertion Force socket)
A type of socket is designed to be easy to enter the PGA chip.