6
Artificial Intelligence Artificial Intelligence, or AI, is the ability of a computer to act like a human being. It has several applications, including software simulations and robotics. Biometrics Biometrics refers to technologies used to detect and recognize human physical characteristics. In the ITworld, biometrics is often synonymous with "biometric authentication," a type of security authorization based on biometric input. There are several types of biometric authentication. Common examples include fingerprint scanning, retinal scanning, facial recognition, and voice analysis. A facial recognition system, for instance, uses a camera to capture an image of a person's face. The photograph is then recorded and processed using biometrics software. The software attempts to match the scanned image with an image from adatabase of users' photos. If the scan is close enough to a specific user, the person will receive authorization to continue. buffer A buffer contains data that is stored for a short amount of time, typically in the computer's memory ( RAM ). The purpose of a buffer is to hold data right before it is used. For example, when you download an audio or video file from the Internet, it may load the first 20% of it into a buffer and then begin to play. Cache Cache, which is pronounced "cash" (not "catch" or "cashay"), stores recently used information so that it can be quickly accessed at a later time. Computers incorporate several different types of caching in order to run more efficiently, thereby improving performance. Common types of caches include browser cache, disk cache, memory cache, and processor cache. 1. Browser cache - Most web browsers cachewebpage data by default. For example, when you visit a webpage, the browser may cache the HTML, images, and any CSS or JavaScript files referenced by the page. When you browse through other pages on the site that use the same images, CSS, or JavaScript, your browser will not have to re-download the files. Instead, the browser can simply load them from the cache, which is stored on your local hard drive. 2. Memory cache - When an application is running, it may cache certain data in the system memory, or RAM. For example, if you are working on a video project, the video editor may load specific video clips and audio tracks from the hard drive into RAM. Since RAM can be accessed much more quickly than a hard drive, this reduces lag when importing and editing files. 3. Disk cache - Most HDDs and SSDs include a small amount of RAM that serves as a disk cache. A typical disk cache for a 1 terabyte hard drive is 32 megabytes, while a 2 TB hard drive may have a 64 MB cache. This small amount of RAM can make a big difference in the drive's performance. For example, when you open a folder with a large number of files, the references to the files may be automatically saved in the disk cache. The next time you open the folder, the list of files may load instantly instead of taking several seconds to appear. 4. Processor cache - Processor caches are even smaller than disk caches. This is because a processor cache contains tiny blocks of data, such as frequently used instructions, that can be accessed quickly by the CPU. Modern processors often contain an L1 cache that is right next to the processor and an L2 cache that is slightly further away. The L1 cache is the smallest (around 64 KB), while the L2 cache may be around 2 MB in size. Some high-end processors even include an L3 cache, which is larger than the L2 cache. When a processor accesses data from higher level caches, it may also move the data to the lower level cache for faster access next time. CAD Stands for "Computer-Aided Design." CAD is the use of computers to create 2D and 3D designs. Common types of CAD include two-dimensional layout design and three-dimensional modeling. Crop When you crop an image or photo, you remove part of the image. This may involve cutting some of the image from the left, right, top, bottom, or any combination thereof. It may also mean just cutting out a small rectangular of the image. Digital information Digital information is stored using a series of ones and zeros. Computers are digital machines because they can only read information as on or off -- 1 or 0. This method of computation, also known as the binary system, may seem rather simplistic, but can be used to represent incredible amounts of data. CDs and DVDs can be used to store and play back high-quality sound and video even though they consist entirely of ones and zeros. Domain While the term "domain" is often used synonymously with "domain name," it also has a definition specific to local networks. A domain contains a group of computers that can be accessed and administered with a common set of rules. Encryption Encryption is the coding or scrambling of information so that it can only be decoded and read by someone who has the correct decoding key. Encryption is used in secure Web sites as well as other mediums of data transfer. If a third party were to intercept the information you sent via an encrypted connection, they would not be able to read it Ergonomics

New Trends for Presentation

Embed Size (px)

Citation preview

Page 1: New Trends for Presentation

Artificial IntelligenceArtificial Intelligence, or AI, is the ability of a computerto act like a human being. It has several applications, including software simulations and robotics.

BiometricsBiometrics refers to technologies used to detect and recognize human physical characteristics. In the  ITworld, biometrics is often synonymous with "biometric authentication," a type of security authorization based on biometric input.There are several types of biometric authentication. Common examples include fingerprint scanning, retinal scanning, facial recognition, and voice analysis. A facial recognition system, for instance, uses a camera to capture an image of a person's face. The photograph is then recorded and processed using biometrics software. The software attempts to match the scanned image with an image from adatabase of users' photos. If the scan is close enough to a specific user, the person will receive authorization to continue.

bufferA buffer contains data that is stored for a short amount of time, typically in the computer's memory (RAM). The purpose of a buffer is to hold data right before it is used. For example, when you download an audio or video file from the Internet, it may load the first 20% of it into a buffer and then begin to play. 

CacheCache, which is pronounced "cash" (not "catch" or "cashay"), stores recently used information so that it can be quickly accessed at a later time. Computers incorporate several different types of caching in order to run more efficiently, thereby improving performance. Common types of caches include browser cache, disk cache, memory cache, and processor cache.

1. Browser cache - Most web browsers cachewebpage data by default. For example, when you visit a webpage, the browser may cache the HTML, images, and any CSS or JavaScript files referenced by the page. When you browse through other pages on the site that use the same images, CSS, or JavaScript, your browser will not have to re-download the files. Instead, the browser can simply load them from the cache, which is stored on your local hard drive.

2. Memory cache - When an application is running, it may cache certain data in the system memory, or RAM. For example, if you are working on a video project, the video editor may load specific video clips and audio tracks from the hard drive into RAM. Since RAM can be accessed much more quickly than a hard drive, this reduces lag when importing and editing files.

3. Disk cache - Most HDDs and SSDs include a small amount of RAM that serves as a disk cache. A typical disk cache for a 1 terabyte hard drive is 32 megabytes, while a 2 TB hard drive may have a 64 MB cache. This small amount of RAM can make a big difference in the drive's performance. For example, when you open a folder with a large number of files, the references to the files may be automatically saved in the disk cache. The next time you open the folder, the list of files may load instantly instead of taking several seconds to appear.

4. Processor cache - Processor caches are even smaller than disk caches. This is because a processor cache contains tiny blocks of data, such as frequently used instructions, that can be accessed quickly by the CPU. Modern processors often contain an L1 cache that is right next to the processor and an L2 cache that is slightly further away. The L1 cache is the smallest (around 64 KB), while the L2 cache may be around 2 MB in size. Some high-end processors even include an L3 cache, which is larger than the L2 cache. When a processor accesses data from higher level caches, it may also move the data to the lower level cache for faster access next time.

CADStands for "Computer-Aided Design." CAD is the use of computers to create 2D and 3D designs. Common types of CAD include two-dimensional layout design and three-dimensional modeling.

CropWhen you crop an image or photo, you remove part of the image. This may involve cutting some of the image from the left, right, top, bottom, or any combination thereof. It may also mean just cutting out a small rectangular of the image.

Digital informationDigital information is stored using a series of ones and zeros. Computers are digital machines because they can only read information as on or off -- 1 or 0. This method of computation, also known as the binary system, may seem rather simplistic, but can be used to represent incredible amounts of data. CDs and DVDs can be used to store and play back high-quality sound and video even though they consist entirely of ones and zeros.

DomainWhile the term "domain" is often used synonymously with "domain name," it also has a definition specific to local networks.A domain contains a group of computers that can be accessed and administered with a common set of rules.

EncryptionEncryption is the coding or scrambling of information so that it can only be decoded and read by someone who has the correct decoding key. Encryption is used in secure Web sites as well as other mediums of data transfer. If a third party were to intercept the information you sent via an encrypted connection, they would not be able to read it

ErgonomicsErgonomics is the study of how humans interact with manmade objects. The goal of ergonomics is to create an environment that is well-suited to a user's physical needs.

GrayscaleGrayscale is a range of monochromatic shades from black to white. Therefore, a grayscale image contains only shades of gray and no color.

StandbyIf you are not going to use your computer for a few hours, it is a good idea to put it to sleep (also known as standby mode) to save power. If you are not going to use the computer for more than a day, it is usually best to turn it off. However, some Windows computer offer an option that combines the benefits of sleep mode and powering down the computer, called "Hibernate."When you select Hibernate, the computer saves the current state of the system from the computer's RAM to the hard disk, and then shuts down. When the computer is restarted, instead of going through the typical boot sequence, the previously saved state is automatically loaded into the RAM.

MnemonicA mnemonic (pronounced "nemonic") is a pattern that can be used as an aid for memorizing information. Most often, this pattern consists of letters or words. For example, the phrase "Every Good Boy Does Fine" can be used to help music students remember the notes of the staff, E, G, B, D, and F. The name "Roy G. Biv" is often used to memorize the order of colors in a rainbow (or other light spectrum) -- Red, Orange, Yellow, Green, Blue, Indigo, Violet.

MMSStands for "Multimedia Messaging Service." MMS is mobile phone service that allows users to send multimedia messages to each other. This includes images, videos, and sound files.

NetworkWhen you have two or more computers connected to each other, you have a network. The purpose of a network is to enable the sharing of files and information between multiple systems. The Internet could be described as a global network of networks

Page 2: New Trends for Presentation

NewbieA new user of a technology, such as a computer, a certain computer program, or the Internet, is often referred to as a "newbie." The term originated sometime around 1990 and supposedly comes from the English phrase, "new boy," which refers to someone in their first year of public schooling

peoplewareComputers operate using a combination of hardware and software. However, without user interaction, most computers would be useless machines. Therefore, "peopleware" is sometimes considered a third aspect that takes into account the importance of humans in the computing process.

PhreakingPhreaking is a slang term that describes the action of experimenting with or manipulating a telephone system. Since phreaking took place before personal computers became popular, it is sometimes considered to be the precursor to computer hacking.

PlagiarismPlagiarism is the act of copying someone else's work and publishing it as your own. This includes text,media, and even ideas. Whenever another person's work is copied and republished without an appropriate reference or citation, it is considered plagiarism

PlatformIn the computer world, a "platform" typically refers to a computer's operating system. For example, a Dell computer running Windows XP would be considered to be running on a Windows platform

PodcastThe name "podcast" combines the terms iPod and broadcast into a single catchy word. As the name suggests, podcasts are audio and video broadcasts that can be played on an iPod. However, because podcasts are downloaded using Apple iTunes and can be played directly within the program, you don't actually need an iPod to listen to a podcast.

RefreshRefresh is a command that reloads the contents of a window or Web page with the most current data. For example, a window may list files stored within a folder, but may not track their location in real-time. If the files have been moved or deleted since the window was first opened, the folder contents displayed will be inaccurate. By refreshing the window, a current list of files is displayed.

RestoreThe word "restore" means to return something to its former condition. Therefore, when you restore a computer or other electronic device, you return it to a previous state. This may be a previous system backup or the original factory settings.

Remote userA "remote user" is how a woman might refer to her husband while he is watching TV. In the computer world, however, a remote user is someone who works on a computer from a remote location

Speech recognitionSpeech recognition is the capability of an electronic device to understand spoken words. A microphone records a person's voice and the hardware converts the signal from analog sound waves to digital audio. The audio data is then processed by software, which interprets the sound as individual words.

StandaloneA standalone device is able to function independently of other hardware. This means it is not integrated into another device.

SwipeSwipe is a command used primarily with touchscreen devices, such as smartphones and tablets. It is also supported by some laptops with trackpads and desktop computers with trackpad input.

Sync"Sync" is short for synchronize. When you sync a device, such as a cell phone, PDA, or iPod, you synchronize it with data on your computer. This is typically done by connecting the device to your computer via a USB or wireless Bluetooth connection. For example, you might sync the address book stored on your computer with your cell phone to update the contacts. If you have an iPod, you may connect it to your computer to sync songs, videos, and other data using Apple iTunes.

Third partyIn the computer world, a third party may refer to either a hardware manufacturer or a software developer. It is a label given to companies that produce hardware or software for another company's product.

ThroughputThroughput refers to how much data can be transferred from one location to another in a given amount of time. It is used to measure the performance of hard drives and RAM, as well as Internet and network connections.

TweakingWhen you modify a certain piece of hardware for better performance, it is often referred to as "tweaking" it. Overclocking the computer's CPU or changing jumper settings on the motherboard are common examples of hardware tweaking. Removing system limitations and adding plug-ins or extensions to a computer's operating system are types of software tweaking.

VirtualWhile the word "virtual" is typically overused in the computer world, it is aptly placed in the phrase "virtual reality." According to the American Heritage Dictionary, virtual means "existing or resulting in essence or effect though not in actual fact, form, or name." It can also mean "created, simulated, or carried on by means of a computer or computer network." Therefore, virtual reality is best described as an illusion of reality created by a computer system.

Warm bootTo perform warm boot (also called a "soft boot") means to restart a computer. It is often used in contrast to a cold boot, which refers to starting up a computer that is turned off.A warm boot is typically initiated from the operating system, rather than pressing a button on the computer itself. For example, to perform a warm boot on a Windows system, you may select Shut Down → Restart from the Start Menu. In Windows 8, you can open the Charms bar and select Settings → Power → Restart to reboot the computer. 3G 3G is a collection of third generation cellular data technologies. The first generation (1G) was introduced in 1982, while the second generation of cellular data technologies (2G) became standardized in the early 1990s. 3G technologies were introduced as early as 2001, but did not gain widespread use until 2007.

4G4G is a collection of fourth generation cellular data technologies. It succeeds 3G and is also called "IMT-Advanced," or "International Mobile Telecommunications Advanced." 4G was made available as early as 2005 in South Korea under the name WiMAX and was rolled out in several European countries over the next few years.

Page 3: New Trends for Presentation

ActiveX ActiveX is a technology introduced by Microsoft in 1996 as part of the OLE framework. It includes a collection of prewritten software components that developers can implement within an application or webpage. This provides a simple way for programmers to add extra functionality to their software or website without needing to write code from scratch.

AdwareAdware is free software that is supported by advertisements. Common adware programs are toolbars that sit on your desktop or work in conjunction with your Web browser

BackboneJust like the human backbone carries signals to many smaller nerves in the body, a network backbone carries data to smaller lines of transmission. A local backbone refers to the main network lines that connect several local area networks (LANs) together. The result is a wide area network (WAN) linked by a backbone connection.

BitTorrentBitTorrent is a peer-to-peer (P2P) file sharing protocol designed to reduce the bandwidth required to transfer files. It does this by distributing file transfers across multiple systems, thereby lessening the average bandwidth used by each computer

BroadbandThis refers to high-speed data transmission in which a single cable can carry a large amount of data at once. The most common types of Internet broadband connections are cable modems (which use the same connection as cable TV) and DSL modems (which use your existing phone line).

Cloud computingCloud computing refers to applications and services offered over the Internet. These services are offered from data centers all over the world, which collectively are referred to as the "cloud." This metaphor represents the intangible, yet universal nature of the Internet.

CookieA cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information about you, similar to a preference file created by a software application.

CyberbullyingThere are bullies and then there are cyberbullies. While bullying typically happens at school or work, cyberbullying takes place over cyberspace. This includes both Internet and cell phone communication. 

Domain suffixA domain suffix is the last part of a domain name and is often referred to as a "top-level domain" or TLD. Popular domain suffixes include ".com," ".net," and ".org,"

Workstation a workstation is a place where work gets done. It refers to a computer (and often the surrounding area) that has been configured to perform a certain set of tasks, such as photo editing, audio recording, or video production.

VGAStands for "Video Graphics Array." It is the standard monitor or display interface used in most PCs. Therefore, if a monitor is VGA-compatible, it should work with most new computers. The VGA standard was originally developed by IBM in 1987 and allowed for a display resolution of 640x480 pixels

UPSStands for "Uninterruptible Power Supply." In the technology world, UPS is more than just a brown shipping company. It is also a type of power supply that uses battery backup to maintain power during unexpected power outages.

USBStands for "Universal Serial Bus." USB is the most common type of computer port used in today's computers With the help of a few USB hubs, you can connect up to 127 peripherals to a single USB port.The USB 1.1 specification supports data transfer rates of up to 12Mb/sec and USB 2.0 has a maximum transfer rate of 480 Mbps. USB 3.0 max. rate 4800 Mbps (4.8Gbps)

TouchscreenA touchscreen is a display that also serves as an input device. Some touchscreens require a proprietary pen for input, though most modern touchscreens detect human touch. Since touchscreen devices accept input directly through the screen, they do not require external input devices, such as mice and keyboards. This makes touchscreens ideal for computer kiosks, as well as portable devices, such as tablets and smartphones.

Toggle keyA toggle key toggles the input from a group of keys on a keyboard between two different input modes. The most common toggle key is Caps Lock, which toggles the letter keys between lowercase and uppercase mode. Some keyboards also have other toggle keys, such as Num Lock, Scroll Lock, and Insert

Surge ProtectorThe surge protector is an important, yet often overlooked part of a computer setup. It allows multiple devices to plugged in to it at one time and protects each connected device from power surges

System RequirementsWhenever you purchase software or hardware for your computer, you should first make sure your computer supports the system requirements. These are the necessary specifications your computer must have in order to use the software or hardware

SSDStands for "Solid State Drive." An SSD is a type of massstorage device similar to a hard disk drive (HDD). It supports reading and writing data and maintains stored data in a permanent state even without power. Internal SSDs connect to a computer like a hard drive, using standard IDE or SATA connections.

SmartphoneA smartphone is a mobile phone that includes advanced functionality beyond making phone calls and sending text messages. Most smartphones have the capability to display photos, play videos, check and send e-mail, and surf the Web. Modern smartphones, such as the iPhone and Android based phones can run third-party applications, which provides limitless functionality.

ServerA server is a computer that provides data to other computers. It may serve data to systems on a local area network (LAN) or a wide area network (WAN) over the Internet.Many types of servers exist, including web servers, mail servers, and file servers

Page 4: New Trends for Presentation

RouterThis is a hardware device that routes data (hence the name) from a local area network (LAN) to another network connection. A router acts like a coin sorting machine, allowing only authorized machines to connect to other computer systems. Most routers also keep log files about the local network activity.

Retina DisplayThe term "retina display" is a hardware term coined by Apple in June, 2010. It describes a display that has a resolution of over 300 dpi. The iPhone 4, which was also announced in June, 2010, has a screen resolution of 326 dpi and was the first Apple product to include a retina display.

Quad-core A quad-core CPU has four processing cores in a single chip. It is similar to a dual-core CPU, but has four separate processors (rather than two), which can process instructions at the same time.

NodeAny system or device connected to a network is also called a node

Hot SwappableIn electronics terminology, the word "hot" is often used to mean "active" or "powered on." Therefore, a hot swappable device is a peripheral or component that can be removed or added while a computer is running. Replacing a device while a computer is powered on is called "hot swapping."

ConsoleA console is the combination of a monitor and keyboard. It is a rudimentary interface in which the monitor provides the output and the keyboard is used for input.

Debug Computer programmers, like everybody else, are not perfect. This means the programs they write sometimes have small errors, called "bugs," in them. These bugs can be minor, such as not recognizing user input, or more serious, such as a memory leak that crashes the program

Default ProgramA default program is an application that opens a file when you double-click it

Dual bootA dual boot system is a computer that can boot into two different operating systems. While most computers automatically load a specific operating system (OS) at startup, a dual boot system allows you to choose what OS you would like to load.

FreewareLike shareware, freeware is software you can download, pass around, and distribute without any initial payment. However, the great part about freeware is that you never have to pay for it. No 30 day limit, no demo versions, no disabled features -- it's totally free

Open sourceWhen a software program is open source, it means the program's source code is freely available to the public. Unlike commercial software, open source programs can be modified and distributed by anyone and are often developed as a community rather than by a single organization. For this reason, the phrase "open source community" is commonly used to describe the developer of open source software development projects.

Assignment:CentralizedStreamingDigital SignatureHyperlinkDSLAccess PointsUTP CableBookmarksPortalIP AddressMainframeObject OrientedSearch EngineVirusHomepage