Term
|
Definition
it is raw input which when processed or arranged makes meaningful output
|
|
|
Term
|
Definition
Information is processed outcome of data
|
|
|
Term
|
Definition
Any activity that transforms an input signal into an output image signal |
|
|
Term
|
Definition
the process of storing information in a computer memory or on a magnetic tape or disk
|
|
|
Term
|
Definition
computer memory refers to the physical devices used to store data or programs on a temporary or permanent basis for use in an electronic digital computer
|
|
|
Term
|
Definition
the ability of a system or component to perform its required functions under stated conditions for a specified period of time. |
|
|
Term
|
Definition
The ability of a software or a hardware to run on a certain model or brand.
Windows Compatible |
|
|
Term
|
Definition
Optical character recognition
Refers to using devices and software to read characters and translate them into ASCII characters that can then be processed by computer programs.
Application of OCR as ASCII text, the text can then be edited in word processors |
|
|
Term
|
Definition
Process of
capturing human marked data from documents such as surveys and tests.
It works with a dedicated scanner device that shines a beam of light onto the form paper. The contrasting reflectivity at predetermined positions on a page is then processed to detect the marked areas because they reflect less light than the blank areas of the paper. |
|
|
Term
|
Definition
Verification is performed to ensure that the data entered exactly matches the original source. |
|
|
Term
|
Definition
is an automatic computer check to ensure that the data entered is sensible and reasonable. It does not check the accuracy of data. |
|
|
Term
|
Definition
encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key |
|
|
Term
|
Definition
A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communication.
The firewall will follow a criteria and set of rules set by the user |
|
|
Term
|
Definition
A malicious software program that attaches itself to other programs or files. It is capable of copying itself throughout the computer or throughout a network. |
|
|
Term
|
Definition
A malicious software that appears to be useful, a antivirus program, but once activated(installed) by t user it will allow unauthorized access by a hacker.
|
|
|
Term
|
Definition
A piece of code that can make fully functional copies of itself, without the need of attaching itself to a program etc.
|
|
|
Term
|
Definition
A piece of code that remains hidden inside a computer and will only execute itself when a certain condition is implied. |
|
|
Term
|
Definition
The operating system, software framework,hardware of a Computer in which certain application softwares can be run.
Computer platforms can be either software or hardware and can build on one another in layers. Computer platforms are used as a framework onto which other programs are built
|
|
|
Term
|
Definition
A hardware component which is connected to a computer it is not part of its normal function it is Dependant on host and extends capabilities of the host computer.
Printer,projector, etc... |
|
|
Term
|
Definition
the programs used to direct the operation of acomputer,
as well as documentation giving instructions on how to use them |
|
|
Term
|
Definition
Software that is distributed freely and for which users voluntarily pay a fee for its use. All users are ethically obligated to pay for shareware if it is used beyond the implied or implied evaluation period. |
|
|
Term
|
Definition
Software or other intellectual material that is free and available to the public without restrictions. With regard to software, this is usually the same as freeware; however, freeware may be copyrighted and often carries the identity of its writer.
|
|
|
Term
|
Definition
software, often copyrighted, produced for free distribution and use. There often are restrictions regarding the sale or modification of the software. Sometimes referred to as public domain software. |
|
|
Term
|
Definition
|
|
Term
|
Definition
is software for personal computers that combines the most commonly used functions of many productivity software programs into one application. |
|
|
Term
|
Definition
A document that presents the information necessary to employ a system or component to obtain desired results. Typically described are |
|
|
Term
|
Definition
\
A unique number or character string assigned to an item of equipment or to a copy of a software program.
|
|
|
Term
|
Definition
offer, often associated with a purchase, in which a marketer provides customers a level of protection, beyond a Guarantee period, that covers repair or replacement of certain product components if found defective within some identified time frame. |
|
|
Term
|
Definition
The legal right of authors, composers, or publisher to "print" and distribute intellectual and artistic creations. The right is granted by governments and may apply to intellectual property in digital forms. In this case the printing and distribution includes digital forms of the works. |
|
|
Term
|
Definition
A licensor may grant licence underintellectual property laws to authorize a use (such as copying software or using a (patented) invention) to a licensee, sparing the licensee from a claim of infringement brought by the licensor.[ |
|
|
Term
|
Definition
The coding of files to storage space or transmission time. Most commonly used files of text, images, sound, or video can be converted into files of fewer bits. These compressed files can then be expanded to the original form for display or play. Many compression algorithms exits. Some compressions are better suited on one type of file than for others. Commonly used image compression methods are JPEG, and GIF. There are special compression methods for sound and video (e.g., MPEG compression) files. Some compression methods are used for files without regard to the kind of data represented. Common general compression methods include zip and pkzip for DOS based systems, stuffit for Macintosh® operating systems, and compress (using gzip) for UNIX operating systems. Two or more compressed files may be combined into an archive file using compression programs such as tat or zip. |
|
|
Term
|
Definition
1. verb - To make copies of computer data or programs. 2. noun - Copies of computer data or programs. Backups may be on any media such as floppy diskettes, hard disks, CD-ROMs, or tapes. Backups are made to be used for recovery in the the event of damage or loss of the original version of the files. |
|
|
Term
|
Definition
An entry into a computer system deliberately left by designers, usually privileged accounts intended for field service technicians or maintenance programmers. (Also called "trap door" or "wormhole") |
|
|
Term
|
Definition
1 A program that guides users through a sequence of choices and helpful information, leading to the completion of specific tasks such as software installation, mail merges, or computer configuration. 2 A person who understands complex computer systems. |
|
|
Term
|
Definition
A template is a tool for enforcing a standard layout and look and feel across multiple pages or within content regions |
|
|
Term
|
Definition
The branch of computer science which aims to create intelligent machines; the study and design of intelligent agents, where an intelligent agent is a system that perceives its environment and takes actions which maximize its chances of success. |
|
|