38
ENGLISH COURSES TASK Intended To Fulfill The Task Of English Languag e Courses Compiled by :  Geby Prihandani 1209705059 DEPARTMENT OF I NFORMATION FACULTY OF SCIENCE AND TECHNOLOGY STATE ISLAMIC UNIVERSITY SUNAN GUNUNG DJATI BANDUNG 2009

Vocabulary of Informatic

Embed Size (px)

Citation preview

Page 1: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 1/38

ENGLISH COURSES

TASK 

Intended To Fulfill The Task Of English Language Courses

Compiled by : 

Geby Prihandani 1209705059

DEPARTMENT OF INFORMATION

FACULTY OF SCIENCE AND TECHNOLOGY

STATE ISLAMIC UNIVERSITY SUNAN GUNUNG DJATI

BANDUNG

2009

Page 2: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 2/38

VOCABULARY OF INFORMATIC

Abend (Abnormal end) 

Termination of a program or process that is not normally caused by theoccurrence data input errors by the user or program crash.

ABI (Application Binary Interface)

Exposure specification hardware and operating system being used.

AbiWord

GNOME Office applications for word processing (word processing). AbiWord

classified in one of the open source software licensed under the GNU GPL (GeneralPublic License). Because it can be used freely as well as making modifications needs.

Abort

Command to cancel the course of a program by force and return to operatingsystem.

Access 

 Activities retrieve or store data from or to memory or to disk drives.

Accessibillity 

How to set the button, voice, appearance and so forth on the Windows operatingsystem.

Access Method 

The software that controls the transfer of data between primary storage andequipment inputs and outputs in a system.

Access Time

The time needed to retrieve or enter data from or to memory.

Accessories 

On Windows operating systems, accessories are additional programs, such asCalculator, Notepad, Wordpad, Paint, etc..

Page 3: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 3/38

Page 4: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 4/38

 ADSL (Asymmetric Digital Subscriber Lines)

Digital data transmission over the high-level line telephone lines. ADSL is atechnology modulation developed with Discrete Multitone (DMT) that allows

transmission tinggi.Fasilitas ADSL speed data simultaneously using a traditionaltelephone service, ISDN, and high-speed data transmission, as well as video.

DMT-based ADSL appears as a transition from copper wire to wire with the fifront. This makes ADSL more economical use for local telephone companies becausemempu ADSL device provides high-speed data services before teknologifi to useoptics.

Advertiser  

Synonymous with Merchant, the merchant or company that gives commission.

Affiliate Site 

Page where the ad merchants included. We can enter into the merchant¶s ad anyexisting page in the website, and it may disembarang place.

AGP (Accelerated Graphics Port) 

 A high-speed graphics bus that directly connects the graphics card with the mainmemory. AGP operates independently and separately with the PCI bus and generallyrunning at 66MHz which is two times the speed of PCI that runs on 33MHz. AGP 1x doone transfer per cycle for maximum data transfer 266 MB per second. AGP 2x to doublethe data transfer by one cycle is 533 MB per second, while the AGP 4x to four timesthe transfer by one cycle is 1.06 GB per second. While speed The maximum datatransfer on the PCI itself is 132 MB per second.

AGPset

 A chipset that supports Accelerated Grap hics Port.

AI (Artificial Intelligence)

Develop computer science in order to work and think and take decisions likehumans.

ALGOL (Algortihmic Oriented Language)

High-level programming language that is used to solve problems in measures islimited. Generally to make science programs.

Page 5: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 5/38

Aliasing

 An effect (aliasing) which arise due to image or signal samples performed at thelevel is too low. This effect causes the high area of texture (d neat change) in the visibleimage as a slow change. When aliasing appears it will be difficult to reproduce the

sample image into the image accurate original.

Alignment

In a computer network is a process of leveling the components of a system of other components. For example computer time synchronization of a system.

Align

From the word alignment, which orders in a word processing program to flattenmanuscript, whether to the left, right, or center.

Allocate

Instructions to put some computer memory or other units under the controlcomputer programs.

Alpha Numeric 

Mixture of characters and numbers, including letters (AZ; az), punctuation andsome special characters such as @, #, $, *, and so on.

Alias 

The second name of a file, usually a second shorter and easier to remember rather than first names.

ALOHA

 Access control technique for medium-level transmission medium that handlesmuchaccess. Data transmission will be done at any time by a station. Shipping will berepeatedIf a NAK response (there are problems with shipping) from the destination station.

Page 6: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 6/38

Alt Key 

Name button on the keyboard located on the right and left of the space key.Buttons These new functions when pressed in conjunction with other keys. In theWindows environment, This key together with a particular letter can be used to open

and select the command on the menu quickly.

ALU (Arithmetic and Logical Unit)

Part of the CPU that is useful for data processing logic and data requirescalculation. ALU consists of registers to store information.

AM (Amplitude Modulation)

Type of amplitude modulation using the analog signals to distinguish the situationdigital signal.

AMD760

 AMD760 chipset is a chipset for the AMD Athlon processor. This chipset consistsof twoie AMD761 chip controller or bus system known as the Northbridge and AMD 766peripheral bus controller or the Southbridge. AMD760 chipset provides a new standardin technology, more powerful memory of PC1600 DDR memory and the DDR PC 2100allows high performance multitasking and multimedia applications intensively. Chipset

 AMD760 support to FSB26 MHz and 266MHz DDR memory and AGP 4x.

AMD760MP

 AMD made chipsets for use with the Athlon MP processor. Consists of two chipsie AMD762 chip bus system controller (Northbridge) and the peripheral bus controller 

 AMD766(Southbridge). AMD760MP chipset using DDR memory technology and enablesmaximum performance on the x86 processor technology in multitasking and multimediaapplications. Chipset This AMD760MP able to support two Athlon MP processors, 266MHz FSB, DDR memory PC2100, and supports AGP 4x and PCI 33MHz/32-bit and 64-bit.

AMD761 

System bus controller chip, known also as the handle element Northbridge criticalsystems that affect overall system performance while also overcoming transfer data tothe processor. AMD761 main feature is the ability of the system controller to Athlonprocessor controlling the bus 266MHz, 266MHz DDR memory, 4x AGP, and PCI bus33MHz/32-bit.

Page 7: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 7/38

AMD762 

CHIP bus system controller also known as the Northbridge to support AMD AthlonMP processors, PC2100 DDR memory up to 4GB maximum capacity, and graphicscard AGP 4x. All of these features are designed to provide high performance server 

entry-level class or workstation-class dual-processor range to high-end. AMD762 has afeature supports FSB 266MHz, designed to provide increased data transfer 33 percentwhen compared with the usual AMD Athlon processors. Also this chip is also capable of handling DDR memory that supports Error Correction Control (ECC) and PCI33MHz/32-bit and 64-bit.

AMI BIOS

 A PC BIOS American Megatrends Production, Inc.. AMI BIOS has been widelyused on the PC desktop.

Amorphous

Nature can not reflect light. For example, a rewritable optical disk said amorphousstate has a spot laser beam that can not be reflected through the lens.

Analog

Forms of electronic communication which uses electromagnetic wavescontinuous, such as television and radio.

Analog Signal

Continuous electromagnetic wave, has the ability to emit through a variety of media and reach far greater than the digital signal.

Analog Computer 

Type of computer data processing-magnitude scale is expressed with variablephysical analog signal.

Anchor  

 Area of nodes between a content source or destination of a link. By clicking themouse on the anchor area, then the window will open a link or source destination. Sothe anchor of this area is a kind of highlight. Anchor area is also known as span, region,button, or extent.

Useful for text and graphics can be linked to a place in a single document same.This link requires 2 parts namely: Anchor, which aims to mark a text / graphics. Link,aims to deliver to places that have the mark earlier.

Page 8: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 8/38

AND 

One of the logical operators of Boolean algebra to compare whether two variableswill result in true value (1) or false (0) with the following rules:

0 AND 0 0

0 AND 1 0

1 AND 0 0

1 AND 1 1

AND Gate 

Electronic circuits that do data processing using an AND operation.

Anonymous FTP 

Facilities transferring files between Internet sites that allow Internet users accessthe data files or documents from anywhere in the Internet without having to enter UserIDand password.

ANSI (American National Standards Institute)

Institutions that determine standards for data processing, provide standard rules inuse the code and the language of a programming language.

Answer Back 

Computer or terminal capabilities are called to give his identity to computers or terminals that call.

Anti Aliasing

 A technique used to eliminate the effect of the jaggies in the image produced. Byusing this anti-aliasing resulting picture will look more smooth, especially on the linesthat are not horizontal or vertical (diagonal).

Anti Virus 

Tailored programs to detect files in a drive if affected virus or not. This programand eliminate the virus.

Page 9: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 9/38

Amplitude

High and low voltage from an analog signal.

Aperture grill

Consists of many vertical wires. Pixels on a monitor phosphor screen arranged inthe form of vertical lines. When the gun eletron scan on one line, this wire is isolatedpixels focused by each light. Aperture grill technique has two advantages whencompared shadow masking technique. First, the use of wire allows more energy canpass from the electron gun, which will produce a brighter image. Second, the resolutionvertical potential will be greater.

API (Application Programming Interface) 

 Application programs that provide services needed by a system, usually special

services for the application.

APL (ADA Programming Language)

 A programming language designed by theorists that are designed to be appliedremote terminals.

APPC

The ability of a protocol SNA to communicate between several programs in thenetwork without the host system in general.

Append 

Command in the file-processing application to add a new record on a files or merge new files with old files.

Application 

Software created by a computer company to do the tasks specific, such as Ms-Word, Ms-Excel.

Application Layers 

The top layer of the OSI model protocol (Op en System Interconnections). Dutyarrange everything related to the exchange of data / information between users,software applications and equipment in a system.

Page 10: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 10/38

Application Program

Computer program made to do or solve problems specific, such as payrollprograms.

Application Interface 

 A set of software that allows programmers to enter a system and use servicesprovided in a network.

Application Development Language 

High-level programming language used to build an application with an easier way.

Application Package 

Complete application package, consisting of specific programs included in thememory The following computer hardware support is needed (including I / O device).

Application Oriented Language

Programming language specifically developed to have the ability change thecomplex processing problems into a more simple way. By using this language,programmers no longer need to compile the code to perform calculationsdifficult.

Arbitrators 

Computer unit in charge of determining the priority number of all input devices unitconnected to a storage function or other functions.

Arcade 

Computer games are simple and two-dimensional shape, such as packman.

Archie 

Service network that is used to place files that can be accessed by public viaanonymous FTP.

Architecture 

The design of the formulation components in the computer.

Page 11: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 11/38

Archive 

Used to make copies of a backup file in order to protect the copy original fromdamage.

Area 

The inside of a computer memory which is determined by hardware or program for specific data handling.

Arguments 

 A value entered on a routine or order as limiting the reach of execution of commands.

ARP (Address Resolution Protocol)

Internet protocol address of the Internet to put the hardware address on the LANcontinuously.

ARPANET

Computer network, developed with the help of Advanced Research Project Agency, is a forerunner of the Internet.

Array

In a programming language. Array is a collection of data objects with identicalattributes.

Ascending

The sequence data from the smallest to the largest, for example from AZ; from 0-9.

Sort Ascending

Sequencing techniques with how to structure the data or information from thelowest to the value highest.

ASCII (American Standard Code for Information Interchange)

Standard letters and punctuation marks for the computer. ASCII is a code in theform of 8-bit characters figure 1 and 0 to represent the character alpha-numericcharacters.

Page 12: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 12/38

ASIC (Application Specific Integrated Circuit)Integrated circuits in a computer system used to perform the duties certain.

ASP (Active Server Pages) 

Microsoft¶s programming language that combines server-side scripting and HTMLto create a dynamic web pages (dynamic pages).

ASP (Application Service Provider) 

 A business that offers access to software applications to individual users or officesvia the Internet facilities. Basically, ASP is a Dent independent Software Vendor (ISV) or ISP who use the Internet as a means of Submitting the application, so the program canfunction.

Assembler 

Program that serves to convert the program into the Assembly language machinelanguage.

Assembly

The process of translating programs written in programming language symbolsinto the machine language.

Assembly Language 

Low-level programming language that is more like machine language in the formis easy to remember.

Associative Memory 

Engineering data call. Data is not retrieved from memory based on the address,but based on existing patterns in data.

Asynchronous

Method of data transmission of data transmitted by one character per unit time.Synchronization will be done every time the character is received with the help of theearly bits and bit the end.

Asynchronous Response Mode (ARM)

One of the secondary station operating model supported by the BOP (Bit OrientedProtocol). This model allows the secondary station transmitting first start without waitingcommand from the primary station.

Page 13: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 13/38

 AT (Advanced Technology)

Type of company issued computers after IBM XT models. AT speed more higher than the XT.

ATA (Advanced Technology Attachment) 

Standard interface for hard drives and use the cable 40-pin connector. Various ATA is ATA-2, ATA-3, Ultra-ATA, ATA/66, ATA/100 and ATA/133 most recently.

ATCON

Tools used in the Novell Netware environment. This tool will provide informationthe stack routers Appletalk and Appletalk networking information on the Internet.

ATM (Asynchronous Transfer Mode)

 An advanced technology development in telecommunications, which uses switchthe hardware to create a direct channel between the two goals while, until data can bemoved at high speed. Data was taken in a unit with a certain length called cell (1 cell =53 octets).

ATS (Administrative Terminal System)System developed to facilitate the person who typed text for copying. ATS was

developed by IBM Corporation.

Attachment

Facility on an e-mail programs both computers and webmail programs that canused to send files, or images, which in ikutsertakan on e-mail are in send.

Attach

Command to track and put the program into memory. Network computer meansfor entering commands in a network server.

Attributes

Data that contains information about a variable or file. In computer networkingmeans of access and describe techniques propertyfil e or directory in storage systems.

Audit Trail 

The concept of gradual examination of the way through past activities that effecton an estimate.

Page 14: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 14/38

Page 15: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 15/38

Auto Indexing 

Determining keywords is done by the computer automatically as an index inputs adocument.

Auto Login 

 A facility in a network environment governing the business of a user login (user).

Autonomous System

Series of hosts and routers under the supervision of a single authoriti.

Automatic Programming

 Automatic programming to prepare commands in machine languageuse of 

computers.

Automatic Programming Tool (APT)

Computer language used for numerically controlled equipment.

Automatic Repeat Request (ARQ)

Facilities in the network will automatically re-request re-transmission known if there is an error in the transmission process.

Automatic Send and Receive (ASR) 

The ability of equipment to receive and send data without human assistance.

Automatic Stop

Termination of computer programs running automatically by the detector becausedetects errors in the process of program operations.

Autoplotter  

 A machine will automatically draw a graph based on data included.

Auto Shapes

Word processing program¶s ability to create three-dimensional text, three boxesdimensions, text boxes and others.

Page 16: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 16/38

Auto Text 

Word processing program¶s ability to enter a key word in keyboard so that a longsentence can be written simply by pressing a button serves as the short cut.

Auxiliary Memory

 Additional memory in addition to main memory, such as floppy disks.

Available on Disk 

Stating the number of areas on the disk is still empty and ready for occupancydata.

B & W (Black and White)

Display an object in black and white only. In Lotus 123, this command color graphics will return to black and white graphics again.

Backbone

Main lines (high frequency) communications on computer network systems.

Backbone Network

The main connection system of distributed network with a hierarchical structure.

Background

Color or image that is structured to create a background effect in the page Web.

Back Orifice

Program developed and released by The Cult of the Dead Cow (CDC). BackOrifice is a remote tool admnistration, but its presence can be misused for thingsnegative. If dimanpaatkan a hacker, so he could take over control entirely on the

victim¶s computer. In addition, back orifice can also be used to steal data and e-mailfrom the victim¶s computer. This program is an extensible programs that can bechanged and developed all the time.

Backing Storage

Tools reservoir data in a computer simpannya ability greater than The main datastorage, but has a lower speed.

Page 17: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 17/38

 Backoff delay

The length of waiting time of a medium control acces to a terminal in the networkform of CSMA / CD, before sending back a fr ame after the a collision.

Backplane

 A panel in which a circuit board in a pl ug equipment included;

including all the cables that connect each circuit.

Backslash

Symbolic keys µ\¶; this button is often used when working with directories.

Backspace

Symbolic´keyboard button located above the Enter key. Work delete onecharacter before the cursor at the moment.

Backup

 A copy of the program file or data files created to provide assurance that the dataThere is not lost or deleted if there is something in the original file.

Backus Normal Form (BNF)

 A formal notation used to define the syntax of a language computer.

Backward Supervision

Supervision in the transmission of data signals sent from a station attendants tomaster terminal.

Bad Block Table

 A list of disk block containing the location of the damaged disk and is not can beused to store data. Sometimes called the media line detect.

Balance Error 

Voltage error caused by the analog sum of the computer analog and directlyproportional to the mistake.

Page 18: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 18/38

Balanced Error 

Tolerance limits of minimum error and maximum error is acceptable. Generallyworth the same or opposite signs (positive and negative), most zero.

Balanced Transmission

Transmission method by sending signals into the form of electrical current that willsent through a conductor. The signal will then be returned through conductor different.

Bandwidth

Transmission capacity of a network connection such as electroniccommunications, computer bus and computer channels. Regular represented by bitsper second or Hertz. If written in Hertz, then the numbers become larger than if writtenin bits per second. For example, if written in bits per second is 64 Kbps, which means it

is 64 kilobits per second or 8 kilobytes per second. This is usually used to measure thespeed Internet which we¶re using. Note 1Bytes = 8 bits.

Bang path 

 A set of names of tools used to direct e-mail from the user to other users.

Banner 

Parts that are not moving in Web documents, even if we roll scrollbar until the endof the document. Currently only Internet Explorer that supports the banner command.

Bar Code

Numeric characters displayed in the form of blocks with various thickness.

Bar Code Scanner 

Tool capable of reading the blocks of bar codes into alphanumeric form.

Bascom (Basic Compiler)

Program that translates a BASIC program ends. BAS into a file. EXE that can be

executed.

BASE

The basis of the number system, is the number of digits that can be displayed in asystem. Basic example of the decimal system is ten, the basis of the binary system istwo, the basic octal system is eight, the basis of the system is sixteen hexadecimal, andso on.

Page 19: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 19/38

 Base Band

Such a canal that uses communication channels that carry only one signal at onetime. For example the use of telephone lines as a means of sending data between

computers which is located far from each other.

Bash (Bourne Shell Againt) 

The shell used in Unix and Linux klonenya like. Bash is a shell that used as thedefault shell by RedHat Linux. This is marked by the symbolic link in sh directory usedto run the bash shell. http://www.gnu.org/manual/bash-2.02/

D

DBase 

Software made by Ashton Tate. With DBase, users can build, access,

process and create reports from the files homemade.

DBMS (DataBase Management System) 

Program that allows the items in a database compiled, processed and

updated.

DBLSPACE 

Extend the technique of hard disk space starting introduced in MS-DOS version 6,

and

versions above.

DCCU (Data Communication Controller  Unit) 

Unit that controls the relationship between data communications equipment.

Usually

integrated part of a data communications system.

DCE (Data Circuit terminating Equipment) 

Tools that perform the conversion and encoding signals and connect to the DTE

a network.

Page 20: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 20/38

 

DCE (Distributed Computing Environment) 

Op-made technology en Softw are Foundation to support the spread of the use of 

computer.

DDBMS (Distributed DataBase Management System)

Database management program capable of accessing the few

databases at once.

DDL (Data Description Language)

Programming language that can be used to determine the level of the database.

EFT (Electronic Funds Transfer)

Transmission technique or data exchange financial transactions electronically.

EGA (Enhanced Graphics Adapter)

One of the standard monitor resolution. EGA could display 16 colors in the model

graph, the equivalent in the CGA monitor. EGA monitor with a card capable of 

displaying 16 colors

in the form of text (80 x 25 characters or 40 x 25 characters), 16 colors in the form of 

low resolution and

4 colors in high resolution graphics display 640 x 350 dots. The development of this

type of EGA

of them is with ATI Technologies Inc. named EGA WONDER card, can

display 132 x 25 characters. EGA monitor types are still using the same monitor 

connector 

with monitor type and Monochrome CGA. Everex cards issued EPGA (Enhanced

Proffesional Graphics Adap too), capable of displaying 649 x 480 dot (dot) with 256

colors, from

Basic color combinations 4096 (llette pa). EPGA and PEGA called (Proffesi onal

Enhanced

Graphics Adap too), or PGA (Proffesional Grap hics Adapter), displays a text screen

Page 21: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 21/38

132 x

43 characters in multi-frequency or jubilee sync, and flexibility that can use the monitor 

and enhanced monochrome monitor. This monitor uses 9-pin connector consisting

of 2 lines.

Egoless Programming 

The agreement between the programmer to read and give each other criticism of 

the

artificial programs other programmers. The programs are regarded as artificial

strangers that criticism is not based on sentiments expressed privately.

EIA (Electronics Industry Association)

 An association of electronics manufacturers in the USA which determines the

standard interface,

eg RS-232 C and RS-422A.

EIA Inteface

EIA standard interface that connects to the computer communications equipment.

EISA (Extended Industry Standard Architecture)

The expansion of computer design with the industry standard.

Eject

Command is given to the printer to put the paper in the beginning of the page. If 

currently the paper's position in the middle, then the rest of the page will be ignored and

put the paper at the beginning of the next page.

Page 22: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 22/38

Electric Delay Line

End delay is used to accommodate the signal by turning information

carried by a wave transmission.

Field Length

Eld sebuahfi length, the number of characters or bits that can be loaded in

sebuahfi Eld.

Field Programmable Logic Array

 Array logic gate associated with a programmable logic returns as one

unity.

FIFO (First In First Out)

One of the queue management techniques or handling of overlapping tasks, ie

items

The first will be done first.

Fifth Generation Computer 

Fifth generation computer, the computer output of the nineties until now.

The fifth-generation computers have the ability to process other things in addition to

data processing,

eg for artificial intelligence (artificial intelligence).

File

The file consists of a collection of records that are related. Each record

have adjusted the number dalamfile position.

Page 23: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 23/38

File Form

Binary files containing graphic images of the form, formed when the programmers

develop

program with a visual programming language. All the changes that occur withrm will be saved tampilanfo this dalamfile.

File Header 

Some characters are located at the beginning of a file stored on the disk.

This header file has a relationship with the name and the sifatfi le.

Floopy and IDE connector 

This connector connects the motherboard to save permanent devices such as

floppy

disk or hard drive. IDE connector on a motherboard usually consists of two, one is

primary IDE and the other is the secondary IDE. Primary IDE connector connects

motherboard with the primary master drive and the secondary master device. While

connector 

secondary IDE usually connected devices to access the slave as CD-ROMs andslave hard drive.

Gathering Data

Combining a number of data as in data collection.

Gather Write

Operations that form a single record from the collection of a number of fields in the

memory location

main.

Page 24: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 24/38

GB

Derived from the word GigaByte, a unit of measurement on a computer hard disk

capacity

with 1 GB = 1024 MB.

GBT (Underground)

Term given the users the facility to refer to IRC users who seem to

silent, but was talking to someone else secretly.

GCR (Group coded recording)

Method of data recording on magnetic tape with a very high density.

General Format Identifier 

Part of the general format of the data packet consists of 4 bits (ie bits 5, 6, 7, and

8) and

shows the form of packet headers. Bits 5 to 6 shows the sequence numbering is used,

bit 7

serves to deliver the confirmation procedure in the packet data and 8 bits serve todistinguish

data packet.

Generalized Routine

 A routine that has the ability to process a variety of tasks.

HTML 3.2

Standard HTML format developed by the W3C (World Wide Web Consortium)

Page 25: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 25/38

HTTP (Hyper Text Transfer Protocol)

 A method or protocol to download the file to your computer. This protocol-based

hyper text, a text format commonly used on the Internet.

Hub ring

 A flat ring found on the floppy disk hole size of 5.25 "and serves to

increase the strength of floppy disk.

Hue

The term which states set the color spectrum. Hue is the component thatdetermine what colors are used. In the gradient, when used color models

using hue as one of the components will be made a rainbow effect.

Hybrid Computer 

 A digital computer which receives the analog signal, convert it into digital data

and processing.

HydraVision

 ATI Technology to be able to show two displays from one graphics card. This

feature

allows two displays can be raised with the resolution and refresh rate are different.

Icon 

 A small symbol is an image that appears on the computer screen. Usually usedto represent documents or other programs and disk drives.

Page 26: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 26/38

ICQ

From the word "I Seek You". Applications to chat with the exchange of files and

sending

SMS.

IDE (Integrated Drive Electronics)

 A type of functioning hardware interface for connecting hard disks, CD-ROM

and tape drives on a PC. IDE is very popular and widely used because it provides a way

a comparatively economical to connect a hardware component.

IDE controller 

The instrument used to regulate the hard disk, cd-rom, etc..

Idle time

The duration of time when a device in a static condition. In other words, life tools

or active, but can not be used for work.

IGP (Interior Gateway Protocol)

 A protocol used by gateways in an autonomous system for 

transfer route information.

ILD (Inter Layer dielectric)

Isolation / insulation installed in between the layers aluminum or copper wire

connect the transistors on a chip. Dielectric polymer found in the early

21st century greatly influenced the design of a chip.

Jaggies

 A jagged effects arising from the use of digital techniques to

displaying an image. This effect is particularly visible on the diagonal line.

J

Java

Programming language to create active content in Web pages, can also be

run in all computers. Java applets retrieved / accessed from a Web page and run

total.

Page 27: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 27/38

Page 28: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 28/38

 

Power Connector 

Connecting pin motherboard with power supply in case of a computer.

 At AT type motherboards, chassis is needed is the type of AT as well. AT Power 

connector type

consists of two parts, where the two wires from the power supply will be lodged. In ATX

type, cable

power supply integrated in one complete header, so stay in menancapkannya

motherboard. This cable consists of two columns in accordance with the pin on the

motherboard which consists of 

two pin array as well. There are some motherboards that provide two types of power 

connectors, AT and

 ATX. Most new motherboards are ATX type.

L

L1 Cache

 A small number of SRAM memory used as cache or a single integrated

packages in the same module on the processor. L1 cache is locked at the same speed

processor. Useful to store temporary instructions and data, and ensure

that the processor has a stable supply of data to be processed in memory while taking

and

storing new data.

L2 CacheGenerally consists of SRAM chips near the processor, however, latest generation

 Athlon processors have L2-Cache on chip. Its function is similar to the L1 cache, L2

Cache is also known as secondary cache, a memory that has a sequence of velocity

The second (type of memory is the fastest L1 Cache) which provided for the

microprocessor.

LAN

 A network built at a location such as at home or building office. Can be interpreted

also as a computer communications system limited distance no more than a few miles

and using high-speed connection between 2 to 100 Mbps.

Land Attack

 Attacks to the system by using a program called "land". If 

attacks directed at Windows systems, the system will be protected not hang

(and get out the blue screen). Similarly, if the attack is directed to the old version of the

UNIX system,

Page 29: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 29/38

then the system will hang. If the attack is directed to the Windows NT system, the

system will be busy

with the CPU usage reaches 100% for some time so the system looks like a traffic jam.

Land program intended to attack the server by sending fake packets as if 

derived from the destination server. In other words, the source and destination of the

packet is made as

will come from the destination server. As a result the server that was attacked was

confused.

Layer 

Layers (the concept) in networking. Various communication models such as OSI

and TCP / IP

composed of several layers that make up the protocol.

LCD (Liquid Crystal Display)Type of display screen that uses a liquid compound that has the structure

polar molecules, sandwiched between two transparent electrodes. When the electric

field is given, the molecule

adjust its position on the field, forming a crystalline structure of light mempolarisasi

whereby.

M

Mailing list

 A discussion forum on the Internet by using e-mail. One message from a

members will be accepted by all members.

Mail Notifier 

Features in the mailer that always tells us if there is an e-mail arrived.

Man Command

In a UNIX command that allows to obtain information about the command -

commands in the UNIX operating system (man stands for manual), and the command is

command parameters to be known.

Mandrake (http://www.linux-mandrake.com)

One of the Linux distributions, was born inspired by the Red Hat Linux, with many

prakonfigurasi application development and making it easier for beginners, both from

initial process XWindow-based installation, to use and is supported by

various languages. In the Mandrake, all packages have been compiled with CPU

optimizations for 

Pentium class (Intel, AMD, cyrixm winchip) and the processor on it and make

Page 30: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 30/38

optimization

more than 30%.

Member 

Members. Member ID = identity of members, member name = name of a

member.

Merchant

Traders or companies in the Internet which provides the commission, which is a

strategy

online sales.

N

Network Adapter 

 A hardware device used to connect computers to the network.

 A network adapter can be a PCI card or a computer connected to the

external via USB or parallel port.

Network Admnistrator 

The person responsible for taking care of the network and help users.

Network Crawler 

 A type of destroyer program commonly called viruses or worms and causes slow

performance in the network.

Network Service Provider 

Service providers including telecommunications companies, data carriers, ISPs,

Wireless -

Communication Service Providers and cable operators that offer a connection speed

high

Newsletter 

News sheets, such bulletins. On the Internet means that pieces of news that

spread via e -

mail, with a layout like a web page, so that it can link is clicked.

NFS

Required if you want to access the remote filesystem to a server and this support

is a must.

Page 31: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 31/38

O

OEM (Original Equipment Manufacturer)

 A slank phrase to describe a company that has a special relationship

with large-scale computer manufacturer. OEM buy products made by large companies

not yet rated brands and then packaging and selling these products with the brand'stheir company.

OLE (Object Linking and Embedding)

Way from Microsoft to be able to communicate between different computer 

programs,

the basis used for the development of ActiveX.

On Now

The technology developed by Microsoft. On Now is the term for a PC

which is always alive but looks dead and immediately responds to the user or the

condition

else if requested.

Open relay

 A server that allows the account to another domain to use the machine.

So contrary to close the relay.

OS / 2 HPFS

Filesystem supports OS / 2 and HPFS. Linux can not read these filesystems(read-only).

OTP (One-Time Programmable)

Part memory or a certain memory functions that only allow programming

done at one time. In this case the reprogramming is not possible.

P

Page Wizard

The steps are assigned sequentially to guide in making

a web page.

Parity

 An error condition detection system that tests the integrity of data between

systems

computers and networks. Parity check using the extra bits 9 which includes the value of 

0-1

Page 32: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 32/38

(depending on the content of the data byte). Each time a byte is transferred or 

transmitted,

test occurred parity bits.

Partitions 

The process of dividing the disk into two or more, so as if there will be

more than one disk.

Payload

Effects caused by a virus. In some cases, can also be used to

calls related to virus or Trojan Horse dropper.

PCI (Peripheral Component Interconnect)

Peripheral bus commonly used on the PC, Macintosh and workstations. First time

designed by Intel and appeared on the market at the end of 1993. PCI provides a datatransfer path

quickly between the CPU with peripheral components in a PC like the other videos,

disks, network

and others. Query

 An extracting data from a database and displays them for "processing" more

information.

Q

QuickStart TechnologyThis feature extended battery life by entering the low power status while

does not work or between jobs, although in a very short time.

R

Radio Button

Used in the form in order to select only one option from a list of exclusive

choice.

RAMDAC (Random Access Memory Digital to Analog Converter)VGA controller chip set color palette and converts data from memory to the signal

analog on the monitor.

Page 33: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 33/38

RDRAM

 A dynamic chip technology from RAMBUS, Inc.. This product has a special license

to

semiconductor technology that produces chips. In the basic chip introduced in 1995 with

speed of 600 MBytes / sec. In 1997, Concurrent RDRAM speed increase

up to 700 MBps, and in 1998, Direct RDRAM reach speeds of 1.6 Gbps. Concurrent

RDRAMs widely used in video games, while the Direct RDRAM used in

computer.

Recovery CD

Recovery CD has the function to return the disk contents as originally

PC (Personal Computer) for sale, alias back to the standard from the manufacturer.

Red Hat (http://www.redhat.com)

One of the Linux distribution, a distribution (distro) the most popular. Graphicsmode

facilitate this installation. Biggest point of this distribution is RPM (Redhat Package

Manager), with

this software we can install or uninstall applications and components sisop. Current

RPM

considered a de-facto standard in terms of packaging and its use has been widespread

in various

other distributions, except for Debian.

S

SDRAM (Synchronised Dynamic RAM)

DRAM is a spectacular place. Memory access cycle is synchronized with

processor clock. Thereby reducing the waiting time between the processor and

memory.

Search Engine

 A (facility) that can search the web links from other sites.

Sendmail

One of the "mail transport agent (MTA) is the most widely used on UNIX systems.The task of sendmail is to receive e-mails from outside and from the local system and

send it to the destination (such as adding e-mail to the mailbox of the user or 

send it to the destination server.

Page 34: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 34/38

Server 

1. A computer on the Internet or on any other network that stores files and

make the file available to be taken if necessary.

2. A computer network applications are used to serve many users

in one network.

Setting

 A program that makes up a system or a software application.

Setup

 A program that prepares a software application that can run on a

computer. Setup creates a folder with the default name on the hard drive and copying

files

files from the CD-ROM or floppy disk.

Setup Wizard

Part of the setup program that helps the user to perform the installation process

correctly.

T

Title

HTML tags are used to give the title of each HTML document.

Transmision Line

Transmission line, the physical connection from the computer through the Internetlike a telephone line or IT.

Tray Icon

In the Windows operating system, tray icon on the toolbar is located next to the

clock

can indicate the status of programs running on the computer.

Trojan Horse

 An application designed to perform a fraud but veiled

with kindness. Usually the method is to put (attach a file by e -mail) a specific file that contains a Trojan Horse but with attractive packaging. If 

Trojan Horse successfully infect it has a hacker can get unlimited access

to the victim's computer. Three types of Trojan horse is a popular use Bac Orifice,

Netbus,

and SubSeven.

Page 35: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 35/38

True Color 

Real colors with 24 bits and 16.7 million color variations. The term used true color 

for Macintosh systems (for the PC is not often used) in the image of the property

mentioned

display. UMSDOS

This support is needed if you want to run Linux on a DOS partition but it seems

RedHat Linux will not be able to run on a file system UMSDOS.

U

Unified Driver Architecture (UDA)

UDA ensure complete compatibility with software drivers. UDA facilitate

upgrade to the latest NVIDIA product because all NVIDIA products work made with

software

The same driver.

UNIX

The operating system used on both PC and Mainframe. Many computers and

servers are connected to the Internet using UNIX.

Upload

The process of transferring information from one computer to another computer /

server over the Internet.

URL (Uniform Resource Locator) An address indicating the route to a file on the Web or on the Internet facility

other. Typing the URL in your browser to access a Web site.

USB (Universal Serial Bus)

Socket contained in all new models for PC connection USB devices.

USB supports easy installation with Plug and Play system, and gradually

replaces the serial and parallel ports of the old. USB devices include scanners, modems

and

printer. V.32

Protocol used to transfer data modem with a maximum speed9600 bps.

Page 36: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 36/38

V

V.32bis

Protocol used to transfer data modem with a maximum speed28,800 bps.

V.34

Protocol used to transfer data modem with a maximum speed

28,800 bps.

V.42

Standard ITU (1989) to check the occurrence of errors (errors) in the modem

using LAP-M as the main protocol and MNP Classes 2 through a protocol

alternatives.

V.42bis

Modem protocol that is used to compress the data up to a maximum of four times

smaller.

V.90

Standard ITU (1988) for a modem that works on the downstream speed of 56

Kbps and

upstream speed of 33.6 Kbps.

W

WinWAIS

Windows-based program that allows use WAIS to track information

on the Internet.

Web Hosting

Provision of space to store the web pages by the owner of the computer / server,

which

can be accessed 24 hours via the Internet.

Web Servers

Hardware and software that is used to store and send

HTML document for use in World Wide Web.

Page 37: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 37/38

Web Site

 A collection of HTML documents in a personal or corporate Web server. A server 

Web can contain more than one site.

Webcams

Video camera designed to connect to a PC. The camera can be used to

record a video clip that can be sent via e-mail or to transmit images

directly on the Internet for video conferencing.

Whois

Free Internet program that is used to provide or compile a database

from the Internet domain name and artities someone else.

X

X2

The technology used by companies to implement a modem USRobotics

56 k.

X.25

 A protocol that determines the exchange package. X.25 is the CCITT standard

defines the communication protocol to access the packet switched network. This

protocol does not

so important, because through X.25 seen that the TCP / IP is much better.

X.75

How to connect together X.25 network.

Xabre

SiS graphics chipset that supports full AGP 8x and DirectX. This chip is

The first graphics chip that supports both features.

Z

Z-Buffer 

 Area of graphics memory used to store the Z or depth information

or object drawn. Z-buffer value of a pixel is used to determine whether he

located behind or in front of the other pixels. Z calculations prevent background objects

in overwrite objects that are in front of the frame buffer.

Page 38: Vocabulary of Informatic

8/8/2019 Vocabulary of Informatic

http://slidepdf.com/reader/full/vocabulary-of-informatic 38/38

 

Zip

ZIP is a common compression format used in the MS-DOS and Windows.

Some files can be merged into one and reduced in size in a single ZIP file

(zip file). There are several programs to manipulate this ZIP file, among others:

PKZip and PKUNZIP (shareware for MS-DOS)

WinZip (for Windows 95)

zip and unzip (free for UNIX)

ZIP socket (Zero Insertion Force socket)

 A type of socket is designed to be easy to enter the PGA chip.