answersLogoWhite

0


Best Answer

It depends on the terms. Here are some:

ASCII: American Standard Code for Information Interchange, a character-encoding scheme originally based on the English alphabet.

BIOS: Basic Input/Output System. This is the code that brings up the computer. It initializes the CPU and memory, installs basic routines needed to start an operating system, detects and initializes devices, and other tasks needed to start the computer.

Bit: A single on or off signal, represented as a 0 or 1.

Boot: To start a computer.

Bus: A collection of wires/traces, often with interface circuitry, which connect parts together in a computer. The peripheral bus is the interface between the peripheral cards and the rest of the computer.

Byte: A unit of data made up of 8 bits. Makes a single ASCII character.

Cache: A buffer between a slow device and a faster device. It can be done in hardware or software. For instance, cache memory on a hard drive can allow a computer to issue commands and to pass the control back to the computer before the hard drive is finished. Or, most commonly read data can be held in the hard drive's cache so it can be immediately given to the computer the next time it is requested without accessing the drive heads.

CPU: Central processing unit. It is a chip for processing and manipulating data. It is given data and instructions, and the instructions are used to manipulate the data, both in registers and in memory.

Code: CPU instructions. It is a special type of data which tells the computer what to do.

Crack: In the noun form, it is a patch or a code used to circumvent copy protection schemes. In the verb form, it means to enter a computer system without authorization, discover other people's passwords, or to modify copy protected software.

Cursor: An indicator on the screen. Could be an arrow, pointer, flashing line, or small solid or flashing dot. It is used by both keyboards and devices like mice, click pads, or track balls.

Data: Stored contents that is acted upon by a CPU.

DDOS: Distibuted Denial of Service attack. This is a way that hackers can keep others from accessing servers or specific computers on the internet. They transmit so much garbage that the other computer cannot access the Internet. It differs from a classical DOS attack in that multiple systems are used and coordinated to lauch the attacks.

DOS: Depending on the context, it could refer to the DOS operating system (Disk Operating System), an older operating system that is mostly obsolete, though it is still used in a way as a console mode under Windows. DOS can also refer to a Denial of Service attack. That is where a machine or botnet targets a specific machine with lots of junk data to where the target machine cannot access the Internet and other machines cannot access it.

Double word: 4 bytes, which is 32 bits.

DRAM: Dynamic Random Access memory. It can be read or written to as desired, but only operates when the power is on and a memory controller is available to refresh the data. Electronically, it is an array of transistors and capacitors. The capacitors hold a charge and keep transistors turned on. The transistors act like switches, and they stay activated as long as the capacitors stay charged. However, the transistors use up some of that current and drain the capacitors over time. So computers use refresh circuitry to read the memory, determine what is intended to contain 0's or 1's, and then write that data back.

Files: Data or code that is stored on a storage medium such as a diskette, hard drive, or CD/DVD.

GPU: Graphical Processing Unit. This is located on the graphics adapter (or the motherboard if the graphics are integrated with the motherboard). It is used to process image data without involving the CPU. It is much faster than the CPU in handling such requests because it was specifically designed for that task and is located on the graphics board. It often has access to its own memory (the graphics RAM), and this memory can be used to cache textures and other image data that a game or other graphics intensive program will use a lot. That way, it won't have to keep requesting the same data since it will have its own copies. So that cuts down on the peripheral bus traffic required.

Hacker: A term with both good and bad connotations. Initially, a hacker was anyone who was really good with computers, and they often taught themselves using unconventional means. However, ever since a news reporter got confused and said some hackers were guilty of getting into some computer systems and destroying data, the term changed to refer to those who maliciously enter the computer systems of others.

Hard drive: A device used to store and retrieve large amounts of data which is retained on a permanent or semi-permanent basis. Traditionally, it has been a box containing a motor and electromagnetic platters and read/write heads to access and record data. Nowadays, there are solid state hard drives that contain only NVRAM or other memory chips and no moving parts.

IC: Integrated circuit. A solid state electronic device that contains multiple, if not many circuits. It may appear as a black thing with many pins sticking out from its sides.

Malware: Any unwanted or destructive computer code. This can include viruses, spyware, worms, trojans, hacking tools (particularly if left on a host computer), rootkits, and spam generation software.

Memory: Areas in the computer in IC chips used to store information (code and data). It can be ROM memory, meaning the information is only read, RAM, which is read from and written to, NVRAM, which works like RAM but retains data similarly to ROM, or similar.

Modem: MOdulator/DEModulator, a device used to connect computers together or to computer networks. Traditional modems connect to telephone lines, and the oldest of those needed to be used with a telephone. Nowadays, "modem" can refer to DSL and cable equipment too, and such equipment encodes and decodes data between the computer and the ISP.

Mouse: A hand held device which is dragged across a surface and used to move a cursor across the screen.

Operating system: The basic collection of code and data used to make a computer usable and able to execute programs. The ROM BIOS or UEFI only provide so much functionality, and it is up to the operating system to form the interface between the computer and the user.

Peripherals: Things used with a computer that are not necessarily a part of the computer. That would be things like mice, keyboards, CD ROM drives, and even add-in cards to plug into the peripheral bus, though that blurs the distinction a bit.

Phishing: Attempts to gain passwords or financial information using social manipulation, particularly in the form of impersonation. They may send you an email pretending to be someone you trust, giving you a link or a form to fill out, and trick you into giving them personal details.

PUPS: Possibly UnPopular Software. These are things like toolbars and other software which users don't want on their PC but which do not damage it nor cause security risks. This category was created in response to trade libel suits over software being called spyware.

Quad word: 8 bytes, 4 words, or 64 bits.

RAM: Random Access Memory. It is computer memory which can be read or written to as desired.

Read: To access memory or data to use, execute, or examine, and do so without changing it.

Registers: Temporary storage areas in the CPU. They are hard-wired into the CPU and are much faster than DRAM memory.

ROM: Read-Only Memory. That is memory that once it is stored, usually at a factory, it can only be read.

Rootkit: Data or code that is hidden using the NTFS file system and certain features found in Windows NT and higher. Malicious software that is hidden this way can be very difficult to remove and may damage the entire Windows installation when you try to remove it. There are valid reasons for rootkits too, since Windows itself uses this approach for some of its files.

Software: The invisible information that is encoded on recordable media which contains CPU instructions and data, and is manufactured to perform specific useful tasks.

Solid state: Any electronic device that doesn't make use of vacuum cavities, heating devices, or moving parts, but uses semiconductors such as germanium and silicon.

Spam: Unsolicited and usually unwanted email, usually of a commercial nature. The emails are often about things such as weight loss, online degrees, male sexual enhancement products, breast enlargement, and scams.

SRAM: Static Random Access Memory. That is memory which you can read to or write to as desired and does not require refresh circuitry to help retain the memory. Internally, it is an array of cells made up of 4-6 transistors. It is often faster than DRAM but is more expensive to make and takes more power to operate. So SRAM is used in crucial places and as cache memory, while DRAM is used elsewhere.

Trackball: A device that looks like an inverted mouse. A finger or heel of the hand is used to turn the ball to position the cursor, and there are buttons just like on a mouse. These may be incorporated into laptop computers.

Trojan: A type of malware that is silently installed along with wanted software. It may include spam generator software, backdoors into your PC, certain types of viruses, install DDOS software, or software intended to delete data or damage your computer.

Unified Extensible Firmware Interface: (UEFI) A modern replacement for BIOS code.

Virus: Malicious computer code that gains control over a computer without a user's knowledge and can spread to other computers.

VLSI: Very Large Scale Integration. It took the integrated circuit idea further and crammed many more things into ICs. That technology made way for more modern computers.

Word: Two bytes, which is 16 bits.

Write: To record information to a storage medium such as RAM or a hard drive.

User Avatar

Wiki User

10y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

14y ago

what is the meaning of basic computer terminology?

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is the meaning of basic computer terminology?
Write your answer...
Submit
Still have questions?
magnify glass
imp