answersLogoWhite

0

📱

Computer Terminology

Questions and answers about different terms related to computers, as well as computer language that is popularly used today.

11,612 Questions

What is the full meaning of PC?

The most common usage of PC is personal computer or politically correct.

Give examples of people ware?

People ware is sort of a joke. A computer system consists of hardware ( the machines) , software ( the programs) and peopleware ( the people who use the computer system. to do their job.

Examples would be medical records staff, bank tellers, clerks in any office or retail outlet, ticket sellers , hotel desk clerks and on and on-- anybody who uses a computer in his work.

What is decomposition in database management system?

We can explain the given information using smaller amount of dats's by using decomposition. also, we can get separate details.

What is the meaning of file processing?

File processing system is a process of storing and organizing information through a network. This is a system that is commonly used in business to keep track and to access files instantly.

What cache memory is designed inside the CPU?

L1 and L2; Many years ago L1 was the only cache memory integrated into the CPU (processor) and L2 had to be added to the motherboard. Currently (as of year 2013), CPUs implement both L1 and L2 cache in the casing of the processor. Thus, processors (CPUs) ship with amounts of L2 cache independent for each processor core.

What is GHz and MHz?

MHz stands for Mega Hertz.

Hertz or Hz is unit for frequency and is represented by inverse of time unit i.e. second(-1) i.e. 1/second or per second.

Frequency = 1/ time period in seconds

1MHz is 10^6 or 1000000 Hz.

Difference between telephone network and internet?

Both are almost similar except internet service is more powerful than telephone network in a sense it never looses its ability to reach and you can even send ur messages to someone not online.. mean offline messages e-mails, attachment and much more..

there is difference in the hardware used between, in telephone we use telephone switches at central office but in internet more powerful and intelligent devices are used like layer 3 and layer 2 devices such as router, layer 3 switches, gateways etc

hope u understand

How many GB make one GHz?

this question makes no sense. its like asking you How many Fahrenheit are in Miles? They are 2 totally different measurements used for totally different things. GHz=Processor Speed GB=Storage Capacity.

What is a URL and what is its purpose?

A URL, or Universal Resource Locator (also known as a URI, a Uniform Resource Identifier) is a string of characters which is used to identify or name a resource, the main purpose being to enable interaction with a representation of the resource, typically the World Wide Web.

Answer

Universal Resource Locator

Data are information facts or numbers that help to describe something?

Measurement information that is used to describe something is called data.

per Physical Science 8th Edition by Bill W. Tillery

Why is task-switching a necessary feature of a multitasking?

The 80386 switches execution to another task in any of four cases: 1. The current task executes a JMP or CALL that refers to a TSS

descriptor.

2. The current task executes a JMP or CALL that refers to a task gate.

3. An interrupt or exception vectors to a task gate in the IDT.

4. The current task executes an IRET when the NT flag is set.

JMP, CALL, IRET, interrupts, and exceptions are all ordinary mechanisms of the 80386 that can be used in circumstances that do not require a task switch. Either the type of descriptor referenced or the NT (nested task) bit in the flag word distinguishes between the standard mechanism and the variant that causes a task switch.

To cause a task switch, a JMP or CALL instruction can refer either to a TSS descriptor or to a task gate. The effect is the same in either case: the 80386 switches to the indicated task.

An exception or interrupt causes a task switch when it vectors to a task gate in the IDT. If it vectors to an interrupt or trap gate in the IDT, a task switch does not occur. Refer to Chapter 9 for more information on the interrupt mechanism.

Whether invoked as a task or as a procedure of the interrupted task, an interrupt handler always returns control to the interrupted procedure in the interrupted task. If the NT flag is set, however, the handler is an interrupt task, and the IRET switches back to the interrupted task.

A task switching operation involves these steps:

  1. Checking that the current task is allowed to switch to the designated task. Data-access privilege rules apply in the case of JMP or CALL instructions. The DPL of the TSS descriptor or task gate must be less than or equal to the maximum of CPL and the RPL of the gate selector. Exceptions, interrupts, and IRETs are permitted to switch tasks regardless of the DPL of the target task gate or TSS descriptor.
  2. Checking that the TSS descriptor of the new task is marked present and has a valid limit. Any errors up to this point occur in the context of the outgoing task. Errors are restartable and can be handled in a way that is transparent to applications procedures.
  3. Saving the state of the current task. The processor finds the base address of the current TSS cached in the task register. It copies the registers into the current TSS (EAX, ECX, EDX, EBX, ESP, EBP, ESI, EDI, ES, CS, SS, DS, FS, GS, and the flag register). The EIP field of the TSS points to the instruction after the one that caused the task switch.
  4. Loading the task register with the selector of the incoming task's TSS descriptor, marking the incoming task's TSS descriptor as busy, and setting the TS (task switched) bit of the MSW. The selector is either the operand of a control transfer instruction or is taken from a task gate.
  5. Loading the incoming task's state from its TSS and resuming execution. The registers loaded are the LDT register; the flag register; the general registers EIP, EAX, ECX, EDX, EBX, ESP, EBP, ESI, EDI; the segment registers ES, CS, SS, DS, FS, and GS; and PDBR. Any errors detected in this step occur in the context of the incoming task. To an exception handler, it appears that the first instruction of the new task has not yet executed.

Note that the state of the outgoing task is always saved when a task switch occurs. If execution of that task is resumed, it starts after the instruction that caused the task switch. The registers are restored to the values they held when the task stopped executing.

Every task switch sets the TS (task switched) bit in the MSW (machine status word). The TS flag is useful to systems software when a coprocessor (such as a numerics coprocessor) is present. The TS bit signals that the context of the coprocessor may not correspond to the current 80386 task. Chapter 11 discusses the TS bit and coprocessors in more detail.

Exception handlers that field task-switch exceptions in the incoming task (exceptions due to tests 4 thru 16 of Table 7-1) should be cautious about taking any action that might load the selector that caused the exception. Such an action will probably cause another exception, unless the exception handler first examines the selector and fixes any potential problem.

The privilege level at which execution resumes in the incoming task is neither restricted nor affected by the privilege level at which the outgoing task was executing. Because the tasks are isolated by their separate address spaces and TSSs and because privilege rules can be used to prevent improper access to a TSS, no privilege rules are needed to constrain the relation between the CPLs of the tasks. The new task begins executing at the privilege level indicated by the RPL of the CS selector value that is loaded from the TSS.

What are Geeks and Bloggers?

You would think the term "geek" was just invented from this modern generation, but I've known this word since the 50's. Geeks (in our minds) wore horn-rimmed glasses, had bad skin, kept to themselves and got straight A's which was uncool for even my time. Funny, those "geeks" probably ended up becoming scientists or doctors or psychiatrists which many of us use! The laugh is on us!

Bloggers started soon after 9/11. They consider themselves bright, overly intelligent and non-stoppable. The are the "new journalists" etc. of the modern generation and, take great delight in so-called "uncovering the truth" (and sometimes they do succeed.) They are taking over on-line and have their very own websites (like small diaries chatting back and forth re their ideas) You don't even really need to know that much about computers. They are also "case crackers" and love a good challenge. They are often regarded as "self-important" but many are tired of the second rate form of journalism and to be honest, many are extremely bright. They don't need editors or publishers.

Their mission ... to remake political journalism and an attempt at changing the democracy itself. To make a run around the media by becoming publishers on the internet. One blogger is Matt Druge who wired the news and gossip and broke the story about Monica Lewinsky's affair with Bill Clinton (Matt is a blogger.) They are forcing mainstream news media to follow the stories they're pushing, such as the scandal that took down Senate Majority Leader Trent Lott. Bloogers run free, while "Geeks" need proof, but both get along together (intellectual minds coming together.)

Is this good or bad? I feel (my own opinion) there is a high price to pay for such things as this and one day they will. As out of control and as mistrustful as they can be about our jouranlists, news coverage, etc., Bloggers too will succumb to their own egotistic ways and be taken over by another foreign body such as they just did.

If you are interested about "Bloogers" go to www.bloggers.com

Marcy

AnswerPeople With too much time on their hands.

What is touch screen called in computer terminology?

It's often simply called a touch screen or a multi touch screen. Invented by Jeffery Han. There are several different technologies that do this. It is based on blob detection. Fingertips cause an electromagnetic or other signal.

How much does a computer technician earn on average?

computer nerds can make about 10,000-50,000 depending on whether you a expirenced builder, or a website desighner. few people can be millionares.

How do you convert Microsoft word 2003 doc into a 2010 version?

Yes. Open the document with Word 2010, then go to "Save As" and in the "Save as" drop down select Word 2010.

Is a computer a technology?

Asking if a computer is a technology is a weird question because there is something called "computer" and there is another thing called "computer technology". Computer technology is a combination of many other technologies (main division is hardware and software) and each have their unique properties. The technology is a know-how while computer is a device. When considered this way, it becomes easier to understand how computer technology helped mobile-phones evolve and become smart-phones.

What is bigger than 1024 kryatbyte?

1Amosbyte = 1 quattordecillon bytes

1Pectrolbyte = 1 quindecillon bytes

1Bolgerbyte = 1 sexdecillon bytes

1Sambobyte = 1 septendecillon bytes

1Quesabyte = 1 octodecillon bytes

1Kinsabyte = 1 novemdecillon bytes

1Rutherbyte = 1 vigintillon bytes

1Dubnibyte = 1 unvigintillon bytes

1Seaborgbyte = 1 duovigintillon bytes

1 Bohrbyte = 1 trevigintillon bytes

1Hassiubyte = 1 quattorvigintillon bytes 

1Meitnerbyte = 1 quinvigintillon bytes 

1Darmstadbyte = 1 sexvigintillon bytes

1Roentbyte = 1 septenvigintillon bytes

1Coperbyte = 1 octovigintillon bytes 

1Nihonbyte = 1 nonvigintillon bytes

1Flerovibyte = 1 trigintillon bytes 

1Moscovibyte = 1 untrigintillon bytes 

1Livermoribyte = 1 duotrigintillon bytes 

1Tennessibyte = 1 trestrigintillon bytes 

1Oganessibyte = 1 quattortrigintillon bytes 

1Ununennibyte = 1 quintrigintillon bytes 

1Sontbyte = 1 sestrigintillon bytes 

1Sophobyte = 1 septentrigintillon bytes 

1Kophobyte =1 Octotrigintillion bytes 

1Goggobyte = 1 Noventrigintillion bytes 

1Geegobyte = 1 Quadragintillion bytes 

1Boogobyte = 1 with 126 zeros bytes

1Geggobyte = 1 with 129 zeros bytes 

1Helfobyte = 1 with 132 zeros bytes 

1Voogobyte = 1 with 135 zeros bytes 

 1 Einbyte= 1 with 138 zeros bytes 

 1 Shivabyte= 1 with 141 zeros bytes

 1 Kominibyte= 1 with 144 zeros bytes 

 1 Somakanbyte= 1 with 147 zeros bytes 

 1 Kominibyte= 1 with 150 zeros bytes 

 1 Somakanbyte= 1 with 153 zeros bytes 

 1 Darkrumbyte= 1 with 156 zeros bytes 

 1 Vifficabyte= 1 with 159 zeros bytes 

 1 Vitabyte= 1 with 162 zeros bytes 

 1 Vosbyte= 1 with 165 zeros bytes 

 1 Controbyte= 1 with 168 zeros bytes 

1 tefreebyte= 1 and 171 zeros bytes 

 1 tibyte= 1 with 174 zeros bytes 

 1 quabyte= 1 with 177 zeros bytes 

 1 quibyte= 1 with 181 zeros bytes 

 1 sebyte= 1 with 184 zeros bytes 

 1 septobyte= 1 with 187 zeros bytes 

 1 terybytes= 1 with 190 zeros bytes 

 1 tegobyte= 1 with 193 zeros bytes 

1 tegohyte= 1 with 196 zeros bytes 

 1 femibyte= 1 with 199 zeros bytes 

 1 attibyte= 1 with 202 zeros bytes 

 1 zepbyte= 1 with 205 zeros bytes 

1 yobyte= 1 with 208 zeros bytes 

1 xentabyte= 1 with 211 zeros bytes 

 1 duebyte= 1 with 214 zeros bytes 

1 tetrabyte= 1 with 217 zeros bytes 

 1 pentabyte= 1 with 220 zeros bytes 

 1 hexabyte= 1 with 223 zeros bytes 

 1 heptabyte= 1 with 226 zeros bytes 

 1 octabyte= 1 with 229 zeros bytes 

 1 nonabyte= 1 with 232 zeros bytes 

 1 decabyte= 1 with 235 zeros bytes 

 1 somethingbyte= 1 with 238 zeros bytes 

1 debyte= 1 with 241 zeros bytes 

 1 dublebyte= 1 with 244 zeros bytes 

 1 hellobyte= 1 with 247 zeros bytes 

 1 tefreebyte= 1 with 250 zeros bytes 

1 tibyte= 1 with 253 zeros bytes 

1 quabyte= 1 with 256 zeros bytes 

 1 quibyte= 1 with 259 zeros bytes 

1 sebyte= 1 with 262 zeros bytes 

 1 septobyte= 1 with 265 zeros bytes 

 1 terybytes= 1 with 268 zeros bytes 

 1 tegobyte= 1 with 271 zeros bytes 

1 tegohyte= 1 with 274 zeros bytes 

1 femibyte= 1 with 277 zeros bytes 

1 attibyte= 1 with 280 zeros bytes 

 1 zepbyte= 1 with 283 zeros bytes 

1 yobyte= 1 with 286 zeros bytes 

 1 xentabyte= 1 with 289 zeros bytes 

 1 duebyte= 1 with 292 zeros bytes 

1 tetrabyte= 1 with 295 zeros bytes 

1 pentabyte= 1 with 298 zeros bytes 

1 hexabyte= 1 with 301 zeros bytes 

 1 heptabyte= 1 with 304 zeros bytes 

 1 octabyte= 1 with 307 zeros bytes 

 1 nonabyte= 1 with 311 zeros bytes 

 1 decabyte= 1 with 314 zeros bytes 

 1 somethingbyte= 1 with 317 zeros bytes 

 1 debyte= 1 with 321 zeros bytes 

 1 dublebyte= 1 with 324 zeros bytes 

1 hellobyte= 1 with 327 zeros bytes 

1 Summabyte= 1 with 330 zeros bytes 

1 Ingensibyte = 1 with 333 zeros bytes 

1 Insanisibyte= 1 with 336 zeros bytes 

1 Stercusibyte = 1 with 339 zeros bytes 

1 Salviabyte = 1 with 342 zeros bytes 

1 Pecuniabyte =  1 with 345 zeros bytes 

1 Claudobyte = 1 with 348 zeros bytes 

1 Immanemquebyte = 1 with 351 zeros bytes 

1 Stantibyte = 1 with 354 zeros bytes 

1 Celsiobyte = 1 with 357 zeros bytes 

1 Opibyte = 1 with 360 zeros bytes 

1 Excretibyte = 1 with 363 zeros bytes 

1 Mordebyte = 1 with 366 zeros bytes 

1 Occiderebyte = 1 with 369 zeros bytes 

1 Sublimibyte = 1 with 372 zeros bytes 

1 Anobyte = 1 with 375 zeros bytes 

1 Chalibyte = 1 with 378 zeros bytes 

1 Atriubyte = 1 with 381 zeros bytes 

1 Finibyte = 1 with 384 zeros bytes 

1 Amerigobyte = 1 with 387 zeros

How many KB is in a G?

Here's the breakdown for you: 8 bits make a byte 1000 bytes make a KiloByte (KB) 1000 Kilobytes makes a MegaByte (10,000 KB/1 million bits) 1000 MegaBytes makes a Gigabyte (100,000 KB/1 billion bits) so 100,000 KB makes a Gigabyte... Hope this helps

What does SPAM mean?

Electronic Spam, commonly shortened and called "Spam," is a general abuse of online messaging systems, including instant messaging, email, etc. Spam is most commonly associated with email spam and is defined as a constant stream of nearly identical emails indicating a single point, e.g. advertising.

Other s
  • Spam is the abuse of electronic messaging systems to send unsolicited bulk messages indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, Online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, and file sharing network spam.

    Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for their mass mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have been forced to add extra capacity to cope with the deluge. Spamming is widely reviled, and has been the subject of legislation in many jurisdictions.

  • Electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited e-mail. However, if a long-lost brother finds your e-mail address and sends you a message, this could hardly be called spam, even though it's unsolicited. Real spam is generally e-mail advertising for some product sent to a mailing list or newsgroup.

    In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth. Consequently, there are many organizations, as well as individuals, who have taken it upon themselves to fight spam with a variety of techniques. But because the Internet is public, there is really little that can be done to prevent spam, just as it is impossible to prevent junk mail. However, some online services have instituted policies to prevent spammers from spamming their subscribers.

Spam of the Food VarietyIt is a word used for chopped pork canned and pressed in loaf form.

What is a hardware device that allows users to enter data?

The primary example of a hardware component that allows user data input is a keyboard.