click below
click below
Normal Size Small Size show me how
DAM2 VOCABULARY QUI
B3U01-B3U08, B3U13
| English | Spanish |
|---|---|
| Apple® | It is the company that produces Macs® and other computing products. |
| color matching | It is the ability to create colors as you see them on the screen. |
| customize | It is to change it to meet your individual needs and purposes. |
| Mac® (Macintosh) | It is a type of computer from Apple®. |
| Microsoft® | It is the company that produces the Windows® operating system among other products. |
| OS X® | It is an operating system from Apple® for Mac® computers. |
| PC (personal computer) | Itrefers to a computer that runs a Windows® operating system. |
| prepress | It is the process of preparing a document, magazine or book to be printed on a large scale. |
| processing speed | It is a measurement of how quickly a computer can perform tasks. |
| typography | It is a computer's use of typefaces. |
| video subsystem | It is the part of the computer that presents the visuals on the screen. |
| Windows® | It is the operating system created by Microsoft® that is used on many PCs. |
| command line | It is a word or phrase that makes a computer perform an operation. |
| free software license | It allows users to change and distribute programs. |
| interface | It provides a way for a user to interact with a computer. |
| Linux® | It is a computer operating system. |
| Linux® distribution | It is a collection of software for Linux®. |
| Microsoft Office | It is the company that produces the Windows® operating system among other products. |
| open source | It is open source, it can be distributed with the same basic source code. |
| OpenOffice® | It is an open source software package similar to Microsoft Office®. |
| Samba® | It is a Linux® program that allows Linux® to act as a client on a Windows0-based network. |
| TCP/IP protocol | It is a set of rules that determine how a computer connects to a network or the Internet. |
| terminal | It is a computer that allows users to input command lines. |
| Ubuntu® | It is an operating system based on Linux. |
| anchor | It is a word, phrase, or image that includes a hyperlink and can be used for navigation. |
| applet | It is a small application that is embedded in a webpage. |
| CAD (Computer-Aided Design) | It is the use of a computer to design things such as machines or buildings. |
| CBT (Computer-Based Training) | It is the use of a computer to train employees. |
| DVD (Digital Video Disc) | It is a storage disc that is read by a laser and can store media tiles such as videos and images. |
| electronic bulletin board | It is a shared tile that can be used to spread information. |
| FAQ (Frequently Asked Questions) | Itis a list of common questions with their answers. |
| flash | It is a media format that can be used to add videos, animations, and other media to a website. |
| media player | It is used to play media such as videos and animations and can be embedded in a web page. |
| MPEG | It is a video format that is used to compress videos into smaller files. |
| multimedia | It is any type of media used on a webpage, including images, animations, and videos. |
| reliability | It is the probability that something will function properly and without any failures. |
| above the fold | It is visible without scrolling down after the page has loaded. |
| ad product | It is an advertising opportunity such as a banner that is located on a website. |
| animated GIF | It is the combination of multiple GIF files in one advertisement to create animation. |
| campaign | It is an agreement between an advertising company and a client that outlines which types of advertisements are to be used, where they are to be placed, and how long they will appear. |
| click tracking | It is the process of counting and keeping track of the number of clicks an advertisement receives. |
| click-through rate | It is the ratio of clicked advertisements to the number of advertisements that are viewed. |
| commission | It is the amount of money charged by a website tor hosting advertisements. |
| CPC (cost per click-through) | It is a pricing model wherein rates are charged according to how many clicks an advertisement receives. |
| CPM (cost per 1,000 impressions) | It is a pricing model wherein rates are charged according to how many thousands of people view the advertisement. |
| frequency capping | It is the process of ensuring that a specific website visitor does not see the same advertisement an excessive number of times. |
| geo targeting | It is the process of showing advertisements in geographical areas where they are relevant. |
| hang | It is to prevent it from loading all the way. |
| Automation | It is the use of programmed machines to perform tasks without human assistance. |
| Computer Aided Manufacturing | It is the use of computers to control production equipment. |
| Embedded system | It is a combination of hardware and software designed to perform a specific task. |
| Encoder | They are devices that convert mechanical information into electronic signals. |
| Ethernet network | It is a high-speed network that links computers together. |
| fault tolerant | It is the ability to continue functioning even though an error has occurred. |
| integrated circuit | It is a small chip that has several electronic devices attached to it. |
| Latency | It is the time between the end of one computer communication and the start of another. |
| open system | It is a system that can use many different types of machines. |
| oscilloscope | It is a device that allows the user to view the electrical voltage of a machine. |
| priority inversion | It is a delay that occurs in a computer system when a low priority task is dealt with before a high-priority task. |
| redundancy | It is the inclusion of duplicate components in a system to maintain production when one component fails. |
| centralize | It is to bring from multiple places and make them available in one location. |
| color-coding | It is the practice of labeling things with different colors in order to tell them apart. |
| dashboard | It is a display on a computer that shows commonly or recently used tiles and programs. |
| gallery | It is a collection of icons or pictures that have been organized in a file or page. |
| message board | It is an online application that displays and organizes messages from users. |
| real time | It is updated or shown at the same time as new information is received. |
| Skype™ | It is software that enables people to call one another using computers rather than telephones. |
| telecommute | It is to work at a location away from a main office by using technology. |
| toggle | It is to move from one file or setting to another. |
| tour | It is a series of web pages that offer information about a product or site. |
| web-based | It is available on the Internet instead of on a disk. |
| anti-antivirus virus | It is a computer virus that attacks and often disables anti-virus software. |
| hacker | It is a person who exploits computer hardware and software for their own purposes. |
| host | It is a computer system that has a computer virus attached to it. |
| imbed | It is to become a part of something. |
| infect | It is to contaminate it with a computer virus. |
| log in | It is to provide a computer security system with the proper identification to use the computer. |
| overwriting virus | It is a computer virus that copies its code over and destroys the files of the original data. |
| piggyback | It is to gain unauthorized access to a computer system by taking advantage of the owner's legitimate connection. |
| replicate | It is to make copies of oneself. |
| resident extension | It is an add-on to a computer virus that causes it to become a part of the host computer's operating system. |
| resident virus | It is a computer virus that becomes part of a file or disk drive but does nothing until activated by a trigger event. |
| virus | It is a harmful computer program file that takes up residence in a computer without the owner's knowledge or permission. |
| card scanning | It is the practice of capturing the personal information stored on credit cards, debit cards, or passports. |
| cyber | It is cyber, it is related to computers or the Internet. |
| fraud | It is an action that results in the loss of another person's property. |
| identity theft | It is the process of stealing another person's personal information and using it for personal gain. |
| malware | It is any type of malicious, harmful software. |
| pharming | It is a process wherein thieves reroute people to a fake website that appears to be legitimate in order to trick them into giving away their personal information. |
| phishing | It is a process wherein thieves trick people into giving away their personal information through email. |
| pretexting | It is a process wherein thieves trick people into giving away their personal information over the phone. |
| scanner | It is a device used to capture the personal information stored on credit cards, debit cards, and passports. |
| spyware | It is a type of computer program that gathers someone's personal information without their knowledge. |
| Trojan horse | It is a computer program that appears to be beneficial but is actually malicious. |
| worm | It is a type of malicious software that replicates itself through emails. |
| blog | It is a personal website that is maintained by an individual. |
| egress filter | It prevents harmful software from leaving a network. |
| ingress filter | It prevents harmful software from entering a network. |
| keyword | It is a term or phrase that is created to describe a webpage, so that it can be found in a search engine. |
| mask | It is to block it from being viewed. |
| natural language | It is the use of phrases from normal speech in search engines. |
| PCI compliance (payment card industry) | It is upholding certain security standards for accepting credit and other payment cards. |
| redesign | It is to change, add, or delete certain elements, but keep others. |
| root directory | It is the main directory of a file system and is where all other branches of the system come from. |
| trust logo | It is a seal that appears on a web page and means that the security of information on that page is assured by an accredited company. |
| web portal | It is a webpage that displays information gathered from several different places. |