Vous êtes sur la page 1sur 4

Artificial Intelligence

Artificial Intelligence, or AI, is the ability of a computerto act like a human being. It has several applications, including software simulations and robotics.

Biometrics
Biometrics refers to technologies used to detect and recognize human physical characteristics. In the ITworld, biometrics is often synonymous with "biometric authentication," a
type of security authorization based on biometric input.
There are several types of biometric authentication. Common examples include fingerprint scanning, retinal scanning, facial recognition, and voice analysis. A facial recognition
system, for instance, uses a camera to capture an image of a person's face. The photograph is then recorded and processed using biometrics software. The software attempts to
match the scanned image with an image from adatabase of users' photos. If the scan is close enough to a specific user, the person will receive authorization to continue.

buffer
A buffer contains data that is stored for a short amount of time, typically in the computer's memory (RAM). The purpose of a buffer is to hold data right before it is used. For
example, when you download an audio or video file from the Internet, it may load the first 20% of it into a buffer and then begin to play.

Cache
Cache, which is pronounced "cash" (not "catch" or "cashay"), stores recently used information so that it can be quickly accessed at a later time. Computers incorporate several
different types of caching in order to run more efficiently, thereby improving performance. Common types of caches include browser cache, disk cache, memory cache, and
processor cache.
1. Browser cache - Most web browsers cachewebpage data by default. For example, when you visit a webpage, the browser may cache the HTML, images, and
any CSS or JavaScript files referenced by the page. When you browse through other pages on the site that use the same images, CSS, or JavaScript, your browser will not
have to re-download the files. Instead, the browser can simply load them from the cache, which is stored on your local hard drive.
2. Memory cache - When an application is running, it may cache certain data in the system memory, or RAM. For example, if you are working on a video project, the video
editor may load specific video clips and audio tracks from the hard drive into RAM. Since RAM can be accessed much more quickly than a hard drive, this reduces lag
when importing and editing files.
3. Disk cache - Most HDDs and SSDs include a small amount of RAM that serves as a disk cache. A typical disk cache for a 1 terabyte hard drive is 32 megabytes, while a 2
TB hard drive may have a 64 MB cache. This small amount of RAM can make a big difference in the drive's performance. For example, when you open a folder with a
large number of files, the references to the files may be automatically saved in the disk cache. The next time you open the folder, the list of files may load instantly instead
of taking several seconds to appear.
4. Processor cache - Processor caches are even smaller than disk caches. This is because a processor cache contains tiny blocks of data, such as frequently used instructions,
that can be accessed quickly by the CPU. Modern processors often contain an L1 cache that is right next to the processor and an L2 cache that is slightly further away. The
L1 cache is the smallest (around 64 KB), while the L2 cache may be around 2 MB in size. Some high-end processors even include an L3 cache, which is larger than the L2
cache. When a processor accesses data from higher level caches, it may also move the data to the lower level cache for faster access next time.

CAD
Stands for "Computer-Aided Design." CAD is the use of computers to create 2D and 3D designs. Common types of CAD include two-dimensional layout design and three-
dimensional modeling.

Crop
When you crop an image or photo, you remove part of the image. This may involve cutting some of the image from the left, right, top, bottom, or any combination thereof. It may
also mean just cutting out a small rectangular of the image.

Digital information
Digital information is stored using a series of ones and zeros. Computers are digital machines because they can only read information as on or off -- 1 or 0. This method of
computation, also known as the binary system, may seem rather simplistic, but can be used to represent incredible amounts of data. CDs and DVDs can be used to store and play
back high-quality sound and video even though they consist entirely of ones and zeros.

Domain
While the term "domain" is often used synonymously with "domain name," it also has a definition specific to local networks.
A domain contains a group of computers that can be accessed and administered with a common set of rules.

Encryption
Encryption is the coding or scrambling of information so that it can only be decoded and read by someone who has the correct decoding key. Encryption is used in secure Web
sites as well as other mediums of data transfer. If a third party were to intercept the information you sent via an encrypted connection, they would not be able to read it

Ergonomics
Ergonomics is the study of how humans interact with manmade objects. The goal of ergonomics is to create an environment that is well-suited to a user's physical needs.

Grayscale
Grayscale is a range of monochromatic shades from black to white. Therefore, a grayscale image contains only shades of gray and no color.

Standby
If you are not going to use your computer for a few hours, it is a good idea to put it to sleep (also known as standby mode) to save power. If you are not going to use the computer
for more than a day, it is usually best to turn it off. However, some Windows computer offer an option that combines the benefits of sleep mode and powering down the computer,
called "Hibernate."
When you select Hibernate, the computer saves the current state of the system from the computer's RAM to the hard disk, and then shuts down. When the computer is restarted,
instead of going through the typical boot sequence, the previously saved state is automatically loaded into the RAM.

Mnemonic
A mnemonic (pronounced "nemonic") is a pattern that can be used as an aid for memorizing information. Most often, this pattern consists of letters or words. For example, the
phrase "Every Good Boy Does Fine" can be used to help music students remember the notes of the staff, E, G, B, D, and F. The name "Roy G. Biv" is often used to memorize the
order of colors in a rainbow (or other light spectrum) -- Red, Orange, Yellow, Green, Blue, Indigo, Violet.

MMS
Stands for "Multimedia Messaging Service." MMS is mobile phone service that allows users to send multimedia messages to each other. This includes images, videos, and sound
files.

Network
When you have two or more computers connected to each other, you have a network. The purpose of a network is to enable the sharing of files and information between multiple
systems. The Internet could be described as a global network of networks



Newbie
A new user of a technology, such as a computer, a certain computer program, or the Internet, is often referred to as a "newbie." The term originated sometime around 1990 and
supposedly comes from the English phrase, "new boy," which refers to someone in their first year of public schooling

peopleware
Computers operate using a combination of hardware and software. However, without user interaction, most computers would be useless machines. Therefore, "peopleware" is
sometimes considered a third aspect that takes into account the importance of humans in the computing process.

Phreaking
Phreaking is a slang term that describes the action of experimenting with or manipulating a telephone system. Since phreaking took place before personal computers became
popular, it is sometimes considered to be the precursor to computer hacking.

Plagiarism
Plagiarism is the act of copying someone else's work and publishing it as your own. This includes text,media, and even ideas. Whenever another person's work is copied and
republished without an appropriate reference or citation, it is considered plagiarism

Platform
In the computer world, a "platform" typically refers to a computer's operating system. For example, a Dell computer running Windows XP would be considered to be running on a
Windows platform

Podcast
The name "podcast" combines the terms iPod and broadcast into a single catchy word. As the name suggests, podcasts are audio and video broadcasts that can be played on
an iPod. However, because podcasts are downloaded using Apple iTunes and can be played directly within the program, you don't actually need an iPod to listen to a podcast.

Refresh
Refresh is a command that reloads the contents of a window or Web page with the most current data. For example, a window may list files stored within a folder, but may not track
their location in real-time. If the files have been moved or deleted since the window was first opened, the folder contents displayed will be inaccurate. By refreshing the window, a
current list of files is displayed.

Restore
The word "restore" means to return something to its former condition. Therefore, when you restore a computer or other electronic device, you return it to a previous state. This may
be a previous system backup or the original factory settings.

Remote user
A "remote user" is how a woman might refer to her husband while he is watching TV. In the computer world, however, a remote user is someone who works on a computer from a
remote location

Speech recognition
Speech recognition is the capability of an electronic device to understand spoken words. A microphone records a person's voice and the hardware converts the signal
from analog sound waves to digital audio. The audio data is then processed by software, which interprets the sound as individual words.

Standalone
A standalone device is able to function independently of other hardware. This means it is not integrated into another device.

Swipe
Swipe is a command used primarily with touchscreen devices, such as smartphones and tablets. It is also supported by some laptops with trackpads and desktop computers with
trackpad input.

Sync
"Sync" is short for synchronize. When you sync a device, such as a cell phone, PDA, or iPod, you synchronize it with data on your computer. This is typically done by connecting
the device to your computer via a USB or wireless Bluetooth connection. For example, you might sync the address book stored on your computer with your cell phone to update
the contacts. If you have an iPod, you may connect it to your computer to sync songs, videos, and other data using Apple iTunes.

Third party
In the computer world, a third party may refer to either a hardware manufacturer or a software developer. It is a label given to companies that produce hardware or software for
another company's product.

Throughput
Throughput refers to how much data can be transferred from one location to another in a given amount of time. It is used to measure the performance of hard drives and RAM, as
well as Internet and network connections.

Tweaking
When you modify a certain piece of hardware for better performance, it is often referred to as "tweaking" it. Overclocking the computer's CPU or changing jumper settings on the
motherboard are common examples of hardware tweaking. Removing system limitations and adding plug-ins or extensions to a computer's operating system are types of software
tweaking.

Virtual
While the word "virtual" is typically overused in the computer world, it is aptly placed in the phrase "virtual reality." According to the American Heritage Dictionary, virtual means
"existing or resulting in essence or effect though not in actual fact, form, or name." It can also mean "created, simulated, or carried on by means of a computer or computer
network." Therefore, virtual reality is best described as an illusion of reality created by a computer system.

Warm boot
To perform warm boot (also called a "soft boot") means to restart a computer. It is often used in contrast to a cold boot, which refers to starting up a computer that is turned off.
A warm boot is typically initiated from the operating system, rather than pressing a button on the computer itself. For example, to perform a warm boot on a Windows system, you
may select Shut Down Restart from the Start Menu. In Windows 8, you can open the Charms bar and select Settings Power Restart to reboot the computer.
3G
3G is a collection of third generation cellular data technologies. The first generation (1G) was introduced in 1982, while the second generation of cellular data technologies (2G)
became standardized in the early 1990s. 3G technologies were introduced as early as 2001, but did not gain widespread use until 2007.

4G
4G is a collection of fourth generation cellular data technologies. It succeeds 3G and is also called "IMT-Advanced," or "International Mobile Telecommunications Advanced." 4G
was made available as early as 2005 in South Korea under the name WiMAX and was rolled out in several European countries over the next few years.

ActiveX
ActiveX is a technology introduced by Microsoft in 1996 as part of the OLE framework. It includes a collection of prewritten software components that developers can implement
within an application or webpage. This provides a simple way for programmers to add extra functionality to their software or website without needing to write code from scratch.

Adware
Adware is free software that is supported by advertisements. Common adware programs are toolbars that sit on your desktop or work in conjunction with your Web browser

Backbone
Just like the human backbone carries signals to many smaller nerves in the body, a network backbone carries data to smaller lines of transmission. A local backbone refers to the
main network lines that connect several local area networks (LANs) together. The result is a wide area network (WAN) linked by a backbone connection.

BitTorrent
BitTorrent is a peer-to-peer (P2P) file sharing protocol designed to reduce the bandwidth required to transfer files. It does this by distributing file transfers across multiple systems,
thereby lessening the average bandwidth used by each computer

Broadband
This refers to high-speed data transmission in which a single cable can carry a large amount of data at once. The most common types of Internet broadband connections are cable
modems (which use the same connection as cable TV) and DSL modems (which use your existing phone line).

Cloud computing
Cloud computing refers to applications and services offered over the Internet. These services are offered from data centers all over the world, which collectively are referred to as
the "cloud." This metaphor represents the intangible, yet universal nature of the Internet.

Cookie
A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information about you, similar to a preference file created
by a software application.

Cyberbullying
There are bullies and then there are cyberbullies. While bullying typically happens at school or work, cyberbullying takes place over cyberspace. This includes both Internet and
cell phone communication.

Domain suffix
A domain suffix is the last part of a domain name and is often referred to as a "top-level domain" or TLD. Popular domain suffixes include ".com," ".net," and ".org,"

Workstation
a workstation is a place where work gets done. It refers to a computer (and often the surrounding area) that has been configured to perform a certain set of tasks, such as photo
editing, audio recording, or video production.

VGA
Stands for "Video Graphics Array." It is the standard monitor or display interface used in most PCs. Therefore, if a monitor is VGA-compatible, it should work with most new
computers. The VGA standard was originally developed by IBM in 1987 and allowed for a display resolution of 640x480 pixels

UPS
Stands for "Uninterruptible Power Supply." In the technology world, UPS is more than just a brown shipping company. It is also a type of power supply that uses battery backup to
maintain power during unexpected power outages.

USB
Stands for "Universal Serial Bus." USB is the most common type of computer port used in today's computers With the help of a few USB hubs, you can connect up to 127
peripherals to a single USB port.
The USB 1.1 specification supports data transfer rates of up to 12Mb/sec and USB 2.0 has a maximum transfer rate of 480 Mbps. USB 3.0 max. rate 4800 Mbps (4.8Gbps)

Touchscreen
A touchscreen is a display that also serves as an input device. Some touchscreens require a proprietary pen for input, though most modern touchscreens detect human touch. Since
touchscreen devices accept input directly through the screen, they do not require external input devices, such as mice and keyboards. This makes touchscreens ideal for computer
kiosks, as well as portable devices, such as tablets and smartphones.

Toggle key
A toggle key toggles the input from a group of keys on a keyboard between two different input modes. The most common toggle key is Caps Lock, which toggles the letter keys
between lowercase and uppercase mode. Some keyboards also have other toggle keys, such as Num Lock, Scroll Lock, and Insert

Surge Protector
The surge protector is an important, yet often overlooked part of a computer setup. It allows multiple devices to plugged in to it at one time and protects each connected device
from power surges

System Requirements
Whenever you purchase software or hardware for your computer, you should first make sure your computer supports the system requirements. These are the necessary
specifications your computer must have in order to use the software or hardware

SSD
Stands for "Solid State Drive." An SSD is a type of massstorage device similar to a hard disk drive (HDD). It supports reading and writing data and maintains stored data in a
permanent state even without power. Internal SSDs connect to a computer like a hard drive, using standard IDE or SATA connections.

Smartphone
A smartphone is a mobile phone that includes advanced functionality beyond making phone calls and sending text messages. Most smartphones have the capability to display
photos, play videos, check and send e-mail, and surf the Web. Modern smartphones, such as the iPhone and Android based phones can run third-party applications, which provides
limitless functionality.

Server
A server is a computer that provides data to other computers. It may serve data to systems on a local area network (LAN) or a wide area network (WAN) over the Internet.
Many types of servers exist, including web servers, mail servers, and file servers

Router
This is a hardware device that routes data (hence the name) from a local area network (LAN) to another network connection. A router acts like a coin sorting machine, allowing
only authorized machines to connect to other computer systems. Most routers also keep log files about the local network activity.

Retina Display
The term "retina display" is a hardware term coined by Apple in June, 2010. It describes a display that has a resolution of over 300 dpi. The iPhone 4, which was also announced in
June, 2010, has a screen resolution of 326 dpi and was the first Apple product to include a retina display.

Quad-core
A quad-core CPU has four processing cores in a single chip. It is similar to a dual-core CPU, but has four separate processors (rather than two), which can process instructions at
the same time.

Node
Any system or device connected to a network is also called a node

Hot Swappable
In electronics terminology, the word "hot" is often used to mean "active" or "powered on." Therefore, a hot swappable device is a peripheral or component that can be removed or
added while a computer is running. Replacing a device while a computer is powered on is called "hot swapping."

Console
A console is the combination of a monitor and keyboard. It is a rudimentary interface in which the monitor provides the output and the keyboard is used for input.

Debug
Computer programmers, like everybody else, are not perfect. This means the programs they write sometimes have small errors, called "bugs," in them. These bugs can be minor,
such as not recognizing user input, or more serious, such as a memory leak that crashes the program

Default Program
A default program is an application that opens a file when you double-click it

Dual boot
A dual boot system is a computer that can boot into two different operating systems. While most computers automatically load a specific operating system (OS) at startup, a dual
boot system allows you to choose what OS you would like to load.

Freeware
Like shareware, freeware is software you can download, pass around, and distribute without any initial payment. However, the great part about freeware is that you never have to
pay for it. No 30 day limit, no demo versions, no disabled features -- it's totally free

Open source
When a software program is open source, it means the program's source code is freely available to the public. Unlike commercial software, open source programs can be modified
and distributed by anyone and are often developed as a community rather than by a single organization. For this reason, the phrase "open source community" is commonly used to
describe the developer of open source software development projects.

Assignment:
Centralized
Streaming
Digital Signature
Hyperlink
DSL
Access Points
UTP Cable
Bookmarks
Portal
IP Address
Mainframe
Object Oriented
Search Engine
Virus
Homepage

Vous aimerez peut-être aussi