N Named anchor: named anchor is an anchor that links to a location on a page. NAND: NAND a Boolean operator which gives the value zero if and only if all the operands have a value of one, and otherwise has a value of one (equivalent to NOT AND). NAP: Network Access Protection(NAP) is a technology that allows network and system administrators to define health parameters for computers connected to a network, and use those parameters to control network access. NAT: NAT is an Internet standard for LAN (local area network) to use one or more IP addresses for internal traffic and a second for external.
Native: native refers to software or hardware designed to run on a particular system. Nanotechnology: Nanotechnology is the industrial use of atoms and molecules to design, engineer, and implement products and devices smaller than 100 nanometers in size. Nagware: Nagware is a description of any software that displays a popup, notification, or window, nagging the user to perform a task or try a feature. NAK: NAK is a signal sent by computers or network devices connected to a network to indication a signal was not received or corrupted during transmission. Narrowband transmission: A narrowband transmission refers to a data transfer with a slow or small transfer rate due to more
Navigation: navigation refers to the act of opening and moving through computer menus, like the Start menu in Windows, opening software programs, or viewing files in Windows Explorer. limited bandwidth. With wireless transmission, a narrowband signal is one covering a small area. NBSP: Alternatively called a fixed space or hard space, nbsp (non-breaking space) is used in programming and word processing to create a space in a line that cannot be broken by word wrap NC: NC (network computer) is a thin client computer that runs applications by downloading them first. Newline: newline is a character used to represent the end of a line of text and the beginning of a new line.
Netmask: netmask is a 32-bit binary mask used to divide an IP address into subnets and specify the network's available hosts. NetWare: NetWare is a local-area network (LAN) operating system developed by Novell Corporation. Network: a group or system of interconnected people or things. Newsgroup: Newsgroup is another name for a forum, an online discussion group, where participants with the same interests can exchange messages with each other. NFT: A non-fungible token (NFT) is a unique digital identifier that is recorded on a blockchain, and is used to certify ownership and authenticity. It cannot be copied, substituted, or subdivide.
Nibble: Nibbles is the second smallest unit of information for data transmission and storage. Each digit of a decimal number can be directly translated into one nibble (four bits) in the binary system. NIC: NIC (network interface card) is an expansion board that is used so that a computer can be connected to a network. Notification area: notification area is a portion of the taskbar that provides a temporary source for notifications and status. Notepad: Notepad is a generic text editor included with all versions of Microsoft Windows that lets you create, open, and read plaintext files with a .txt file extension.
Num Lock: Short for numeric lock or number lock, the Num key, Num Lock, or Num Lk key is on the top-left corner of a keyboard's numeric keypad. Numberic Keypad: numeric keypad is a 17-key keypad on the far right side of a PC keyboard.
O OBJ: OBJ is a universal file format that stores 3-D models and their related information, such as location in 3-D space, textures, and materials. OCX: OCX (OLE Custom Control) is an independent program module that can be accessed by other programs in the Windows environment. Object-Oriented: object-oriented is a term first thought of by Ole-Johan Dahl and describes a device, service software, or system that interacts with multiple objects.
P Plug-ins: A special program that expands the capabilities of Netscape Navigator. Point-to-Point: Direct transmission between two different places without being obstructed by anything. Ports: Communication channels between computers and other devices, such as printers, modems, terminals, mice, etc. Portals: A national internet service provider in the United States. POP(Post Office Protocol):An application program that allows personal E-mail users (POP clients) to receive E-mail from the E-mail storage center (POP server). PPP(Point To Point Protocol): TCP/IP protocol which allows connections
between hosts and networks and between routers and routers or can also be used for serial connections between 2 systems. Protocol (protocol): he language or relationship procedure used by one computer system with another system so that the two can communicate with each other. To be able to communicate. Both systems must use the same protocol. Providers: Company providing connection services to the Internet network. Proxy: a type of connection using a modem and telephone line to the internet that allows users to use full-screen programs such as Netscape or Mosaic for internet magazines. Packard Bell: Packcard Bell is one of the world's largest computer vendors headquartered in Wijchen, Netherlands.
Packard Bell, which is part of NEC Computers International, which was formed to produce and market home PCs, was founded in 1986. Page Faults: Page fault is an interrupt that occurs when a program requires data that is not available in virtual memory. PAP: PAP (Password Authentication Protocol) is the most basic form of authentication, where a username and password are transmitted over a network and compared with a tag of username and password pairs. parent directory: Parent directory is a directory that is above other directories. Each directory (other than the root directory) is under another directory. parity
Parity (parity) is a method of detecting communication errors using parity bits.. Pascal Pascal is a high-level programming language developed by Niklaus Wirth in the late 1960s. planning planning is an approach used in engineering (and other fields) that is used to specify how to make or do something. Perl Perl (Practical Extraction and Report Language) is a programming language developed by Larry Wall, designed for processing text.. persistence
Persistence is the length of time a phosphor pixel or diode lasts after receiving a current. Plotters A graphics printer that draws images with ink pens.
Q QBE QBE (query by example) is a query method provided by the system in the form of an empty record and the user can specify certain fields and values that will be used in the query. QPSK QPSK (quadrature phase shift keying) is a frequency modulation technique used to send data over networks that use coaxial cables. Because this technique is relatively easy to implement and quite resistant to noise, QPSK is widely used for sending data (upstream transmission) from cable subscribers to the Internet.
quadrature phase shift keying See QPSK. query A query is a question or request for certain information from a database written in a certain format. There are three main methods for creating queries: by selecting the parameters provided in the menu. This method is the easiest to use but the least flexible because the user can only use a limited choice of parameters. query by example (QBE) is a query method provided by the system in the form of an empty record and the user can
specify certain fields and values to be used in the query. Query language is a special language used to perform queries on a database. This method is the most complicated but the most flexible query by example See QBE. query language See query language. queue
A queue is a data structure for representing a set of elements where only the earliest added (leading) element can be accessed. There are two basic queue operations, namely adding an element to the very end (enqueue) and processing or deleting the leading element (dequeue). QuickTime QiuckTime is a method for storing sound, graphic, and movie files developed by Apple Computer. An example of this file is a MOV file. Although QuickTime was originally developed for the Macintosh, there is now a lot of software to run it that runs on Windows and other operating systems.
R Remote Access Access from one system (computer) to another system remotely using certain communication connections (analog telephone network, communications, radio, digital telephone network, VSAT, etc.). Repeaters A device installed at certain points in the network to update the transmitted signals so that they regain their original strength and shape, in order to extend the distance that can be traveled. This is necessary because signals experience weakening and change in shape during transmission. ,.
Routers A device that functions to connect a LAN to an internetworking/WAN and manage the distribution of data traffic within it. Routing The process of determining a path that is used to send data to a specific destination. RAD RAD (Rapid Application Development) is a programming system that allows programmers to create programs quickly. In general, RAD systems provide a number of tools for creating graphical user
interfaces which usually require a lot of effort and time to create. The two most popular RAD systems for Windows are Visual Basic and Delphi. RAM RAM (random access memory) is needed to store programs that are being run from permanent storage such as a hard disk, floppy disk, or CD-ROM. As the name suggests, RAM can be accessed randomly. The more RAM a computer has, the more efficiently it works. There are two basic types of RAM, (a) dynamic RAM (DRAM), and (b) static RAM (SRAM). These two RAMs are differentiated based on the technology used to store data. DRAM needs to be refreshed thousands of times per second while SRAM does not
need to be refreshed, so it is faster; but also more expensive. Both types of RAM are volatile, which means that their contents will be lost when the power is cut off or the computer is turned off. Rambus DRAM See RDRAM. RAMDAC RAMDAC (random access memory digital-to-analog converter) is a microchip on a VGA Card or other graphics board that translates a digital representation of information into an analog signal that a monitor can display. The faster the RAMDAC (measured in MHz), the higher
the screen refresh rate at the resolution supported by the card random access memory See RAM. random access memory digital-to-analog converter See RAMDAC.9 Rapid Application Development See RAD RD
RD (receive data) is a modem indicator light that flashes which indicates that the modem is receiving a signal from another computer. RDRAM RDRAM (Rambus DRAM) is a type of DRAM developed by Rambus, Inc. RDRAM can transfer data at a speed of 600 MHz. Compare this with SDRAM which can only transfer at a speed of 100 MHz. read-only memory See ROM
real Real is a data type that consists of fractional numbers in a certain range. This range differs from one programming language to another. Examples of real type data are 0.2, 35.6, and 1000.0. real mode Real mode is an x86 chip operating mode that doubles the memory management used on the 8086 or 8088 chips. Real mode limits the processor to 1MB of memory and does not provide memory management or memory protection features. The term real mode is also often used to refer to device drivers that operate in this mode. MS-DOS runs in real mode.
real time View real time. records In a database management system, a record is a collection of information consisting of several fields, each of which stores an item of information. In relational database management systems records are called tuples. reduced instruction set computer See RISC.
refresh rate Refresh rate is the number of times an image can be displayed again on the monitor. This is related to the electron gun in the cathode ray tube on the monitor. The Hz refresh rate (which means the screen is redrawn 60 times per second) will still appear flickering. A refresh rate of 70 Hz or higher would be better. Because refresh rates vary greatly depending on screen resolution, the monitor and display adapter used must be able to set a refresh rate of 70 Hz or better. recursive An object is called recursive if each object contains itself or is defined by itself. This relationship can be found not only in mathematics, but also in everyday life.
Have you ever received gifts in repeat packages? When you opened it the first time, you found another smaller wrapper, and when you opened it again, you found another wrapper that was smaller than the second one, and so on. On television, you often see other television images whose images are exactly the same as the images seen on television. The two examples above are recursive phenomena in everyday life. In programming, this recursive concept is very useful because it allows expressing infinite definitions with finite statements. For example, to determine the factorial value of a number, you can determine the factorial value of another number using the formula n! = n* (n-1)! where n is a positive integer and 0! = 1.
repeaters A repeater is a network or communication device that uses an electrical signal from one cable to another, amplifying it and returning it to its original (strong) condition in a process. Repeaters are used to account for attenuation that occurs when signals have traveled long distances (for example, over oceans). A network repeater is not as intelligent as a bridge, gateway or router because it works at the physical layer (in the OSI model). replication Replication is the process of creating and managing a duplicate version of a database. Replication not only copies the
database, but also synchronizes multiple copies so that they reflect changes that have been made. The advantage of this technique is its ability to allow multiple users to work on a local copy of an updated database while working on a single, centralized database. Database applications where users are geographically dispersed, replication is an efficient way of accessing the database. requirements analysis View needs analysis Richard Stallman Richard Stallman is the person most involved in the GNU project. He resigned
from the artificial intelligence laboratory at MIT and wanted to produce software that would then be distributed for free. Then he founded the Free Software Foundation in 1985 to support production and guarantee free distribution of software. He received a BA in physics from Harvard University in 1974. During his college years, he also worked at the MIT Artificial Intelligence Lab. and study operating system development. He wrote the Emacs text editor there in 1975. In January 1984 he resigned from MIT and started the GNU project. Stallman received the Grace Hopper Award in 1991 from the Association for Computing Machinery, because of the Emacs editor he developed. In 1990 he received an award from the MacArthur
Foundation, and in 1996, he received an honorary doctorate from The Royal Institute of Technology, Sweden. Apart from that, he received many other awards from various institutions. ripper Ripper is software used to copy digital studio from CD to computer hard drive into WAV files. Files in WAV format can be compressed into MP3 format with an encoder. RISC RISC (reduced instruction set computer) is a type of microprocessor that recognizes a certain number of instructions. One of the
advantages of RISC technology is that it allows very fast instruction execution because the instructions used are simple. Another advantage is that RISC technology requires less RJ-45 RJ-45 (Registered Jack-45) is an eightcable connector that is usually used to connect computers to a local-area network (LAN), especially Ethernets. The RJ-45 connector is similar to the RJ-11 connector used in telephone connections, but is larger. roaming
In wireless networks, the term roaming refers to the ability to move from one access point coverage area to another without interruption in service or loss of connection. ROM ROM (read-only memory) is a storage chip that usually consists of hardwired instructions that are used when the computer is turned on. The instructions, contained in a small program called the BIOS, are called from ROM and provide a hard disk for the operating system to run on. Some new BIOS chips, such as EEPROM and BIOS flash. root directory
The root directory is the top directory in the file system. The root directory is provided by the operating system and has a special name. In the DOS operating system the root directory is marked with a slash (\). routers A router is hardware that routes data from a LAN to a telephone line. Routers are used to ensure that only authorized machines can send data to the LAN. Apart from that, routers are also used to handle errors, store network usage statistics, and support network security systems. rm
This command is used to delete directories or files. This command is similar to the del command in DOS. When using this command, be careful because in Linux there is no undelete or unerase command. Example of using rm as follows: #rm example1.php To delete a directory use the command: #rm /home/adje/temp rmmod module_name (as root, not essential). Removed the module module_name from the kernel. rpm -ivh filename.rpm (=Red Hat Package Manager) Installs programs with utilities from Redhat and displays information about what is
happening. See next command for installation via GUI (xwindow). renice -1 PID (as root) Change the running priority to -1. Normal users can only change their own process values, and they cannot raise the priority value higher than it already is (or they can make the process run slower) rm files Deleting files S Search engines
Tool for cataloging Internet content and for creating an index of internet content. This tool can speed up searches on the internet. Currently there are many search engines on the internet, such as: Yahoo, Infoseek, Lyos, Alta Vista, etc. Servers a unit that functions to store information and to manage a computer network. The computer server will serve all clients or workloads connected to the network. SMTP(Simple Mail Transfer Protocol) A protocol used by computers on the internet to manage E-mail messages. With this protocol it is possible to develop E-
mail servers and E-mail clients. Most Email programs such as "Eudora" also used this protocol to develop a reliable and efficient E-mail system. scalability Look at scalability. Scalable Processor Architecture See SPARC S-CDMA S-CDMA (Synchronous Code Division Multiple Access) is a version of CDMA (Code Division Multiple Access) developed by Terayon Corporation for
data transmission over networks using coaxial cables. S-CDMA spreads digital data over a wide frequency band and allows many subscribers connected to the network to send and receive data simultaneously. This data transmission method developed to ensure security is very resistant to interference (noise). scripts A script is a type of program that consists of a set of instructions that can be used by another application or utility. script kiddie A script kiddie is a person who is usually not technologically advanced enough to
randomly search for system vulnerabilities over the Internet to gain access to a system without understanding what is being exploited. elementary school SD (send data) is a modem indicator light that flashes which indicates that the modem is sending a signal to another computer. SDLC (See) system development life cycle. SDRAM
SDRAM (Synchronous DRAM) is a type of DRAM that can run at a higher clock speed than conventional memory. SDRAM synchronizes itself with the CPU bus and can run at 133 MHz, or about three times faster than EDO DRAM. SDRAM has largely replaced EDO DRAM. SEARCC SEARCC (South East Asian Computer Confederation, http://searcc.org/) is a professional organization in the computer field which was founded in 0987 by computer expert organizations from 6 countries (Indonesia, Malaysia, Hong Kong, Singapore, the Philippines and Thailand) in Singapore.
The idea to form SEARCC emerged at the first regional computer conference in Singapore in 1976, initiated by the International Federation for Information Processing and organized by the Singapore Computer Society. Although initially, SEARCC was aimed at the Southeast Asian region (as the name suggests), now SEARCC members do not only come from Southeast Asia. Currently (2001), SEARCC has 14 members and one observer with additional members Australia, Canada, India, Japan, New Zealand, Pakistan, Sri Lanka, and Taiwan. Myanmar entered as an observer. The Indonesian organization that is a member of SEARCC is the Indonesian Computer and Informatics Professional Association (IPKIN, http://www.ipkin.co.id).
search engines Look at search engines. secondary cache See secondary cache secondary cache See secondary cache. Secure Electronic Transactions See SET.
Secure HTTP See S-HTTP Secure Sockets Layer See SSL. sector A sector is the smallest unit that can be accessed on a disk. Sector division is done when the disk is formatted. For example, a disk has been formatted to have dozens of tracks and each track is divided into several sectors. The location of information stored on a disk is known from its track and sector numbers.
New technology makes it possible to divide the disk into a different number of sectors for each track. The outer track has more sectors than the track closer to the center. This technique is called zoned bit recording. semiconducto Semiconductors are materials that are neither conductors nor good electrical insulators. Generally, semiconductor materials are silicon and germanium. Computer chips, whether for microprocessors or memory, are made from semiconductor materials. Sequenced Packet eXchange
See SPX. serial line Internet protocol See SLIP serial port See serial port. servers A server is usually a computer that provides information, files, Web pages, or other services to clients who must log on first. The term server is also used for software or operating systems designed to run server hardware.
servlets Servlets are applets that run on a server. This term usually refers to Java applets that run in a Web server environment. This is analogous to Java applets running in a Web browser environment. Java servlets are an alternative to CGI programs. The biggest difference between these two is that Java applets are persistent. Which means that once executed, the Java applet will be in memory and can serve several processes. On the other hand, CGI programs will disappear after each process is completed. SET
SET (Secure Electronics Transaction) is a protocol used to ensure the security of credit card transactions on the Internet. SET uses digital signatures that allow sellers to verify that the buyer using a credit card is the person authorized to use the card. The credit card number will be sent directly to the issuer for verification and billing without being seen by the seller. SET has been backed by many of the major companies involved, including Microsoft, Netscape, Vista, and Mastercard. shading In 3D graphics, every shape created is based on a polygon. The process of coloring polygons is called shading.