Home Computers What is a word in a computer document. Glossary of computer terms in Russian

What is a word in a computer document. Glossary of computer terms in Russian

Sooner or later, almost every modern person begins to master the computer. There is nowhere without him now. And if anyone wants to have a normal job with a decent salary, then computer literacy is one of the conditions for this. We don’t talk about young people at all, since already from school, most of them are PC users. Where should you start? The answer is simple - learn computer terms, the basis of all subsequent learning.

Presenting information is impossible without special expressions, phrases, and phrases, even when explaining it to “dummies.” And therefore you need to slowly study and memorize them. Let's look at some common computer terms as examples.

For general development, more specific computer terms are presented below.

  1. Subscriber digital Internet line format, ADSL - data is transmitted up to 1 Mbit/s, received - up to 8 Mbit/s.
  2. Advanced Technology Attachment, ATA - this is the name given to the bus for connecting various storage devices, such as hard drives.
  3. Basic Input/Output System, BIOS - a set of programs for checking the operation of PC hardware at startup.

You shouldn’t be afraid of incomprehensible names; as you learn, computer terms will gradually become memorized, and over time you will no longer be confused by them.

Actually, all this is not a matter of one day, and in order to successfully master this task, you will need: the computer/laptop itself, a tutorial on how to use it, and the Internet. Unless, of course, you sign up for specialized courses, but continue to master the computer on your own.

Initially, it is advisable to at least read the tutorial, or even part of it, and you can start your device. After downloading, open the Help and Support section and pay attention to it. Put what you read into practice. So things will go slowly. Over time, you will notice that you no longer need to look at the prompts every time to perform some action.

As you master the computer, you can purchase more complex literature or a self-instruction CD; also, do not hesitate to ask friends or work colleagues. You can learn the basics without a device, but it will be more difficult. And remember that theory without practice is quickly forgotten.

In conclusion, I would like to note: despite the fact that the bulk of computer equipment in our country is still imported, companies producing Russian computers are gaining momentum. This could be seen at recent exhibitions in the Expocentre complex, where visitors were shown domestic personal computers, new processors, laptops, and other various electronics that run on components and software of their own production. All this is intended not only for military departments and the civilian production industry, but also for business and civilians, that is, for you and me. And, frankly, there is a lot to see. So master the computer and enjoy all the benefits of civilization!

Hello! Dear friends, can you imagine your life without modern technology? I think not, and it is especially difficult to imagine the absence of a computer. The computer has taken a very important position in all areas of activity. That is, over the past decades, the computer has become a way to spend interesting leisure time, as well as an integral part in many areas of work: engineering, medicine, etc.

Many programs and computer “innovations” are developed abroad and distributed throughout the world. It happens that the program does not have Russian, but you will probably find English in the list of languages ​​when installing. So there is a need to know a basic dictionary of computer terms in English. In addition, many of the programs have a certain number of identical terms, which greatly simplifies the task of studying them, since they are found in almost all programs. Thus, it will not be difficult to remember their translation and meaning over time.

For example, in any program you will encounter

  • open- open
  • file- file
  • error- error, etc.

In addition to the fact that many will find knowledge of computer terms useful in their work, others will also find it useful in non-professional work, for example, to install a program on a computer. Almost always during installation you will come across words such as:

  • next- Further
  • cancel- cancel
  • to close all other applications- close all applications
  • accept- accept

English computer terms Mastering a dictionary of computer terminology will improve your computer literacy. Those who use a computer for an impressive period of time mistakenly consider themselves “advanced” users. In fact, encountering any English term often becomes an insurmountable obstacle.

Another argument for you to learn a dictionary of English computer terms is the fact that many of them are borrowed from Russian. It is well known that the computer has become one of the reasons for the intensive use of Anglicisms in the Russian language over the last half century. For example, the word " feast" comes from the English words " peer”, which translated means “accomplice” and has acquired a new meaning: a client participating in distribution in programs such as torrent.

Computer and global Internet system

As was said a little above, the computer and the Internet have become the reasons for the emergence of Anglicisms in the Russian language; they are changing the Russian vocabulary with amazing speed. You are right in thinking that there is nothing wrong with this. However, imagine that you hear the following dialogue on the street:

I changed mine yesterday Avik, Jolie poured himself. And I set myself aku Best

  • Avik (from the English “avatar”) - means a picture that serves as a “face” on forums and blogs
  • aka (from the expression “also known as”, translated “also known as”) - means nickname, that is, the name by which a network user is known

Okay, I'll keep you posted. What are you?

What is your opinion? Does this sound Russian? Of course not. All this resembles some kind of strange, ridiculous slang. Why did it happen? Yes, because many, due to ignorance of translation into Russian, began to distort English words, adding only Russian endings.

That is why today’s topic is relevant, since studying the information below will help you not speak the fictitious half-Russian-half-English language. You will be able to maintain a purely Russian language, and if necessary, you will not be confused by the program in English.

Dictionary of English computer terms

For greater convenience, we will divide computer terms into specific topics. Each topic includes a small glossary of terms that you may encounter in a given situation.

Computer and its components

Computer - computer
Laptop - laptop
Monitor - monitor
Flash drive - flash drive
Disk - disk
Projector - projector
Scanner - scanner
Printer - printer
Keyboard - keyboard
Key - key
Mouse - mouse
Mousepad - mouse pad
Power strip - extension cord
Floppy disk drive - disk drive
Motherboard - motherboard
Hard disk - hard drive
Random access memory - RAM
Modem - modem

Audio and video player

Internet

Internet - Internet
Link - link
Hard link - direct link
Home page - home page
Hyperlink - hyperlink
History - history
Internet address - Internet address
Join - connection
Net - network
E-mail - e-mail
Spam - spam
Off line - off line
Port - port
Server - server
Traffic - traffic
Trojan horse - Trojan
User - user
Web page - web page
Web site - website
Weblog - blog
Forum - forum
Browser - browser
Log in - input
World-Wide Web - World Wide Web

The program and its installation on the computer

Program - program
Programming - programming
Software
Data processing - data processing
Main program - main program
Processing program
Testing - testing
Recovery program - recovery program
Install - install
Instruction - instructions
Demo version - demo version
Freeware - free software
Algorithm - algorithm
Menu bar - menu bar
Prompt - hint
Exit - exit
Uninstall - uninstall
Update - update

Working with text data

Printer - printer, printing device
Listing - printout
Text - text
File store - file storage
Cipher - cipher
Copy - copy
Insert - insert
Delete - delete, exclude
Symbol - symbol
Gap - space
Cell - cell
A scrollbar - scroll bar
Label - label
Colon - colon
comma - comma
Quotation marks - quotes
Bracket - bracket
Semicolon - semicolon
Line - string
Font - font
Font size/ style/ weight - font size/ style/ boldness
Erasing - erasing
Copy protect - copy protection
Word processing - text processing

Common computer terms

This is not the entire dictionary of English terms you will encounter if you have a computer with Internet access, but these are the most common terms. You can download a more extensive dictionary of terms in English with translation

Hey there, everyone! In this rather long article, we will touch on the extremely relevant field of IT and show you the definitions of popular (and not so popular) computer and technical terms. You were waiting for such an article, weren't you?

To look decent when communicating with knowledgeable people on the Internet or “just be on topic” at a programming party, you better know what they are talking about. With our article on terms, everything mysterious will become clear and understandable!

Since the second half of the 20th century, the rapid growth of computer technology, and the mass introduction of personal computers and computer devices into everyday life in the mid-80s, introduced a huge number of special words and expressions into the Russian language. Thanks to the start of publication in 1988 of the PC World magazine, which became very popular, a “collapse” occurred: English-language terms and abbreviations, often in English spelling, filled the pages of magazines and “clogged” the speech of specialists.

Today, these words are used by people in highly paid positions, and many terms are also used among people not involved in the field of information technology. Who knows how your life will turn out in the future? Know them too!

Are you ready for some serious longread? Then let's get to it!

Top 5 IT terms from EnglishDom

User-centered design (user-centered design)

It is a term used to discuss processes that take user characteristics, habits, or preferences into account in product design. When people design a product based on the user's needs, rather than forcing the user to conform to the design.

Some of the confusion around user-centered design stems perhaps from the more popular term user experience (UX). The term has become quite popular in the IT field when talking about ways for the user to improve the software or other products being tested.

Many people believe that user-centered design and user interface are interchangeable terms. Others point out that the former is more of a concept plan, and the user experience (improved or customizable) is the result. However, IT professionals still use “user interface” as a process term, which can create ambiguity.

User-centered design can be applied to any product, but in the IT industry, much emphasis is placed on intuitive graphical user interfaces and other tools that are user friendly for end users.

Blockchain(blockchain)

A digital way of storing information that allows different people to always know what exactly is stored, when, who and what information was changed, moved or added.

The term blockchain has become a household word due to the emergence of cryptocurrencies (digital or virtual currency designed to act as a medium of exchange using cryptography to facilitate transactions), a new type of money whose earnings and movement are organized precisely according to the blockchain principle.

We can say that the information stored using blockchain technology is something like a logbook that cannot be stolen, burned, hidden, or damaged. And even more so, you cannot secretly erase anything in it, or change any information bypassing the log.

The word "blockchain" literally means "chain of blocks". Any change in information in the blockchain will result in the creation of a new block(or entries in the logbook), which tightly “clings” to the previous links. And each link, once created, cannot be changed.

Information systems for all kinds of purposes can exist in the form of a blockchain. If this is, for example, a real estate register, then without any restrictions it will be possible to find out the history of ownership of any object included in the register. In this case, nothing can be done retroactively, and any attempts to change records will be transparent to everyone.

An important property of information stored using the blockchain principle is that it not stored somewhere in one specific place, but in fragments or completely placed on the computers of a large number of people, duplicated many times. That is, information in the blockchain cannot be taken and deleted: one, ten or a hundred disconnected computers with fragments of the blockchain will not affect the availability of information. If anywhere manuscripts don’t burn, it’s on the blockchain.

Folksonomy (folksonomy)

Type of object classification. This is something like manual sorting of information, which is carried out jointly by a group of people. As a rule, we are talking about classifying something on the Internet - it is more convenient there. For example: lovers of children's literature create, say, a collection of children's e-books on the Internet. Then they mark the books they know with some marks (tags). Each to their own.

More often, the set of tags is discussed in advance, and you cannot go beyond it. For example, in our case, these could be tags: “for children”, “classics”, “no pictures”, “boring”, “bad translation”, “Agniya Barto”, “poems”, “unreadable”, “adventures” " etc.

A popular site that uses folksonomy is the photo hosting site Flickr. Here users upload their photos by tagging them. Each photo can be tagged by anyone who has registered on the site.

Sooner or later, if the community is active, almost every book will receive several of the same tags, set by different people. This means: several people find this book to satisfy these particular tags. All members of the community can rely on them when choosing something for their offspring.

Artificial neural network (ANN)

This is an artificial analogue of a biological neural network, which allows you to automate the solution of many problems. Most of the achievements of artificial intelligence today are associated with artificial neural networks.

The first simple artificial neural network appeared in 1960. A century later, will the progress of such networks lead to the emergence of merciless terminators? Only John Connor knows this.

In essence, an artificial neural network is a special type of computer program, and such a program runs on one or more computers, respectively.

The most interesting property of an artificial neural network is its learning ability. If the task of the program is to distinguish women from men in photographs, then through an artificial neural network you need to “pass” as many different images as possible, suggesting the correct answer.

In the process of such “training”, increasingly accurate algorithms for determining a person’s gender from his image are formed within the neural network - this happens in a semi-automatic mode, the network learns from its mistakes.

Autoencoder (autoencoder, AE)

It is a special type of unsupervised artificial neural network that provides compression and other machine learning features.

The simplest architecture of an autoencoder is a feed-forward network, without feedback, containing an input layer, an intermediate layer, and an output layer. The main principle of operation and training of the autoencoder network is to obtain a response at the output layer that is closest to the input.

Technical terms

  • API— application programming interface. In simple words: connectors on the back of the TV.

When a device from another manufacturer (for example, a DVD player or game console) is connected to the TV, both of them “know” what to do next. And all thanks to connectors - the interface, that is, the means of pairing devices.

  • Access Control List - access control list. Or “party guest list.”

The owner is not interested in the invitations he brought with him. He posts a list on the door and personally checks who is allowed in. No matter how much you would like to get inside, you won’t be able to persuade him (and you won’t be able to take advantage of someone else’s invitation either).

In complex words: the part of a security descriptor that lists who has access to an object and what kind of access it has. The owner of an object can change the ACL of that object to allow or deny access to it by other users. An ACL consists of a header and an arbitrary number of ACL elements (ACEs). An ACL without an ACE is called a null ACL and indicates that no user is allowed access to the object.

  • AdBlock- a program that blocks advertising modules, ad blocking. Or “damage to outdoor advertising.”

It’s quite understandable to be outraged by the littering of public places, isn’t it? But, if the advertisement is privately owned, then it won’t take long for it to fall under the article.

  • Agile Software Development— flexible software development (focused on ease of making changes) or rapid software development (adaptive development).

It's like finishing up a ship on a voyage. That is, it is already possible to float on the water: there is a hull, or even a mast. And the ship is not completed, but is immediately lowered from the slipways and completed during the voyage. This way you immediately find out what is most important and what you need to focus on.

  • Back End— server application (part) or software for performing the final stage of the process.

It's like an underground part of the city. At the top, everything is normal: HTML buildings, CSS cathedrals, Javascript office blocks. And underground is what allows the city to function properly: an intricate network of web servers, applications and databases. Software for solving a problem that is not obvious to the user.

  • Backdoor- loophole. That is, a tool (way) to bypass the security system. Or just a backdoor.

This is when, for example, a builder made a duplicate key to your door. Even the most secure locks will not prevent him from entering. Or maybe give the key to someone else.

  • Bandwidth— bandwidth, frequency range; bandwidth (for example, a communication channel).

For example, the rear channel of the Dolby Surround system has a frequency range of 100 Hz - 7 kHz. This channel passes frequencies from 1-10 Hz (low frequencies) to 7 kHz (lower high frequencies).

The frequency range perceived by human hearing is between 20 Hz and 20 kHz. The limits of the frequency range of electronic or acoustic devices are considered to be frequencies at which the transmission coefficient decreases by 3 dB.

Imagine a water supply pipe through which water is supplied to the shower, dishwasher and washing machine. Turn on all three at the same time and the pressure will immediately drop. And a couple of strong words will come from the shower.

  • Big Data- big data. A series of approaches, tools and methods for processing and analyzing structured, semi-structured and unstructured data of huge volumes and significant diversity to obtain practical, human-readable results.

Mapping an unfamiliar area. It's hard to understand what's what when you're pushing through bushes or wandering through gorges. But armed with the right tool (a balloon), you can see the entire landscape at once and analyze individual elements, for example, the shape of a mountain range or a winding river bed.

  • Bug- error in the program.

The Leaning Tower of Pisa, which stood straight for the first five years, as expected, and then began to lean. Why? There was a design error! There was quicksand under the three-meter foundation. It’s a pity that tourists don’t get caught by software errors.

  • Cookie is a cookie that is used by web servers to distinguish users and store data about them.

It's like a barista with a good memory. You come early in the morning for a double soy decaf latte with cream, and he nods boredly: “As usual?”

  • DDoS Attack— distributed network denial of service attack.

When 200 people dial one number. A regular network attack (DoS attack) is a type that constantly calls. It is annoying and interferes with the use of the phone, but one person can be tracked down and stopped.

But if an anonymous person puts an ad in the newspaper “Bugatti Chiron for $200” with your number, this is already a distributed attack. In this case, a barrage of calls hits you, and your life turns into hell. Callers do not even suspect that they are being used, and it is almost impossible to track down the organizer.

  • Dark Web- dark Internet - a segment of the World Wide Web, which can only be accessed with the help of special software, maintaining complete anonymity there, in order to purchase and sell illegal goods (for example, weapons or drugs) and services, and covert exchange of information.

Actually, the other side of the Moon. Everyone can see the bright side (the regular Internet) - just use the search. To access the dark side you need special (dark) software (rocket).

  • Data Bleed- data leakage. The term is gradually gaining popularity, but it is still difficult to clearly describe as there is no precise definition on the Internet yet.

In general, data breaches occur when there is no transparency in the use of data or when data is shared without the user's express permission.

  • De-identification— de-identification, removal of personal data (identification information) .

Phrases like “senior official” and “source close to the president” are often used by journalists to de-identify their sources.

There is useful information in their words (after all, the credibility of the report depends on where the information comes from), but the specific person will remain unknown. If, of course, you choose your words carefully.

  • Doxing- doxxing, collection and distribution, disclosure, publication, publication of someone’s personal data on the Internet without the consent of that person.

Lynching as a way to take justice into your own hands to punish the guilty. But lynching sometimes backfires if the wrong person becomes the victim or the consequences go too far.

  • Encryption- encryption, secrecy. Tradition of wearing clothes.

It would never occur to anyone to accuse a dressed person of hiding something (you can try, but they are unlikely to understand). Everyone knows that this is how it is accepted in a civilized society.

The same applies to encryption of various basic transactions on the Internet - from banking and trading to sending personal information.

Without strong encryption, the Internet is broken. The question is how to integrate encryption strength requirements with national security and law enforcement concerns - see Backdoor.

  • Front End - the interface part of the client-server application (client component).

It's like walking around the city. The interface is available to us: sidewalks, roads, shops, parks, business districts. But the server part, responsible for the life support of the city, remains hidden from view: power supply lines, gas pipelines, sewers, building foundations are underground.

  • Least Mean Square (LMS) minimum mean square error algorithm.

This is a type of filter used in machine processes that uses stochastic gradient descent in complex ways professionals describe it as an adaptive filter that helps perform signal processing in various ways.

  • OAuth— OAuth authorization protocol.

It's like hiring a gardener for a second home in Spain. In the absence of the owners, a reliable housekeeper with keys looks after the house. That’s why they don’t give the gardener a key: the housekeeper herself will let him in and show him where the shed is. Now, by the next visit, both the house and the garden will be well-groomed - life is wonderful.

  • Open Source- open source.

The principle is that the source code of the system being developed should be freely and freely available to anyone who wants to improve it. The resulting improvements should also be available to everyone for free. Like a cake baked for a friend with a recipe for it.

The cake is a program (only tastier), and the transmitted recipe is open source. Your friend will not only treat himself to something delicious, but will be able to make another cake himself: for himself or for a friend’s birthday. It is possible, of course, that instead of butter he will take peanut butter (this is such an original).

  • Spam- spam, “junk” message.

An infinite number of monkeys locked in a room with an infinite number of typewriters and eventually spitting out the works of Shakespeare.

To increase the chances of success, more and more spam is sent. Millions filter it, delete it, ignore it, but one answer is enough to make the game worth the candle.

  • Spoofing— spoofing fraud (fraud aimed at obtaining confidential banking data of clients for the purpose of stealing money, usually using computer technology, by simulating a real-life banking website or posting it on a fake website. Accordingly, information from the client is sent to a fake website.

In simple words: simulating a connection. Someone disguised as a police officer to obtain confidential information, the IP address in “spoofing” is disguised as a trusted node. In reality, everything is not so, which is fraught with problems.

  • Spyware- spyware. Spyware designed to monitor user actions on a computer. Intercepts his email correspondence, information he enters, passwords and commands. Like hidden microphones.

Once installed, spyware tracks every keystroke, recording passwords, bank details and the translation of the poem you're poring over.

  • TOR (The Onion Router) - free software for implementing the second generation of so-called “onion or multilayer routing”.

This is a system that allows you to establish an anonymous network connection that is protected from eavesdropping. It is considered as an anonymous network that provides data transmission in encrypted form. Like Ray-Ban Wayfarer glasses for the browser. No one sees what exactly their owner is looking at. They look stylish and mysterious.

  • Trojan- Trojan program. Chalice of poison. The motif of the poisoned cup first appears in Shakespeare's Macbeth - a gift that seems flattering, but ultimately turns out to be destructive. Act 1, scene 7.
  • Troll- troll, provocateur (on forums or in chats); troll is the author of defiant and provocative messages. Playing chess with a pigeon.

No matter how you play chess, he will scatter all the pieces, crap on the board and fly off to tell you how he killed everyone.

  • Virus- virus. Venereal disease. Sorry for this comparison, but viruses are picked up when a computer comes into contact with the Internet without protection.
  • WPA (Wi-Fi Protected Access)— protected access via Wi-Fi. The President's Motorcycle Escort is a bulletproof vehicle accompanied by motorcyclists. Delivered securely from your device to your internet connection. But upon arrival, additional security will not hurt.
  • White Hat- white hat hacker, fanatical programmer or ethical hacker. Positive character. This is a computer security specialist who specializes in testing the security of computer systems.

Unlike black hat (or black hat) hackers, white hat hackers search for vulnerabilities on a voluntary basis or for a fee in order to help developers make their product more secure.

The term originates in old Westerns (black hat - villain, scoundrel, black hacker), where the right heroes and villains followed a comfortable monochrome dress code.

  • Wiki— Wiki is a hypertext environment (usually a website) for collecting and structuring written information. May have many authors. Some wikis can be edited by all visitors. Like a hotel guest book.
  • Zero-day— zero-day vulnerability — malicious programs (exploits) against which protective mechanisms have not yet been developed.

"Naked king" in chess. There is nothing left but to start building a defense in the hope that the opponent has not noticed anything. Although it is possible that he has been in the know for a long time and has been just having fun for the last five moves. Checkmate.

Computer terms

  • AJAX is an approach to building interactive web pages that involves the browser communicating with a web server in the background.

Thus, the current page is not completely reloaded, only the changed objects are updated. The result is greater convenience and speed of web applications.

  • ADSL— asymmetric digital subscriber line is a new technology that allows you to use existing subscriber telephone lines for high-speed transmission and reception of data between subscriber computers.

It is called asymmetric because the speed of data reception by the subscriber is several times greater than the speed of data transmitted by it

  • Active Directory is an implementation of the Microsoft directory service for Windows that allows administrators to implement sets of rules that ensure consistency in setting up the user environment, deploying software to a huge number of computers, installing updates on all computers on the network, etc.

Active Directory stores data and environment settings in a centralized database and its networks can reach millions of objects.

  • CSS(Cascading Style Sheets) - cascading style sheets, a separate code that expands the design and formatting capabilities of a web page.

CSS properties are in addition to the main HTML markup. A given rule can apply to individual page elements, the entire document, and the entire site.

  • DNS(Domain Name System) is a system (database) capable of reporting an IP address upon a request containing the domain name of a host (computer or other network device).

To put it simply, each computer on the network has its own unique address - this is a series of numbers (up to 12). If you want to write a letter, dial the mail server number and go ahead. But, you see, remembering the name “mail.ru” is easier than, for example, 164.295.790.024.

Type “mail.ru”, your computer will knock on the “DNS” server, and to the question “How to get to mail.ru?” will receive the exact digital address. Connect at the address (of course without your participation), and you are there. It looks like an ordinary address desk. Only it is not people who use it, but their computers.

  • Doctype— document type — “DTD” (document type definition, description of the document type).

This is necessary so that the browser understands how to interpret the current web page, because “HTML” exists in several versions, in addition, there is XHTML (Extensible Hypertext Markup Language), similar to “HTML”, but differing from it in syntax.

So that the browser “does not get confused” and understands according to which standard to display the web page, it is necessary to set in the first line of code .

  • Delphi is an object-oriented programming environment based on the Object Pascal language.

Used for software development and support. Unlike its progenitor, the Pascal language, it is multifunctional and convenient in that it has a visual application editor that allows you to create the appearance of the future program.

  • DMZ is a technology that ensures the security of a computer network. Its essence is that servers working with external network requests are located in a “demilitarized zone” - “DMZ”.

These servers are limited in access to the main network by a firewall, while working with the external network directly is impossible

  • EDGE is an “advanced GPRS”, a data transfer protocol used in GSM networks of cellular operators; the technology allows you to access the Internet at a speed up to 3-4 times higher than when using GPRS, and transfer data from a mobile phone at an average speed of about 236 kbit/s.

“EDGE”, like “GPRS”, allows the subscriber to pay only for the volume of received/sent information; the technology also allows you to make and receive calls during data transfer, staying always in touch; To use EDGE you need a mobile phone that supports this technology.

  • ERP-system(Enterprise Resource Planning System) is an information system that is designed to automate accounting and management in an enterprise.

Typically, ERP systems are developed on a module basis and cover the entire set of key processes of the company. Their use allows several disparate programs to be replaced by one integrated one.

  • Excel is a program included in the Windows Office suite of programs, one of the most popular among users.

It is a spreadsheet, used for maintaining small databases; calculations; arranging, sorting and linking information; creating charts and graphs.

The program is easy to use; for more experienced users, it opens up the possibility of using complex formulas, analysis, and programming.

  • FTP- this is, translated from English, a file transfer protocol. It is one of the basic protocols designed for information exchange.

The fundamental difference between the FTP protocol and HTTP is that FTP is designed for transferring files of arbitrary size.

Transferring files from the server file system to the client file system and vice versa is carried out using a special program - an FTP client.

  • Flash is an invention for creating interactive content in web animation technology from Macromedia. It is used to create interactive website elements, web games, as well as to create banners and animated screensavers.

Flash files are compact but labor intensive to create. Only experienced flash programmers can do this. To view Flash files you need a Flash player.

  • Firefox is the world's first open source browser. "Fire Fox" has a high level of security.
  • Firewall is a software package designed to protect a computer from unauthorized access.

The functions of the “wall of fire” include monitoring and separating network packets passing through it, filtering out suspicious and dangerous ones, in accordance with specified rules. Sometimes similar functions are assigned to hardware protection.

  • Firewire is a high-speed serial bus that provides high-speed data exchange between a computer and various peripheral devices.

In particular, it is used when capturing video and audio streams from digital video cameras.

Allows you to connect the above-mentioned devices without turning off the power supply to the latter (the so-called “hot plug”).

  • FreeBSD is a UNIX-like operating system, a descendant of UNIX, distributed in source code. FreeBSD is one of the best OS for building Internet and intranet servers.

FreeBSD features reliable network services, efficient memory management, and stability. Compared to other operating systems, FreeBSD servers have the longest uptime.

  • FAQ(Frequently Asked Questions) - answers to popular questions.

“FAQ” is a section in help, help for programs, or online services, containing typical user questions and answers to them. If the program or service is quite simple or completely new, then the “FAQ” can completely replace the help.

  • GPS is a global navigation and positioning system used in Europe and America.

The basic idea is that the location is determined relative to several satellites, the orbits of which, and therefore the exact location, are known.

Each satellite of the GPS system transmits certain signals, the decoding of which is carried out in the receiving device.

  • Host is a powerful server (communication hub) for hosting sites on the World Wide Web, which is used to transfer any files or electronic mail messages.

Host computer is a server installed on Internet nodes that resolves all issues regarding communication and access to various network resources: modems, other computers.

  • HTTP (Hyper Text Transport Protocol) is a data transfer protocol on the Internet. Hypertext Transfer Protocol.

There are clients that send requests to the server, and the server, which processes the incoming requests, responds to them. Today, “http” is one of the most common Internet protocols.

  • HDMI(High-Definition Multimedia Interface) is an interface for high-definition multimedia, designed to transmit a high-definition signal to a video device, that is, a TV, monitor, projector, etc.

Sound is connected via 5.1 or 7.1 channels. The HDMI connector allows you to connect multiple devices using appropriate cables.

  • DPI- (Dot Per Inch - number of dots per inch). Determines the image resolution by the number of dots (pixels). The higher the number of dots, the better the picture quality.

Most often, values ​​from 300 to 1440 are used for various types of images.

  • Cluster is a combination of homogeneous units into a system. In this case, this system can be considered an independent element with certain properties.

The concept of a cluster is included in many fields of science - chemistry, physics, sociology, astronomy, etc. In computer science, there are concepts of a cluster as a unit of information storage, a computer cluster, a server cluster and a database cluster.

  • Screenshot- using the “Print Screen” key you can take a “snapshot” of what is currently on your computer screen. Next, by opening a graphic editor, you can insert a “snapshot” there and save it as a picture.
  • Usability- ease of use of something. Evaluation of the interface, service, control buttons, navigation from the point of view of human comfort. For example, our portal was created according to usability principles - we try to make it easy and convenient for you to navigate here.
  • Pathname— the full name of the file or the full path to the element (represents a link to the element located in the package, the name of which is specified by the path prefix).

Conclusion

You may already be familiar with many of these terms, or you may have used some of them incorrectly. Or maybe you have discovered a whole world for yourself? Be that as it may, now you are aware and can safely go to hacker parties, try to get a job in a good IT company and amaze everyone with your knowledge!

Keep the good English rolling!

Big and friendly EnglishDom family

A
Authorization- a procedure for checking the authenticity of the combination of logical identification name and password (or just the password) entered by the user in some interactive form.
Admin- administrator, a leadership position in the computer world. Network, database, website administrator...
Aka, aka, aka- (from English Also Known As) a combination of two nicknames (or names). For example, “Batman aka Vasya” where “Batman” is a nickname, “Vasya” is a name.
Account- account - login (user name) (login) and password (password).
Antivirus- a program that detects and removes viruses.
Antilich(from the English antitileech) - a system for protecting files from direct downloading. To download files from a leecher-protected website, the user must first visit that site. See also Personalize.
Apache- one of the implementations of http servers intended for use under the control of the UNIX operating system. The program is a virtual server that you can install on your computer. With its help, it is possible to imitate a real Internet server (from the English Apache).
Upgrade- modernization of computer hardware, expansion of capabilities, improvement of its functional characteristics, as well as improvement of software (to a lesser extent).
Upgrade- update something.
Applet- an independent application written in Java and intended to be included in an HTML document as an element of a web page.
Upload- the process of downloading files to a remote computer. (from the English Upload).
Apxivator- a program that allows you to compress information by eliminating redundancy (spaces, repetitions, etc.). Compression can happen with or without losses. You can compress anything: text, music, video, photo, etc. At the same time, the more homogeneous the information is, the better it is compressed.
ICQ (ICQ)- a communication program for the Internet that allows you to exchange short messages (analogous to a pager), as well as send files, photos, etc. One of the means of communication on the Internet.
Attach- attached file.

B
Bug- error, error in the program. From (from the English bug) beetle, insect. The electronic tubes of large and ancient EBMs often burned out due to beetles and moths flying into the light and warmth, and the machine failed. So they began to blame all the mistakes on the beetles...
Byte- 8 bits, unit of measurement of the amount of information. Same as “bit”, only 8 times larger. There are also the following units of measurement: kilobyte, megabyte, gigabyte, terabyte, petabyte, exabyte.
Ban, send to the bathhouse- deprive access rights to something, for example, to a forum.
Banner- an advertising image of a fixed size, usually containing animation, which acts as a hyperlink to one or another Internet resource.
Bath attendant- a person who makes banners.
Browser (browser) is a special client program designed to view the content of web sites and display HTML documents.
loaf- any key on the keyboard (example: trample loaves) (from the English Button).
Backup- make backup.
BebEska, biBizba, bibisa, bibisina, bibiEsina, borda, biba- BBS (bulleten board system), a bulletin board from the times of FIDO, the prototype of modern sites.
Bit- the minimum unit of measurement of information (0 or 1).
Blank- CD.
Action- browser or computer game. IN
Varese- free, “pirated” software (from the English Ware - products).
Windows, Windows carrier- the same as Mazda.
Screw, broom- hard drive, hard drive.
Rope- wire, cable, channel of connections to the Network. G
Gamer- a person who cannot imagine himself without toys. To be nasty is to play.
Guestbook- guest book (from English Guestbook). Guest book is a section of a website equipped with a special interactive form, with the help of which visitors to a given website can leave their wishes and suggestions for developments to chicks or pecypca owners.
Glitch- an incomprehensible glitch in the program (if it repeats, then this is already a bug). It's buggy - it works with errors.
Gig- the same as “meg”, only 1024 times more.
Gifetz- familiar from GIF.
Bang- delete something, erase something from the disk.
Guru- a respected person, an experienced master. D

Dunload(download) - the process of copying files from a remote network computer (server) to the calling computer (client). In common technical jargon, this procedure is sometimes called “downloading.”
Tree- directory layout structure.
Defaults- default values.
Directory- a folder (and not a colony, as one might think).
Domain- this is usually what is called an articulate address on the Internet. (Take www.design.ru. Here “.ru” is the first-level domain, “.design” is the second, “www” is the third).
Firewood- drivers.
Driver- a program that controls any external or internal computer device (scanner, mouse, keyboard, disk drive...). The driver is an intermediate link between the hardware (device) and the operating system. Having changed or added a device, you need to change or install its driver and the operating system and programs can work with this device. There is no need to change the program or operating system. F, W
Hardware- computer filling (processor, hard drive, memory).
Packed goon- an archive packed first with tar and then with gzip.
Fill- upload the file to the server.
Release- officially release the finished software product.
Save- save (from English Save).
Set up- install the program or set the system configuration. (from English setup)
Zip- use zip archiver.
PS- post scriptum (afterword). It’s just that on the keyboard the letters Z and Y are located in the same place as P and S. Too lazy to change the layout... (from English P.S. abbreviation for Post Scriptum) AND
UPS (UPS)- uninterruptible power supply (protects the computer from electrical failures and unexpected power outages). It has a rechargeable battery designed to operate from several minutes to several hours when the mains voltage of 220 V is turned off.
Ignore- an abbreviation for the word “ignore”, a special program procedure for dealing with individual chatlans or forum members, when applied, messages do not reach the addressee. Ignoring can be private or general (total).
IE, IE- Internet Explorer, browser from Microsoft.
IMHO- “in my humble opinion” - (from the English In My Humble Opinion). By expressing this phrase, a person expresses his opinion, trying not to offend anyone, as well as the True Opinion You can’t dispute it (depending on the situation).
Installation- installing the program on the computer. Programs are distributed in a distribution - a kind of packaging. Most programs require installation before starting work. At the same time, they copy the necessary files to the computer’s hard drive and register in the operating system.
Iskalka- search engine (eg Yandex). TO
Stone- processor.
Quoting- quotation (from English quote).
Kilo, Kb, Kb- kilobyte. KiO" - the same as "byte", only 1024 times larger.
Klava- keyboard. Trample the keyboard (loaves, i.e. keys) - work with the keyboard.
Client- a computer (or program) that is served by a server.
Command line- an interface in which interaction with the system is carried out by entering commands and parameters to them, in response some action is performed. It has less clarity for perception, unlike icons of programs similar to Windows. In the case of the command line, there is a line on the monitor against the background of a black screen that is incomprehensible to the average user.
Computer(wheelbarrow, apparatus, number-biter) - computer, PC.
Root- the first directory in the tree (root directory).
Kraker- a person who hacks a system for criminal purposes: theft of information, compromise, ransom. Not to be confused with a hacker.
Crack, crack- (from English crack), which means to break. Usually this is a Key-generator or a small program that allows you to use a licensed program without paying for registration.
Crack, break, hack, pick- open any software and change data in it at your own discretion.
Connect- connection to the Internet or connection to the server.
Cookies- from the English “cookies” - cookies. This is confidential information regarding your IP, your settings on this or that site. On the one hand, this is very convenient, because, for example, you don’t have to constantly enter your password on your provider’s website. However, these cookies can be used for minor purposes.
Cooler- from the word “cooler” - fan. There are coolers that cool the processor, power supply and other devices: graphics accelerator, etc. That is, a computer can have several coolers (usually at least two).
Caching Internet pages- the process of saving html documents and graphic files downloaded from the Internet into a special folder on the hard drive of the user’s computer. When you access the site again, browsers open this web page from the hard drive, which allows you to significantly reduce the time it takes to read it. L
LOL- (from English Laughing Out Loud) what does it mean to laugh loudly, chuckle, etc. There is a corresponding emoticon.
Lamer- a complete idiot, fool, idiot, dumbass. Not to be confused with a novice user. Lamer is dangerous to himself and to others.
Sheet- mailing list, used to notify the general public with one simple letter (from the English Mailing List).
Lich (lich, leecher)- indicate a direct link to an object on someone else’s server (from the English leech - leech). Cheerfulness is considered bad form when working on the Internet. For example, someone posted a file for download on their website. The leecher does not upload it to his server, does not indicate the address of the site where this file can be found, but gives the specific address of the file, thereby using someone else’s traffic and labor. The same applies to pictures. In the case of Warez, this creates additional problems, since the authors of programs, in the event of fraudulent screenshots from an offsite site, can track where and on what resources they were used and at the same time find unlicensed copies of their programs.
Holders of serious resources are fighting leechism, checking the referrer, installing anti-leach (from the English antileech) - a system for protecting files from direct downloading. To download files from a leecher-protected website, the user must first visit that site.
Login- identifier used to log into the system (for example, to a website or forum).
Local- a local network that does not necessarily have access to the Internet.

A
Authorization– a procedure for checking the authenticity of the combination of logical identification name and password (or password only) entered by the user in some interactive form.
Admin– administrator, a leadership position in the computer world. Network, database, website administrator...
Aka, aka, aka– (from English Also Known As) a combination of two nicknames (or names). For example, “Batman aka Vasya” where “Batman” is a nickname, “Vasya” is a name.
Account– account – login (user name) (login) and password (password).
Antivirus– a program that detects and removes viruses.
Antilich(from the English antitilech) – a system for protecting files from direct downloading. To download files from a leecher-protected website, the user must first visit that site. See also Personalize.
Apache– one of the implementations of http servers intended for use under the control of the UNIX operating system. The program is a virtual server that you can install on your computer. With its help, it is possible to imitate a real Internet server (from the English Apache).
Upgrade– modernization of computer hardware, expansion of capabilities, improvement of its functional characteristics, as well as improvement of software (to a lesser extent).
Upgrade– update something.
Applet– an independent application written in Java and intended to be included in an HTML document as an element of a web page.
Upload– the process of downloading files to a remote computer. (from the English Upload).
Apxivator– a program that allows you to compress information by eliminating redundancy (spaces, repetitions, etc.). Compression can happen with or without losses. You can compress anything: text, music, video, photo, etc. At the same time, the more homogeneous the information is, the better it is compressed.
ICQ (ICQ)– a communication program for the Internet that allows you to exchange short messages (analogous to a pager), as well as send files, photos, etc. One of the means of communication on the Internet.
Attach– attached file.

B
Bug- error, error in the program. From (from the English bug) beetle, insect. The electronic tubes of large and ancient EBMs often burned out due to beetles and moths flying into the light and warmth, and the machine failed. So they began to blame all the mistakes on the beetles...
Byte– 8 bits, unit of measurement of the amount of information. Same as “bit”, only 8 times larger. There are also the following units of measurement: kilobyte, megabyte, gigabyte, terabyte, petabyte, exabyte.
Ban, send to the bathhouse– deprive access rights to something, for example, to a forum.
Banner– an advertising image of a fixed size, usually containing animation, which acts as a hyperlink to one or another Internet resource.
Bath attendant– a person who makes banners.
Browser (browser) is a special client program designed to view the content of web sites and display HTML documents.
loaf– any key on the keyboard (example: trample loaves) (from the English Button).
Backup– make a backup.
BebEska, biBizba, bibisa, bibisina, bibiEsina, borda, biba– BBS (bulleten board system), a bulletin board from the time of FIDO, the prototype of modern sites.
Bit– the minimum unit of measurement of information (0 or 1).
Blank- CD.
Action– browser or computer game. IN
Varese– free, “pirated” software (from the English Ware – products).
Windows, Windows carrier- the same as Mazda.
Screw, broom- hard drive, hard drive.
Rope– wire, cable, channel of connections to the Network. G
Gamer- a person who cannot imagine himself without toys. To be nasty - to play.
Guestbook– guest book (from the English Guestbook). Guest book is a section of a website equipped with a special interactive form, with the help of which visitors to a given website can leave their wishes and suggestions for developments to chicks or pecypca owners.
Glitch– an incomprehensible glitch in the program (if it repeats, then this is already a Bug). It's buggy - it works with errors.
Gig– the same as “meg”, only 1024 times more.
Gifetz– familiar from GIF.
Bang– delete something, erase something from the disk.
Guru- a respected person, an experienced master. D
Dunload(download) – the process of copying files from a remote network computer (server) to the calling computer (client). In common technical jargon, this procedure is sometimes called “downloading.”
Tree– directory layout structure.
Defaults– default values.
Directory– a folder (and not a colony, as one might think).
Domain- This is usually what is called an articulate address on the Internet. (Take www.design.ru. Here “.ru” is the first-level domain, “.design” is the second, “www” is the third).
Firewood– drivers.
Driver– a program that controls any external or internal computer device (scanner, mouse, keyboard, disk drive...). The driver is an intermediate link between the hardware (device) and the operating system. Having changed or added a device, you need to change or install its driver and the operating system and programs can work with this device. There is no need to change the program or operating system. F, W
Hardware– computer filling (processor, hard drive, memory).
Packed goon– an archive packed first with tar and then with gzip.
Fill– upload the file to the server.
Release– officially release the finished software product.
Save– save (from English Save).
Set up– install the program or set the system configuration. (from English setup)
Zip– use zip archiver.
PS– post scriptum (afterword). It’s just that on the keyboard the letters Z and Y are located in the same place as P and S. Too lazy to change the layout... (from English P.S. abbreviation for Post Scriptum) AND
UPS (UPS)- uninterruptible power supply (protects the computer from electrical failures and unexpected power outages). It has a rechargeable battery designed to operate from several minutes to several hours when the mains voltage of 220 V is turned off.
Ignore– an abbreviation for the word “ignore”, a special program procedure for dealing with individual chatlans or forum members, when applied, messages do not reach the addressee. Ignoring can be private or general (total).
IE, IE– Internet Explorer, browser from Microsoft.
IMHO– “in my humble opinion” – (from the English In My Humble Opinion). By expressing this phrase, a person expresses his opinion, trying not to offend anyone, as well as the True Opinion You can’t dispute it (depending on the situation).
Installation– installing the program on the computer. Programs are distributed in a distribution - a kind of packaging. Most programs require installation before starting work. At the same time, they copy the necessary files to the computer’s hard drive and register in the operating system.
Iskalka– search engine (eg Yandex). TO
Stone– processor.
Quoting– quotation (from English quote).
Kilo, Kb, Kb– kilobyte. KiO" is the same as "byte", only 1024 times larger.
Klava- keyboard. Trample the keyboard (loaves, i.e. keys) - work with the keyboard.
Client– a computer (or program) that is served by a server.
Command line– an interface in which interaction with the system is carried out by entering commands and parameters to them, in response some action is performed. It has less clarity for perception, unlike icons of programs similar to Windows. In the case of the command line, there is a line on the monitor against the background of a black screen that is incomprehensible to the average user.
Computer(wheelbarrow, apparatus, number-biter) – computer, PC.
Root– the first directory in the tree (root directory).
Kraker– a person who hacks a system for criminal purposes: theft of information, compromise, ransom. Not to be confused with a hacker.
Crack, crack– (from English crack), which means to break. Usually this is a Key-generator or a small program that allows you to use a licensed program without paying for registration.
Crack, break, hack, pick– open any software and change data in it at your own discretion.
Connect– connection to the Internet or connection to a server.
Cookies– from the English “cookies” - cookies. This is confidential information regarding your IP, your settings on this or that site. On the one hand, this is very convenient, because, for example, you don’t have to constantly enter your password on your provider’s website. However, these cookies can be used for minor purposes.
Cooler- from the word “cooler” - fan. There are coolers that cool the processor, power supply and other devices: graphics accelerator, etc. That is, a computer can have several coolers (usually at least two).
Caching Internet pages- the process of saving html documents and graphic files downloaded from the Internet into a special folder on the hard drive of the user’s computer. When you access the site again, browsers open this web page from the hard drive, which allows you to significantly reduce the time it takes to read it. L
LOL– (from English Laughing Out Loud) which means to laugh loudly, chuckle, etc. There is a corresponding emoticon.
Lamer- a complete idiot, fool, idiot, dumbass. Not to be confused with a novice user. Lamer is dangerous to himself and to others.
Sheet– a mailing list, used to notify the general public with one simple letter (from the English Mailing List).
Lich (lich, leecher)– indicate a direct link to an object on someone else’s server (from the English leech – leech). Cheerfulness is considered bad form when working on the Internet. For example, someone posted a file for download on their website. The leecher does not upload it to his server, does not indicate the address of the site where this file can be found, but gives the specific address of the file, thereby using someone else’s traffic and labor. The same applies to pictures. In the case of Warez, this creates additional problems, since the authors of programs, in the event of fraudulent screenshots from an offsite site, can track where and on what resources they were used and at the same time find unlicensed copies of their programs.
Holders of serious resources are fighting leech, checking the referrer, installing anti-leach (from the English antileech) - a system for protecting files from direct downloading. To download files from a leecher-protected website, the user must first visit that site.
Login– identifier used to log into the system (for example, to a website or forum).
Local- a local network that does not necessarily have access to the Internet.

New on the site

>

Most popular