TagsAcronyms Blogging Brands Browsers Capitalization styles Cartoon Cloud Communication Compression CPU Data DPI Electronics Email facebook Gaming Google Graphics Hardware Internet iPad Kernel Memory Naming convention Networking Phrase Programming Projects RAM Saying Security social bookmarking Social Networking Software Storage Storage Media UI Units of measure
Category Archives: IT
Unlike the cartoon the tick box is not a container for a dog’s ticks but rather an element or user interface control used in computer programs. Tick boxes are also known as check boxes. A check boxes usually only have two states, checked (ticked) or not checked (not ticked). There are check boxes with a third state, tristate check boxes. This third state indicates that the check box hasn’t been to set to either state (undecided).
Check boxes are generally used to indicate true or false, yes or no or to confirm something. It is commonly used on the internet when a visitor registers on a web site. They are presented with a check box they must tick to confirm that they have read and understood the terms and conditions of the site.
Apple iTunes is a popular software application developed by Apple Inc that manages and plays various types of electronic media from mp3′s to video files. The media is organised in various libraries on the user’s personal computer, iPod, iPad or iPhone.
iTunes allows the user to purchase and download digital media and organize it across various compatible devices.
Dropbox is an internet based service that offers file hosting capabilities. The service allow you to store files on-line and synchronize them to one ore more personal computers. All you have do to use Dropbox, is to register with them and install the synchronisation application on your computer or mobile phone. The installation creates a special Dropbox folder on your hard drive. All files placed in this folder will be synchronised with all your other devices that have the Dropbox software installed. You can also access your Dropbox files on-line by logging on to their website.
A motherboard is the main printed circuit board in a modern computer and has various connectors and sockets for computer components and peripherals. Like a mother it keeps the family of components together and forms the backbone of the personal computer and can be expanded by plugging in additional cards or circuit boards that can perform a range of tasks and functions. Some of these add-on card are things like graphics cards, network interface cards and more. It also holds the RAM modules and CPU which forms the core of the PC. The PC’s hard disk drives also connect to motherboard with special cables and connectors.
Modern motherboards have some of these interfaces built into the board and is referred to as on-board. Some motherboards may come with a basic on-board graphics card for normal use but gamers like to install high performance graphics cards to improve graphics quality and performance.
These add-on cards are plugged into expansion slots on the motherboard which connects to the integrated circuits and CPU via subsystems called buses.
In computer terms, a memory stick is a small, portable electronic storage device. Memory sticks are mostly used in portable devices, like digital cameras, to store electronic data. In the case of a digital camera it will store photographs. Most modern computing devices, for example computer laptops, have ports where you can plug in the memory stick to download or copy the data from the memory stick to the computer.
The term memory stick was first created by Sony to describe their flash memory devices but today, the term memory stick, is used to describe these types of devices in general.
In computer terms a tunnel is a bi-directional connection between two networks. An example of such a tunnel would be when someone connects to their workplace from their home PC. They would use VPN (virtual private network) software to establish the connection.
This creates a secure connection over a public network, like the Internet. All the data is encrypted and secure from tampering. Another example would be when you make payments over the Internet. You will notice that the URL of the page that processes the payment starts with https://. This is an encrypted connection or tunnel between your browser and the web site.
Tunneling is also referred to as encapsulation. One type of network protocol is encapsulated by another. SSH and SSL are example of such secure protocols.
Mobile games are electronic games designed for mobile electronic devices like cellular phones and tablets. The mobile gaming industry has grown rapidly in the last couple of years mainly due to the growth in the mobile device market.
Mobile devices have become powerful enough for mobile games with high quality graphics and physics. Prior to modern day mobile devices and games there were handheld gaming devices that offered a single came on the device, for example Donkey Kong. These devices had limited graphics capabilities and used basic liquid crystal displays.
Modern mobile devices can play various games which can be installed and uninstalled from the device . Most mobile games are downloadable onto the mobile device via the internet. One of the more famous mobile games is Angry Birds by Rovio, which is available for various mobile platforms for example, the iPhone and iPad, Android phones and tablets and more.
Cloud computing is a term used in information technology to describe internet based computing and software services. In computing, cloud is a metaphor for the internet. Cloud computing allows businesses to harness the power of large computer systems and services.
In other words, instead of managing and hosting their computing systems and services on-site within the business domain, businesses can use cloud computing and get these services and systems via the internet.
This means that business systems and resources based on cloud computing can grow with the business needs in a secure and scalable manner.
Here are only some of the companies that offer cloud computing platforms and services:
- Amazon (Amazon Elastic Compute Cloud)
- Fortress ITX
- Layered Technologies
In information technology terms the acronym PC stands for personal computer. A personal computer can be defined as a computer designed with the speed, capacity and capabilities to make it suitable for use by individuals.
PCs in the household are typically installed with software used for personal admin, games, Internet browsing and email whereas the PC in the office usually comes installed with software to perform business related tasks and functions.
In computing terms a cookie refers to a small text file stored on a user’s computer by a web site the user might be visiting. Information stored in these cookies are used by web sites to store information related to the user for example the email address, user name or anything else the web site might need to identify the user in the future.
Web sites implement this to improve user experience and personalisation. That is how the web sites know who you are when you visit them a second time round. Clearing your cookies in your browser will delete all this information and the web site will not recognise the user.
Cookies can be disabled in most browsers but this can prevent some web sites from functioning properly.