SlideShare a Scribd company logo
1 of 26
MODULE ICT AS A TOOL FOR COMPUTER
EDUCATION
ESTUDENT:
KELLY JHOANA DURAN MENDEZ
TEACHER:
Suraya PERAZA PIZARRO
NATIONAL EDUCATIONAL INSTITUTION CODAZZI
A
Abandonware:
Is software that is no longer marketed by the company that created and has
been discontinued. This generates the free software movement, which makes
it legal because it maintains the rights under copyright, but companies
usually do not pursue this market.
Accessibility:
Accessibility is the ease of access for people with difficulties in implementing
technologies like the Internet represents the adaptation of web pages for easy
navigation by the disabled or elderly.
ActiveX:
Program or application that Microsoft developed to allow dynamic web
pages.
B
Broadband:
Is a connection to the Net via high-speed technologies. These
connections go beyond the data transfer speed of 56Kbs.
Bond or link:
These are the parts of a web page that take you to another part of the
same or another page.
Bps (bits per second):
Indicates the speed of transmission of bits in a communication
medium.This speed can be measured in other larger units.
Browser:
In Castilian translates as browser is a software to display web pages
(Internet Explorer, Netscape, Opera or Mozilla, for example).
C
Cable:
It is understood by those wired high-speed allow connection via fiber optic
cables, may also offer other services such as television or phone in Spain offer
these services Aunacable and ONO, among other smaller companies.
CPU (Central Processing Unit):
It is the central processing unit of the computer. It performs all operations
and instructions for the various programs. It is divided into Control Unit and
Arithmetic Logic Unit.
Cyberspace:
Term that refers to the world of computers and information technology and
society built around them. Designates the set of all existing telematics
services. It was created by William Gibson in his novel Neuromancer.
D
Download (Download)
On the Internet, is the process of transferring information from an
information server to the user's personal computer.
Digital Divide:
Is a metaphor for the differences in evolution, development and penetration of the
Information Society and new technologies in different areas, communities, countries or
social
classes, analyzed through benchmarking indicators.
Download (Download)
On the Internet, is the process of transferring information from an information server to the
user's personal computer.
Driver:
Software drivers that are necessary for the operation of parts or peripherals of a computer.
E
E-mail:
It is one of the most used Internet applications, is a fast messaging system that lets you send
messages and files from a user's computer to another computer. For sending and receiving
mail you need to be connected to our server.
Emoticon (Smiley)
Graphic symbol representing the different expressions of the human face.Used to show the
mood in the written communications through the network (email, chat, etc).
Ethernet:
One type of local area network developed by Xerox at the moment is the most widely used
despite the boom of Wi-Fi networks. These networks began taking a speed of 10 Mbps but
later versions have appeared at 100 Mbps or 1 Gbps.
Extension:
They are characters that specify the type of a file. After a point is added after the name of the
file.
E-bussiness:
Can be defined as businesses that use Internet technologies for development.
F
Firewall:
System or program that sits between a computer or local network and Internet to ensure that
all communications are secure, thus preventing the attack from hackers and crackers to the
ports of the system.
Forum:
A website (site, web, ...) where users can leave their opinions and messages in relation to a
particular topic. Can be answered by other users who access the forum.
Freeware:
Computer programs that are distributed for free over the Internet or other channels. It is often
confused Freeware (Free Software) with Free Software (Free Software), although sometimes a
single application can be both free software distributed free.
Forum:
A website (site, web, ...) where users can leave their opinions and messages in relation to a particular
topic. Can be answered by other users who access the forum.
FTP (File Transfer Protocol):
File Transfer Protocol. Provides access to files located on another computer on a network and download
them to your own computer. Some FTP servers are private and others as the universities are public. Using
this method also uploaded various Internet websites.
G
GÉANT (1 and 2):
European high-speed networks that connect scientific and academic
institutions with research and development objectives.
GIF (Graphics Interchange Format):
Graphic file format widely used on the Internet. Allows multiple
images be exchanged in a time series logic, generating movement.
GPRS (General Packet Radio Service):
Transmission technology based on packet switching that uses the
GSM mobile telephone.
GSM (Global System for Mobile):
Digital system for mobile phones. This is a standard used in most of the
world. Opera on 3 frequencies 900, 1800 and 1900 MHz The first two used in
Europe and third in North America.
H
Hard Drive:
Is the central unit of computer memory, is a magnetic disk having a large capacity.
Hacker:
Well known to the person who has reached a deep knowledge about the inner workings of a
system and accessing it without malice and without causing any damage. To demonstrate his
knowledge of computers and detect vulnerabilities in systems very safe.
Hypertext
Document written in HTML that contains links to other documents that may be further
hypertext documents. Normally you can access hypertext documents via web browsers. It
also identifies hypertext link or link.
Host:
Computer that enables communication with other computers attached to a network.
HTML (HyperText Markup Language):
Language they are written documents that are accessed through web browsers. Supports
hypertext and multimedia components.
I
Inbox:
Folder where the messages received by email.
Ibernet:
Spanish network maintained by the telecommunications company Telefonica IP protocol.
Icon:
Graphic symbol displayed on a computer screen to represent a particular action to perform,
such as running a program, open a file, print a document or display a folder.
IP (Internet Protocol):
Is the set of rules governing the transmission of data packets over the Internet. The IP address
consists of 32 bits represented by dotted decimal notation, this address identifies the
computer connected to the Internet.
ICQ:
Instant messaging system that allows communication between users and the exchange of
small files. Now with the boom of Internet technology and has been superseded by type
system from Microsoft or Yahoo Messenger.
J
JAVA:
Language developed by Sun Microsystems for the elaboration of export
applications to the network, capable of operating on any platform, web
browsers normally.
JPEG (Joint Phtographic Experts Group):
Compressed image format (loss of information). The JPEG graphics that can
be included in HTML pages, are recognized and displayed by Web browsers.
JDOWNLOADER:
is a very popular download manager that accelerates downloads, extract the
files, and does practically everything electric works only if mismo.Â
JavaScript.: Language scheduling of instructions developed by Netscape that
allows the creation of interactive Web sites. It is a relatively simple tool that
can be used in conjunction with Java applets (but not the same language).
K
Knowbot.: Robot of knowledge or virtual robot. This
is a type of personal digital assistant.
KiloBytes (Kb):
is a unit of information storage No symbol which is
electric and is equal to 103bytes KBA.
kernel:
Core or essential part of an operating system. Provides the
basic services of the entire system.
keyword:
keyword for any search.
L
LAN (Local Area Network):
Network devices that cover a small area. Normally used for buildings, office complexes or
small towns.
Link:
Hypertext pointers used to jump from one information to another, from one page to another
or from one server to another, when browsing the Internet.Also link or link.
Linux:
Operating system implemented by Linus Torvalds, based Unix and published in 1994. His
interest is that its code is open under the GNU, which means that its development was made
with input from different users. From here came the whole philosophy of free software.
Login:
Login or when logging is done take steps to identify and access restricted services of a
portal. In some cases the word login is used in place of the word you or nick.
Lurking:
A term referring to a subscriber in a newsgroup or a mailing list simply follow the discussion
without participating. Beginners are advised to know the style and atmosphere of the group.
M
MIDI:
Encrypted music format that makes use of standard tools that incorporate all sound cards
with MIDI capability.
Modem:
Hardware device that allows connecting a computer to the network. It is necessary to
differentiate the traditional modem ADSL modem, which enables more optimal advantage of
the telephone line.
MP3:
Audio compression format with sound quality similar to that of CDs and widespread on the
internet.
MP4:
Is a multimedia compression format. Unlike the MP3 files can contain both audio and video.
MS-DOS:
Operating system that Microsoft developed for IBM personal computers.Spread like other
operating system-compatible personal computers during the early popularization of the PC.
N
NAT (Network Address Translation):
Is the translation or conversion of private network IP addresses to Internet IP addresses.
Netizen:
Emerged is a neologism of the words Net and Citizen means a citizen or resident of the Net is
used to use it synonymous with surfer or surfer.
Nick:
Is the username or nickname that uses a contributor to the network to protect their identity.
Node:
A network device, usually a computer or printer.
Network:
A computer network is a data communication system that connects computer systems located
in different places.
O
Operating system:
Software responsible for managing all hardware and computer software.Windows, Linux, MacOS or MS
DOS are examples of operating systems.
On-line:
Relating to any document or file indicates that service is available through the network.
Object-Orientation to:
It is a paradigm of the programming n the variables instead of using objects that can have a state and a
behavior or methods.
OSI (Open System Interconnection):
Universal standard for communication protocols.
OEM (Original Equipment Manufacturer, Original Equipment Manufactured).
Applies to businesses that purchase a product from a manufacturer and integrate it into its own
product. All such manufacturers, which include a Pentium in your computer as an OEM Take
Action. Sometimes the tea. Terms apply to goods sold by wholesalers and do not include packaging,
software and other accessories that come with the version commercial.OS/2 (Operating System 2). It is a 32
bit operating system originally developed by IBM multitasking and Microsoft as a substitute for
professional Windows. The latest version is 4, which supports voice commands and dictation, but that is
already raced ahead of the evolution of Windows and various versions of Unix.
P
P2P (peer to peer):
Communication between the same two levels of the OSI standard. Allows the exchange of
information between computers without the need for a central server, putting the client or
server computers as necessary. Widely used P2P networks to exchange files between various
users around the world.
PCOrd (Personal Computer):
enadores aimed at users created by IBM. It began marketing in 1982. Its compatibility with
other computers and the alliance with Microsoft to establish in all its operating system, led to
the success of the PC against Apple Computer. It is now understood by any desktop PC
without the need to be IBM, with the exception of Apple that inconsistent and are still known
as Mac
Photoshop:
Application for editing and bitmap images. Support vector data.
Protocol:
Formal description of message formats and rules two computers must follow to exchange those messages.
PROTECTED:
Internet surfer.
Q
QuickTime:
Software developed by Apple that lets you view
video files.
QAM (Quadrature Amplitude Modulation):
Modulation system for data transmission and
telecommunications.
R
Router:
Hardware device that distributes traffic between networks.
RAM (Random Access Memory):
It is the main memory which have computers. It stores the data while we are
working. It's kind of volatile, ie, when you turn off the computer data are lost,
so if you want to keep must be stored in a nonvolatile media type (hard disk,
CD,.).
ROM (Read Only Memory):
It is a read-only memory as its name suggests. In principle can not be changed
and contains the information necessary to use the computer to start up.
RSS (Really Simple Syndication):
Is how to provide content for web pages immediately as they are updated.Go
far beyond the traditional mailing lists and providing access to information
without having to visit their respective websites. Are based on XML documents and read by
aggregators.
S
Software:
Is the logic of the computer. Are the different programs that can use the machines and allow the various
actions or tasks to hardware.
Spyware:
This is a particular type of software that is installed on users' computers without the knowledge or consent,
and collect information or enable actions that could expose the machine to some kind of attack. Usually
arrive via email or hidden in files that are downloaded from the Internet.
Streaming:
System allows data transmission through a program that handles the data already received after processing,
go without waiting for them to download completely. Convenient to listen / watch radio or television
programs, watch or listen to music clips.
Server:
System that provides resources and services to personal computers. Often used to refer to those systems
that provide information to users.
Shortcut:
They are icons for opening programs and files quickly from the desktop or from the toolbar .
T
TCP / IP:
Communication protocol that underlies the Internet. Thanks to this protocol, the network is not centralized
and when a computer calls another chooses a random direction which will tend to be optimal.
Trojan horse:
Computer program that carries within it the necessary programming for the operator or user of the
computer system can access the outside in is installed. To detect and remove these malicious programs will
need a antivirus software. Some Trojan horse allows the external user (hacker) a total team control, and are
considered very dangerous.
Token Ring:
A type of network that is characterized by a ring topology in which there is a token or witness who goes
through the various stations of the network which gives permission to the control station has to transmit.
Trojan:
Computer program that carries within it the necessary programming for the operator or user of the
computer system can access the outside in is installed. To detect and remove these malicious programs will
need a antivirus software. Some Trojans allow the external user (hacker) a total team control, and are
considered very dangerous.
The Outbox:
Folder where messages are stored before being sent by email.
U
Unix:
First multi-user operating system developed with a high level language like C. There appeared in 1971 and
has evolved over time with the collaboration of various entities. Use and administration is a bit complex but
with the apparition of Linux has expanded its use for PC's.
UMTS (Universal Mobile Telephone Service):
Technology of communication of the third generation of mobile phone telephony.
USB (Universal Serial Bus):
Is a connection device that allows support of up to 256 peripherals. Furthermore s can be connected and
disconnected with the computer running. This makes a big difference, since the former involves installing a
corresponding connector card drivers and reboot the computers.
Update:
Is to publish new information on a website. An updated website indicates you have new information in
short periods of time. It is also understood to update the act to refresh or reload a web page to load
completely.
Usenet (USEer NETwork, a network of users).
Character network of the Public composed of a large number of newsgroups and organized theme cally.
V
Virus:
Code fragments that are entered into computers without the user noticing its
presence. Damaging effects of various kinds, from affecting the performance to erase the
entire disc information, from affecting performance to erase the entire disc information, are
hidden and may have the ability to spread to other computers
VRA (Virtual Reality, Virtual Reality):
Technology that enables the creation and Interaction with fictional worlds hosted on a
computer. This technology has a wide variety ofuses, among them training with sophisticated
machines and flight simulators, medical applications or games.
Videoconferencing:
Conversation between two or more s people in different locations but can
be viewed and oars. Videoconferences that take place outside the Internet require that in
every place where the participants have a special camera and camcorder devices for
presentation of documents.
w
Wiring:
Is central and fundamental structure of a network based on cable connections.
Worm:
It is a malicious program or virus that automatically spreads via the Internet.
Website:
Document displayed in the browser. May simply contain text or graphics and multimedia. When we refer to the overall content
of a website we should call it Web Site.
Web:
It is an information system created by Swiss researchers of CERN. Is based on "hypertext." Users can create, edit and display
hypertext documents. The Internet is accessible through browsers like Internet Explorer or Mozilla Firefox.
WAN (Wide Area Network):
Network devices (computers, routers, printers and other network ....) occupies a large size. Normally used to connect smaller
networks (LAN) apart.
WAP (rotate Application Protocol):
It is a protocol by which mobile phones can be connected to the Internet and display the information in the phone.
Wi-Fi (Wireless Fidelity):
Performance standard for wireless networks. This is called an end to any element capable of supporting wireless
communications.
x
XML (Extensible Markup Language):
It is a markup language that allows users to tag content very easily. Do not have a fixed format. It has become a standard for
exchanging data between applications.
z
ZIP:
File compression format, possibly the most used. The extension of the ZIP files is. "Zip." There are different programs to
compress and decompress files in this format, the most popular are WinZip (for Windows) MacZip (for Macintosh) and unzip
(for UNIX). Zip means "zipper."

More Related Content

What's hot

CURRENT AND FUTURE DEVELOPMENT OF OPEN SOURCE SOFTWARE AND LATEST DEVELOPMENT...
CURRENT AND FUTURE DEVELOPMENT OF OPEN SOURCE SOFTWARE AND LATEST DEVELOPMENT...CURRENT AND FUTURE DEVELOPMENT OF OPEN SOURCE SOFTWARE AND LATEST DEVELOPMENT...
CURRENT AND FUTURE DEVELOPMENT OF OPEN SOURCE SOFTWARE AND LATEST DEVELOPMENT...Syazzey Waniey II
 
Chapter1- Introduction to Computers and the Internet
Chapter1- Introduction to Computers and the InternetChapter1- Introduction to Computers and the Internet
Chapter1- Introduction to Computers and the InternetFatom Ahmad
 
computer networks
computer networks computer networks
computer networks MiXvideos
 
How does the web or internet work
How does the web or internet workHow does the web or internet work
How does the web or internet workAnand Bhushan
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networkingshankars73
 
Computers and more
Computers and moreComputers and more
Computers and moreEli Jimenez
 
Cibm worhop 2 chapter seven
Cibm   worhop 2 chapter sevenCibm   worhop 2 chapter seven
Cibm worhop 2 chapter sevenShaheen Khan
 
Technical language
Technical languageTechnical language
Technical languageana maria
 
Interactive glossary
Interactive glossaryInteractive glossary
Interactive glossaryOtarola93
 
Cibm workshop2 chapter eight
Cibm  workshop2 chapter eightCibm  workshop2 chapter eight
Cibm workshop2 chapter eightShaheen Khan
 
ecom notes mca 5th sem
ecom notes mca 5th semecom notes mca 5th sem
ecom notes mca 5th semRenu Thakur
 
Chap1 Internet Fundamental
Chap1 Internet FundamentalChap1 Internet Fundamental
Chap1 Internet Fundamentalnizamhusen
 
PPT on MS-CIT Unit 3 (slide share)
PPT on MS-CIT Unit 3 (slide share)PPT on MS-CIT Unit 3 (slide share)
PPT on MS-CIT Unit 3 (slide share)SHRIBALAJIINFOTECH
 
Interactive glossary - Telematic´s Terms
Interactive glossary - Telematic´s TermsInteractive glossary - Telematic´s Terms
Interactive glossary - Telematic´s TermsEldher Salas
 
1. palma integration of learning across subject discipline
1. palma  integration of learning across subject discipline1. palma  integration of learning across subject discipline
1. palma integration of learning across subject disciplineDonah Basco
 

What's hot (20)

CURRENT AND FUTURE DEVELOPMENT OF OPEN SOURCE SOFTWARE AND LATEST DEVELOPMENT...
CURRENT AND FUTURE DEVELOPMENT OF OPEN SOURCE SOFTWARE AND LATEST DEVELOPMENT...CURRENT AND FUTURE DEVELOPMENT OF OPEN SOURCE SOFTWARE AND LATEST DEVELOPMENT...
CURRENT AND FUTURE DEVELOPMENT OF OPEN SOURCE SOFTWARE AND LATEST DEVELOPMENT...
 
MSCIT Unit 1
MSCIT Unit 1MSCIT Unit 1
MSCIT Unit 1
 
Chapter1- Introduction to Computers and the Internet
Chapter1- Introduction to Computers and the InternetChapter1- Introduction to Computers and the Internet
Chapter1- Introduction to Computers and the Internet
 
computer networks
computer networks computer networks
computer networks
 
How does the web or internet work
How does the web or internet workHow does the web or internet work
How does the web or internet work
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
Computer systems
Computer systemsComputer systems
Computer systems
 
Computers and more
Computers and moreComputers and more
Computers and more
 
Cibm worhop 2 chapter seven
Cibm   worhop 2 chapter sevenCibm   worhop 2 chapter seven
Cibm worhop 2 chapter seven
 
Technical language
Technical languageTechnical language
Technical language
 
Interactive glossary
Interactive glossaryInteractive glossary
Interactive glossary
 
Cibm workshop2 chapter eight
Cibm  workshop2 chapter eightCibm  workshop2 chapter eight
Cibm workshop2 chapter eight
 
ecom notes mca 5th sem
ecom notes mca 5th semecom notes mca 5th sem
ecom notes mca 5th sem
 
958870 62257 sunnysunny_
958870 62257 sunnysunny_958870 62257 sunnysunny_
958870 62257 sunnysunny_
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Chap1 Internet Fundamental
Chap1 Internet FundamentalChap1 Internet Fundamental
Chap1 Internet Fundamental
 
MS-CIT Unit 4 (slide share)
MS-CIT Unit 4 (slide share)MS-CIT Unit 4 (slide share)
MS-CIT Unit 4 (slide share)
 
PPT on MS-CIT Unit 3 (slide share)
PPT on MS-CIT Unit 3 (slide share)PPT on MS-CIT Unit 3 (slide share)
PPT on MS-CIT Unit 3 (slide share)
 
Interactive glossary - Telematic´s Terms
Interactive glossary - Telematic´s TermsInteractive glossary - Telematic´s Terms
Interactive glossary - Telematic´s Terms
 
1. palma integration of learning across subject discipline
1. palma  integration of learning across subject discipline1. palma  integration of learning across subject discipline
1. palma integration of learning across subject discipline
 

Viewers also liked

Viewers also liked (11)

DMAD 2010 Target Awards
DMAD 2010 Target AwardsDMAD 2010 Target Awards
DMAD 2010 Target Awards
 
DMAD 2010 Target Awards
DMAD 2010 Target AwardsDMAD 2010 Target Awards
DMAD 2010 Target Awards
 
Cvpfinall
CvpfinallCvpfinall
Cvpfinall
 
Afe - Gas
Afe - GasAfe - Gas
Afe - Gas
 
Como contruir un vehiculo
Como contruir un vehiculoComo contruir un vehiculo
Como contruir un vehiculo
 
Le fonti di contaminazione in ambito domestico 2
Le fonti di contaminazione in ambito domestico 2Le fonti di contaminazione in ambito domestico 2
Le fonti di contaminazione in ambito domestico 2
 
Afe - energie rinnovabili
Afe - energie rinnovabiliAfe - energie rinnovabili
Afe - energie rinnovabili
 
Cura Mobile Crm (4)
Cura  Mobile Crm (4)Cura  Mobile Crm (4)
Cura Mobile Crm (4)
 
Receptes
ReceptesReceptes
Receptes
 
Le fonti di contaminazione in ambito domestico 1
Le fonti di contaminazione in ambito domestico 1Le fonti di contaminazione in ambito domestico 1
Le fonti di contaminazione in ambito domestico 1
 
Receptes
ReceptesReceptes
Receptes
 

Similar to Diccionario kelly ingles

Primer parcial- Computer technical vocabulary
Primer parcial- Computer technical vocabularyPrimer parcial- Computer technical vocabulary
Primer parcial- Computer technical vocabularyAdiiLove18
 
English Technical Glossary
English Technical GlossaryEnglish Technical Glossary
English Technical Glossaryana maria
 
Notes for banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationxNotes for  banking railway opsc psc preparationx
Notes for banking railway opsc psc preparationxRAJSEKHAR PEDINA
 
The Internet, Intranet and Extranet
The Internet, Intranet and ExtranetThe Internet, Intranet and Extranet
The Internet, Intranet and ExtranetFellowBuddy.com
 
Introduction to Networking | Linux-Unix and System Administration | Docker an...
Introduction to Networking | Linux-Unix and System Administration | Docker an...Introduction to Networking | Linux-Unix and System Administration | Docker an...
Introduction to Networking | Linux-Unix and System Administration | Docker an...andega
 
A 101025201954-phpapp02
A 101025201954-phpapp02A 101025201954-phpapp02
A 101025201954-phpapp02theiluminados
 
Literacy glossary
Literacy glossaryLiteracy glossary
Literacy glossaryJTHSICT
 
Ch03 internet-2-browser.pptx
Ch03 internet-2-browser.pptxCh03 internet-2-browser.pptx
Ch03 internet-2-browser.pptxSR NAIDU
 
Final draft[2]
Final draft[2]Final draft[2]
Final draft[2]Teshabel
 
LTR: Open Source Public Workstations
LTR: Open Source Public WorkstationsLTR: Open Source Public Workstations
LTR: Open Source Public Workstationskoegeljm
 

Similar to Diccionario kelly ingles (20)

Internet
InternetInternet
Internet
 
Primer parcial- Computer technical vocabulary
Primer parcial- Computer technical vocabularyPrimer parcial- Computer technical vocabulary
Primer parcial- Computer technical vocabulary
 
Information systems software
Information systems softwareInformation systems software
Information systems software
 
English Technical Glossary
English Technical GlossaryEnglish Technical Glossary
English Technical Glossary
 
Notes for banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationxNotes for  banking railway opsc psc preparationx
Notes for banking railway opsc psc preparationx
 
The Internet, Intranet and Extranet
The Internet, Intranet and ExtranetThe Internet, Intranet and Extranet
The Internet, Intranet and Extranet
 
DICTIONARY
DICTIONARYDICTIONARY
DICTIONARY
 
Introduction to Networking | Linux-Unix and System Administration | Docker an...
Introduction to Networking | Linux-Unix and System Administration | Docker an...Introduction to Networking | Linux-Unix and System Administration | Docker an...
Introduction to Networking | Linux-Unix and System Administration | Docker an...
 
A 101025201954-phpapp02
A 101025201954-phpapp02A 101025201954-phpapp02
A 101025201954-phpapp02
 
Literacy glossary
Literacy glossaryLiteracy glossary
Literacy glossary
 
Glosario
GlosarioGlosario
Glosario
 
wajeiofweofwejf
wajeiofweofwejfwajeiofweofwejf
wajeiofweofwejf
 
FixLolololol
FixLololololFixLolololol
FixLolololol
 
Bryanpulido
BryanpulidoBryanpulido
Bryanpulido
 
Ch03 internet-2-browser.pptx
Ch03 internet-2-browser.pptxCh03 internet-2-browser.pptx
Ch03 internet-2-browser.pptx
 
Final draft[2]
Final draft[2]Final draft[2]
Final draft[2]
 
Presentasi ally
Presentasi allyPresentasi ally
Presentasi ally
 
Fixxxxx
FixxxxxFixxxxx
Fixxxxx
 
Tics
TicsTics
Tics
 
LTR: Open Source Public Workstations
LTR: Open Source Public WorkstationsLTR: Open Source Public Workstations
LTR: Open Source Public Workstations
 

Recently uploaded

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

Diccionario kelly ingles

  • 1. MODULE ICT AS A TOOL FOR COMPUTER EDUCATION ESTUDENT: KELLY JHOANA DURAN MENDEZ TEACHER: Suraya PERAZA PIZARRO NATIONAL EDUCATIONAL INSTITUTION CODAZZI
  • 2. A Abandonware: Is software that is no longer marketed by the company that created and has been discontinued. This generates the free software movement, which makes it legal because it maintains the rights under copyright, but companies usually do not pursue this market. Accessibility: Accessibility is the ease of access for people with difficulties in implementing technologies like the Internet represents the adaptation of web pages for easy navigation by the disabled or elderly. ActiveX: Program or application that Microsoft developed to allow dynamic web pages.
  • 3. B Broadband: Is a connection to the Net via high-speed technologies. These connections go beyond the data transfer speed of 56Kbs. Bond or link: These are the parts of a web page that take you to another part of the same or another page. Bps (bits per second): Indicates the speed of transmission of bits in a communication medium.This speed can be measured in other larger units. Browser: In Castilian translates as browser is a software to display web pages (Internet Explorer, Netscape, Opera or Mozilla, for example).
  • 4. C Cable: It is understood by those wired high-speed allow connection via fiber optic cables, may also offer other services such as television or phone in Spain offer these services Aunacable and ONO, among other smaller companies. CPU (Central Processing Unit): It is the central processing unit of the computer. It performs all operations and instructions for the various programs. It is divided into Control Unit and Arithmetic Logic Unit. Cyberspace: Term that refers to the world of computers and information technology and society built around them. Designates the set of all existing telematics services. It was created by William Gibson in his novel Neuromancer.
  • 5. D Download (Download) On the Internet, is the process of transferring information from an information server to the user's personal computer. Digital Divide: Is a metaphor for the differences in evolution, development and penetration of the Information Society and new technologies in different areas, communities, countries or social classes, analyzed through benchmarking indicators. Download (Download) On the Internet, is the process of transferring information from an information server to the user's personal computer. Driver: Software drivers that are necessary for the operation of parts or peripherals of a computer.
  • 6. E E-mail: It is one of the most used Internet applications, is a fast messaging system that lets you send messages and files from a user's computer to another computer. For sending and receiving mail you need to be connected to our server. Emoticon (Smiley) Graphic symbol representing the different expressions of the human face.Used to show the mood in the written communications through the network (email, chat, etc). Ethernet: One type of local area network developed by Xerox at the moment is the most widely used despite the boom of Wi-Fi networks. These networks began taking a speed of 10 Mbps but later versions have appeared at 100 Mbps or 1 Gbps. Extension: They are characters that specify the type of a file. After a point is added after the name of the file. E-bussiness: Can be defined as businesses that use Internet technologies for development.
  • 7. F Firewall: System or program that sits between a computer or local network and Internet to ensure that all communications are secure, thus preventing the attack from hackers and crackers to the ports of the system. Forum: A website (site, web, ...) where users can leave their opinions and messages in relation to a particular topic. Can be answered by other users who access the forum. Freeware: Computer programs that are distributed for free over the Internet or other channels. It is often confused Freeware (Free Software) with Free Software (Free Software), although sometimes a single application can be both free software distributed free. Forum: A website (site, web, ...) where users can leave their opinions and messages in relation to a particular topic. Can be answered by other users who access the forum. FTP (File Transfer Protocol): File Transfer Protocol. Provides access to files located on another computer on a network and download them to your own computer. Some FTP servers are private and others as the universities are public. Using this method also uploaded various Internet websites.
  • 8. G GÉANT (1 and 2): European high-speed networks that connect scientific and academic institutions with research and development objectives. GIF (Graphics Interchange Format): Graphic file format widely used on the Internet. Allows multiple images be exchanged in a time series logic, generating movement. GPRS (General Packet Radio Service): Transmission technology based on packet switching that uses the GSM mobile telephone. GSM (Global System for Mobile): Digital system for mobile phones. This is a standard used in most of the world. Opera on 3 frequencies 900, 1800 and 1900 MHz The first two used in Europe and third in North America.
  • 9. H Hard Drive: Is the central unit of computer memory, is a magnetic disk having a large capacity. Hacker: Well known to the person who has reached a deep knowledge about the inner workings of a system and accessing it without malice and without causing any damage. To demonstrate his knowledge of computers and detect vulnerabilities in systems very safe. Hypertext Document written in HTML that contains links to other documents that may be further hypertext documents. Normally you can access hypertext documents via web browsers. It also identifies hypertext link or link. Host: Computer that enables communication with other computers attached to a network. HTML (HyperText Markup Language): Language they are written documents that are accessed through web browsers. Supports hypertext and multimedia components.
  • 10. I Inbox: Folder where the messages received by email. Ibernet: Spanish network maintained by the telecommunications company Telefonica IP protocol. Icon: Graphic symbol displayed on a computer screen to represent a particular action to perform, such as running a program, open a file, print a document or display a folder. IP (Internet Protocol): Is the set of rules governing the transmission of data packets over the Internet. The IP address consists of 32 bits represented by dotted decimal notation, this address identifies the computer connected to the Internet. ICQ: Instant messaging system that allows communication between users and the exchange of small files. Now with the boom of Internet technology and has been superseded by type system from Microsoft or Yahoo Messenger.
  • 11. J JAVA: Language developed by Sun Microsystems for the elaboration of export applications to the network, capable of operating on any platform, web browsers normally. JPEG (Joint Phtographic Experts Group): Compressed image format (loss of information). The JPEG graphics that can be included in HTML pages, are recognized and displayed by Web browsers. JDOWNLOADER: is a very popular download manager that accelerates downloads, extract the files, and does practically everything electric works only if mismo. JavaScript.: Language scheduling of instructions developed by Netscape that allows the creation of interactive Web sites. It is a relatively simple tool that can be used in conjunction with Java applets (but not the same language).
  • 12. K Knowbot.: Robot of knowledge or virtual robot. This is a type of personal digital assistant. KiloBytes (Kb): is a unit of information storage No symbol which is electric and is equal to 103bytes KBA. kernel: Core or essential part of an operating system. Provides the basic services of the entire system. keyword: keyword for any search.
  • 13. L LAN (Local Area Network): Network devices that cover a small area. Normally used for buildings, office complexes or small towns. Link: Hypertext pointers used to jump from one information to another, from one page to another or from one server to another, when browsing the Internet.Also link or link. Linux: Operating system implemented by Linus Torvalds, based Unix and published in 1994. His interest is that its code is open under the GNU, which means that its development was made with input from different users. From here came the whole philosophy of free software. Login: Login or when logging is done take steps to identify and access restricted services of a portal. In some cases the word login is used in place of the word you or nick. Lurking: A term referring to a subscriber in a newsgroup or a mailing list simply follow the discussion without participating. Beginners are advised to know the style and atmosphere of the group.
  • 14. M MIDI: Encrypted music format that makes use of standard tools that incorporate all sound cards with MIDI capability. Modem: Hardware device that allows connecting a computer to the network. It is necessary to differentiate the traditional modem ADSL modem, which enables more optimal advantage of the telephone line. MP3: Audio compression format with sound quality similar to that of CDs and widespread on the internet. MP4: Is a multimedia compression format. Unlike the MP3 files can contain both audio and video. MS-DOS: Operating system that Microsoft developed for IBM personal computers.Spread like other operating system-compatible personal computers during the early popularization of the PC.
  • 15. N NAT (Network Address Translation): Is the translation or conversion of private network IP addresses to Internet IP addresses. Netizen: Emerged is a neologism of the words Net and Citizen means a citizen or resident of the Net is used to use it synonymous with surfer or surfer. Nick: Is the username or nickname that uses a contributor to the network to protect their identity. Node: A network device, usually a computer or printer. Network: A computer network is a data communication system that connects computer systems located in different places.
  • 16. O Operating system: Software responsible for managing all hardware and computer software.Windows, Linux, MacOS or MS DOS are examples of operating systems. On-line: Relating to any document or file indicates that service is available through the network. Object-Orientation to: It is a paradigm of the programming n the variables instead of using objects that can have a state and a behavior or methods. OSI (Open System Interconnection): Universal standard for communication protocols. OEM (Original Equipment Manufacturer, Original Equipment Manufactured). Applies to businesses that purchase a product from a manufacturer and integrate it into its own product. All such manufacturers, which include a Pentium in your computer as an OEM Take Action. Sometimes the tea. Terms apply to goods sold by wholesalers and do not include packaging, software and other accessories that come with the version commercial.OS/2 (Operating System 2). It is a 32 bit operating system originally developed by IBM multitasking and Microsoft as a substitute for professional Windows. The latest version is 4, which supports voice commands and dictation, but that is already raced ahead of the evolution of Windows and various versions of Unix.
  • 17. P P2P (peer to peer): Communication between the same two levels of the OSI standard. Allows the exchange of information between computers without the need for a central server, putting the client or server computers as necessary. Widely used P2P networks to exchange files between various users around the world. PCOrd (Personal Computer): enadores aimed at users created by IBM. It began marketing in 1982. Its compatibility with other computers and the alliance with Microsoft to establish in all its operating system, led to the success of the PC against Apple Computer. It is now understood by any desktop PC without the need to be IBM, with the exception of Apple that inconsistent and are still known as Mac Photoshop: Application for editing and bitmap images. Support vector data. Protocol: Formal description of message formats and rules two computers must follow to exchange those messages. PROTECTED: Internet surfer.
  • 18. Q QuickTime: Software developed by Apple that lets you view video files. QAM (Quadrature Amplitude Modulation): Modulation system for data transmission and telecommunications.
  • 19. R Router: Hardware device that distributes traffic between networks. RAM (Random Access Memory): It is the main memory which have computers. It stores the data while we are working. It's kind of volatile, ie, when you turn off the computer data are lost, so if you want to keep must be stored in a nonvolatile media type (hard disk, CD,.). ROM (Read Only Memory): It is a read-only memory as its name suggests. In principle can not be changed and contains the information necessary to use the computer to start up. RSS (Really Simple Syndication): Is how to provide content for web pages immediately as they are updated.Go far beyond the traditional mailing lists and providing access to information without having to visit their respective websites. Are based on XML documents and read by aggregators.
  • 20. S Software: Is the logic of the computer. Are the different programs that can use the machines and allow the various actions or tasks to hardware. Spyware: This is a particular type of software that is installed on users' computers without the knowledge or consent, and collect information or enable actions that could expose the machine to some kind of attack. Usually arrive via email or hidden in files that are downloaded from the Internet. Streaming: System allows data transmission through a program that handles the data already received after processing, go without waiting for them to download completely. Convenient to listen / watch radio or television programs, watch or listen to music clips. Server: System that provides resources and services to personal computers. Often used to refer to those systems that provide information to users. Shortcut: They are icons for opening programs and files quickly from the desktop or from the toolbar .
  • 21. T TCP / IP: Communication protocol that underlies the Internet. Thanks to this protocol, the network is not centralized and when a computer calls another chooses a random direction which will tend to be optimal. Trojan horse: Computer program that carries within it the necessary programming for the operator or user of the computer system can access the outside in is installed. To detect and remove these malicious programs will need a antivirus software. Some Trojan horse allows the external user (hacker) a total team control, and are considered very dangerous. Token Ring: A type of network that is characterized by a ring topology in which there is a token or witness who goes through the various stations of the network which gives permission to the control station has to transmit. Trojan: Computer program that carries within it the necessary programming for the operator or user of the computer system can access the outside in is installed. To detect and remove these malicious programs will need a antivirus software. Some Trojans allow the external user (hacker) a total team control, and are considered very dangerous. The Outbox: Folder where messages are stored before being sent by email.
  • 22. U Unix: First multi-user operating system developed with a high level language like C. There appeared in 1971 and has evolved over time with the collaboration of various entities. Use and administration is a bit complex but with the apparition of Linux has expanded its use for PC's. UMTS (Universal Mobile Telephone Service): Technology of communication of the third generation of mobile phone telephony. USB (Universal Serial Bus): Is a connection device that allows support of up to 256 peripherals. Furthermore s can be connected and disconnected with the computer running. This makes a big difference, since the former involves installing a corresponding connector card drivers and reboot the computers. Update: Is to publish new information on a website. An updated website indicates you have new information in short periods of time. It is also understood to update the act to refresh or reload a web page to load completely. Usenet (USEer NETwork, a network of users). Character network of the Public composed of a large number of newsgroups and organized theme cally.
  • 23. V Virus: Code fragments that are entered into computers without the user noticing its presence. Damaging effects of various kinds, from affecting the performance to erase the entire disc information, from affecting performance to erase the entire disc information, are hidden and may have the ability to spread to other computers VRA (Virtual Reality, Virtual Reality): Technology that enables the creation and Interaction with fictional worlds hosted on a computer. This technology has a wide variety ofuses, among them training with sophisticated machines and flight simulators, medical applications or games. Videoconferencing: Conversation between two or more s people in different locations but can be viewed and oars. Videoconferences that take place outside the Internet require that in every place where the participants have a special camera and camcorder devices for presentation of documents.
  • 24. w Wiring: Is central and fundamental structure of a network based on cable connections. Worm: It is a malicious program or virus that automatically spreads via the Internet. Website: Document displayed in the browser. May simply contain text or graphics and multimedia. When we refer to the overall content of a website we should call it Web Site. Web: It is an information system created by Swiss researchers of CERN. Is based on "hypertext." Users can create, edit and display hypertext documents. The Internet is accessible through browsers like Internet Explorer or Mozilla Firefox. WAN (Wide Area Network): Network devices (computers, routers, printers and other network ....) occupies a large size. Normally used to connect smaller networks (LAN) apart. WAP (rotate Application Protocol): It is a protocol by which mobile phones can be connected to the Internet and display the information in the phone. Wi-Fi (Wireless Fidelity): Performance standard for wireless networks. This is called an end to any element capable of supporting wireless communications.
  • 25. x XML (Extensible Markup Language): It is a markup language that allows users to tag content very easily. Do not have a fixed format. It has become a standard for exchanging data between applications.
  • 26. z ZIP: File compression format, possibly the most used. The extension of the ZIP files is. "Zip." There are different programs to compress and decompress files in this format, the most popular are WinZip (for Windows) MacZip (for Macintosh) and unzip (for UNIX). Zip means "zipper."