Techniczny definicje po ang bo po co po polsku

 0    88 tarjetas    filipplitt
descargar mp3 imprimir jugar test de práctica
 
término English definición English
Mac
empezar lección
one of a line of personal computers developed by Apple
Microsoft Windows
empezar lección
an operating system developed by Mincrosoft (I think)
upgrade
empezar lección
get or install a newer, more advanced version
software compatible
empezar lección
being able to run multiple types of software on a system
vulnerable
empezar lección
If computer is like ... it is open to attack from things such as computer viruses or hackers
hardware
empezar lección
an electronic device that uses computing system to operate as well as the physical components of a computer, such as the processor, memory, and hard disk
customize
empezar lección
to create it using individual specifications
macOS
empezar lección
the name of the operating system developed by Apple and used on the Mac computer
Apple
empezar lección
a company that designs and develops computers and computing system
prepress
empezar lección
If a digital file is ..., then it contains images and texts before being printed
color matching
empezar lección
a digital image is the act of controlling its color conversion between how it displays on diffrent computing devices
processing speed
empezar lección
a measure of how quickly a computer can process infomation
Linux
empezar lección
an operating system developed using the free and open source software model
virus
empezar lección
a program, usually harmful, that cen copy itself and spread to other computers
infect
empezar lección
To ... a file is to attach a virus to it
host
empezar lección
To ... viruses is to deceptively store viruses within digital files
overwriting virus
empezar lección
a virus that erases information on an infected program and replaces it wit a virus
resident virus
empezar lección
a type of virus that is not active until triggered by a certain event
resident extensions
empezar lección
an add-on to a computer virus that causes it to become part of the host computer's operating system
replicate
empezar lección
copy
Trojan horse
empezar lección
a destructive program disguised as a non-threatening program
embed
empezar lección
To ... a virus is to hide it within another type of file
piggyback
empezar lección
To ... is to transfer by attaching to another file
worm
empezar lección
a hramful program that can replicate itself but does not need to be attached to another type of file
fraud
empezar lección
the crime of deceiving someone for personal of financinal profit
identity theft
empezar lección
the crime of stealing someone's personal information and/or using that information for personal gain
phishing
empezar lección
the practise of using personal communication systems like email or instant messaging to deceive people into sharing [ersonal information
credit card
empezar lección
a card provided by a bank or a company that allows its user to make purchases without immediatly paying for them
pretexting
empezar lección
the act of using falsehood to manipulate a person into divulging private information
hacker
empezar lección
a person who uses a computer to access or manipulate data illegally
backdoor
empezar lección
a feature that allows programmers, and sometimes hackers, special access to a program
hack
empezar lección
To ... into computer program is to access it without authorization
keylogger
empezar lección
a device or program that registers keystrokes on a keyboard or number pad, usually for the purpose of obtaining information like passwords and seciurity codes
pharming
empezar lección
the process of redirecting users from a legitimate website to a site designed to trick them into surrendering personal data
information security
empezar lección
the protection of a computer system against unauthorized access
malware
empezar lección
the general term of a destructive software
spyware
empezar lección
general term for destructive programs that infect a computer for the purposes of financial gain
Anti-virus software
empezar lección
a type of program used to detect and eliminate viruses
block
empezar lección
To ... sth is to prevent it from occurring
rootkit
empezar lección
a software that permits a hacker to obtain special access to a system while masking that access from other users
detect
empezar lección
To ... is to pick up or recive signal / sth is to discover it
pop-up
empezar lección
a small browser window that appears unexpectedly, often contaning an unwanted advertisement
quarantine
empezar lección
To ... s file or program is to isolate it from other files to prevent the spread of malware
false positive
empezar lección
when anti-virus software reports uninfected files as infected
false negative
empezar lección
when anti-virus software reports infected files as uninfected
update
empezar lección
a file that brings software up to the standards of the most recent version
removal
empezar lección
the process of eliminating or deleting sth
backup
empezar lección
an extra copy made to protect against the loss or damage of the original
Webpage analysis
empezar lección
an evaluation of the effectiveness of a webpage, often using statistics on the number of users and their activities on the site
packet filtering
empezar lección
a firewall technique which determines which type of traffic is allowed into or out of a router
Incoming
empezar lección
arivving somewhere
packet
empezar lección
a formatted unit of data sent from one computer or other device to another one over a network
settings
empezar lección
any values data at which some feature of a computer or computer program can be placed
deny
empezar lección
To ... an action is to not allow someone or sth to perform it
permit
empezar lección
To ... an action is to give permission to someone or sth to perform it
access
empezar lección
a permission tu use certain computer programs, data, or website
traffic
empezar lección
the number of people that visit a particular website
default
empezar lección
a value of setting that is predetermined by the operating system or program
exception
empezar lección
an instruction to allow a program through the firewall when it is normally blocked
unauthorized
empezar lección
If a user or software is ..., they do not have permission or authority to perform certain operations
permission
empezar lección
consent or license to do sth
firewall
empezar lección
a system that protects a private network from being accessed by unauthorized applications or individuals
account number
empezar lección
a unique number associated with a person's bank account
bill pay
empezar lección
service provided by banks that allows customers to automatically pay bills online
direct deposit
empezar lección
a payment method in which an employer deposits funds electronically into an employee's account instead of issuing a check
payroll
empezar lección
amount of money paid out to employees during a certain period of time
SSL connection
empezar lección
a secure connection between two servers
Site Key
empezar lección
an Internet security tool that confirms tha validity of a website
PIN
empezar lección
(Personal Identification Number) unique personal number that helps banks maintain security
monitor
empezar lección
To ... activity is to check it in order to see what is going on
account activity
empezar lección
the history of withdrawals, deposits, and transfers in a bank account
electronic statement
empezar lección
banking statement that is viewable on a computer
an electronic funds transfer
empezar lección
a method of sending money to diffrent account or banks without physically moving it
computer literacy
empezar lección
the ability to use computer correctly
sales
empezar lección
the field dealing with selling products
management
empezar lección
the field and process of organizing employees and projects
accounting
empezar lección
a field dealing with tracking finances
administrative assistant
empezar lección
an employee that handles paperwork and scheduling for another person
digital marketers
empezar lección
someone who promotes products and services online
social media managers
empezar lección
someone who manages a company's online
data entry
empezar lección
the process and field of putting information into databases
computer science
empezar lección
the study and development of computer programming and hardware
IT
empezar lección
(Information Technology) a field dealing with the maintenance of computers
tech support
empezar lección
the field of assisting computer users with technical problems
software engineer
empezar lección
an engineer that writes, tests, and evaluates software
programmer
empezar lección
person who writes a computer programs
Web developers
empezar lección
person who creates websites
system administrator
empezar lección
person that oversees and repairs a network

Debes iniciar sesión para poder comentar.