Ø EEPROM:
Electrical Erasable Programmable Read Only Memory. This type of memory can be reprogrammed and erased electronically repeatedly by using a device programmer which provides an electric surge. This memory is similar to DRAM, however not as fast, but EEPROM will retain its data even in the event of a power loss. Because of its similarities to flash memory, EEPROM is sometimes referred to as "Flash EEPROM". The difference between flash memory and EEPROM is that EEPROM erases and rewrite data one byte at a time whereas flash memory has the ability to erase and rewrite in blocks. Therefore flash memory is much faster.
Electrical Erasable Programmable Read Only Memory. This type of memory can be reprogrammed and erased electronically repeatedly by using a device programmer which provides an electric surge. This memory is similar to DRAM, however not as fast, but EEPROM will retain its data even in the event of a power loss. Because of its similarities to flash memory, EEPROM is sometimes referred to as "Flash EEPROM". The difference between flash memory and EEPROM is that EEPROM erases and rewrite data one byte at a time whereas flash memory has the ability to erase and rewrite in blocks. Therefore flash memory is much faster.
Ø EIDE:
Enhanced Integrated Development Environment. This an enhanced version of the IDE hardware technology but is much faster. It allows for more memory, can access larger hard drives and can support up to four other IDE devices.
Enhanced Integrated Development Environment. This an enhanced version of the IDE hardware technology but is much faster. It allows for more memory, can access larger hard drives and can support up to four other IDE devices.
Ø E-Mail:
Stands for Electronic Mail. This is a system of relaying messages across the Internet, from one Internet user to another.
Stands for Electronic Mail. This is a system of relaying messages across the Internet, from one Internet user to another.
Ø Embed:
When adding an element from one document to another document. Example: A sound file is created in one document, then it is embedded in an HTML document for publication to the Web.
When adding an element from one document to another document. Example: A sound file is created in one document, then it is embedded in an HTML document for publication to the Web.
Ø Emulation:
This term refers to a program or device that has the ability to imitate another. A common example would be that many printer manufactures software emulate the Hewlett-Packard Laser Jet software because of the fact that so many of these printers exist. Emulation does not exist only for software. Hardware can be emulated as well.
This term refers to a program or device that has the ability to imitate another. A common example would be that many printer manufactures software emulate the Hewlett-Packard Laser Jet software because of the fact that so many of these printers exist. Emulation does not exist only for software. Hardware can be emulated as well.
Ø Encryption:
Encryption is the process of converting data into "unreadable code" is so that unauthorized people cannot understand the content. Encryption may be used to make stored data private (e.g., data that is stored on a potentially vulnerable hard disk), or to allow a nonsecure communications channel to serve as a private communications channel. Encryption is sometimes described as the process of converting plaintext into ciphertext. To decipher the message, the receiver of the encrypted data must have the proper decryption key.
Encryption is the process of converting data into "unreadable code" is so that unauthorized people cannot understand the content. Encryption may be used to make stored data private (e.g., data that is stored on a potentially vulnerable hard disk), or to allow a nonsecure communications channel to serve as a private communications channel. Encryption is sometimes described as the process of converting plaintext into ciphertext. To decipher the message, the receiver of the encrypted data must have the proper decryption key.
Ø Engine: (as in "Search Engine"):
This is the working part of a database or application.
This is the working part of a database or application.
Ø Enhanced IDE:
This is an enhanced version of the ATA-2 standard for managing the interface between secondary storage devices and a computer system.
This is an enhanced version of the ATA-2 standard for managing the interface between secondary storage devices and a computer system.
Ø Environment:
The interaction of all things external to a physical platform. This could be made up of software, hardware or networking procedures that communicate with the system to provide a particular service.
The interaction of all things external to a physical platform. This could be made up of software, hardware or networking procedures that communicate with the system to provide a particular service.
Ø EPROM:
Erasable Programmable Read-Only Memory. It is pronounced "ee-prom". This type of memory is designed to hold information until exposed to ultraviolet light in which case the information or memory is erased. Once exposed to this ultraviolet light, the EPROM can then be reprogrammed. A PROM burner or PROM programmer is used for the rewriting task. The difference between EPROM and its PROM counterpart is that the EPROM can be rewritten and PROM cannot. This makes it possible for the manufacture to change the contents of the EPROM to a newer or bug-free version prior to the computer being shipped.
Erasable Programmable Read-Only Memory. It is pronounced "ee-prom". This type of memory is designed to hold information until exposed to ultraviolet light in which case the information or memory is erased. Once exposed to this ultraviolet light, the EPROM can then be reprogrammed. A PROM burner or PROM programmer is used for the rewriting task. The difference between EPROM and its PROM counterpart is that the EPROM can be rewritten and PROM cannot. This makes it possible for the manufacture to change the contents of the EPROM to a newer or bug-free version prior to the computer being shipped.
Ø Error Rate:
In many cases, it may be acceptable if an input device generates a certain number of errors. This is often referred to as the error rate and the acceptable level will vary according to the input device being used and the business application. Optical character recognition, for example, is generally considered a comparatively unreliable means of entering data. At present, a typical OCR software package will have an error rate of between five and ten per cent.
In many cases, it may be acceptable if an input device generates a certain number of errors. This is often referred to as the error rate and the acceptable level will vary according to the input device being used and the business application. Optical character recognition, for example, is generally considered a comparatively unreliable means of entering data. At present, a typical OCR software package will have an error rate of between five and ten per cent.
Ø ESD:
Stands for Electro Static Discharge and is defined as a sudden flow of electricity between two objects at different electrical potentials. ESD is a primary cause of integrated circuit damage or failure.
Stands for Electro Static Discharge and is defined as a sudden flow of electricity between two objects at different electrical potentials. ESD is a primary cause of integrated circuit damage or failure.
Ø ESD Testing:
Electro Static Discharge testing is one kind of test that hardware usually has to pass to prove it is suitable for sale and use. The hardware must still work after is has been subjected to some level of electrostatic discharge. Some organizations have their own ESD requirements which hardware must meet before it will be considered for purchase.
Different countries have different legal regulations about levels of ESD.
Electro Static Discharge testing is one kind of test that hardware usually has to pass to prove it is suitable for sale and use. The hardware must still work after is has been subjected to some level of electrostatic discharge. Some organizations have their own ESD requirements which hardware must meet before it will be considered for purchase.
Different countries have different legal regulations about levels of ESD.
Ø How to help prevent ESD?
The best way to help prevent ESD is either to use a wrist strap, or a grounding mat. However most users do not have access to such items therefore you can follow the below guidelines to help prevent ESD as much as possible.
The best way to help prevent ESD is either to use a wrist strap, or a grounding mat. However most users do not have access to such items therefore you can follow the below guidelines to help prevent ESD as much as possible.
ü Clothes - Insure what you are not wearing an item that conducts a lot of Electrical Charge, such as a wool sweater. Also it is generally a good idea to remove all jewelry as well.
ü Weather - When working on your computer insure there is not an electrical storm outside which increases the potential of ESD.
ü Cords - Insure everything is removed from the back of the computer (power cord, mouse, keyboard, etc).
ü Zero Potential - Insure you and the computer are at Zero Potential by continuously touching the un-painted metal chassis (computer frame) or the Power supply.
ü Standing - When working inside the computer it is highly recommended that you stand at ALL times.
ü Surface - It is always best to stand on a wooden surface. Avoid working on a computer in carpeted areas.
Ø Ethernet:
A networking system that enables high speed data communication over coaxial cables. The Ethernet network system supports TCP/IP, AppleTalk, Novell Netware, and other network protocols. An Ethernet (LAN) connection is 10 Mbit/s or 100 Mbit/s, and is used to connect many computers that can all "talk" directly to each other. Normally they will all talk with a few servers and printers, but the network is all-to-all. The distance is normally limited to below 1 km.
A networking system that enables high speed data communication over coaxial cables. The Ethernet network system supports TCP/IP, AppleTalk, Novell Netware, and other network protocols. An Ethernet (LAN) connection is 10 Mbit/s or 100 Mbit/s, and is used to connect many computers that can all "talk" directly to each other. Normally they will all talk with a few servers and printers, but the network is all-to-all. The distance is normally limited to below 1 km.
Ø Executable File:
An executable file or has a file extension of .EXE. It is a type of binary file designed to be directly executed by a computer system. Unlike source files, an executable file cannot be read by humans. They are specifically designed to be interpreted as a program.
An executable file or has a file extension of .EXE. It is a type of binary file designed to be directly executed by a computer system. Unlike source files, an executable file cannot be read by humans. They are specifically designed to be interpreted as a program.
Ø Expanded Memory:
Anther term for Expanded Memory is EMS (Expanded Memory Specification). In a DOS based system there is 1 MB (megabyte) of address space available for main memory. 384K is for high-memory and 640K is for the conventional memory. To expand the memory capabilities, this technique is applied to the DOS system.
Anther term for Expanded Memory is EMS (Expanded Memory Specification). In a DOS based system there is 1 MB (megabyte) of address space available for main memory. 384K is for high-memory and 640K is for the conventional memory. To expand the memory capabilities, this technique is applied to the DOS system.
Ø Expansion Bus:
A group of control lines that provide a buffered interface to devices located either on the system board or on cards that are plugged into expansion connectors. Common expansion buses included on the system board are USB, PC Card, and PCI.
A group of control lines that provide a buffered interface to devices located either on the system board or on cards that are plugged into expansion connectors. Common expansion buses included on the system board are USB, PC Card, and PCI.
Ø Expansion Card:
This is a circuit card that it attached to the motherboards expansion slot. By using an expansion card, you can increase a systems functionality by providing the access to additional devices or features.
This is a circuit card that it attached to the motherboards expansion slot. By using an expansion card, you can increase a systems functionality by providing the access to additional devices or features.
Ø Extended Memory:
This memory expands upon a DOS systems existing conventional memory.
This memory expands upon a DOS systems existing conventional memory.
Ø External Modem:
A modem that is separate from the actual computer system and is self-contained in its own box. Because of the additional expense of creating the housing for the external modem, they tend to be a little more expensive that its internal modem counterpart. An external modem can be easily moved from one computer to the next because it is not attached directly to the printed circuit board is the internal modem is.
A modem that is separate from the actual computer system and is self-contained in its own box. Because of the additional expense of creating the housing for the external modem, they tend to be a little more expensive that its internal modem counterpart. An external modem can be easily moved from one computer to the next because it is not attached directly to the printed circuit board is the internal modem is.
Ø Extranet:
An extranet is similar to an intranet. They both use Internet protocols. The difference is that the extranet is designed to give a certain amount of access to outside users where an intranet is securely set behind a firewall and intended to be viewed by company employees or members of an organization only. An extranet can be controlled to provide various levels of accessibility to outside users and to what parts of the extranet they are authorized to view.
An extranet is similar to an intranet. They both use Internet protocols. The difference is that the extranet is designed to give a certain amount of access to outside users where an intranet is securely set behind a firewall and intended to be viewed by company employees or members of an organization only. An extranet can be controlled to provide various levels of accessibility to outside users and to what parts of the extranet they are authorized to view.
No comments:
Post a Comment