Translation of computer terms Basic computer terms: information for dummies

A
Authorization- a procedure for verifying the readability of a logical identification name and password (or just a password) entered by the user’s computer.
Admin- Administrator, main office in the computer world. Administrator of a network, database, website...
Aka, aka, aka- (In English Also Known As) the union of two people (or names). For example, "Batman aka Vasya" is "Batman" - nickname, "Vasya" - im'ya.
Account- account record - login (name of the accountant) (login) and password (password).
Antivirus- a program that detects and removes viruses.
Antilich(In English Antileech) - a system for protecting files from direct downloading. To obtain files from a website stolen from liquor, you must first go to the site. So is Significance.
Apache- One of the implementations of http servers intended for use under the control of the UNIX operating system. The program is a virtual server that you can install on your computer. For additional help, it is possible to imitate the nearest Internet browser (Apache).
Upgrade- modernization of computer access, expansion of capabilities, enhancement of its functional characteristics, as well as increased access (integration).
Upgrade- update now.
Applet- an independent application, written in Java and intended for inclusion in an HTML document as a web page element.
Applause- the process of importing files to a remote computer. (English version: Upload).
Apxivator- a program that allows you to compress information in a way that reduces supernaturalism (gaps, repetitions, etc.). The squeeze comes with or without expenses. You can compress anything: text, music, video, photo, etc. In this case, the more uniform information there is, the more it becomes compressed.
ICQ (ICQ)- a communication program for the Internet that allows you to exchange short messages (analogous to a pager), as well as transfer files and photos. One of the methods is sharing on the Internet.
Atach- attached file.

B
Bug- Mercy, mercy in the program. Type (English bug) beetle, mosquito. The electronic tubes of the great and old EBMs often burned out because of the bugs and snowstorms that flew into the light and heat, and the car went out of order. So they began to blame all the mistakes on the beetles.
Byte- 8 bits, one for the amount of information. The same thing that “beat” is only 8 times more. There are also such units of data: kilobyte, megabyte, gigabyte, terabyte, petabyte, exabyte.
Ban, send to lazna- Allow access rights to, for example, the forum.
Banner- advertising images of a fixed size, as a rule, to replace animation, which is part of the hyper-force on one or another Internet site.
Bath attendant- people who deal with banners.
Browser (browser) - a special client program designed for viewing instead of web sites and creating HTML documents.
loaf- Whether there is a key on the keyboard (butt: trample batoni) (English: Button).
Becapity- Robiti backup.
Bebeska, biBizba, bibisa, bibisina, bibiEsina, borda, bibisa- BBS (bulleten board system), FIDO's homepage, the prototype of current sites.
Bit- Minimum unit of information (0 or 1).
Blank- CD.
Action- browser or computer gra. U
Varese- Cost-free, “pirated” software (from the English Ware - products).
Vinda, wind carrier- the same ones as Mazda.
Gwent, vinik- Winchester, hard drive.
Motuzka- Wire, cable, channel connects to Merezha. G
Gamer- people, I can’t imagine living without toys. Hamiti - grati.
Guestbook- Guest book (English: Guestbook). Guest book is a subsection of the website, provided with a special interactive form, in addition to which this device can be used by both the site’s authorities.
Glitch- an unreasonable glitch in the program (as it is repeated, it is already a bug). Glitch - work with mercy.
Gig- The same as “meg” is only 1024 times greater.
Gifets- friendly GIF.
Bang- Somehow, erase it from the disk.
Guru- Shanovna lyudina, advanced master. D

Dunload(download) - the process of copying files from a remote computer (server) to the computer that is clicking (client). In common technical jargon, this procedure is sometimes called “downloading.”
Tree- Structure of directory development.
Default- Significance, displayed for washing.
Directory- A folder (and not a colony, as you might think).
Domain- Call this the name of the articulate addresses on the Internet. (Take www.design.ru. Here “.ru” is the domain of the first region, “.design” is another, “www” is the third).
Firewood- Drivers.
Driver- a program that monitors any external or internal device of the computer (scanner, mouse, keyboard, disk drive...). The driver is the intermediate layer between the hardware (device) and the operating system. Having changed or added the device, you need to change or install the driver, operating systems and programs that can use this device. There is no need to change the program or operating system. F, W
Zalizo (hardware)- Computer stuffing (processor, hard disk, memory).
Goon packing- archives, first packed with tar and then with gzip.
Fill- Upload the file to the server.
Release- Officially release the finished software product.
Save- Save (in English Save).
Get ready- install the program and configure the system configuration. (English version: Setup)
Zipuvati- Vikoristovati zip archiver.
ZI- Post scriptum (message). Just on the keyboard, the letters Z I S are located there where I P and S. Line up the layout... (English version P.S. shortened version of Post Scriptum) І
DBJ (URS)- Safe food storage (supports the computer against electrical failures and unpowered power supply). It has a rechargeable battery that is insured for work from several hours to several years when the 220 V voltage is turned off.
Ignore- Shorthand for the word “ignore”, a special program procedure for communicating with other members or members of the forum, if any notification is given, do not go through to the addressee. Ignoring is either private or secret (total).
II, IE- Internet Explorer, a browser from Microsoft.
IMHO- “On my humble thought” - (in English: In My Humble Opinion). Based on this phrase, the person expresses his thought, trying not to embarrass anyone, and also the Right Thought will be disputed (for the situation).
Installation- Installation of programs on the computer. Programs are distributed throughout the distribution - their own type of packaging. Most programs will require installation before starting work. If so, copy the required files to the computer’s hard drive and register them in the operating system.
Shukalka- Poshukova system (eg Yandex). Before
Kamen- Processor.
Quoting- Quote (English quote).
Kilo, Kb, Kb- Kilobyte. Kilo" is the same as "byte", but 1024 times larger.
Klava- Keyboard. Trample the keyboard (batoni, tobto buttons) - practice with the keyboard.
Client- The computer (or program) is served by the server.
Team row- an interface in which interaction with the recovery system by entering commands and memories before them is carried out. It may be less easy to manage the icon programs that run on Windows. Next to the command row on the monitor, against the backdrop of a black screen, there is a row hanging that did not make sense to the original correspondent.
Computer(Car, machine, number of grizz) - computer, PC.
Korin- first directory in the tree (root directory).
Cracker- a person who is abused by the system with a criminal method: crime of information, competence, crime. Chi don't mess with the hacker.
Crack, crack- (English: Crack), which means lamati. Call it Key-generator or a small program that allows you to use a licensed program without paying for registration.
Shout, lamanuti, hack, knock- open this security program and change it at your own discretion.
Connect- connections to the Internet or connection to the server.
Cookies- The type of English “cookies” is baked. This is confidential information that includes your IP, your settings on this or that other site. On the one hand, it’s much easier, because, for example, you don’t have to constantly enter a password on your provider’s website. However, these cookies can be used for inexpensive purposes.
Cooler- The word “cooler” means fan. Є coolers that cool the processor, the life unit and other equipment: graphics speed, etc. This means that your computer may have a number of coolers (at least two).
Internet site cache- the process of saving html documents and graphic files acquired from the Internet into a special folder on the hard disk of Koristuvalnytsky. When downloading the site again, browsers open the entire web page from the hard drive, which allows you to significantly speed up the reading time. L
LOL- (In English Laughing Out Loud) which means to loudly laugh, grin, etc. This is the definitive emoticon.
Lamer- A complete idiot, a fool, a kettle, a deaf kut. Don't get confused with the cob. Lamer is not safe for himself and for those who are absent.
Arkush- The list of mailing lists is used to notify the general public with one simple sheet (in English Mailing List).
Vvazhati (lich, lecher)- Indicate a direct message to an object on someone else’s server (from the English Leech - Leech). Sympathy is respected by the vile tone of work on the Internet. For example, you might have added a file to your website for downloading. The reader does not upload it to its server, does not indicate the address of the site where this file can be found, but gives a specific address to the file, vikoryst and other people's traffic and activity. The same applies to the pictures. The release of Varez creates additional problems, so that the authors of programs can find out where they have been vicorized on any resources and can easily find unlicensed copies of their programs. .
The users of serious resources are fighting against malice, checking the referrer, installing anti-leach (from the English antileech) - a system for protecting files from direct downloading. To obtain files from a website stolen from liquor, you must first go to the site.
Login- an identifier that is used to log into the system (for example, a website or a forum).
Local- a local barrier, as access to the Internet is not obligatory.

Upgrade- (English Upgrade) - updating, modernizing a PC (personal computer), etc. Replacing old components is more common today.

Archiving- The compression of data with the method of changing their obligations. Suitable for more efficient saving and transfer of data. For archiving, use special archiving programs (for example, WinRar).

Bit- Minimum unit of information in a dual system. The value of the bit is either 0 or 1.

Byte- Call 8 bets.

Browser- a program that allows you to view pages on the Internet (Internet Explorer, Opera, Netscape, etc.).

Clipboard- An area of ​​the computer’s random access memory in which data in different formats can be saved for transferring or copying them between programs or parts of the same programs.
As a rule, instead of what is copied to the buffer, it erases the first one.
The most advanced combinations for working with a clipboard:
Ctrl+C - copy object views to the clipboard.
Ctrl+X - view the visible object on the clipboard (for moving).
Ctrl+V – paste from clipboard.

Virus(computer) - a nasty program that drains your computer most often from the Internet or from an “infected” disk. Vikonova is prescribed some awkward actions that do not allow her to work normally. Required by antivirus programs.

"Winchester"- The disk on which all information on the PC is saved. Located in the middle of the system unit. Another name is Hard Disk Drive (HDD).

Driver- a program that ensures the exchange of data between a computer and connected devices (for example, a printer, scanner, etc.). Until the driver is installed, the device will not work. A lot of drivers are installed when the system is installed on the PC.

Installation- Installation of a program or operating system in the PC.

Kilobyte(KB, KB) - a unit of a large amount of information, which is more than 1024 bytes. It is necessary to insert memory information.

Logical hard drive partition- name your hard drive (HDD) for easy sharing of sections C:, D: and others. This includes logical partitions (and logical drives). One physical disk can be represented as a bunch of logical ones, and we have not one disk, but two or more (although we have one physical disk). Windows install in section C:.

Operating system(OS) is the most important program that is installed into the computer first and ensures further data exchange between the computer and people (OS applications - Windows, Linux).

Panel zavdan- a panel at the bottom of the screen, where icons for programs that are most frequently used are placed for easy access.

- Completing Windows and then starting Windows immediately. It is often restarted after installing certain driver programs or when the PC is frozen (it does not respond to pressure on the keyboard or mouse buttons).

Reinstallation- Installation of the operating system or software from the beginning. Reinstalling Windows is often a hassle when the system begins to malfunction.

Peripheral devices- additional devices for the computer (printer, scanner, etc.)

Work table- this is the entire working area of ​​the screen. You place program icons (shortcuts) on the screen, just like on the table, and you can move them as you wish.

Registry- This is a database for saving information about the computer and operating system. The registry contains data that Windows is constantly evolving when it is completed and completed.

Software- The same security software (programs) that are installed on the PC.

Utilities- These are service (non-application) programs that are used for setting up, monitoring, updating, and protecting the operating system. There are only a few functions that can be disabled by utilities. In fact, there are even more of them.

File- A collection of data (stacks of information) on the disk that the PC uses. This can be a document, program (or other element). All information on the disk is saved as files.

Disk formatting- The process of disk partitioning (HDD, floppy disks). Please note that when formatted, all information on the hard drive is lost.

Hosting- placement of your information (name the site) on a computer that is fully connected to the Internet.

"Kettle"- the newcomer is in the right.

Chipset(chip) – a set of microcircuits that indicates the characteristics of the system (computer). Created for memory processors and memory types.

"User"- (English user) koristuvach.

BIOS- a program that configures the processor to start the computer after quitting. In addition, the BIOS exchanges data between the computer's operating system and connected peripheral devices.

You can search for other terms (slang)

A
Authorization- a procedure for verifying the readability of a logical identification name and password (or just a password) entered by the user’s computer.
Admin- Administrator, main office in the computer world. Administrator of a network, database, website...
Aka, aka, aka- (In English Also Known As) the union of two people (or names). For example, "Batman aka Vasya" is "Batman" - nickname, "Vasya" - im'ya.
Account- account record - login (name of the accountant) (login) and password (password).
Antivirus- A program that primes and removes viruses.
Antilich(In English Antileech) - a system for protecting files from direct downloading. To obtain files from a website stolen from liquor, you must first go to the site. So is Significance.
Apache- One of the implementations of http servers intended for use under the control of the UNIX operating system. The program is a virtual server that you can install on your computer. For additional help, it is possible to imitate the nearest Internet browser (Apache).
Upgrade- Modernization of the computer, expansion of capabilities, improvement of its functional characteristics, as well as improvement (incorporation).
Upgrade- Update now.
Applet- An independent application, written in Java and intended for inclusion in an HTML document as a web page element.
Applause- The process of importing files to a remote computer. (English version: Upload).
Apxivator- A program that allows you to compress information in a way that reduces supernaturalism (skips, repetitions, etc.). The squeeze comes with or without expenses. You can compress anything: text, music, video, photo, etc. In this case, the more uniform information there is, the more it becomes compressed.
ICQ (ICQ)- A communication program for the Internet that allows you to exchange short messages (analogous to a pager), as well as send files and photos. One of the methods is sharing on the Internet.
Atach- Attached file.

B
Bug- Mercy, mercy in the program. Type (English bug) beetle, mosquito. The electronic tubes of the great and old EBMs often burned out because of the bugs and snowstorms that flew into the light and heat, and the car went out of order. So they began to blame all the mistakes on the beetles.
Byte- 8 bits, one for the amount of information. The same thing that “beat” is only 8 times more. There are also such units of data: kilobyte, megabyte, gigabyte, terabyte, petabyte, exabyte.
Ban, send to lazna– grant access rights to anything, for example, to the forum.
Banner– advertising images of a fixed size, as a rule, to replace animation, which contributes to the overload on one or another Internet list.
Bath attendant- Lyudina, why are you working on banners?
Browser (browser) is a special client program designed for viewing HTML documents instead of web sites.
loaf- Whether there is a key on the keyboard (butt: trample batoni) (English: Button).
Becapity- Robiti backup.
Bebeska, biBizba, bibisa, bibisina, bibiEsina, borda, bibisa- BBS (bulleten board system), FIDO's homepage, the prototype of current sites.
Bit- Minimum unit of data collection (0 or 1).
Blank- CD.
Action- Browser or computer gra. U
Varese- Cost-free, “pirated” software (from the English Ware - products).
Vinda, wind carrier- the same ones as Mazda.
Gwent, vinik- Winchester, hard drive.
Motuzka- Wire, cable, channel connects to Merezha. G
Gamer- Lyudina, you can’t imagine yourself without toys. Hamiti - grati.
Guestbook- Guest book (English: Guestbook). Guest book is a section of the website, provided with a special interactive form, for additional information about this purchase can contact you or your authorized representatives.
Glitch– an unreasonable glitch in the program (as it is repeated, it is already a bug). To be glitchy is done by making mistakes.
Gig- The same as “meg” is only 1024 times greater.
Gifets- friendly GIF.
Bang- Somehow, erase it from the disk.
Guru- Shanovna lyudina, advanced master. D
Dunload(download) - the process of copying files from a remote computer (server) to the computer that is clicking (client). In common technical jargon, this procedure is sometimes called “downloading.”
Tree- Structure of directory development.
Default– meanings displayed behind the mind.
Directory- A folder (and not a colony, as you might think).
Domain- Call this the name of the articulate addresses on the Internet. (Take www.design.ru. Here “.ru” is the domain of the first region, “.design” is another, “www” is the third).
Firewood- Drivers.
Driver- a program that monitors any external or internal device of the computer (scanner, mouse, keyboard, disk drive...). The driver is the intermediate layer between the hardware (device) and the operating system. Having changed or added the device, you need to change or install the driver, operating systems and programs that can use this device. There is no need to change the program or operating system. F, W
Zalizo (hardware)- Computer stuffing (processor, hard disk, memory).
Goon packing– archives, packed first with tar and then with gzip.
Fill- Upload the file to the server.
Release- Officially release the finished software product.
Save- Save (in English Save).
Get ready– install the program and configure the system configuration. (English version: Setup)
Zipuvati- Vikoristovati zip archiver.
ZI- Post scriptum (message). Just on the keyboard, the letters Z I S are located there where I P and S. Line up the layout... (English version P.S. shortened version of Post Scriptum) І
DBJ (URS)- Safe food storage (supports the computer against electrical failures and unpowered power supply). It has a rechargeable battery that is insured for work from several hours to several years when the 220 V voltage is turned off.
Ignore- Shorthand for the word “ignore”, a special program procedure for communicating with other members or members of the forum, if any notification is given, do not go through to the addressee. Ignoring is either private or secret (total).
II, IE- Internet Explorer, a browser from Microsoft.
IMHO– “to my humble thought” – (in English: In My Humble Opinion). Based on this phrase, the person expresses his thought, trying not to embarrass anyone, and also the Right Thought will be disputed (for the situation).
Installation- Installation of programs on the computer. Programs are distributed throughout the distribution - their own type of packaging. Most programs will require installation before starting work. If so, copy the required files to the computer’s hard drive and register them in the operating system.
Shukalka- Poshukova system (eg Yandex). Before
Kamen- Processor.
Quoting- Quote (English quote).
Kilo, Kb, Kb- Kilobyte. Kilo" is the same as "byte", but 1024 times larger.
Klava- Keyboard. Trample the keyboard (batoni, tobto buttons) - practice with the keyboard.
Client- The computer (or program) is served by the server.
Team row- an interface in which interaction with the recovery system by entering commands and memories before them is carried out. It may be less easy to manage the icon programs that run on Windows. Next to the command row on the monitor, against the backdrop of a black screen, there is a row hanging that did not make sense to the original correspondent.
Computer(Car, machine, number of grizz) - computer, PC.
Korin– the first directory of the tree (root directory).
Cracker- A person who abuses the system with criminal methods: theft of information, compromise, ransom. Chi don't mess with the hacker.
Crack, crack- (English: Crack), which means lamati. Call it Key-generator or a small program that allows you to use a licensed program without paying for registration.
Shout, lamanuti, hack, knock- open the security program and change the data at your own discretion.
Connect- Connection to the Internet or connection to the server.
Cookies- The type of English “cookies” is baked. This is confidential information that includes your IP, your settings on this or that other site. On the one hand, it’s much easier, because, for example, you don’t have to continuously enter a password on the website of your manufacturer. However, these cookies can be used for inexpensive purposes.
Cooler- The word "cooler" means fan. Є coolers that cool the processor, the life unit and other equipment: graphics speed, etc. This means that your computer may have a number of coolers (at least two).
Internet site cache- the process of saving html documents and graphic files acquired from the Internet into a special folder on the hard disk of Koristuvalnytsky. When downloading the site again, browsers open the entire web page from the hard drive, which allows you to significantly speed up the reading time. L
LOL- (In English Laughing Out Loud) which means to loudly laugh, grin, etc. This is the definitive emoticon.
Lamer- A complete idiot, a fool, a kettle, a deaf kut. Don't get confused with the cob. Lamer is not safe for himself and for those who are absent.
Arkush- The list of mailing lists is used to notify the general public with one simple sheet (in English Mailing List).
Vvazhati (lich, lecher)- Indicate a direct message to an object on someone else’s server (from the English Leech - leech). Sympathy is respected by the vile tone of work on the Internet. For example, you might have added a file to your website for downloading. The reader does not upload it to its server, does not indicate the address of the site where this file can be found, but gives a specific address to the file, vikoryst and other people's traffic and activity. The same applies to the pictures. The release of Varez creates additional problems, so that the authors of programs can find out where they have been vicorized on any resources and can easily find unlicensed copies of their programs. .
Utrimovach of serious resources are fighting against malice, checking the referrer, installing Antileech (from the English Antileech) - a system for protecting files from direct downloading. To obtain files from a website stolen from liquor, you must first go to the site.
Login– an identifier that is used to log in to the system (for example, a website or a forum).
Local- a local barrier, as access to the Internet is not obligatory.

Hello! Dear friends, how can you imagine your life without modern technologies? I respect that, but it is especially important to recognize the reality of the computer. The computer has taken an even more important position in all aspects of its activity. So, over the past decade, the computer has become a way to carry out the final decision, and also an invisible part in many areas of work: engineering, medicine, etc.

A lot of software and computer “innovations” are being fragmented overseas and spreading throughout the world. It turns out that the program has a Russian language every day, but then when you install it in the list of languages ​​you will find an English one. So there is a need to know a basic vocabulary of computer terms in English. In addition, there are a lot of programs that use a lot of new terms, which will make it easier to understand them, and some of them are common in all programs. In this manner, it is not important to memorize their translation and meaning over time.

For example, any program on the Internet

  • open- Vidkriti
  • file- File
  • error- Milk, etc.

In addition, while rich people benefit from knowing computer terms, others, even in non-professional practice, will find it difficult, for example, to install any program on a computer. Almost always, when your network is installed, you will hear the following words:

  • next- Dali
  • cancel- Skasuwati
  • to close all other applications- Close all add-ons
  • accept- accept

Volodinya's English computer terminology dictionary will help you improve your computer literacy. Those who use a computer for a significant period of time consider themselves to be “stuck” koristuvachs. In fact, sustrich with some kind of English term often becomes an incomprehensible overkill.

Another argument for those that you should read the glossary of English computer terms is the fact that a lot of them are included in Russian language. It is well known that the computer has become one of the reasons for the intensive stagnation of Englishisms in the Russian language. For example, the word “ banquet"to sound like English words" peer”, which in the translation means “speech attendant” and a new word has emerged with a meaning: a client who takes part in the distribution of programs such as torrents.

Computer and global Internet system

As it was said a little more, the computer and the Internet have become the reasons for the decline of Englishisms in the Russian language, they are changing the Russian vocabulary with rapid fluency. You truly respect that there is nothing nasty in him. However, you will notice that you will feel an upcoming dialogue on the street:

I changed my teacher Avik, Joli Sobi Bay. I put myself aku Best

  • Avik (from the English “avatar”) means a picture that serves as an “exposure” on forums and blogs
  • aka (from the expression “also known as”, translated “also known as”) means no, that is, under the knowledge of the koristuvach boundaries

Okay, I'll keep you posted. What are you talking about?

What is your idea? Why sound Russian? Of course, no. It all comes down to such wonderful, mindless slang. Why did this happen? That is why, through an unknown translation of the Russian language, they began to twist English words, adding more Russian endings.

In fact, today’s topic is relevant, and the fragments of knowledge below the given help do not speak to you in the same way I have learned in the Russian-speaking English language. You can save the Russian language, and if necessary, you won’t get hurt with the English program.

Glossary of English computer terms

For clarity, we will separate computer terms into different topics. The skin topic includes a small glossary of terms that you may come across in any situation.

Computer and accessories

Computer - computer
Laptop - notebook
Monitor - monitor
Flash drive - flash drive
Disk - disk
Projector - projector
Scanner - scanner
Printer - printer
Keyboard
Key - key
Mouse - bear
Mousepad - kilimok for a bear
Power strip
Floppy disk drive
Motherboard - motherboard
Hard disk
Random access memory - RAM
Modem - modem

Audio and video player

Internet

Internet - internet
Link - effort
Hard link - straight forward
Home page - home page
Hyperlink - hyperpower
History - history
Internet address - Internet addresses
Join - connection
Net - mesh
E-mail - e-mail
Spam - spam
Off line - off line
Port - port
Server - server
Traffic - traffic
Trojan horse - Trojan
User - koristuvach
Web page - web side
Web site - website
Weblog - blog
Forum - forum
Browser - browser
Log in - login
World-Wide Web - all-world web

The program is installed on the computer

Program - program
Programming - programming
Software - software
Data processing - data processing
Main program
Processing program - detailed program
Testing
Recovery program - a program that renews
Install - install
Instruction
Demo version – demo version
Freeware - cost-free software
Algorithm - algorithm
Menu bar - menu bar
Prompt - hint
Exit - exit
Uninstall - uninstall
Update - update

Working with text data

Printer - a printer with another device
Listing - rozdrukivka
Text - text
File store - a bunch of files
Cipher - cipher
Copy - copy
Insert - insert
Delete - view, disable
Symbol - symbol
Gap - gap
Cell - middle
A scrollbar - smuga scrolling
Label
Colon - double-crowned
Comma - coma
Quotation marks - paws
Bracket - bow
Semicolon - speck with clod
Line - row
Font - font
Font size/style/weight - font size/style/weight
Erasing - erasing
Copy protect – copy protection
Word processing - text processing

Foreign computer terms

This is not the entire glossary of English terms that you may need if you have a computer with Internet access, or the most extensive terms. You can enjoy a larger glossary of terms in English with translation

Hey there, everyone! In this article we will focus on the current sphere of IT and show you the meaning of popular (and not so popular) computer and technical terms. Did you check for such a statue?

To look good when interacting with famous people on the Internet or just staying on top of a programming party, you better know what to expect. With our article of terms, all mysteries will become clear and understandable!

From the other half of the XX century. The magazine “PC World” began to appear in 1988, becoming even more popular, becoming a “collapse”: English terms and abbreviations, most often written in English, filled the pages of magazines and “spotted” the promotional fakes iv.

Today, these words are used by people in high-paying positions, and a lot of terms are used by people who are not involved in the sphere of information technologies. Who knows how your life will turn out next? Know them and you!

Are you ready for some serious longread? Then let's get to it!

Top 5 IT terms from EnglishDom

Design with a focus on the customer (user-centered design)

This is a term that is used to discuss processes that highlight the characteristics of a product, its advantages and design advantages for a product. If people distribute the product according to the needs of the koristuvach, instead of making the koristuvach follow the design.

The idea behind customer-oriented design has been revealed, perhaps, through the more popular term “user experience” (UX). The term has become popular in the IT sphere, with discussions about ways to improve the quality of software that is being tested, and other products.

Many people appreciate that customer-oriented design and customer interface are interchangeable terms. Others mean that the conceptual plan comes first, and the user interface (shortening or tweaking) is the result. However, IT specialists still use “the customer interface” as a term for the process through which ambiguity can arise.

Designs oriented towards the user can be limited to any product, but in the IT field, great respect is given to intuitively sensible graphical interfaces for the user and other tools that are user friendly for end-users. Istuvachiv.

Blockchain(Blockchain)

A digital way of saving information, which allows people to know what they are saving, if they change, move or add information.

The term blockchain has become familiar to everyone in connection with the emergence of cryptocurrencies (digital or virtual currency, intended for use as a special exchange with the use of cryptography to secure transactions), a new type of money, earnings and revenues that are organized according to the principle of blockchain .

We can say that the blockchain information that is stored behind the technology is like a logbook, which cannot be stolen, burned, stored, or zipped. And thus, nothing can be erased, or any information can be changed to bypass the magazine.

The word “blockchain” literally means “lance of blocks.” Any change in information on the blockchain will lead to the creation of a new block(or the entries in the logbook), which tightly “chips” to the front straps. And the skin strip cannot be changed after it has been removed.

How blockchain can be used by information systems of various purposes. If, for example, there is a register of hearing loss, then in a new way it will be possible to recognize the history of Volodynia by any object included in the register. In this case, nothing can be done retroactively, and any attempts to change records will be visible to everyone.

The power of information that is protected by the blockchain principle is important - there not saved here in one specific place, and in fragments or entirely placed on the computers of a great number of people, many times duplicated. However, the information in the blockchain cannot be taken or deleted: one, ten or a hundred connected computers from fragments of the blockchain will not affect the availability of information. If manuscripts are not burned here, then they are in the blockchain.

Folksonomia (folksonomy)

Type of object classification. There is a price for the manual sorting of information that a group of people is actively engaged in. As a rule, when it comes to classifying something on the Internet, it’s easier there. For example: lovers of children's literature create, say, a collection of children's e-books around the corner. Then label your books with the following tags. Kozhen with his own.

Most often, the set of tags is discussed in advance, and it is not possible to go beyond. For example, our version may have tags: “for children”, “classics”, “no pictures”, “boring”, “poor translation”, “Agniya Barto”, “virshi”, “unreadable”, “useful” " etc.

A popular site on which folksonomia is based is the photo hosting site Flickr. Here, koristuvach vivantize their photographs, marking them with tags. The skin photo tag can be added by the person who registered on the site.

It’s early in the morning, since the partnership is active, and every book picks up a few of the same tags put by different people. This means: a number of people know this book, which satisfies them all. All members of the team can be guided by them, choosing the right one for their areas.

artificial neural network (ANN)

This is a piece analogue of a biological neural network, which allows you to automate a wide range of tasks. Today’s very artificial neurointerferences are associated with greater access to artificial intelligence.

The very simplest piece of neural interconnection appeared in the 1960s. What will lead the century through the progress of such measures to the appearance of merciless terminators? This is only known to John Connor.

In essence, piecemeal neurofusion is a special type of computer program, and such a program runs on one or more computers.

The real power of piecemeal neuro-measurement - ii forever. Since the purpose of the program is to distinguish women from men in photographs, it is necessary to “pass” as many different images as possible through a custom neural network, indicating the correct answer.

In the process of such “tension” in the middle of the neural network, more precise algorithms for assigning a person’s status to their images are formed - which are carried out in an automatic mode, the measurement begins at its conclusions.

Auto-blower (autoencoder, AE)

This is a special type of uncontrolled piece-by-piece neural network that ensures the restriction of other functions in the machine learning chamber.

The simplest architecture of an auto-coder is a straight widened hem, without collar joints, to accommodate the input ball, the intermediate ball and the exit ball. The basic principle of operation and operation of the auto-coder is to select the output ball closest to the input ball on the output ball.

Technical terms

  • API- Application programming interface. In simple words: connections on the back panel of the TV.

If you connect another device to the TV (for example, a DVD player or game console), it’s hard to know what to do next. And all we need to do is connect the interface to the methods of obtaining devices.

  • Access Control List - list keruvannya access. Or "guest list for the party."

The owner does not remove the burial from his own request. She hangs a list on the door and especially checks who is allowed to enter. Even if I wanted to spend everything in the middle, I couldn’t find a way to wash it (and also quickly respond to other people’s requests).

In simple words: a part of the descriptor is responsible for determining who has access to the object. The owner of an object can change the ACL of that object, allowing or denying access to other users. An ACL consists of a header and a sufficient number of ACL (ACI) elements. An ACL without ACE is called a null ACL and indicates that access to the object is not permitted to the individual user.

  • AdBlock- A program that blocks advertising modules, ad blocking. Or “the suvania of foreign advertising.”

It’s completely understandable to see the storm of threats in huge cities, isn’t it? If it’s an advertisement for a private Volodin, then it’s too late to get to the bottom of the article.

  • Agile Software Development— software development (orientated to ease of making changes) and software development (adaptive development).

Tse yak dobudova vessel voyage. Then you can still trim on the water: the hull, otherwise the goldfish. And the vessel is not finished, but immediately lowered from the slipways and brought into order during the voyage. So it is immediately clear what is most important and what you need to focus on.

  • Back End— a server program (part) or a software program for completing the final stage of the process.

This is like the underground part of the place. From above, everything starts to sound: HTML, CSS cathedrals, Javascript office quarters. And below the ground are those that allow the place to function properly: the ingenious wisdom of managing web servers, applications and databases. Security software for the implementation of things that are not obvious to the manager of the plant.

  • Backdoor- Lazivka. This is a tool (way) to bypass the security system. Otherwise it's just a backdoor.

If, for example, the alarm clock creates a duplicate key for your doors. Putting all the locks in place will not prevent you from leaving. Or maybe you can pass the key to someone else.

  • Bandwidth - bandwidth, frequency range; smuga transmission (for example, channel zv'yazku).

For example, the rear channel of the Dolby Surround system has a frequency range of 100 Hz - 7 kHz. This channel passes frequencies from 1-10 Hz (low frequencies) to 7 kHz (lower high frequencies).

The frequency range that can be heard by human hearing is between 20 Hz and 20 kHz. Between the frequency range of electronic and acoustic devices, frequencies are considered whose transmission coefficient changes by 3 dB.

Find your water supply pipe through which water is supplied to the shower, dishwasher and washing machine. Press down all three at the same time - and the pressure will immediately fall. And a couple of sweet words for the soul of the valley.

  • Big Data- Great tributes. A series of approaches, tools and methods for processing and analyzing structured, unstructured and unstructured data of great obligations and significant diversity for extracting results that are not practical in human reading.

Inflicted on the map with an unknown mystique. It’s important to understand what it’s like when you’re making your way through a chagarbush or wandering through gorges. And having created the axis in the right way (with a water spool), you can study the entire landscape at once and analyze the surrounding elements, for example, the shape of the Girsky lancet or the winding bed of a river.

  • Bug- Completion in the program.

The Leaning Tower of Pisa stood straight for the first five years, and then began to crumble. Why? There was a problem with the design! Under the three-meter foundation, a floating swimmer has stopped. It’s a pity that tourists aren’t caught in the beating program.

  • Cookie— a cookie that is used by web servers to differentiate users and save data about them.

This is like a barista from a garnished memory. You come home early for a nice decaf soy latte with tops, and he nods boringly: “How do you call it?”

  • DDoS Attack- The hemorrhage attack on Vidmova in the service room has been expanded.

When 200 people dial one number. DoS attack is a type that is commonly called. He loves, he loves to use the phone, but only one person can be tracked down and zupiniti.

And when an anonymous person gives the newspaper a stunning Bugatti Chiron for $200 with your number, the attack is already divided. At such a time, a flurry of calls will fall on you, and your life will turn into hell. Those who call do not suspect that they are being victorious, and it may be impossible to find out the organizer.

  • Dark Web- dark Internet - a segment of the World Wide Web, where you can use special software security, preserving anonymity there, through the purchase and sale of illegal goods (for example, illegal drugs iv) those services that involve the unspoken exchange of information.

Vlasna, gateway b_k Misyatsya. On the bright side (the primary Internet) you need to know – it’s enough to quickly listen. To access the dark side, you need a special (black) security program (rocket).

  • Data Bleed- Vitik data. The term is gradually gaining popularity, but it is still important to clearly characterize it, as there is still no exact definition on the Internet.

In general, a round of data is obtained if there is no transparency in the data vikoristan or if the transmission of data is obtained without the direct permission of the customer.

  • De-identification- De-identification, removal of personal data (identification information) .

With phrases like “high-ranking person” and “dzherel, close to the president,” journalists often de-identify their dzherel.

The truth in their words is true (even if there is enough confidence in the report, intelligence information), otherwise a particular person will be deprived of the unknown. It is important to choose your words carefully.

  • Doxing- doxxing, collection and widespread disclosure, publicity, publication of any special data on the Internet without the help of a person.

Lynching is a way to take justice from your own hands in order to punish the one who has done wrong. If lynching sometimes backfires, because the victim is the wrong person, you have to go that far.

  • Encryption- Encrypted, classified. The tradition of wearing robes.

No one would think of blaming the enslaved people for what they are getting (you can try, but you will probably never understand). Everyone knows that this is how civilized marriage is accepted.

However, there is no need to encrypt certain basic transactions on the Internet - from banking transactions and trading to the transfer of special information.

Without reliable encryption, the Internet is unusable. Food, how to understand the reliability of encryption with national security and law enforcement, div. Backdoor.

  • Front End - The interface part of the client-server program (client component).

It's like a walk around the place. The interface available to us is: sidewalks, roads, shops, parks, business districts. And the axis of the server part, which represents the life of a secure place, is deprived of the obvious: power supply lines, gas pipelines, sewerage, foundations of booths are located underground.

  • Least Mean Square (LMS) minimum mean square reduction algorithm.

This is a type of filter that is used in machine processes, which uses stochastic gradient descent using folding methods. They describe it as an adaptive filter that helps you process signals in different ways.

  • OAuth- OAuth authorization protocol.

This is like a gardener, hired for another cabin in Spain. In the absence of the rulers, a reliable hut with keys is watching the booth. Don’t give that gardener the key: the housekeeper will let him in and show him where the barn is. Now, until the coming arrival, both the cabin and the garden will be looked after - life is wonderful.

  • Open Source- Unlock output texts.

The principle lies in the fact that the output code of the system that is being fragmented must be freely and painlessly given to all those who need to thoroughly edit it. The most thorough knowledge will also be available to everyone at no cost. Like baking a cake for a friend using the recipe before.

The cake is a program (the more delicious it is), and the recipe that is transmitted is an open code. A friend not only treats himself to something delicious, but can also prepare another cake himself: bring it to a friend for a special occasion. It is not included, of course, that the replacement of top butter with peanut butter (this is the same as the original).

  • Spam- Spam, "smitteve" notification.

There is an infinite number of machines, closed in a room with an infinite number of other machines, and as a result, you can see the works of Shakespeare.

To increase the chances of success, spam will be more effective later. There are millions of them to filter, see, ignore, and just one type of input is enough for the game to knock out a candle.

  • Spoofing- spoofing-scam (scam, direct stealing of bank confidential data of clients by the method of stealing pennies, which means, with the help of computer technologies, the way of imitating a real banking website of its placement on the detailed site.Obviously, information from the client is located on the detailed site.

In simple words: imitation of connection. Although, when police officers change their clothes, in order to deny confidential information, IP addresses are masked under “spoofing” as university trusts. In reality, everything is not so, which threatens with problems.

  • Spyware- Spygun program. Shpigunske PZ, intended for the development of koristuvach’s activities on the computer. It scans through your email list, the information you entered, your passwords, and your commands. How to use a microphone.

After installing the spyware program, you will need to set up key presses, fix passwords, bank details and transfer the top you are working on.

  • TOR (The Onion Router) There is a better software for implementing another generation of so-called “cipher and ball routing”.

This system, which allows you to establish an anonymous connection, is protected from wiretapping. It is seen as an anonymous network that allows data transmission in an encrypted manner. Yak Ray-Ban Wayfarer eyepieces for the browser. No one knows what their ruler can see. They look stylish and dark.

  • Trojan- Trojan program. The bowl is broken. First of all, the motif of the broken cup appears in Shakespeare in Macbeth - a gift that seems to be lost, but as a result turns out to be ruinous. Act 1 scene 7.
  • Troll- troll, provocateur (on forums and chats); The troll is the author of tweets and provocative messages. Gra in shahi with blue.

As if you weren’t playing checks, he scatters all the pieces, guesses on the board and goes to tell the truth, as if he had lost all his luck.

  • Virus- Virus. Venereal disease. Beware of this leveling, otherwise viruses will spit if the computer comes close to the Internet, without neglecting.
  • WPA (Wi-Fi Protected Access)- Theft of Wi-Fi access. The President's motorcycle escort is a bullet-proof car accompanied by motorcyclists. Deliver under protection from the device until connected to the Internet. And after arriving, the axis will not cause additional security.
  • White Hat- A great hacker, a fanatical programmer or an ethical hacker. Positive character. This is a computer security specialist who specializes in testing the security of computer systems.

In addition to black hackers (or hackers), they are looking for contributions on a voluntary basis or for a fee in order to help retailers make their product more secure.

The term originates from old westerns (black hat - wicked, wicked, black hacker), in fact, the correct heroes and wickedness were subject to a manual monochrome dress code.

  • Wiki— Wiki is a hypertext medium (call it a website) for collecting and structuring written documents. Maybe there are a lot of authors. Actions can be edited in any way. Like a book of vogues at the hotel.
  • Zero-day- zero-day spillage - useless programs (exploit), against which dry mechanisms have not yet been developed.

Naked king in checks. Nothing is lost, except for engaging in point-to-point defense, confident that the opponent won’t notice anything. Although it’s not turned off, he’s been in the know for a long time and the remaining five moves are just getting excited. Checkmate

Computer terms

  • AJAX- This is an approach to the development of interactive web pages, which involves the browser exchanging data with the web server in the background.

In this way, the current page is not completely re-created, only the objects that have changed are updated. As a result, web extensions can operate more easily and fluidly.

  • ADSL- asymmetric digital subscriber line - a low-cost new technology that allows you to use existing subscriber telephone lines for high-speed data transmission and collection between subscriber computers.

It is called asymmetric because the speed at which the subscriber receives data is many times greater than the speed at which data is transmitted.

  • Active Directory— the implementation of the Microsoft directory service for Windows, which allows administrators to implement sets of rules, which will ensure the continuity of the system environment, the development of software on a large number of computers, installations install updates on all computers, etc.

Active Directory stores data and configured middleware in a centralized database that can reach millions of objects.

  • CSS(Cascading Style Sheets) - cascading style sheets, complete code that expands the design and formatting capabilities of a web page.

The power of CSS is added to the basic HTML layout. This rule can be expanded on the side of the page element, and the entire document will be included on the site.

  • DNS(Domain Name System) is a system (database) created for storing the domain name of a host (computer or other connected device) to the IP address.

To put it simply, the computer at the edge has its own unique address – a low number of digits (up to 12). If you want to write a sheet, dial the mail server number and go ahead. Well, wait a minute, it’s easier to remember mail.ru names, for example, 164.295.790.024.

Type "mail.ru", your computer taps on the "DNS" server, and on the power supply "How to get to mail.ru?" Removing the exact digital address. Contact at the address (certainly without your participation), and at the place. Enter the primary address table. It’s not people who are profiting from it, but their computers.

  • Doctype- document type - "DTD" (document type definition, description of the document type).

It is necessary for the mind browser to interpret the exact web page, even HTML is available in several versions, in addition, XHTML (Extensible Hypertext Markup Language, extended language markup for hypertext), similar to HTML, but also tease him about the syntax .

In order for the browser to “not get lost” and understand that it is necessary to display the web page according to any standard, it is necessary to set the code first .

  • Delphi- This is the middle of object-oriented programming, based on the language "Object Pascal".

Vikorist for development and support of software security. In addition to its work, the movie “Pascal” is richly functional and user-friendly because it is a visual program editor that allows you to create a new look for your current programs.

  • DMZ- This is a technology that ensures the safety of computer systems. The point is that servers that operate from external networks are located in the “demilitarized zone” - “DMZ”.

These servers are interconnected with access to the main boundary by an inter-boundary screen, making it impossible to work from the outside boundary

  • EDGE- this is “slipped GPRS”, a data transfer protocol that is used in the GSM networks of mobile operators; The technology allows you to access the Internet with a speed of up to 3-4 times higher, even with a GPRS connection, and transfer data from a mobile phone with an average speed of about 236 kbit/s.

“EDGE”, like “GPRS”, allows the subscriber to pay only for the information received/sent, and the technology also allows for calls to be made and received during the transmission of data, without the need for communication; Wi-Fi EDGE requires a mobile phone that supports this technology.

  • ERP-system(Enterprise Resource Planning System) is an information system intended for automation and management of enterprises.

Therefore, ERP systems are divided into modules and integrate the entire set of key processes in the company’s activities. Their installation allows a number of separate programs to be replaced with one integrated one.

  • Excel- this program, which is included in the Windows Office program complex, is one of the most popular among computer systems.

Electronic tables are used for maintaining small databases; rozrakhunkiv; arrangement, sorting and linking of information; Check out the diagrams and graphs.

The program is easy to set up; for experienced developers, the possibilities of setting up folding formulas, analysis, and programming are revealed.

  • FTP- That's right, the file transfer protocol is translated from English. It is one of the basic protocols used for exchanging information.

The fundamental subordination of the FTP protocol to HTTP is that FTP is used for transferring files of a sufficient size.

Transferring files from the server's file system to the client's file system and then using an additional special program - an FTP client.

  • Flash— this is a solution for creating interactive space in web animation technology from the Macromedia company. Suitable for creating interactive elements of the site, web games, as well as for creating banners and animated screensavers.

Flash files are more compact and less difficult to create. This is only valid for advanced flash programmers. To view flash files, you need a flash player.

  • Firefox— the world's first browser with an open source code. “Fire Fox” has a high level of security.
  • Firewall— this software package is intended to protect the computer from unauthorized access.

The “walls of fire” function includes effective control and separation that passes through new border packages containing suspected and unsafe substances before setting the rules. Other similar functions rely on hardware protection.

  • Firewire- This is a high-speed serial bus that transmits high-speed data exchange between the computer and various peripheral devices.

Zokrema is used for storing video and audio streams from digital video cameras.

Allows you to connect electrical devices without interrupting the power supply of the rest (so-called hot plugging).

  • FreeBSD- This is a UNIX-like operating system, the UNIX platform, which is found throughout the output codes. FreeBSD is one of the leading operating systems for running the Internet and Intranet servers.

FreeBSD features reliable edge services, efficient memory management and stability. Compared to other operating systems, FreeBSD servers experience the longest hours of uninterrupted operation.

  • FAQ(Frequently Asked Questions) - tips on popular foods.

“FAQ” is a section for information about programs and online services that will help you find out the types of power supply to your computers and the types of responses to them. If the program or service is simple or completely new, then “FAQ” can replace the supplement.

  • GPS- This is a global navigation system and an important station that is being developed in the regions of Europe and America.

The main idea is that locality is determined by the number of satellites in orbit, and more precisely, locality is visible.

The skin satellite of the GPS system transmits song signals, the decoding of which takes place in the primary device.

  • Host- this is a powerful server (vuzolzvyazku) for hosting sites on the entire Internet, which is used for transmitting any files or electronic mail messages.

Host computer is a server installed at Internet nodes that supplies all power for communication and access to various network resources: modems, other computers.

  • HTTP (Hyper Text Transport Protocol)— this is the protocol for transmitting data on the Internet. Hypertext transfer protocol.

There are clients who send requests to the server, and the server that processes the requests responds to them. Today, “http” is one of the most widespread protocols on the Internet.

  • HDMI(High-Definition Multimedia Interface) - this is an interface for high-definition multimedia, creations for transmitting a high-quality signal to a video device, such as a TV, monitor, projector, etc.

Sound is connected through 5.1 and 7.1 channels. The HDMI connector will provide connection to multiple devices via additional cables.

  • DPI- (Dot Per Inch - number of dots per inch). The number of dots (pixels) indicates the separateness of the image. If the number is a dot, then the brightness of the picture is more beautiful.

Most often, for different types of images, values ​​from 300 to 1440 are used.

  • Cluster- This is integrated into a system of similar units. In this case, the system can be influenced by an independent element, which is led by the singing authorities.

It is clear that the cluster is included in many fields of science - chemistry, physics, sociology, astronomy, etc. In information science, there is a concept of a cluster as a unit of information storage, a cluster of computers, a cluster of servers, and a database cluster.

  • Screenshot- Using the additional Print Screen key, you can take a snapshot of what is currently on your computer screen. Then, having opened the graphic editor, you can insert a “note” there and save it as a picture.
  • Usability- Handiness vikoristany something. Evaluation of the interface, service, control buttons, navigation based on human comfort. For example, our portal of creations is based on the principles of usability - we strive to make it easy for you to navigate here.
  • Pathname- outside the file name or outside the path to the element (it is sent to the element that is in the package, the name of which is specified by the path prefix).

Visnovok

It is possible that you already know a lot of these terms, and perhaps you have been victorious incorrectly. Or maybe you just opened up the whole world for yourself? Even if it wasn’t there, now you know and can safely join hacker parties, try to get involved in a good IT company and deceive everyone with your knowledge!

Keep the good English rolling!

How great is the friendship of this family EnglishDom