User Tools

Site Tools


computer_dictionary

If you want to send us your comments, please do so. Thanks
More on comments


Computer dictionary

TermExplanationRemark
2-trackTwo channel or AuxUsed on mixers.
The 2-Track RCA input jacks are a unbalanced direct input to the main mix outs. No level control.
The 2-track (unbalanced) output carries the same signal as the mixer output
AGESAAMD Generic Encapsulated Software Architecture
APIApplication Programming Interface
APMAdvanced Power ManagementFor hard disk drives. Can be configured with the hdparm command
BLOBBinary Large OBjectMostly firmware files
C-stateCPU power modes. These are used to save energy when the CPU is idle
CCACopper Clad AluminiumAluminium wires with a copper coating. Higher resistance compared to full copper wires
CCACold Cranking Amps
MCAMarine Cranking Amps
CCMPThe Counter Mode Cipher Block Chaining Message Authentication Code Protocol is an encryption protocol for WiFi
CISCComplex Iinstruction Set Computer
ClobberingOverwriting
Clutter(Disorderly) Litter
CSMCompatibility Support ModuleAutomatic switching between booting into BIOS or UEFI
CursusNow ncursus is a program that sources a graphical user interface on terminals
daemonAn application that runs, without a terminal or user interface, as a background process. This can be accomplished for scripts and applications
DentriesA data structure that represents a directory
Dependency confusion attackInstalling the intended software from a malicious source by a trick
EDCEveryDay CarryA collection of useful items that are consistently carried on person every day. Like keys and a smartphone
EDCElectrical Design CurrentRelated to CCA
EHCIEnhanced Host Controller InterfaceThis is the USB 2.0 host controller specification
EgressData egress refers to data leaving a computer, datacenter via a network to an external location
Environment Variables
FTTHFiber to the Home
GlobGlob patterns specify sets of filenames with wildcard charactersWildcard characters are * ! and ?
Hand-offUSB relatedWhen set to “Enable” the BIOS / UEFI does not handle the hardware. The operating system must have drivers for that hardware
Idle TimeoutInactive time before the user is automatically loged out
IDORInsecure Direct Object ReferencesSecurity issue by which unauthenticated access to a database is possible
InodeA data structure that represents a file
Lock PeriodLength of time a user has to wait before being able to attempt again to log in after he has been locked out because he tried more than the number of allowed attempts to log in
MBR1)Master Boot RecordThe size is 466 bytes at the beginning of a hard disk drive
mwaitA hint that allows the processor to stop instruction execution2). A series of instructions on contemporary x86 systems that allows the kernel to temporarily block execution (in place of a spinloop, or other solution) until a memory location has been updated3)
ModalWebdesign. Pop up
npmNode Package Manager is used for managing NodeJS packagesis as APT to Debian
NSSName Service Switch
OLTOptical Line Termination
OTDOn This Date
P-stateCPU performance states. This is called a CPU governor. These are used to save energy when the CPU is executing code
Page cacheData stored in memory than the speed of accessing the drive itself. This is useful when data is often requested from the drive. Caching data can speed up the computer
padadd characters. Like in the date command the _ pads spaces
PAMPluggable Authentication Modules
PMFProtected Management Frames. Provides protection for unicast and multicast management action frames
ratchet pawlAn asynchronous WebSocket client in PHP
react/socketAsync, streaming plaintext TCP/IP and secure TLS socket server and client connections for ReactPHP
REPLInteractive method to communicate to your computer in Python
Reaped child processes4)refer to child processes that have been terminated, and have entered “zombie” state. To “reap” a child process, the parent process collects the exit status 5) and thereby removes the child from the process table and frees up the resources associated with it. Once this happens, the child process is considered “reaped.”
Retry TimesThe number of times consecutive wrong passwords can be entered
RISCReduced Instruction Set Computer
SASSerial Attached SCSI
SassSyntactically Awesome Style Sheets
ScrapeAttempt to recreate heavily damaged areas of a file on a diskThis can damage the disk further!
SparseBlocks of zeroes are not allocated on the disk, which saves space
.snb fileSamsung mobile devices note-taking application S Note fileCan be extracted with unzip. Text files are in xml format
SSI Server Side IncludesItems in a webpage like #config and #flastmod
Stream RecordingDefect Management on DVD-RAM or formatted Blue Ray disks. If turned on defect management is disabled in order to get full burning speedOption found in xfburn
TPMTrusted Platform Module
TrimAn operating system ATA command that informs a solid-state drive (SSD) which blocks of data are no longer considered in use and can be wiped
TWATime Weighted Average
URI6)scheme:[//authority]path[?query][#fragment]authority = [userinfo@]host[:port]
URLscheme:[//authority]path
URNauthority]path[?query][#fragment]
XHCIExtensible Host Controller InterfaceUSB 3.x specification
WALWrite-Ahead LoggingUsed by sqlite
Web storageWeb browser storage used by scripts like javascript
WebUSBJavaScript API for securely providing access to USB devices from web pages

De betekenis van getallen en letters van Intel-processors


Main subjects on this wiki: Linux, Debian, HTML, Microcontrollers, Privacy

RSS
Disclaimer
Privacy statement
Bugs statement
Cookies
Copyright © : 2014 - 2026 Webevaluation.nl and the authors
Changes reserved.

computer_dictionary.txt · Last modified: by wim