MahomedLaheriaSoftwareVocabs


 * || == **__Cycle 5__** == || == **__Cycle 6__** == || == **__Cycle 7__** == ||||  ||
 * === **__Words:__** === || ==== 1) Application Software====

4) Legacy System
|| ==== 1) Open Source Software ====

4) Wintel
|| ==== 1) Google Docs====

4) User Support: Help system
||||  ||
 * === **__Description:__** === || ==== 1) Application software, also known as an application or an "app", is a computer software designed to help the user to perform specific tasks.==== || ==== 1) Open Source Softare is a kind of software that is released publicly and is free.==== || ==== 1) Google Docs is a free, Web-based office suite, and data storage service offered by Google.==== ||||  ||
 * || ==== 2) Enterprise resource planning (ERP) integrates internal and external management information across an entire organization, embracing finance/accounting, manufacturing, sales and service, customer relationship management.==== || ==== 2) Higher Level Language is programming software that provides little or no abstraction from a computers instruction sets architecture.==== || ==== 2) Tutorials should help newbies or other users in general to get ideas how to solve problems with a specific tasks.==== ||||   ||
 * || ==== 3) Distributed computing is a field of computer science that studies distributed systems.==== || ==== 3) Lower Level Language is a programming language with strong abstraction from the details of the computer. ==== || ==== 3) A readme (or read me) file contains information about other files in a directory or archive and is commonly distributed with computer software.==== ||||   ||
 * || ==== 4) A legacy system is an old method, technology, computer system, or application program that continues to be used, typically because it still functions for the users' needs, even though newer technology or more efficient methods of performing a task are now available.==== || ==== 4) Wintel is a operating system of Windows and Intel, referring to personal computers using Intel x86 compatible processors running Microsoft Windows. ==== || ==== 4) A help system (sometimes called a help file) is a documentation component of a software program that explains the features of the program and helps the user understand its capabilities.==== ||||  ||
 * || == **__Cycle 8__** == || == **__Cycle 9__** == ||||||  ||
 * === **__Words:__** === || ==== 1) Megabyte (MB)====
 * === **__Words:__** === || ==== 1) Megabyte (MB)====

4) Exabyte (EB)
|| ==== 1) Dual core====

4) PDA
||||||  ||
 * ===** __Description:__ **=== || ==== 1) A megabyte is a multiple of the unit byte for digital information storage or transmission with two different values depending on context: 1048576 bytes computer memory and one million bytes generally for computer storage.==== || ==== 1) A dual-core processor has two cores (e.g. AMD Phenom II X2, Intel Core Duo),==== ||||||   ||
 * || ==== 2) The gigabyteis a multiple of the unit byte for digital information storage, therefore 1 gigabyte is 1000000000bytes.==== || ==== 2) A quad-core processor contains four cores (e.g. AMD Phenom II X4, the Intel 2010 core line that includes three levels of quad-core processors (i3, i5, and i7 at Intel Core)==== ||||||  ||
 * || ==== 3) The terabyteis a multiple of the unit byte for digital information,====

therefore 1 terabyte is 1000000000000bytes, or 1 trillion bytes, or 1000 gigabytes.
|| ==== 3) In personal computers, a motherboard is the central printed circuit board (PCB) in many modern computers and holds many of the crucial components of the system, providing connectors for other peripherals.==== ||||||  ||
 * || ==== 4) The exabyteis a unit of information or computer storage equal to one quintillion bytes.====
 * ====1 EB = 1000000000000000000B = 1018 bytes = 1 billion gigabytes = 1 million terabytes==== || ==== 4) A personal digital assistant (PDA), is a mobile device that functions as a personal information manager.==== ||||||  ||
 * || == **__Cycle 9__** == || == **__Cycle 10__** == || == **__Cycle 11__** == || == **__Cycle 12__** == || == **__Cycle 13__** == ||
 * ====** __Words:__ **==== || ==== 1) P2P ====
 * ====** __Words:__ **==== || ==== 1) P2P ====

4) Blog
|| ==== 1) Intranet ====

4) Virus: Trojan
|| ==== 1) WiMaX ====

4) 3G Network
|| 1) WAN 2) Home Network

4) VLAN
|| ==== 1) ILOVEYOU virus ====

4) SQL Slammer
||
 * ===** __Description:__ **=== || ==== 1) Peer-to-peer (P2P) computing or networking is a distributed application architecture that allows tasks or workloads among peers.==== || ==== 1) An intranet is a computer network that uses IP technology to securely share any part of an organization's information or network operating system within that organization.====

|| ==== 1) WiMAX is a communication technology for wirelessly delivering high-speed Internet service to large geographical areas.====

|| ==== 1) A wide area network (WAN) is telecommunication network that covers a broad area.==== || ==== 1) ILOVEYOU, also known as Love Letter, is a computer worm that successfully attacked tens of millions of computers in 2000 when it was sent as an attachment to a user with the text "ILOVEYOU" in the subject line.==== ||
 * || ==== 2) In computing, an avatar is the virtual representation of the user or the user's or character.====

|| ==== 2) BitTorrent is a P2P file sharing protocol used for distributing large amounts of data over the Internet.====

|| ==== 2) Bluetooth is an open wireless technology for exchanging data over short distances from fixed and mobile devices, creating Personal Area Networks PANs) with high levels of security.====

|| ==== 2) A home network or home area network (HAN) is a residential Local Area Network (LAN).==== || ==== 2) This virus was created almost ten years ago, the creator of this virus made it work through Microsoft Outlook. What basically it did is, here it is: you receive an email with this title “Here is the Document you asked for” from an unknown sender.==== ||
 * || ==== 3) Electronic commerce, refers to the buying and selling of products or services over electronic systems such as the Internet and other computer networks.==== || ==== 3) Instant Messaging (IM) is a form of real time direct text-based communication in between two or more people using personal computers or other devices, along with shared clients.====

|| ==== 3) Mesh networking (topology) is a type of networking where each node must not only capture and disseminate its own data, but also serve as a relay for other nodes, that is, it must collaborate to propagate the data in the network.====

|| 3) A wireless local area network (WLAN) links two or more devices using some wireless distribution method and usually providing a connection through an access point to the wider internet. || ==== 3) This is one of the most recent viruses of its kind, the attack strategy of Storm Worm is somewhat similar to the Melissa Virus; the email title mention a current natural disaster like an earthquake or storm.==== ||
 * || ==== 4) A blog is a type of website or part of a website supposed to be updated with new content from time to time.====

|| ==== 4) A Trojan horse, or Trojan, is software that appears to perform a desirable function for the user prior to run or install, but steals information or harms the system.====

|| ==== 4) 3G is a generation of standards for mobile phones and mobile telecommunications services fulfilling the International Mobile Telecommunications-2000 (IMT-2000) specifications.==== || 4) A virtual local area network, virtual LAN or VLAN, is a group of hosts with a common set of requirements that communicate as if they were attached to the same broadcast domain, regardless of their physical location. || ==== 4) While discussing the most deadly virus, here is yet another spreading virus, it hit round about 75,000 computers in the first 10 minutes of its release, it damaged American Banks, Security systems and organizations, and Airline networks in a great number.==== ||