safwanmasterSoftwareVocab

from high level computer language to machine language before the program runs for the first time. ||  || __**Emulation**__- this is a program that translates all windows related instructions into instructions that macs operating system and CPU can understand. ||  || __**UNIX-**__ is an operating system that allows a time sharing computer to communicate with many other computers or terminals at once. ||  || __**unicode-**__is a character set for making letters digits and special characters to fit into the computers binary circuitry. ||  || __**Hot Swappers-**__hot swapping describes replacing components without significant interruption to the system, ||   ||   ||   ||   || ammount of physical memory available. ||  || __**computer clusters**__-is a group of linked computers working together closely thus in many respects forming a single computer. ||  || __**Pathname-**__ a unique specified location of all of the files and folders, describing the nesting of folders containing it. ||  || **__compatible__-** the ability of a software program to run on a specific computer system. also the ability of a hardware device to function with a particular type of computer. ||  || **__Hardware Disposal-__** this is electronic recycling which is the reuse of computers and other electronic devices., firstly you dismentle the hardware so nothing gets destroyed then you a good use for the recycled materials. for e.g. charity. ||  ||   ||   ||   ||
 * cycle 5 ||  || cyle 6 ||   || cycle 7 || =**hardware**= || cycle 8 ||   || cycle 9 ||   ||   ||   ||   ||
 * **__compiler-__** this is a translator program that gathers a complete translation of the
 * __**virtual memory**__- the ammount of memory addresses are much larger than the
 * ||  || __**Patent-**__ this is a law that protects mechanical inventions. ||   ||   ||   || __**expansion slots**-__ an area inside the computers housing that holds a special purpose circuit boards. ||   ||   ||   ||   ||   ||   ||
 * =Networks= ||  || cycle 10 ||   || cycle 11 ||   || cycle 12 ||   || cycle 13 ||   ||   ||   ||   ||
 * ||  || **__Mesh Networks__**-is a type of networking where each node must not only capture and publish its own data, but also serve as a //relay// for other nodes, that is, it must collaborate to propagate the data in the network. ||   || **__Macro Virus__**-A virus that takes the form of an application (for example, a word-processing or spreadsheet) program macro, which may execute when the program is in use. ||   || **__intellectual property-__** is  a number of distinct types of rights that are recognised by the law.these rights are mostly seen in copy right and patent law. ||   || **__lind scripting Language (Linda)__** - a model of coordination and communication among several parallel processes operating upon objects stored in and retrieved from shared ||   ||   ||   ||   ||
 * ||  || **__Cloud Computing-__** is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility over a network ||   || **__Hackers-__**People very knowledgeable about computers who use their knowledge to invade other people's computers. ||   || **__Decryption-__** The process of decoding data that has been //encrypted// into a secret format. Decryption requires a secret //key// or //password// ||   || __**Host-**i__s a computer connected to a computer network,A network host may offer information resources, services, and applications to users ||   ||   ||   ||   ||
 * ||  ||   ||   || **__Firewalls__**- security measures designed to prevent unauthorized electronic access to a networked computer system ||   || **__online extortion__**-Illegal use of one's official position or powers to obtain property, funds, or patronage.so basically it is when you hack into someones PC and use his identity to make something happen. ||   || **__distributed computing__**-is a field of computer science that studies distributed systems. A distributed system consists of multiple autonomous computers that communicate through a computer network ||   ||   ||   ||   ||
 * ||  || **__Cloud Computing-__** is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility over a network ||   || **__Hackers-__**People very knowledgeable about computers who use their knowledge to invade other people's computers. ||   || **__Decryption-__** The process of decoding data that has been //encrypted// into a secret format. Decryption requires a secret //key// or //password// ||   || __**Host-**i__s a computer connected to a computer network,A network host may offer information resources, services, and applications to users ||   ||   ||   ||   ||
 * ||  ||   ||   || **__Firewalls__**- security measures designed to prevent unauthorized electronic access to a networked computer system ||   || **__online extortion__**-Illegal use of one's official position or powers to obtain property, funds, or patronage.so basically it is when you hack into someones PC and use his identity to make something happen. ||   || **__distributed computing__**-is a field of computer science that studies distributed systems. A distributed system consists of multiple autonomous computers that communicate through a computer network ||   ||   ||   ||   ||