Sunteți pe pagina 1din 21

LA TRADUCCIN DE TEXTOS

INFORMTICOS (INGLS-ESPAOL)

TRANSLATION SAMPLES, OBLIGATORY TEXTS AND OPTIONAL TEXTS


In what follows, you will find a variety of English computer-related texts with their
suggested translation and some comments on their translation. The comments aim at
drawing your attention to some important translation points, especially these related
to computer-related texts.
SAMPLE ONE
The World Wide Web is a collection of electronic files linked together like a spider web.
These files are stored on computers called servers located around the world. The Web
has evolved into a global electronic publishing medium and a medium for conducting
electronic commerce.
TRANSLATION
La World Wide Web es una coleccin de documentos electrnicos que estn vinculados
entre s, como una telaraa. Estos documentos estn almacenados en computadoras
llamadas servidores situados en todas partes del mundo. La Web ha evolucionado
hasta ser un medio de publicacin electrnica global, y, de forma creciente, un medio
que sirve de soporte al comercio electrnico.
COMMENTS
It is interesting that the English simile in line 1 in the English text like a spider Web
is translated verbatim as como una telaraa since it is a metaphor that exists in both

languages. One has to be careful with metaphoric language since it tends to be more
language-specific than universal. Note the passive structure in line 2 of the English
text and how it is translated using the equivalent structure in Spanish (are storedestn almacenados). The complex preposition into is translated as hasta ser which is
a totally different form. However, it perfectly captures the sense conveyed in the
English text. Also note the use of the phrase de forma creciente which does not have
a parallel in the English text, but its meaning is dictated by context.

SAMPLE TWO
Web pages are stored on web servers located around the globe. Entering the Uniform
Resource Locator or URL of a web page in your web browser or clicking a link sends a
request to the server that hosts the content. The server transmits the web page data to
your computer and your web browser assembles it on your screen.

TRANSLATION
Las pginas Web estn almacenadas en servidores web situados por todo el mundo. Al
introducir en el explorador de web la URL (siglas del ingls Uniform Resource Locator,
en espaol un Localizador Uniforme de Recursos) de una pgina web, o al hacer clic
en un vnculo, una peticin es enviada al servidor que alberga la pgina. El servidor
enva la pgina web a su ordenador y su explorador de web la muestra en su pantalla.
COMMENTS
The treatment of the technical abbreviation in line 2 of the English text (URL) is worth
highlighting. The translator states first what the abbreviation stands for in English,
then he or she provides the equivalent words in Spanish. In this respect, the
translator helps the reader even understand English terminology. The Spanish text
uses the formal polite pronoun su although this does not have a direct lexical
equivalent in the English text.

The translator has decided that the English your

should be matched with Spanish

su rather than

tu. This indicates that the

translator feels that the formal pronoun is the default one in Spanish computerrelated texts, especially that the reference of the pronoun is not specific. It is also
known that English in general tends to be more on the informal side. Note also the
difference in word order between the English and the Spanish texts.

SAMPLE THREE
A web page (such as the one you are looking at now) is an electronic document written
in a computer language called HTML (Hypertext Markup Language). Web pages can
contain text, graphics, audio, video, and animation, as well as interactive features,
such as data entry forms and games. Each page has a unique address known as a
URL (Uniform Resource Locator), which identifies its location on the network. Web
pages usually contain hyperlinks to other web pages or resources. Hyperlinks are text
and images that reference the addresses of other web pages.

TRANSLATION
Una pgina web (como la que est viendo ahora) es un documento electrnico escrito
en un lenguaje de computador llamado HTML (siglas del ingls Hypertext Markup
Language, o Lenguaje de Marcacin de Hipertexto, en espaol). Las pginas Web
pueden contener texto, grficos, vdeo, animaciones, y sonido, as como elementos
interactivos, como formularios de entrada de datos. Cada pgina tiene una direccin
nica que se denomina una URL (del ingls Uniform Resource Locator, en espaol
Localizador Uniforme de Recursos), que identifica su ubicacin en el servidor. Las
pginas Web contienen generalmente hipervnculos a otras pginas web. Los
hipervnculos son textos e imgenes que hacen referencia a URLs de otras pginas
web.
COMMENTS
The English linking phrase as well as in line 3 is appropriately matched with the
Spanish as como while the item such as is provided with the translation como
which is also fitting here. It is quite interesting that the word addresses towards the
end of the English text is translated as URLs in Spanish. This demonstrates that the
translator has IT and computer knowledge. In some other texts or due to lack of such
knowledge, the word would have been translated as domicilios. Note how the
translator has used the Spanish word contienen to translate the English word
contain in line 5 of the English text. The translator could have used tienen. He or
she has to decide about the best equivalent, and the more synonyms there are, the
more difficult his or her job becomes.
SAMPLE FOUR
A website consists of one or more web pages that relate to a common theme, such as a
person,

business,

organization,

or

subject,

such

as

news

or

sports.

The first page is called the home page, which acts like an index, indicating the

content on the site. From the home page, you can click links to access other pages on
the site or other resources on the Web
TRANSLATION
Un sitio web se compone de una o ms pginas web referidas a un asunto comn,
como a una persona, un negocio, una organizacin o a un tema, tal como el deporte.
La primera pgina se llama la pgina de inicio, y hace las funciones de un ndice,
indicando el contenido del sitio. En la pgina de inicio puede hacer clic en los
hipervnculos para acceder a otras pginas web.
COMMENTS
Note how the translator has used the word asunto to translate theme in line 1 of
the English text. Falling into the trap of false friends. Some other translator would
have used the word tema , which is correctly used to translate the word subject in
line 2 of the English text. Note how the English such as in line 2 is translated here
as tal como and NOT as como as we see in SAMPLE
how

the

context

is

of

utmost

THREE.

importance.

Now,

This

shows

interestingly,

the

translator has NOT translated the word news in line 2. Perhaps, since it is simply a
list of examples, the translator has felt that dropping one word would not hurt.
However, one can argue that this would mean that one is not totally faithful to the
source text where the word news DOES exist indeed. This is definitely a question to
debate.
SAMPLE FIVE
Electronic mail, or e-mail, is the most frequently used service on the Internet for many
reasons:

Send a message anytime, anywhere and the recipient can read it at his or her
convenience. Send the same message to multiple recipients.

Forward information to people without retyping it.

E-mail is fast, usually taking no more than a few seconds to be received.

Attach digital files to your messages, including electronic documents, video


clips, music and photos.

Send messages around the world as easily as to someone down the block.

TRANSLATION
El correo electrnico, o e-mail, es el servicio utilizado con ms frecuencia en Internet,
por muchas razones:

Puede enviar un mensaje en cualquier momento, a cualquier lugar y el


destinatario puede leerlo cuando le venga mejor.

Puede enviar el mismo mensaje a muchas personas al mismo tiempo.

Puede reenviar informacin a compaeros de trabajo sin tener que reescribirla.

Puede ahorrar tiempo. El correo electrnico es rpido, no tardando,


generalmente, ms de unos minutos en ser recibido.

Puede enviar documentos por correo electrnico y los destinatarios pueden


editarlos y devolverle versiones revisadas.

Puede enviar mensajes a cualquier parte del mundo tan fcilmente como a
compaeros de trabajo de la oficina de al lado.

COMMENTS
The English adverbial phrase most frequently in line 1 is translated using the
Spanish prepositional phrase con ms frecuencia, which shows how the priority of
the translator is to convey the meaning of the source text using the same grammatical
structure or a different one. Grammar for the translator is a means to achieve an end,
and not the end itself. Grammar is at the service of the translator to find the best way
to express the semantic

content

of

the

source

text. Furthermore,

The metaphoric expression down the block at the end of the English text has
been translated using a different item. What

the

English

expression

means

is

essentially closeness or nearness. The translator has decided to express this


meaning using the scenario como a compaeros de trabajo de la oficina de al lado,
which expresses the meaning intended in the source text.
SAMPLE SIX
There is no guarantee of e-mail privacy. A message can be intercepted and read as it
makes its way over the Internet to its final destination. Consider e-mail as you would a
postcard. The safest way to send sensitive or confidential information via e-mail is by
using encryption software. Some companies consider e-mail to be the same as paper
mail and reserve the right to archive and review all electronic correspondence. When
you delete a message from your computer, a copy of the message may still remain on
the mail server and can be retrieved.

TRANSLATION
No hay garantas de privacidad del correo electrnico. Un mensaje puede ser
interceptado y ledo mientras va camino de su destino final a travs de Internet.
Considere el correo electrnico como si fuera una postal. Para enviar informacin
delicada o confidencial va correo electrnico, utilice software de cifrado o encriptacin.
Algunas compaas consideran el correo electrnico equivalente al correo en papel, y
se reservan el derecho a archivar y revisar su correspondencia electrnica. Cuando
borra un mensaje de su ordenador, una copia de ste an puede permanecer en el
servidor de correo.
SAMPLE SEVEN
To improve the impact of your messages and avoid trouble, there are a few unwritten
rules, called netiquette (networking etiquette) you should be aware of:
-

Clearly summarize your message in the subject line.

Keep your messages short and focused. Recipients tend to ignore long messages
-

Don't write in all CAPITAL LETTERS. Capital letters are used for emphasis, and
are considered equivalent to SHOUTING. IT'S ALSO DIFFICULT TO READ.

Don't write anything you wouldn't say in public. It's easy for recipients to
forward messages to others, which could leave you in an embarrassing position
if you divulge personal or confidential information.

Include your name at the bottom of a message.

TRANSLATION
Para mejorar la impresin causada por sus mensajes, y evitar problemas, hay algunas
reglas no escritas, denominadas de netiqueta (net + etiqueta; "net" es "red" en ingls)
que debe conocer:
-

En la lnea de asunto, resuma su mensaje claramente.

En sus mensajes sea breve y centrado. Los destinatarios tienden a ignorar los
mensajes largos.

No escriba todo en LETRAS MAYSCULAS. Las maysculas se utilizan para


dar nfasis, y se consideran el equivalente a GRITAR.

No escriba nada que no dira en pblico. Es fcil para los destinatarios reenviar
sus mensajes a otros, lo que puede dejarle en una posicin incmoda en caso
de que divulgara en ellos informacin personal o confidencial.

Incluya su nombre al final del mensaje.

SAMPLE EIGHT
Like a postal address, an e-mail address specifies the destination of an electronic
message.

An Internet e-mail address looks like this: user name@domain name

The user name is a unique name that identifies the recipient.

The domain name is the address. Many people can share the same domain
name.

TRANSLATION
Igual que una direccin postal, una direccin de correo electrnico especifica el
destino de un mensaje electrnico.

Una direccin de correo electrnico de Internet tiene este aspecto: nombre de


usuario@nombre de dominio

El nombre de usuario es un nombre nico que identifica al destinatario.

El nombre de dominio es la direccin. Mucha gente puede compartir el mismo


nombre de dominio.

SAMPLE NINE
In addition to sending text messages, most e-mail programs allow you to attach word
processing documents, spreadsheets, graphics, audio, video, and other electronic files
to your message. To attach a file:

Click the Attachment or Include File icon, often represented by a paper clip.
This feature is often located on the toolbar or on a pull-down menu.

Locate the file on your computer's hard drive or other storage device from the
window

that

opens

requesting

the

name

of

the

file.

Select the file you want from the file attachment window. An icon representing
the file may appear in the body of your message, or the name of the file
appears in the Attachment line of your message window.

TRANSLATION
Adems de enviar mensajes de texto, muchos programas de correo electrnico le
permiten adjuntar a sus mensajes documentos de procesadores de texto, hojas de
clculo, grficos, audio, vdeo y otros archivos electrnicos. Para adjuntar un archivo:

Haga clic en el icono Adjuntar o Incluir Archivo, a menudo representado por


un clip o sujetapapeles. Esta funcin a menudo est situada en la barra de
herramientas

en

un

men

desplegable.

Desde la ventana que generalmente se abre para solicitar el nombre del


archivo, localice el archivo en el disco duro de su ordenador o en otro
dispositivo

de

almacenamiento.

Desde la ventana de adjuntar archivos, seleccione el archivo que quiera. Un


icono que representa al archivo puede aparecer en el cuerpo de su mensaje, o
puede que aparezca el nombre del archivo en el campo Adjuntos de la ventana
de su mensaje.

SAMPLE TEN
The most useful buttons on your browser toolbar include:
-

Back -- Returns you to the previous page.

Forward -- Returns you to the page you have backed up from.

Home -- Takes you to the start page specified in the browser preferences.

Reload or Refresh -- Downloads the web page from the server again.

Stop -- Stops the browser from loading the current page.

Print -- Lets you make a hard copy of the current page displayed in your
browser.

TRANSLATION
Entre los botones ms tiles de la barra de herramientas de su explorador estn:

Atrs -- Vuelve a la pgina anterior.

Adelante -- Regresa a la siguiente pgina, desde una pgina a la que hubiera


vuelto atrs.

Inicio -- Le lleva a la pgina de inicio especificada en las preferencias del


explorador.

Recargar o Actualizar -- Descargan la pgina web de nuevo desde el servidor.

Detener -- Detiene la carga de la pgina actual por el explorador.

Imprimir -- Le permite sacar una copia impresa del documento o marco


actualmente cargado en su explorador.

Textos Obligatorios

TEXT ONE
Obligatory-Obligatorio
LAPTOP OR DESKTOP
Choosing between a laptop and desktop can be a difficult decision. The bottom line
comes down to portability. If you will need or use the portability of a laptop, then it
can be a powerful tool for you and worth the extra money. However, if the laptop will
simply act as a desktop with very occasional need for portability, a desktop is also an
excellent choice and far less expensive.
Laptops have a great advantage in terms of their portability. If you carry a laptop with
you, your applications and documents are always immediately available. With a
wireless card, your laptop can also access the Internet while on the go, so you have
more places to do research, check your email, and be more productive.
Desktops offer other advantages. Although laptop prices have come down and
performance has increased, most desktops offer a better price-to-performance ratio.
Desktops also still hold some ergonomic advantages over laptops. Bear in mind that,
aside from small footprint desktops like the iMac or Studio One, they take up more
space in an apartment or residence hall.
A typical laptop weighs between 4.5 and 8 pounds. Alternatively, the economy and
cost-oriented option - the netbook- focuses primarily on mobility and are often
Windows or Linux-based. Netbooks are most commonly equipped with an Intel Atom a series of microprocessor that focuses less on performance and more on basic
functionality in tandem with low power consumption.
Adapted from http://helpdesk.wisc.edu/showroom/page.php?id=3044

TEXTO TWO
Obligatory-Obligatorio
HOW TO INSTALL RAM
1. Determine what kind of RAM you need, and whether your computer has enough
open slots to hold it. The new RAM should match the existing RAM's
specifications and configuration.
2. Shut down the computer and leave it plugged into the surge suppressor.
3. Disconnect all peripheral devices, such as the monitor, from the computer.
4. Remove the computer cover.
5. Ground yourself to the computer with professional grounding equipment like an
anti-static wristband or hold a metal part of the chassis.
6. Remove any cards or internal components necessary to give yourself
unobstructed access to RAM sockets.
7. Pick up your SIMM (single in-line memory module) or DIMM (dual in-line
memory module) by the ends without touching pins or chips.
8. If adding a SIMM, find the notched end and turn the SIMM so that it is parallel
to the existing RAM card(s). Insert the SIMM into the socket at a 30-degree
angle.
9. Use slight pressure to keep a SIMM from backing out while rotating the module
to an upright position perpendicular to the motherboard.
10. Make sure the small holes on each side of a SIMM fit into holders.
Adapted from: http://www.ehow.com/how_895_install-ram.html

TEXT THREE
Obligatory-Obligatorio
WHAT IS A VIRUS
In computers, a virus is a program that replicates by being copied or initiating its
copying to another program or document. Viruses can be transmitted as attachments
to an e-mail note or in a downloaded file, or be present on a diskette or CD. The
immediate source of the e-mail note, downloaded file, or diskette you have received is
usually unaware that it contains a virus. Some viruses wreak their effect as soon as
their code is executed; other viruses lie dormant until circumstances cause their code
to be executed by the computer. Some viruses are benign or playful in intent and
effect while some can be quite harmful, erasing data or causing your hard disk to
require reformatting. A virus that replicates itself by resending itself as an e-mail
attachment is known as worm.
Generally, there are three main classes of viruses. The first is the File infectors. Some
file infector viruses attach themselves to program files. Some can infect any program
for which execution is requested. When the program is loaded, the virus is loaded as
well. Other file infector viruses arrive as wholly-contained programs or scripts sent as
an attachment to an e-mail note.
The second is System or boot-record infectors. These viruses infect executable code
found in certain system areas on a disk. A typical scenario is to receive a diskette from
an innocent source that contains a boot disk virus. When your operating system is
running, files on the diskette can be read without triggering the boot disk virus.
However, if you leave the diskette in the drive, and then turn the computer off or
reload the operating system, the computer will look first in your A drive, find the
diskette with its boot disk virus, load it, and make it temporarily impossible to use
your hard disk.
Adapted from
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213306,00.html

TEXT FOUR
Obligatory-Obligatorio
PERSONAL COMPUTERS
A personal computer is a small, relatively inexpensive computer designed for an
individual user. All are based on the microprocessor technology that enables
manufacturers to put an entire CPU on one chip. Businesses use personal computers
for word processing, accounting, desktop publishing, and for running spreadsheet and
database management applications. At home, the most popular use for personal
computers is for playing games.
Personal computers first appeared in the late 1970s. One of the first and most popular
personal computers was the Apple II, introduced in 1977 by Apple Computer. During
the late 1970s and early 1980s, new models and competing operating systems seemed
to appear daily. Then, in 1981, IBM entered the fray with its first personal computer,
known as the IBM PC. The IBM PC quickly became the personal computer of choice,
and most other personal computer manufacturers fell by the wayside. One of the few
companies to survive IBM's onslaught was Apple Computer, which remains a major
player in the personal computer marketplace.
Other companies adjusted to IBM's dominance by building IBM clones, computers
that were internally almost the same as the IBM PC, but that cost less. Because IBM
clones used the same microprocessors as IBM PCs, they were capable of running the
same software. Over the years, IBM has lost much of its influence in directing the
evolution of PCs. Many of its innovations, such as the MCA expansion bus and the
OS/2 operating system, have not been accepted by the industry or the marketplace.

Adapted from
http://webopedia.internet.com/TERM/P/personal_computer.html

TEXT FIVE
Obligatory-Obligatorio
THE INTERNET

The Internet, in simplest terms, is the large group of millions of computers around the
world that are all connected to one another. These computers are connected by phone
lines, fiber optic lines, cable, satellites, and wireless connections.
When you log on to the Internet you are given access to many of the other computers
that are connected around the world. Some common ways of connecting to the
Internet include are Internet service provider (ISP) by modem, Internet ready cable,
digital subscriber line (DSL), and simply turning on your computer which is on a
network at work or school connected to the Internet
The Internet works a lot like a postal or parcel delivery system, except it is much,
much faster. Say, for example, you are in California and want to send an e-mail to a
friend in London. After you press the send button, your e-mail goes to your mail
server. The mail server will attempt to contact your friend's mail server in London. But
chances are your mail server doesn't have a direct line connecting it to your friend's
mail server in London. Your mail server may have to "talk" to a computer in Chicago,
which then takes to a computer in Washington, D.C., which contacts the London
server via satellite.
Adapted from: http://www.davesite.com/webstation/inet101/net01.shtml

TEXT SIX
Obligatory-Obligatorio
SPAM

Spam is flooding the Internet with many copies of the same message in an attempt to
force the message on people who would not otherwise choose to receive it. Most spam
is commercial advertising, often for dubious products, get-rich-quick schemes, or
quasi-legal services. Spam costs the sender very little to send -- most of the costs are
paid for by the recipient or the carriers rather than by the sender.
There are two main types of spam, and they have different effects on Internet users.
Cancellable Usenet spam is a single message sent to 20 or more Usenet newsgroups.
(Through long experience, Usenet users have found that any message posted to so
many newsgroups is often not relevant to most or all of them.) Usenet spam is aimed
at "lurkers", people who read newsgroups but rarely or never post and give their
address away. Usenet spam robs users of the utility of the newsgroups by
overwhelming them with a barrage of advertising or other irrelevant posts.
Furthermore, Usenet spam subverts the ability of system administrators and owners
to manage the topics they accept on their systems.
Email spam targets individual users with direct mail messages. Email spam lists are
often created by scanning Usenet postings, stealing Internet mailing lists, or searching
the Web for addresses. Email spams typically cost users money out-of-pocket to
receive. Many people - anyone with measured phone service - read or receive their
mail while the meter is running, so to speak.

Adapted from
http://spam.abuse.net/overview/whatisspam.shtml

TEXT SEVEN
Obligatory-Obligatorio
SPEED: CPU AND MEMORY

The CPU is the brain of the computer. Its job is to take information from the various
input devices, the operating system, and software and execute the instructions that it
has been given. A CPU executes a certain amount of instructions within a grouping
called a cycle. The speed of the CPU is measured in how many cycles it can perform in
a given second. A speed of one cycle per second is called a hertz. Therefore, a CPU that
has a frequency of 1 million cycles per second has the speed of a Megahertz, and a
CPU that has a frequency of 1 billion cycles per second is a Gigahertz.

Just as important to the speed of the CPU is the amount of memory you have in your
computer. Memory is the temporary storage place for your computers information.
When a computer is manipulating some sort of information, it is placed in the memory
to be retrieved or manipulated later. If all your usable memory gets filled up, the
computer will then start storing temporary data on to your hard drive in something
called a swap file. When the CPU is ready to use that information it will then read it
back from your hard drive and place it into memory where it can be used.
As you can see when you use a swap file, and the CPU needs to access the data. It
becomes a two-step process in retrieving that data from the hard drive and memory,
instead of a one step process of reading the data directly from memory.
Adapted from
http://www.bleepingcomputer.com/tutorials/tutorial30.html

TEXT EIGHT
Obligatory-Obligatorio
INSTRUCTIONS TO INSTALL THE WINDOWS 7 BETA

1- Install the Beta only on a dedicated test computer


2- Make frequent backups while testing the Beta. You can back up files to an external
hard disk, a DVD or CD, or a network folder.
3- Prepare a recovery disc. A recovery disc restores your computer to its out-of-the-box
state. Most computers come with one. If yours didnt, contact your PC maker.
4- Update your antivirus program, run it, and then disable it before installing the
Beta. After you install the Beta, remember to re-enable the antivirus program.
5- Connect to the Internet after you install the Beta. Being connected helps make sure
you get useful security and hardware updates. (If you don't have an Internet
connection, you can still install the Beta.)
6- Dont install the Beta if youre uncomfortable troubleshooting your own PC
problems. Microsoft does not provide technical support for the Windows 7 Beta.

Adapted from
http://www.microsoft.com/australia/windows/windows-7/beta-installationinstructions.aspx

TEXT NINE
Obligatory-Obligatorio

NEW GENERATION OF COMPUTERS


Scientists have developed a new generation of hardware and software based on the
simpler designs of the 1950s. Clock-free systems promise extra speed, safety, and
security. The new designs work well in the laboratory and are only awaiting the
development of software tools so that they can be produced commercially.
Because computers of the 1950s were relatively simple, they could function without
clocks. Since the advent of faster and more complex systems in the 1960s, all
hardware design has been based on the principle of the clock a microelectronic
crystal which emits rapid pulses of electricity to synchronize the flow of data. In
modern
PCs,
this
is
at
the
heart
of
the
Pentium
Processor.
But computer systems are now so complex that clocks are imposing limitations on
performance. The electrical pulses, travelling at the speed of light, are not fast enough
to keep accurate time as they visit tens of millions of transistors on a single chip. The
result is that errors begin to occur in data. This is a fundamental and insoluble
problem which is causing increasing difficulty for designers who have to balance the
demand for speed and complexity of systems with the need for reliability.
Such systems rely on a protocol of data transmission and acknowledgement which is
not regulated by time. This can happen locally within a computer or globally between
computers. Before data is exchanged, there must first be a handshake, or agreement
on
the
mutually
acceptable
protocol.

Adapted from http://www.innovations


report.de/html/berichte/informationstechnologie/bericht-8982.html

TEXT TEN
Obligatory-Obligatorio
NEWSGROUPS

A newsgroup is a discussion about a particular subject consisting of notes written to a


central Internet site and redistributed through Usenet, a worldwide network of news
discussion groups. Usenet uses the Network News Transfer Protocol (NNTP).
Newsgroups are organized into subject hierarchies, with the first few letters of the
newsgroup name indicating the major subject category and sub-categories represented
by a subtopic name. Many subjects have multiple levels of subtopics. Some major
subject categories are: news, rec (recreation), soc (society), sci (science), comp
(computers), and so forth (there are many more). Users can post to existing
newsgroups, respond to previous posts, and create new newsgroups.
Newcomers to newsgroups are requested to learn basic Usenet netiquette and to get
familiar with a newsgroup before posting to it. A frequently-asked questions is
provided. The rules can be found when you start to enter the Usenet through your
browser or an online service. You can subscribe to the postings on a particular
newsgroup.
Some newsgroups are moderated by a designated person who decides which postings
to allow or to remove. Most newsgroups are unmoderated.

Adapted from
http://searchexchange.techtarget.com/sDefinition/0,,sid43_gci212650,00.html

Textos "Opcionales"

FIREWALLS
Optional-Opcional
A firewall is a protective system that lies, in essence, between your computer network
and the Internet. When used correctly, a firewall prevents unauthorized use and
access to your network. The job of a firewall is to carefully analyze data entering and
exiting the network based on your configuration. It ignores information that comes
from an unsecured, unknown or suspicious locations. A firewall plays an important
role on any network as it provides a protective barrier against most forms of attack
coming from the outside world.
Firewalls can be either hardware or software. The ideal firewall configuration will
consist of both. In addition to limiting access to you computer and network, a firewall
is also useful for allowing remote access to a private network through secure
authentication certificates and logins.
While many people do not completely understand the importance and necessity of a
firewall, or consider it to be a product for businesses only, if your network or
computer has access to the outside world via the Internet then you need have a
firewall to protect your network, individual computer and data therein.

Adapted from
http://www.webopedia.com/didyouknow/hardware_software/2004/firewall_types.asp

FLASH MEMORY
Optional-Opcional

Flash memory (sometimes called "flash RAM") is a type of constantly-powered


nonvolatile memory that can be erased and reprogrammed in units of memory called
blocks. It is a variation of electrically erasable programmable read-only memory
(EEPROM) which, unlike flash memory, is erased and rewritten at the byte level,
which is slower than flash memory updating. Flash memory is often used to hold
control code such as the basic input/output system (BIOS) in a personal computer.
When BIOS needs to be changed (rewritten), the flash memory can be written to in
block (rather than byte) sizes, making it easy to update. On the other hand, flash
memory is not useful as random access memory (RAM) because RAM needs to be
addressable at the byte (not the block) level.
Flash memory gets its name because the microchip is organized so that a section of
memory cells are erased in a single action or "flash." The erasure is caused by FowlerNordheim tunneling in which electrons pierce through a thin dielectric material to
remove an electronic charge from a floating gate associated with each memory cell.
Intel offers a form of flash memory that holds two bits (rather than one) in each
memory cell, thus doubling the capacity of memory without a corresponding increase
in price.
Flash memory is used in digital cellular phones, digital cameras, LAN switches, PC
Cards for notebook computers, digital set-up boxes, embedded controllers, and other
devices.

Adapted from
http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci212130,00.html

TOUCHSCREENS
Optional-Opcional

A touchscreen is a computer display screen that is sensitive to human touch, allowing


a user to interact with the computer by touching an active area, target or control such
as pictures or words on the screen. As touchscreens become more common it is
essential that they are designed for ease of use by everyone, including disabled and
elderly people.
Touchscreens are activated by the insertion or removal of the fingertip or by pressing
the controls, active areas or targets with a mouthstick, headstick, or other similar
device (stylus). Some touchscreens support stylus input and others do not. The
difference is in the device's touch sensor technology
The touchscreen interface can be beneficial to those that have difficulty using other
input devices such as a mouse or keyboard. When used in conjunction with software
such as on-screen keyboards, or other assistive technology, they can help make
computing resources more available to people that have difficulty using computers.
Information kiosks, tourism displays, trade show displays and other electronic
displays are used by many people that have little or no computing experience. The
user-friendly touchscreen interface can be less intimidating and easier to use than
other input devices, especially for novice users. A touchscreen can help make
information more easily accessible by allowing users to navigate by simply touching
the display screen.

Adapted from: http://www.tiresias.org/research/guidelines/touch.htm

S-ar putea să vă placă și