Documente Academic
Documente Profesional
Documente Cultură
TASK
Compiled by :
DEPARTMENT OF INFORMATION
FACULTY OF SCIENCE AND TECHNOLOGY
STATE ISLAMIC UNIVERSITY SUNAN GUNUNG DJATI
BANDUNG
2009
VOCABULARY OF INFORMATIC
A
Abend (Abnormal end)
AbiWord
Abort
Access
Accessibillity
How to set the button, voice, appearance and so forth on the Windows operating
system.
Access Method
The software that controls the transfer of data between primary storage and
equipment inputs and outputs in a system.
Access Time
Accessories
Part of the arithmetic unit of a computer to store the results of the calculation
temporary or some other operation.
Acknowledge
Signs of the receiver that the sending of messages have arrived without any
errors. Acknowledge Acknowledge the word comes from.
Acoustic Coupler
Modem type simple tool to send computer data over telephone lines. The tool is
changing the binary signals into acoustic signals received by the microphone to the
phone, the signal Active Task Button Command button located on the taskbar that will
arise if a command should executed.
Adapter
Add-Ins
Address
Adobe PageMaker
Application software for data processing needs of design layout books, covers for
magazines, newspapers, etc.. Typically used by business type settings for the computer
purposes of making the invitation cards, business cards, greeting cards, letterhead, and
so forth.
Adobe Photoshop
Software applications that process data and graphic images for printing needs,
graphic design.
ADSL (Asymmetric Digital Subscriber Lines)
Digital data transmission over the high-level line telephone lines. ADSL is a
technology modulation developed with Discrete Multitone (DMT) that allows
transmission tinggi.Fasilitas ADSL speed data simultaneously using a traditional
telephone service, ISDN, and high-speed data transmission, as well as video.
DMT-based ADSL appears as a transition from copper wire to wire with the fi
front. This makes ADSL more economical use for local telephone companies because
mempu ADSL device provides high-speed data services before teknologifi to use
optics.
Advertiser
Affiliate Site
Page where the ad merchants included. We can enter into the merchant’s ad any
existing page in the website, and it may disembarang place.
A high-speed graphics bus that directly connects the graphics card with the main
memory. AGP operates independently and separately with the PCI bus and generally
running at 66MHz which is two times the speed of PCI that runs on 33MHz. AGP 1x do
one transfer per cycle for maximum data transfer 266 MB per second. AGP 2x to double
the data transfer by one cycle is 533 MB per second, while the AGP 4x to four times
the transfer by one cycle is 1.06 GB per second. While speed The maximum data
transfer on the PCI itself is 132 MB per second.
AGPset
AI (Artificial Intelligence)
Develop computer science in order to work and think and take decisions like
humans.
An effect (aliasing) which arise due to image or signal samples performed at the
level is too low. This effect causes the high area of texture (d neat change) in the visible
image as a slow change. When aliasing appears it will be difficult to reproduce the
sample image into the image accurate original.
Alignment
Align
From the word alignment, which orders in a word processing program to flatten
manuscript, whether to the left, right, or center.
Allocate
Instructions to put some computer memory or other units under the control
computer programs.
Alpha Numeric
Mixture of characters and numbers, including letters (AZ; az), punctuation and
some special characters such as @, #, $, *, and so on.
Alias
The second name of a file, usually a second shorter and easier to remember
rather than first names.
ALOHA
Name button on the keyboard located on the right and left of the space key.
Buttons These new functions when pressed in conjunction with other keys. In the
Windows environment, This key together with a particular letter can be used to open
and select the command on the menu quickly.
Part of the CPU that is useful for data processing logic and data requires
calculation. ALU consists of registers to store information.
AM (Amplitude Modulation)
Type of amplitude modulation using the analog signals to distinguish the situation
digital signal.
AMD760
AMD760 chipset is a chipset for the AMD Athlon processor. This chipset consists
of two
ie AMD761 chip controller or bus system known as the Northbridge and AMD 766
peripheral bus controller or the Southbridge. AMD760 chipset provides a new standard
in technology, more powerful memory of PC1600 DDR memory and the DDR PC 2100
allows high performance multitasking and multimedia applications intensively. Chipset
AMD760 support to FSB26 MHz and 266MHz DDR memory and AGP 4x.
AMD760MP
AMD made chipsets for use with the Athlon MP processor. Consists of two chips
ie AMD762 chip bus system controller (Northbridge) and the peripheral bus controller
AMD766
(Southbridge). AMD760MP chipset using DDR memory technology and enables
maximum performance on the x86 processor technology in multitasking and multimedia
applications. Chipset This AMD760MP able to support two Athlon MP processors, 266
MHz FSB, DDR memory PC2100, and supports AGP 4x and PCI 33MHz/32-bit and 64-
bit.
AMD761
System bus controller chip, known also as the handle element Northbridge critical
systems that affect overall system performance while also overcoming transfer data to
the processor. AMD761 main feature is the ability of the system controller to Athlon
processor controlling the bus 266MHz, 266MHz DDR memory, 4x AGP, and PCI bus
33MHz/32-bit.
AMD762
CHIP bus system controller also known as the Northbridge to support AMD Athlon
MP processors, PC2100 DDR memory up to 4GB maximum capacity, and graphics
card AGP 4x. All of these features are designed to provide high performance server
entry-level class or workstation-class dual-processor range to high-end. AMD762 has a
feature supports FSB 266MHz, designed to provide increased data transfer 33 percent
when compared with the usual AMD Athlon processors. Also this chip is also capable of
handling DDR memory that supports Error Correction Control (ECC) and PCI
33MHz/32-bit and 64-bit.
AMI BIOS
A PC BIOS American Megatrends Production, Inc.. AMI BIOS has been widely
used on the PC desktop.
Amorphous
Nature can not reflect light. For example, a rewritable optical disk said amorphous
state has a spot laser beam that can not be reflected through the lens.
Analog
Analog Signal
Analog Computer
Anchor
One of the logical operators of Boolean algebra to compare whether two variables
will result in true value (1) or false (0) with the following rules:
0 AND 0 0
0 AND 1 0
1 AND 0 0
1 AND 1 1
AND Gate
Anonymous FTP
Facilities transferring files between Internet sites that allow Internet users access
the data files or documents from anywhere in the Internet without having to enter
UserID
and password.
Institutions that determine standards for data processing, provide standard rules in
use the code and the language of a programming language.
Answer Back
Anti Aliasing
A technique used to eliminate the effect of the jaggies in the image produced. By
using this anti-aliasing resulting picture will look more smooth, especially on the lines
that are not horizontal or vertical (diagonal).
Anti Virus
Tailored programs to detect files in a drive if affected virus or not. This program
and eliminate the virus.
Amplitude
Aperture grill
APPC
Append
Application
Application Layers
The top layer of the OSI model protocol (Op en System Interconnections). Duty
arrange everything related to the exchange of data / information between users,
software applications and equipment in a system.
Application Program
Computer program made to do or solve problems specific, such as payroll
programs.
Application Interface
A set of software that allows programmers to enter a system and use services
provided in a network.
Application Package
Arbitrators
Computer unit in charge of determining the priority number of all input devices unit
connected to a storage function or other functions.
Arcade
Archie
Service network that is used to place files that can be accessed by public via
anonymous FTP.
Architecture
Archive
Used to make copies of a backup file in order to protect the copy original from
damage.
Area
Arguments
Internet protocol address of the Internet to put the hardware address on the LAN
continuously.
ARPANET
Array
Ascending
The sequence data from the smallest to the largest, for example from AZ; from 0-
9.
Sort Ascending
Sequencing techniques with how to structure the data or information from the
lowest to the value highest.
Standard letters and punctuation marks for the computer. ASCII is a code in the
form of 8-bit characters figure 1 and 0 to represent the character alpha-numeric
characters.
A business that offers access to software applications to individual users or offices
via the Internet facilities. Basically, ASP is a Dent independent Software Vendor (ISV) or
ISP who use the Internet as a means of Submitting the application, so the program can
function.
Assembler
Program that serves to convert the program into the Assembly language machine
language.
Assembly
Assembly Language
Low-level programming language that is more like machine language in the form
is easy to remember.
Associative Memory
Engineering data call. Data is not retrieved from memory based on the address,
but based on existing patterns in data.
Asynchronous
Method of data transmission of data transmitted by one character per unit time.
Synchronization will be done every time the character is received with the help of the
early bits and bit the end.
One of the secondary station operating model supported by the BOP (Bit Oriented
Protocol). This model allows the secondary station transmitting first start without waiting
command from the primary station.
AT (Advanced Technology)
Type of company issued computers after IBM XT models. AT speed more higher
than the XT.
Standard interface for hard drives and use the cable 40-pin connector. Various
ATA is ATA-2, ATA-3, Ultra-ATA, ATA/66, ATA/100 and ATA/133 most recently.
ATCON
Tools used in the Novell Netware environment. This tool will provide information
the stack routers Appletalk and Appletalk networking information on the Internet.
Attachment
Facility on an e-mail programs both computers and webmail programs that can
used to send files, or images, which in ikutsertakan on e-mail are in send.
Attach
Command to track and put the program into memory. Network computer means
for entering commands in a network server.
Attributes
Audit Trail
The concept of gradual examination of the way through past activities that effect
on an estimate.
Auto Answer
Auto Call
AutoCAD
AutoCAD MAP
One of the Autodesk software for mapping. Excess AutoCAD MAP 2000 is able to
perform operations with several projects at once (multip le document interface, MDI)
and at the same time still be opening another project with a single data source.
AutoCorrect
Capability word processing programs (word processor) to correct the wrong word
type with the correct words but must be inserted before the words into List of the
available.
Auto Dial
Computer system’s ability to direct dial telephone and modem destination will be
working when it is connected.
Autoexec.bat
Autoexec stands for Automatic Execution, which is a batch file created to perform
specific tasks a user automatically when the computer is turned on.
Auto Focus
A tool that can set the camera to automatically adjust to focus on all something
that appeared in the window of sight, so the photographer does not need to adjust the
lens manually.
Auto Indexing
Determining keywords is done by the computer automatically as an index inputs a
document.
Auto Login
A facility in a network environment governing the business of a user login (user).
Autonomous System
Automatic Programming
The ability of equipment to receive and send data without human assistance.
Automatic Stop
Autoplotter
Auto Shapes
Auto Text
Word processing program’s ability to enter a key word in keyboard so that a long
sentence can be written simply by pressing a button serves as the short cut.
Auxiliary Memory
Available on Disk
Stating the number of areas on the disk is still empty and ready for occupancy
data.
Display an object in black and white only. In Lotus 123, this command color
graphics will return to black and white graphics again.
Backbone
Backbone Network
Background
Color or image that is structured to create a background effect in the page Web.
Back Orifice
Program developed and released by The Cult of the Dead Cow (CDC). Back
Orifice is a remote tool admnistration, but its presence can be misused for things
negative. If dimanpaatkan a hacker, so he could take over control entirely on the
victim’s computer. In addition, back orifice can also be used to steal data and e-mail
from the victim’s computer. This program is an extensible programs that can be
changed and developed all the time.
Backing Storage
Tools reservoir data in a computer simpannya ability greater than The main data
storage, but has a lower speed.
Backoff delay
The length of waiting time of a medium control acces to a terminal in the network
form of CSMA / CD, before sending back a fr ame after the a collision.
Backplane
Backslash
Symbolic keys ‘\’; this button is often used when working with directories.
Backspace
Symbolic”keyboard button located above the Enter key. Work delete one
character before the cursor at the moment.
Backup
A copy of the program file or data files created to provide assurance that the data
There is not lost or deleted if there is something in the original file.
Backward Supervision
A list of disk block containing the location of the damaged disk and is not can be
used to store data. Sometimes called the media line detect.
Balance Error
Voltage error caused by the analog sum of the computer analog and directly
proportional to the mistake.
Balanced Error
Balanced Transmission
Transmission method by sending signals into the form of electrical current that will
sent through a conductor. The signal will then be returned through conductor different.
Bandwidth
Bang path
A set of names of tools used to direct e-mail from the user to other users.
Banner
Parts that are not moving in Web documents, even if we roll scrollbar until the end
of the document. Currently only Internet Explorer that supports the banner command.
Bar Code
Tool capable of reading the blocks of bar codes into alphanumeric form.
Program that translates a BASIC program ends. BAS into a file. EXE that can be
executed.
BASE
The basis of the number system, is the number of digits that can be displayed in a
system. Basic example of the decimal system is ten, the basis of the binary system is
two, the basic octal system is eight, the basis of the system is sixteen hexadecimal, and
so on.
Base Band
Such a canal that uses communication channels that carry only one signal at one
time. For example the use of telephone lines as a means of sending data between
computers which is located far from each other.
The shell used in Unix and Linux klonenya like. Bash is a shell that used as the
default shell by RedHat Linux. This is marked by the symbolic link in sh directory used
to run the bash shell. http://www.gnu.org/manual/bash-2.02/
D
DBase
Software made by Ashton Tate. With DBase, users can build, access,
process and create reports from the files homemade.
DBMS (DataBase Management System)
Extend the technique of hard disk space starting introduced in MS-DOS version 6,
and
versions above.
DCCU (Data Communication Controller Unit)
Tools that perform the conversion and encoding signals and connect to the DTE
a network.
DCE (Distributed Computing Environment)
Op-made technology en Softw are Foundation to support the spread of the use of
computer.
DDBMS (Distributed DataBase Management System)
Programming language that can be used to determine the level of the database.
E
EFT (Electronic Funds Transfer)
One of the standard monitor resolution. EGA could display 16 colors in the model
graph, the equivalent in the CGA monitor. EGA monitor with a card capable of
displaying 16 colors
in the form of text (80 x 25 characters or 40 x 25 characters), 16 colors in the form of
low resolution and
4 colors in high resolution graphics display 640 x 350 dots. The development of this
type of EGA
of them is with ATI Technologies Inc. named EGA WONDER card, can
display 132 x 25 characters. EGA monitor types are still using the same monitor
connector
with monitor type and Monochrome CGA. Everex cards issued EPGA (Enhanced
Proffesional Graphics Adap too), capable of displaying 649 x 480 dot (dot) with 256
colors, from
Basic color combinations 4096 (llette pa). EPGA and PEGA called (Proffesi onal
Enhanced
Graphics Adap too), or PGA (Proffesional Grap hics Adapter), displays a text screen
132 x
43 characters in multi-frequency or jubilee sync, and flexibility that can use the monitor
and enhanced monochrome monitor. This monitor uses 9-pin connector consisting
of 2 lines.
Egoless Programming
The agreement between the programmer to read and give each other criticism of
the
artificial programs other programmers. The programs are regarded as artificial
strangers that criticism is not based on sentiments expressed privately.
EIA (Electronics Industry Association)
Command is given to the printer to put the paper in the beginning of the page. If
currently the paper's position in the middle, then the rest of the page will be ignored and
put the paper
at the beginning of the next page.
Electric Delay Line
Eld sebuahfi length, the number of characters or bits that can be loaded in
sebuahfi Eld.
Field Programmable Logic Array
Fifth generation computer, the computer output of the nineties until now.
The fifth-generation computers have the ability to process other things in addition to
data processing,
eg for artificial intelligence (artificial intelligence).
File
The file consists of a collection of records that are related. Each record
have adjusted the number dalamfile position.
File Form
Binary files containing graphic images of the form, formed when the programmers
develop
program with a visual programming language. All the changes that occur with
rm will be saved tampilanfo this dalamfile.
File Header
Some characters are located at the beginning of a file stored on the disk.
This header file has a relationship with the name and the sifatfi le.
floppy
disk or hard drive. IDE connector on a motherboard usually consists of two, one is
primary IDE and the other is the secondary IDE. Primary IDE connector connects
motherboard with the primary master drive and the secondary master device. While
connector
secondary IDE usually connected devices to access the slave as CD-ROMs and
slave hard drive.
G
Gathering Data
Operations that form a single record from the collection of a number of fields in the
memory location
main.
GB
Derived from the word GigaByte, a unit of measurement on a computer hard disk
capacity
with 1 GB = 1024 MB.
GBT (Underground)
Term given the users the facility to refer to IRC users who seem to
silent, but was talking to someone else secretly.
GCR (Group coded recording)
Part of the general format of the data packet consists of 4 bits (ie bits 5, 6, 7, and
8) and
shows the form of packet headers. Bits 5 to 6 shows the sequence numbering is used,
bit 7
serves to deliver the confirmation procedure in the packet data and 8 bits serve to
distinguish
data packet.
Generalized Routine
Standard HTML format developed by the W3C (World Wide Web Consortium)
A flat ring found on the floppy disk hole size of 5.25 "and serves to
increase the strength of floppy disk.
Hue
The term which states set the color spectrum. Hue is the component that
determine what colors are used. In the gradient, when used color models
using hue as one of the components will be made a rainbow effect.
Hybrid Computer
A digital computer which receives the analog signal, convert it into digital data
and processing.
HydraVision
ATI Technology to be able to show two displays from one graphics card. This
feature
allows two displays can be raised with the resolution and refresh rate are different.
I
Icon
A small symbol is an image that appears on the computer screen. Usually used
to represent documents or other programs and disk drives.
ICQ
From the word "I Seek You". Applications to chat with the exchange of files and
sending
SMS.
IDE (Integrated Drive Electronics)
A type of functioning hardware interface for connecting hard disks, CD-ROM
and tape drives on a PC. IDE is very popular and widely used because it provides a way
Java applet
A Java program is downloaded from the server and the streets through the
browser program.
Java Virtual Machine in the browser dibundle and giving instructions.
JavaScript
Scripting language interpreter to create active content in Web pages.
JEDEC (Joint Electronic Device Engineering Council)
International agencies that set the standard IC (Integrated Circuit).
JPEG (Joint Photographic Expert Group)
File format that contains data of the image. JPEG images are lossy compressed,
thus reduced the image quality for small file sizes. Nevertheless
differences in quality will not be visible to certain images. JPEG usually
used for the pictures that are not clearly limit the color, such as photographs, paintings,
etc..
Junk e-mail
E-mail is not useful and would like removed. Kaleida
Joint venture between Apple and IBM are developing multimedia software ScriptX.
K
Kerberos
Encryption-based security systems at MIT made to prevent abuses in
password and login controls. This system provides client services to determine the
allowed to access specific servers, and authentication services between the password
and
login client and server.
Kbit / s (kilobits per Second)
Size for data transfer or modem speed. Most modern computers to
download information at speeds of 56 Kbit / s. Used to express the speed
transfer data across a network. One kilobits equal to 1000 bits.
Kbps
Kilobytes per second.
KHz
Frequency unit equal to 1000 cycles per second.
Power Connector
Connecting pin motherboard with power supply in case of a computer.
At AT type motherboards, chassis is needed is the type of AT as well. AT Power
connector type
consists of two parts, where the two wires from the power supply will be lodged. In ATX
type, cable
power supply integrated in one complete header, so stay in menancapkannya
motherboard. This cable consists of two columns in accordance with the pin on the
motherboard which consists of
two pin array as well. There are some motherboards that provide two types of power
connectors, AT and
ATX. Most new motherboards are ATX type.
L
L1 Cache
A small number of SRAM memory used as cache or a single integrated
packages in the same module on the processor. L1 cache is locked at the same speed
processor. Useful to store temporary instructions and data, and ensure
that the processor has a stable supply of data to be processed in memory while taking
and
storing new data.
L2 Cache
Generally consists of SRAM chips near the processor, however, latest generation
Athlon processors have L2-Cache on chip. Its function is similar to the L1 cache, L2
Cache is also known as secondary cache, a memory that has a sequence of velocity
The second (type of memory is the fastest L1 Cache) which provided for the
microprocessor.
LAN
A network built at a location such as at home or building office. Can be interpreted
also as a computer communications system limited distance no more than a few miles
and using high-speed connection between 2 to 100 Mbps.
Land Attack
Attacks to the system by using a program called "land". If
attacks directed at Windows systems, the system will be protected not hang
(and get out the blue screen). Similarly, if the attack is directed to the old version of the
UNIX system,
then the system will hang. If the attack is directed to the Windows NT system, the
system will be busy
with the CPU usage reaches 100% for some time so the system looks like a traffic jam.
Land program intended to attack the server by sending fake packets as if
derived from the destination server. In other words, the source and destination of the
packet is made as
will come from the destination server. As a result the server that was attacked was
confused.
Layer
Layers (the concept) in networking. Various communication models such as OSI
and TCP / IP
composed of several layers that make up the protocol.
LCD (Liquid Crystal Display)
Type of display screen that uses a liquid compound that has the structure
polar molecules, sandwiched between two transparent electrodes. When the electric
field is given, the molecule
adjust its position on the field, forming a crystalline structure of light mempolarisasi
whereby.
M
Mailing list
A discussion forum on the Internet by using e-mail. One message from a
members will be accepted by all members.
Mail Notifier
Features in the mailer that always tells us if there is an e-mail arrived.
Man Command
In a UNIX command that allows to obtain information about the command -
commands in the UNIX operating system (man stands for manual), and the command is
R
Radio Button
Used in the form in order to select only one option from a list of exclusive
choice.
RAMDAC (Random Access Memory Digital to Analog Converter)
VGA controller chip set color palette and converts data from memory to the signal
analog on the monitor.
RDRAM
A dynamic chip technology from RAMBUS, Inc.. This product has a special license
to
semiconductor technology that produces chips. In the basic chip introduced in 1995 with
The task of sendmail is to receive e-mails from outside and from the local system and
send it to the destination (such as adding e-mail to the mailbox of the user or
send it to the destination server.
Server
1. A computer on the Internet or on any other network that stores files and
make the file available to be taken if necessary.
2. A computer network applications are used to serve many users
in one network.
Setting
A program that makes up a system or a software application.
Setup
A program that prepares a software application that can run on a
computer. Setup creates a folder with the default name on the hard drive and copying
files
files from the CD-ROM or floppy disk.
Setup Wizard
Part of the setup program that helps the user to perform the installation process
correctly.
T
Title
HTML tags are used to give the title of each HTML document.
Transmision Line
Transmission line, the physical connection from the computer through the Internet
like a telephone line or IT.
Tray Icon
In the Windows operating system, tray icon on the toolbar is located next to the
clock
can indicate the status of programs running on the computer.
Trojan Horse
An application designed to perform a fraud but veiled
with kindness. Usually the method is to put (attach a file by e -
mail) a specific file that contains a Trojan Horse but with attractive packaging. If
Trojan Horse successfully infect it has a hacker can get unlimited access
to the victim's computer. Three types of Trojan horse is a popular use Bac Orifice,
Netbus,
and SubSeven.
True Color
Real colors with 24 bits and 16.7 million color variations. The term used true color
for Macintosh systems (for the PC is not often used) in the image of the property
mentioned
display. UMSDOS
This support is needed if you want to run Linux on a DOS partition but it seems
RedHat Linux will not be able to run on a file system UMSDOS.
U
Unified Driver Architecture (UDA)
UDA ensure complete compatibility with software drivers. UDA facilitate
upgrade to the latest NVIDIA product because all NVIDIA products work made with
software
The same driver.
UNIX
The operating system used on both PC and Mainframe. Many computers and
servers are connected to the Internet using UNIX.
Upload
The process of transferring information from one computer to another computer /
server over the Internet.
URL (Uniform Resource Locator)
An address indicating the route to a file on the Web or on the Internet facility
other. Typing the URL in your browser to access a Web site.
USB (Universal Serial Bus)
Socket contained in all new models for PC connection USB devices.
USB supports easy installation with Plug and Play system, and gradually
replaces the serial and parallel ports of the old. USB devices include scanners, modems
and
printer. V.32
Protocol used to transfer data modem with a maximum speed
9600 bps.
V
V.32bis
Protocol used to transfer data modem with a maximum speed
28,800 bps.
V.34
Protocol used to transfer data modem with a maximum speed
28,800 bps.
V.42
Standard ITU (1989) to check the occurrence of errors (errors) in the modem
using LAP-M as the main protocol and MNP Classes 2 through a protocol
alternatives.
V.42bis
Modem protocol that is used to compress the data up to a maximum of four times
smaller.
V.90
Standard ITU (1988) for a modem that works on the downstream speed of 56
Kbps and
upstream speed of 33.6 Kbps.
W
WinWAIS
Windows-based program that allows use WAIS to track information
on the Internet.
Web Hosting
Provision of space to store the web pages by the owner of the computer / server,
which
can be accessed 24 hours via the Internet.
Web Servers
Hardware and software that is used to store and send
HTML document for use in World Wide Web.
Web Site
A collection of HTML documents in a personal or corporate Web server. A server
Web can contain more than one site.
Webcams
Video camera designed to connect to a PC. The camera can be used to
record a video clip that can be sent via e-mail or to transmit images
directly on the Internet for video conferencing.
Whois
Free Internet program that is used to provide or compile a database
from the Internet domain name and artities someone else.
X
X2
The technology used by companies to implement a modem USRobotics
56 k.
X.25
A protocol that determines the exchange package. X.25 is the CCITT standard
defines the communication protocol to access the packet switched network. This
protocol does not
so important, because through X.25 seen that the TCP / IP is much better.
X.75
How to connect together X.25 network.
Xabre
SiS graphics chipset that supports full AGP 8x and DirectX. This chip is
The first graphics chip that supports both features.
Z
Z-Buffer
Area of graphics memory used to store the Z or depth information
or object drawn. Z-buffer value of a pixel is used to determine whether he
located behind or in front of the other pixels. Z calculations prevent background objects
in overwrite objects that are in front of the frame buffer.
Zip
ZIP is a common compression format used in the MS-DOS and Windows.
Some files can be merged into one and reduced in size in a single ZIP file
(zip file). There are several programs to manipulate this ZIP file, among others:
PKZip and PKUNZIP (shareware for MS-DOS)
WinZip (for Windows 95)
zip and unzip (free for UNIX)
ZIP socket (Zero Insertion Force socket)
A type of socket is designed to be easy to enter the PGA chip.