You are on page 1of 7

Blu-ray

Blu-ray is an optical disc format such as CD and DVD. It was developed for recording and playing back high-definition (HD) video and for storing large amounts of data. While a CD can hold 700 MB of data and a basic DVD can hold 4.7 GB of data, a single Blu-ray disc can hold up to 25 GB of data. Even a double sided, dual layer DVD (which are not common) can only hold 17 GB of data. Dual-layer Blu-ray discs will be able to store 50 GB of data. That is equivalent to 4 hours of HDTV. Blu-ray discs can hold more information than other optical media because of the blue lasers the drives use. The laser is actually blue-violet, but "Blu-ray" rolls off the tounge a little easier than "Blu-violet-ray." The blue-violet laser has a shorter wavelength than the red lasers used for CDs and DVDs (405nm compared to 650nm). This allows the laser to focus on a smaller area, which makes it possible to cram significantly more data on a disc the same size as a CD or DVD. Proponents of the Blu-ray format say they expect Blu-ray devices to replace VCRs (thank goodness) and DVD recorders as more people make the transition to HDTV. For the latest Blu-ray news, check out Blu-ray.com.

Cluster
In the computer world, a cluster can refer to two different things: 1) A group of sectors on a disk. While a sector is the smallest unit that can be accessed on your hard disk, a cluster is a slightly larger unit that is used to organize and identify files on the disk. Most files take up several clusters of disk space. Each cluster has a unique ID, which enables the hard drive to locate all the clusters on the disk. After reading and writing many files to a disk, some clusters may remain labeled as being used even though they do not contain any data. These are called "lost clusters" and can be fixed using ScanDisk on Windows or the Disk Utility program on the Mac. This is why running a disk utility or defragmentation program may free up space on your hard disk. 2) A group of connected computers. A cluster can also refer to several machines grouped together, all performing a similar function. For example, a cluster may consist of eight PCs, all connected via high-speed Ethernet, processing scientific data. This type of setup is often referred to as "parallel computing," since all the computers in the cluster are acting as one machine. Clusters are typically used for high-end processing, such as performing scientific calculations or decrypting algorithms.

Antivirus
Antivirus software is a type of utility used for scanning and removing viruses from your computer. While many types of antivirus (or "anti-virus") programs exist, their primary purpose is to protect computers from viruses and remove any viruses that are found. Most antivirus programs include both automatic and manual scanning capabilities. The automatic scan may check files that are downloaded from the Internet, discs that

are inserted into the computer, and files that are created by software installers. The automatic scan may also scan the entire hard drive on a regular basis. The manual scan option allows you to scan individual files or your entire system whenever you feel it is necessary. Since new viruses are constantly being created by computer hackers, antivirus programs must keep an updated database of virus types. This database includes a list of "virus definitions" that the antivirus software references when scanning files. Since new viruses are frequently distributed, it is important to keep your software's virus database up-to-date. Fortunately, most antivirus programs automatically update the virus database on a regular basis. While antivirus software is primarily designed to protect computers against viruses, many antivirus programs now protect against other types of malware, such as spyware, adware, and rootkits as well. Antivirus software may also be bundled with firewall features, which helps prevent unauthorized access to your computer. Utilities that include both antivirus and firewall capabilities are typically branded "Internet Security" software or something similar. While antivirus programs are available for Windows, Macintosh, and Unix platforms, most antivirus software is sold for Windows systems. This is because most viruses are targeted towards Windows computers and therefore virus protection is especially important for Windows users. If you are a Windows user, it is smart to have at least one antivirus program installed on your computer. Examples of common antivirus programs include Norton Antivirus, Kaspersky Anti-Virus, and ZoneAlarm Antivirus.

C/C++
C is a high-level programming language that was developed in the mid-1970s. It was originally used for writing Unix programs, but is now used to write applications for nearly every available platform. Compared to most previous languages, C is easier to read, more flexible (can be used for a wide variety of purposes), and more efficient at using memory. C++, pronounced "C plus plus," is a programming language that was built off the C language. The syntax of C++ is nearly identical to C, but it has object-oriented features, which allow the programmer to create objects within the code. This makes programming easier, more efficient, and some would even say, more fun. Because of the power and flexibility of the language, most software programs today are written in C++.

Data Management
Data management is a general term that covers are broad range of data applications. It may refer to basic data management concepts or to specific technologies. Some notable applications include data design, data storage, and data security. Data design, or data architecture, refers to the way data is structured. For example, when creating a file format for an application, the developer must decide how to organize the data in the file. For some applications, it may make sense to store data in

a text format, while other programs may benefit from a binary file format. Regardless of what format the developer uses, the data must be organized within the file in a structure that can be recognized by the associated program. Data storage refers to the many different ways of storing data. This includes hard drives, flash memory, optical media, and temporary RAM storage. When selecting an appropriate data storage medium, concepts such as data access and data integrity are important to consider. For example, data that is accessed and modified on a regular basis should be stored on a hard drive or flash media. This is because these types of media provide quick access and allow the data to be moved or changed. Archived data, on the other hand, may be stored on optical media, such as CDs and DVDs, since the data does not need to be changed. Optical discs also maintain data integrity longer than hard drives, which makes them a good choice for archival purposes. Data security involves protecting computer data. Many individuals and businesses store valuable data on computer systems. If you've ever felt like your life is stored on your computer, you understand how important data can be. Therefore, it is wise to take steps to protect the privacy and integrity of your data. Some steps include installing a firewall to prevent unauthorized access to your computer and encrypting personal data that is submitted online or shared with other users. It is also important to backup your data so that you will be able to recover your files in case your primary storage device fails.

Data Type
A data type is a type of data. Of course, that is rather circular definition, and also not very helpful. Therefore, a better definition of a data type is a data storage format that can contain a specific type or range of values. When computer programs store data in variables, each variable must be assigned a specific data type. Some common data types include integers, floating point numbers, characters, strings, and arrays. They may also be more specific types, such as dates, timestamps, boolean values, and varchar (variable character) formats. Some programming languages require the programmer to define the data type of a variable before assigning it a value. Other languages can automatically assign a variable's data type when the initial data is entered into the variable. For example, if the variable "var1" is created with the value "1.25," the variable would be created as a floating point data type. If the variable is set to "Hello world!," the variable would be assigned a string data type. Most programming languages allow each variable to store a single data type. Therefore, if the variable's data type has already been set to an integer, assigning string data to the variable may cause the data to be converted to an integer format. Data types are also used by database applications. The fields within a database often require a specific type of data to be input. For example, a company's record for an employee may use a string data type for the employee's first and last name. The employee's date of hire would be stored in a date format, while his or her salary may be stored as an integer. By keeping the data types uniform across multiple records, database applications can easily search, sort, and compare fields in different records.

Database
A database is a data structure that stores organized information. Most databases contain multiple tables, which may each include several different fields. For example, a company database may include tables for products, employees, and financial records. Each of these tables would have different fields that are relevant to the information stored in the table. Nearly all e-commerce sites uses databases to store product inventory and customer information. These sites use a database management system (or DBMS), such as Microsoft Access, FileMaker Pro, or MySQL as the "back end" to the website. By storing website data in a database, the data can be easily searched, sorted, and updated. This flexibility is important for e-commerce sites and other types of dynamic websites. Early databases were relatively "flat," which means they were limited to simple rows and columns, like a spreadsheet. (See also "flat file database"). However, today's relational databases allow users to access, update, and search information based on the relationship of data stored in different tables. Relational databases can also run queries that involve multiple databases. While early databases could only store text or numeric data, modern databases also let users store other data types such as sound clips, pictures, and videos.

Java
While most of the world uses "Java" as another term for coffee, the computer science world uses it to refer to a programming language developed by Sun Microsystems. The syntax of Java is much like that of C/C++, but it is object-oriented and structured around "classes" instead of functions. Java can also be used for programming applets - small programs that can be embedded in Web sites. The language is becoming increasingly popular among both Web and software developers since it is efficient and easy-to-use. Java is a great programming language, but like Reading Rainbow says, you don't have to take my word for it. Sun Micorsystems describes Java as a "simple, object-oriented, distributed, interpreted, robust, secure, architecture-neutral, portable, highperformance, multithreaded, dynamic, buzzword-compliant, general-purpose programming language." And it removes stains like magic.

Malware
Short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system. In Spanish, "mal" is a prefix that means "bad," making the term "badware," which is a good way to remember it (even if you're not Spanish). Common examples of malware include viruses, worms, trojan horses, and spyware. Viruses, for example, can cause havoc on a computer's hard drive by deleting files or directory information. Spyware can gather data from a user's system without the user

knowing it. This can include anything from the Web pages a user visits to personal information, such as credit card numbers. It is unfortunate that there are software programmers out there with malicious intent, but it is good to be aware of the fact. You can install anti-virus and anti-spyware utilities on your computer that will seek and destroy the malicious programs they find on your computer. So join the fight against badware and install some protective utilities on your hard drive!

Software
Computer software is a general term that describes computer programs. Related terms such as software programs, applications, scripts, and instruction sets all fall under the category of computer software. Therefore, installing new programs or applications on your computer is synonymous with installing new software on your computer. Software can be difficult to describe because it is "virtual," or not physical like computer hardware. Instead, software consists of lines of code written by computer programmers that have been compiled into a computer program. Software programs are stored as binary data that is copied to a computer's hard drive, when it is installed. Since software is virtual and does not take up any physical space, it is much easier (and often cheaper) to upgrade than computer hardware. While at its most basic level, software consists of binary data, CD-ROMs, DVDs, and other types of media that are used to distribute software can also be called software. Therefore, when you buy a software program, it often comes on a disc, which is a physical means of storing the software.

Spyware
As the name implies, this is software that "spies" on your computer. Nobody likes to be spied on, and your computer doesn't like it either. Spyware can capture information like Web browsing habits, e-mail messages, usernames and passwords, and credit card information. If left unchecked, the software can transmit this data to another person's computer over the Internet. So how does spyware get on your computer? Just like viruses, spyware can be installed when you open an e-mail attachment containing the malicious software. It can also be installed when you install another program that has a spyware installer attached to it. Because of the insidious nature of spyware, most people don't even know when spyware is on their computer. Fortunately, you can purchase anti-spyware utilities that will search for spyware on your computer and stomp the unwanted software out of your system. A good way to prevent spyware from infecting your computer is to install a security program that lets you know when any program is being installed, so that you can choose to authorize or stop the installation.

CRM (Customer Relationship Management)


Stands for "Customer Relationship Management." This is a business term that started somewhere in the deep abyss of the IT (Information Technology) world. CRM refers

to solutions and strategies for managing businesses' relationships with customers. (I suppose that's why they call it customer relationship management). With the advent of Web retailing, companies have found it hard to develop relationships with customers since the e-commerce interface is so impersonal. After all, don't you miss the firm handshake and sparkling smile of the salesperson who just sold you the most expensive computer system in the store? Well, whether or not you miss the personal experience of the retail store, the goal of CRM is to give you that feeling when you buy products over the Internet. When it comes to CRM, customer service is the number one priority. Yes, all companies seem to make that claim, but when online businesses create CRM models, it really is the case.

E-commerce
E-commerce (electronic-commerce) refers to business over the Internet. Web sites such as Amazon.com, Buy.com, and eBay are all e-commerce sites. The two major forms of e-commerce are Business-to-Consumer (B2C) and Business-to-Business (B2B). While companies like Amazon.com cater mostly to consumers, other companies provide goods and services exclusively to other businesses. The terms "ebusiness" and "e-tailing" are often used synonymously with e-commerce. They refer to the same idea; they are just used to confuse people trying to learn computer terms.

JavaScript
Like Java, this is a programming lanuguage designed by Sun Microsystems, in conjuction with Netscape, that can be integrated into standard HTML pages. While JavaScript is based on the Java syntax, it is a scripting language, and therefore cannot be used to create stand-alone programs. Instead, it is used mainly to create dynamic, interactive Web pages. For example, Web developers can use JavaScript to validate form input, create image rollovers, and to open those annoying pop-up windows. Like so many other things, we have to take the good with the bad.

Ping
This term refers to a golf equipment brand, as well as the sound made by striking your glass with a spoon at the dinner table. However, it also has a computer-related meaning. A ping is a test to see if a system on the Internet is working. "Pinging" a server tests and records the response time of the server. Pinging multiple computers can be helpful in finding Internet bottlenecks, so that data transfer paths can be rerouted a more efficient way. A good way to make sure you do not get disconnected from your dial-up ISP for being idle is to send a ping every 5 minutes or so. There are a number of shareware Ping programs that will do this for you.

Trojan Horse
In Greek mythology, there is a story about the Trojan War. This war lasted many years, as the Greeks could not penetrate the heavily barricaded city of Troy. So one day, a few of the Greek soldiers brought the people of Troy a large wooden horse, which they accepted as a peace offering. The horse was moved inside the city walls, where it sat until the night. After the people of the city had fallen asleep, Greek soldiers jumped out of the wooden horse, opened the gates to let their fellow soldiers

in,

and

took

over

the

city.

So what is the moral of this story? Mainly, beware of Trojan horses. But how does that relate to computers? That's a good question. In the computing world, Trojan horses are more than just a myth. They really exist and can cause damage to your computer. Trojan horses are software programs that masquerade as regular programs, such as games, disk utilities, and even antivirus programs. But if they are run, these programs can do malicious things to your computer. For example, a Trojan horse might appear to be a computer game, but once you double-click it, the program starts writing over certain parts of your hard drive, corrupting your data. While this is certainly something you want to avoid, it is good to know that these malicious programs are only dangerous if they are given a chance to run. Also, most antivirus programs can catch Trojan horses when scanning for viruses. Unlike viruses, however, Trojan horses don't replicate themselves. Though it is possible for a Trojan horse to be attached to a virus file that spreads to multiple computers. So as a general rule, don't open a program unless you know it is legitimate. This applies especially to e-mail attachments that are executable files. Even if you are pretty sure the attachment is OK, it is still a good idea to run it through your virus scan program (with the latest virus definitions) just to be safe. Remember what happened to the people of Troy -- don't let a Trojan horse catch you off guard.

You might also like