Computer Glossary, Glossary

Computer terminology covers the set of terms and acronyms used in the field of computing and the Internet, facilitating communication and understanding of key concepts in the digital world.

Español | Inglés | Kichwa

T
TEXT FILE:

File that contains only text, where each byte is represented with an ASCII code character and is human-readable.

TOOLBAR:

Set of icons that facilitate the use of frequently used commands in an application.

TAB CHARACTER:

Tab. A special character that can be inserted into a text document. Different programs react to tabs in different ways. Most word processors, for example, move the cursor or insertion point to the next tab position, and many printers do the same by moving the print head to the next position. Some programs, however, ignore tabs.

TAPE:

A metal-coated plastic strip on which data can be encoded. Computer tapes are similar to tapes that are usually used to store music. Data storage on tapes is considerably less than on disks. Tapes also have a large capacity, ranging from a few hundred kilobytes to several gigabytes. Data access on a tape is much slower than on a disk because a tape is a sequential access medium, meaning that to access a particular point on the tape, it is necessary to advance the tape until it is found. In contrast, disks are random access media because a disk can directly access any point without having to go through the preceding ones. Because tapes are so slow, they are used only for backups. They are also used to transport large amounts of data. Tapes come in different sizes and formats.

TWISTED PAIR:

A device similar to a telephone cable which contains a larger number of cables. It is the physical medium through which several computers can be connected.

TERABYTE:

TB. It is equivalent to something more than one thousand billion bytes, specifically 1,024 (2^40) or 1024 Gigabytes. Memories of this capacity have not yet been developed, although storage devices have.

T-1:

A dedicated line capable of transferring data at 1,544,000 bits per-second. Theoretically, a T-1 at its maximum transmission capacity transports a megabyte in less than 10 seconds. However, this is not fast enough for full-screen displays with general motion, for which at least 10,000,000 bits per- second are required. A T-1 is the fastest medium commonly used for connecting to the Internet.

T-3:

It is a connection through a switched line capable of transmitting data at 44,736,000 bits per second. This is more than enough to display full-screen video with continuous motion.

TALK:

Protocol that allows two people connected to terminals located in two different places, to communicate in writing in real time. It is very rudimentary and used for short messages, mostly in Unix/Linux networks. If not necessary, preferably close port 518 of talk.

TAR:

Unix program that concatenates an ‘x’ number of files into a single one, but without compressing it. A tar file has the extension ‘.tar’

TCP/IP:

Transmission Control Protocol / Internet Protocol. Transmission Control Protocol and Internet Protocol. Basic form of communication used by the Internet, which makes it possible for any type of information (messages, graphics or audio) to travel in the form of packets without getting lost and following any possible route.

TDMA:

Time Division Multiple Access. This involves sharing access time among multiple users of a system.

TELECONFERENCE:

This involves holding a TV conference with several people at once. It is accomplished using cameras and video monitors located at the client's premises or at a public conference center. Full-screen, full-motion video at 30 frames per second requires a high-bandwidth network.

TELEMATICS:

Science born from the fusion of telecommunications and computer science, which studies communication between distant computers so that they can exchange information.

TELEPROCESSING:

Operations that are carried out remotely from terminals connected to a central unit (such as bank ATMs)

TELNET:

Internet service with which a user can connect remotely to another computer, as if it were done from a local terminal, usually through port 23. It is preferable to use other more up-to-date programs such as ssh2, since telnet has vulnerabilities. It is a protocol that allows the user to connect to a remote computer and use it as if they were at one of their terminals.

TERMINAL:

Device that is part of a network controlled by a remote central unit. Through the terminal, data is requested and sent to the central computer, which is responsible for processing and storing the information. There are terminals that can also run individual applications without requiring the support of the mainframe.

TEXT DELIMITED BY TAB:

It is a popular way of structuring databases, where tabs (Tab key) are used in text files, to denote when one column ends and another begins.

THREAD:

The conversation thread. A series of related messages in a forum or newsgroup. Gmail uses a similar system to organize emails by subject.

TIFF:

Tagged Image File Format. Tagged Image File Format. Bitmap image storage format that provides high quality. Graphic format used to represent files in order to be viewed by the most common browser programs, so that a specific plugin must be installed in these.

TLD:

Top Level Domain. It refers to the last part of a domain. In www. panamacom.com for example, the “.com” would be the Top Level Domain. There are a large number of TLDs, to mention a few: .biz, .com, .edu, gov, .info, .int, .mil, .net, .org, and country names, such as .pa, .ve, .us, .ca, .jp, .co., etc.

TOKEN PASSING:

Protocol used in Arcnet and Token Ring networks, which is based on a collision-free scheme, since the signal (token) travels from one node or station to the next node. This guarantees that all stations will have the same opportunity to transmit and that only one packet will travel at a time in the network.

TOKEN RING:

Communication protocol for networks in which computers are connected forming a ring.

TÓNER:

A pigment deposit used by laser printers to print text and graphics. It is also used by photocopiers and fax machines.

TOPOLOGY:

It is the scheme of how the computers that make up a network are connected. Three types of topologies predominate: Bus, Star and Ring.

TORRENT:

A torrent is information about a destination file, although it does not contain information about the content of the file. The only information that a torrent contains is the location of different pieces of the destination file. Torrents work by breaking the destination file into small chunks of information, located on an unlimited number of different hosts. By using this method, torrents are able to download large files quickly. When a client (the recipient of the destination file) has initiated a torrent download, the chunks of the destination file that are needed can be easily found, based on the information in the torrent. Once all the chunks are downloaded, the client can assemble them into a usable form. Note: the download must be completed before it can be assembled into a usable form.

TRACK:

Track of a storage device: hard disk, floppy disk...

TRACKBALL:

Type of mouse that is incorporated into some laptops that directs the cursor by means of the movement of a small ball located on the upper part and that can be moved with the hand.

TRANSLATORS:

Programs that translate software written in a high-level language into machine code. Depending on the way they translate, we can distinguish two types of translators: Compilers, which translate the entire program at once and store it on a disk for later execution. They generate an executable copy of the source programs, which are saved with an extension. COMO or . EXE.- Interpreters. They translate the program line by line during its execution as the computer needs it. Since they store no copy in machine language, every time we want to run the program again, we need to use the interpreter again.

TROJAN HORSE:

Computer program that contains the logic necessary for the creator of the program to access the interior of the system into which it is surreptitiously introduced (hence its name).

TROJAN:

Trojan horse; a program that contains harmful code inside seemingly harmless data. It can ruin part of the hard drive or cause data loss.

TSR:

Terminate and Stay Resident program. A program that stays loaded in memory even when it is not running and that is quickly invoked to perform a specific task while another program is operating.

TUNNELING:

Technology that allows a network to send its data through the connections of another network. It works by encapsulating a network protocol within the packets of the second network. It is the act of encapsulating a communication protocol within another through devices and routers.

TTL:

Time To Live. Time to live. This is the amount of time that a packet remains alive on a network. There is a TTL number in each IP packet header. As a packet passes through each router, the router decrements this number by 1. If the packet reaches 0, the routers will not continue to forward the packet.

U
URL ADDRESS:

Uniform Resource Locator. Format of web page addresses.

USB FLASH DRIVE:

Data storage devices known as keychains because they are USB flash drives as small as a regular keychain. Their great advantage is that they do not require special readers. They connect directly to the USB port of the PC and begin reading at high speed. Those that connect to USB 1.0 transmit data at 12 Megabytes per second (Mbps). Those that connect to USB 2.0 at 485 (Mbps). They range from 16 MB to a Gigabyte (GB).

UART:

Universal Asynchronous Receiver / Transmitter. Integrated circuit (chip) that controls the serial communications port. Currently, UART 16450 type is used.

UDP:

User Datagram Protocol. Protocol within TCP/IP that converts data messages into packets for delivery via IP but does not request confirmation of the validity of the packet sent by the sending computer (it does not verify that they have been delivered correctly).

UBE:

Unsolicited Bulk Email. Unsolicited bulk email.

UAL:

Arithmetic and Logic Unit. Performs the logical and arithmetic operations of the programs. It contains an internal clock that marks the rate at which program instructions are executed. The higher its frequency (measured in Megahertz, MHz), the greater the computer's processing speed.

UBUNTU:

Linux distribution on Debian.

UMTS:

Universal Mobile Telecommunication System. Third generation of mobile phones, which will arrive after the imminent appearance of GPRS (the latest evolution of the GSM generation)

UNICAST:

Communication established between a single transmitter and a single receiver in a network.

UNIX:

Multi-user operating system (allows many users to work simultaneously) and multitasking (performs several operations at the same time). It was designed to be small, flexible, and exclusively for programmers.

UPLOAD:

Upload. The process of transferring information from a personal computer to usually a server.

UPS:

Uninterruptible Power Supply Uninterruptible power supply, also known as UPS. It is automatically activated in the event of a power failure, allowing you to continue working on your computer without losing data.

URL:

Uniform ResourceLocation. Uniform Resource Locator. These are Internet addresses that, when referring to web pages, always begin with the letters http//. The URL is made up of: a) The service protocol (http://) b) The name of the computer (www. panamacom.com) c) The directory and the file referred to.

USABILITY:

It refers to the elegance and clarity with which the user interface of a program or website is designed. For example, a usability expert may observe and discuss with users of the program or website to improve unanticipated flaws in the design.

USB:

Universal Serial Bus. Bus that allows the connection of all types of peripherals. Standard used in PCs in order to recognize hardware devices (printer, keyboard, etc.) and start them up quickly and easily. Eliminates the need to install adapters in the PC.

USB 2.0:

Hi-Speed ​​USB, USB 2.0 is an external bus that supports speeds of up to 480 Mbps. USB 2.0 is an extension of USB 1.1. USB 2.0 is fully compatible with USB 1.1 and uses the same cables and connectors.

USB FLASH DRIVE:

A portable flash memory card that can be plugged into a computer's USB port and function as a hard drive with up to 2 GB of capacity. These cards are easy to use and small enough to fit in a pocket and are compatible with any computer with a USB port. While they have less capacity than a removable hard drive, they are more durable because they do not contain any mechanical parts inside.

USENET:

Stands for User Network. Main network of newsgroups available through the Internet. A network system that transmits thousands of newsgroups in the form of global and public chat forums on many different topics. Usenet transmits thousands of newsgroups on all kinds of topics.

USER ID:

User ID. A set of alphanumeric characters that are used to identify a user for access to a system, for example web sites, electronic banking, emails, etc.

UTILITY:

A program that complements or improves the functions of an operating system or a specific program. Among the most famous are Norton utilities.

UTILITARIAN:

Program designed to perform a particular function, highly focused problems or problems related to the management of a computer system.

USER:

A person who has an account on a particular computer through which he or she can access the resources and services offered by a network. This person may be an e-mail user or a terminal-mode server access user. A user who resides on a particular computer has a unique e-mail address.

UUDECODE:

Unix to Unix Decoding. Unix to Unix decoder. Program used to convert ASCII files (text files) sent by email that are more efficient from the point of view of data compression.