Glitch : A glitch is a short-lived fault in a system. It is often used to describe a transient fault that corrects itself, and is therefore difficult to troubleshoot.
Bug: In computer technology, a bug is a coding error in a computer program.
Debugging : The process of finding bugs before program users do is called debugging.
3 Finger Salute : Control-Alt-Delete (often abbreviated to Ctrl+Alt+Del, also known as the "three-finger salute")
GIGO : Garbage In Garbage Out , it means the qualify of Output always depends on quality of Input.
WYSIWYG : What You See Is What You Get , A WYSIWYG application is one that enables you to see on the display screen exactly what will appear when the document is printed.
Email Bomb : In Internet usage, an email bomb is a form of net abuse consisting of sending huge volumes of email to an address in an attempt to overflow the mailbox.
Spoofing : is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.
Phishing
Flooding
Zombie
VIRUS
Spooling
Plug n Play
ASCII
EBCDIC
Compiler
Qurantine
Cold Boot
Warm Boot
Remote Boot
Cloud Computing
Browser
FIFO
LIFO
Hot Plugging
Find answers yourself..Answers will be posted tomorrow..
Good Luck
Best Wishes
Bug: In computer technology, a bug is a coding error in a computer program.
Debugging : The process of finding bugs before program users do is called debugging.
3 Finger Salute : Control-Alt-Delete (often abbreviated to Ctrl+Alt+Del, also known as the "three-finger salute")
GIGO : Garbage In Garbage Out , it means the qualify of Output always depends on quality of Input.
WYSIWYG : What You See Is What You Get , A WYSIWYG application is one that enables you to see on the display screen exactly what will appear when the document is printed.
Email Bomb : In Internet usage, an email bomb is a form of net abuse consisting of sending huge volumes of email to an address in an attempt to overflow the mailbox.
Spoofing : is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.
Phishing
Flooding
Zombie
VIRUS
Spooling
Plug n Play
ASCII
EBCDIC
Compiler
Qurantine
Cold Boot
Warm Boot
Remote Boot
Cloud Computing
Browser
FIFO
LIFO
Hot Plugging
Find answers yourself..Answers will be posted tomorrow..
Good Luck
Best Wishes
No comments:
Post a Comment