Теми рефератів
> Реферати > Курсові роботи > Звіти з практики > Курсові проекти > Питання та відповіді > Ессе > Доклади > Учбові матеріали > Контрольні роботи > Методички > Лекції > Твори > Підручники > Статті Контакти
Реферати, твори, дипломи, практика » Статьи » The general knowledge of neologisms

Реферат The general knowledge of neologisms





anding outside on a smoking break (comp) Smoke + text-delivering video programming aimed at an extremely small audience (comp) Sliver + castattack-A series of minor computer crimes - slices of a large crime - that are different to detect and trace (wc + nm) - The informal, decentralized system of transmitting texts, particularly jokes, over the Internet (nm + comp) jack - To include in a Web page popular, but superfluous, search terms in order to appear in the result when people search for those terms (wc + nm) - Your name garbled in a computer (nm) memo - A memo letter, or e-mail message that contains irrefutable evidence or crime (wc) - The transfer of files form one computer to another using a floppy disk or another removable medium (comp + nm) - the practice of winning in an online auctions (suf + nm) media - Online sites and technologies that enable people to contribute or share content, discuss, rate, or categorize content with each other (wc) - 1) The waves or smell of the sea breaking on the shore or a reef. 2) To search the information on the net. (Conv) Trojan horse - a Trojan horse program sent as an attachment in an e-mail message that has a subject line, body, text, and return address that have been created to fool the recipient into opening the attachment (wc) creep - The gradual encroachment of technology into every aspect of society (comp) techno + creepbutler - A hotel stuff member who performs computer-related tasks and helps guests with software and hardware problems (wc) - a person, who registers one or more Internet names ( comp) - 1) A short unit that contains connected sentences. 2) To chat in the net. p align="justify"> (conv) u - A verbal shortcut for the always awkward www part of a Web address (nm + abr ) - An extremely small. lightweight computer that has many of the functions and features of a full-size personal computer abbreviation From ultra-mobile personal computer. (abr) - A Web page link that appears on almost everyone `s hotlist. (Bd) - Describes a person or technology that uses wireless communications to access the Internet. (Conv) - A person for whom no information appears in an Internet search engine, particularly Google. (Comp + pref) - A person who watches video content online or on a computer, or who combines regular TV watching with related digital content. (Bd) view + user-Podcasting video content. (Bd) video + podcasting-A blog that contains mostly video. (Comp) video + blog-An animated image that appears over a Web page `s regular content and that, when clicked takes the user to an advertisement or promotional site. (Bd) k - shortened form of Windows 2000 (abr + nm) bug - A small, invisible image embedded into HTML-formatted e-mail message or a Web site and uses to track the activity of users who read the message or visit the site. (Wc + nm) - A form of English to some on-line documents and communications. (Aff) cramming - A scam in which a person or small business accepts an offer for a free Web site, to be subsequently charged a monthly free on their phone bill. (Wc) Fi - Wireless fidelity (abr) - A collaborative Web site that allows to add, edit, and delete the site `s content (abr) OK - Describes the lack of serious computer problem resulting from the changeover from 1999-2000 (abr) - A high-school yearbook on CD-ROM (comp) - 2 to the power of 80 (approximately 10 to the power of 24) (bd) computer - A computer containing a hidden software program that enables the machine to be controlled remotely, usually to perform an attack on another computer. (Comp + nm) mail - An incoming e-mail message without any body text or attachments. (Comp) day - Relating to a computer security vulnerability that is explotoited before the vulnerability is known to security experts (wc + nm)


Назад | сторінка 16 з 16





Схожі реферати:

  • Реферат на тему: Сучасні технології Виведення ІНФОРМАЦІЇ. Технології Computer to film, Comp ...
  • Реферат на тему: Intensification of learning a foreign language using computer technology
  • Реферат на тему: Технологія Computer-to-Plate
  • Реферат на тему: Influence of computer games on the psyche of teenager
  • Реферат на тему: Історія розвитку компанії Apple Computer під керівництвом Стівена Джобса