Thursday 31 July 2014

List of computer term etymologies:

1)Abend —
Originally from an IBM System/360 error message,BEEB short for "abnormal end".
2)Booting or Bootstaraping —
           Loading or fetching the OS to the memory for processing while the the system starts.
3) Cookie —
A packet of information that travels between a browser and the web server.
4)Daemon —
A process in an operating system that runs in the background.It is falsely considered an acronym for       Disk And Execution Monitor.
5)Ethernet —
A computer networking technology.
6)Finger —
Unix command that provides information about users logged into a system.

7) Gopher —
An early distributed document search and retrieval network protocol on the Internet.
8)Hotmail —
Free email service, now part of MSN. The idea of accessing email via the web from a  computer anywhere in the world.
9) ID10T -
Pronounced "ID ten T" - is a code frequently used by a customer service representative  (CSR) to annotate their notes and identify the source of a problem as the person who is reporting  the problem rather than the system being blamed. This is a thinly veiled reference to the CSR's  opinion that the person reporting the problem is an IDIOT. Example: Problem reported caused by    ID10T, no resolution possible

10)Jakarta Project —
A project constituted by Sun and Apache to create a web server for Java servlets and JSPs.Jakarta was the name of the conference room at Sun where most of the meetings between Sun and Apache took place.
11)Kerberos —
A computer network authentication protocol that is used by both Windows 2000 and Windows XP as their default authentication method.
12)liveware -
computer personnel.It play on the terms "software" and "hardware". Coined in 1966,
the word indicates that sometimes the computer problem is not with the computer itself, but with user.
13) Macintosh, Mac —
  A personal computer from Apple Computer.From McIntosh, a popular type of apple.
14)Nerd —
A colloquial term for a computer person, especially an obsessive, singularly focused one.
15)OLIVER -
CICS interactive test/debug software.The name of this online interactive software - that prevented CICS system abends caused by application programs.
16)ping —
a computer network tool used to detect hosts.
17)Query string —
In the World Wide Web, is an optional part of a Uniform Resource Locator (URL)
18) RSA —
An asymmetricalgorithm for public key cryptography.
19)SPIM —
A simulator for a virtual machine closely resembling the instruction set of MIPS processor,  is simply MIPS spelled backwards. In recent time, spim has also come to mean SPam sent over Instant Messaging.
20)Trojan horse —
A malicious program that is disguised as legitimate software.
21)Unix —
an operating system.
22)Virus —
a piece of program code that spreads by making copies of itself.
23)Worm —
a self-replicating program, similar to a virus.
24)X Window System —
a windowing system for computers with bitmap displays.
25)Yahoo —
internet portal and web directory.
26)zip —
a file format, also used as a verb to mean compress.

No comments:

Post a Comment