정보처리산업기사 전산 영어 (1)
안녕하세요, 흰머리오목눈이입니다~
IT 관련 직업을 가질 때 자격증이 있으면 좋습니다.
정보처리산업기사 실기에 전산영어 부분이 있는데요.
암기를 해야 하는 과목입니다.
몇 개만 들고 왔어요~
우리 다같이 외워보아요.
The ( ) is a set of social relations that link people through the World Wide Web. The ( ) encompasses how web sites and software are designed and developed in order to support and foster social interaction. These online social interactions form the basis of much online activity including online shopping, education, gaming and social networking web sites.
( ) is an open source application framework that provides the foundation for building Web browsers. It was originally derived from the KHTML software library of Conker Browser for use with the Safari web browser engine in Mac OS 10, but now it is available on OmniWeb, Shira, Aurora, Midori, Ubble, iCab, Adobe Integrated Runtime, Nokia's Series 60 browser, Google's Android platform is being used.
( ) is a concept related to broadcasting which consists of a number of different fields or streams which are displayed on many HD Radio & satellite radio receivers in order to describe the program being transmitted, including different information such as: • Song title. • Artist name • Album name. • Music genre This is intended to be seen by the listener as the program is heard.
PET(Privacy Enhancing Technology
( ) is a general term for a set of computer too1s, applications and mechanisms which - when integrated in online services or applications, or when used in conjunction with such services or applications - allow online users to protect the privacy of their personally identifiable information (PII) provided to and handled by such services or applications.( ) can also be defined as: ( ) is a system of ICT measures protecting informational privacy by eliminating or minimizing personal data thereby preventing unnecessary or unwanted processing of personal data, without the loss of the functionality of the information system.
It is a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.
DDOS(Distribute Denial of Service)
VOIP(Voice over Internet Protocol)
It is a category of hardware and software that allows people to use the Internet as a transmission medium for telephone calls by sending voice data using IP technology to telephone calls that have been made over the PSTN network. One of the benefits of ( ) is that users do not pay an extra fee by calling the Internet as if they were paying for the Internet and paying for each when sending an e-mail.
DRM(Digital Rights Management)
It refers to the method of protection for security distribution and piracy prevention of various digital contents distributed through the Web. It is intended to protect digital contents from online piracy of commercial data propagated through file exchange program. It is difficult to prevent by laws and regulations of violators. Therefore, will be.
HVC(High Performance Video Coding)
MICS(Medical Implant Communication Service)
It is the name of a specification for using a frequency band between 402 and 405 MHz in communication with medical implants. It allows bi-directional radio communication with a pacemaker or other electronic implants. The maximum transmit power is very low, EIRP=25 microwatt, in order to reduce the risk of interfering with other users of the same band. The maximum used bandwidth at any one time is 300 KHz, which makes it a low bit rate system compared with WiFi or Bluetooth. The main advantage is the additional flexibility compared to previously used inductive technologies, which required the external transceiver to touch the skin of the patient.
In computer networking, a service set is a set consisting of all the devices associated with a consumer or enterprise IEEE 802.11 wireless local area network (WLAN). 88m is a 1 to 32 byte string, which identifies the service set. 88m is normally a human-readable string and thus commonly called the "network name".
An industry-standard protocol for securely exchanging data between a web browser and a web server. It was developed by Netscape Communications, Inc., and has been adopted by major web product makers such as Microsoft. Since there is an authentication encryption function that checks the identity of each other between the web browser and the web server, the risk that the data exchanged is intercepted on the Internet can be reduced. The personal information is encrypted and transmitted.
A ( ) is a high-level description of a business's informational needs. It typically includes only the main concepts and the main relationships among them. Typically this is a first-cut model, with insufficient detail to build an actual database. This level describes the structure of the whole database for a group of users. The conceptual model is also known as the data model that can be used to describe the ( ) when a database system is implemented. It hides the internal details of physical storage and targets on describing entities, datatype, relationships and constraints.
( ) is a computer programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible. Java is intended to let application developers "write once, run anywhere" (WORA), meaning that code that runs on one platform does not need to be recompiled to run on another.
( ) refers to content that uses a combination of different content forms. This contrasts with media that use only rudimentary computer displays such as text- only or traditional forms of printed or hand- produced material. ( ) includes a combination of text, audio, still images, animation, video, or interactivity content forms.
HDCP(High-bandwidth Digital Content Protection)
It is a technique to take pictures, dolls, shadows, or non-moving objects in a stop-motion and frame-by-frame. This causes the subject to appear to move when projected normally. Each frame contains fine and gradual changes in the object, and when projected onto the screen in turn at a specified rate of 24 frames per second, the object appears to be moving or alive.
IT is a ( ) built on a mobile operating system, with more advanced computing capability and connectivity than a feature phone. The first things combined the functions of a personal digital assistant with a mobile phone. Later models added the functionality of portable media players, low-end compact digital cameras, pocket video camera, and GPS navigation units to form one multi-use device. Many modern products also include high-resolution touch screens and web browsers that display standard web pages as well as mobile-optimized sites. High-speed data access is provided by Wi-Fi and Mobile Broadband.
FCFS(First-Come First-Service) or FIFO(First-In First-Out)
( ) scheduling is the simplest scheduling algorithm with this scheme, the process that request the CPU first is allocated the CPU first. ( ) is a service policy where by the requests customers or clients are attended to in the order that they arrived, without orders biases or preferences The policy can be employed when processing sales orders, in determining restaurant seating, or on a taxi stand, for example.
( ) is a scheduling policy that selects the waiting process with the smallest execution time to execute next. ( ) is advantageous because of its simplicity and because it maximizes process throughput. However, it has the potential for process starvation for processes which will require a long time to complete if short processes are continually added.
( ) scheduling algorithm is designed especially for time sharing system, but Preemption is added to switch processes. ( ) is one of the simplest scheduling algorithms for processes in an operating system, which assigns time slice, a small unit of time, to each process in equal portions and in order, handling all processes without priority.
A ( ) is a temporary storage place for temporarily storing a value in the CPU.
( ) is the as main memory. We can both write data into ( ) and read data from ( ). This is in contrast to ROM, which permits you only to read data. ( ) is a type of computer memory that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes. ( ) is the most common type of memory found in computers and other devices, such as printers.
In computing ( ), or sometimes an object module, is what a compiler produces.
( ) is a generic name given to a category of small, lightweight, legacy-free, and inexpensive laptop computers that were introduced in 2007. It usually has a small screen of 7 to 10 inches. It weighs less than three pounds and supports keyboards that are 75 to 80 percent smaller than standard keyboards.
RFID(Radio Frequency Identification)
RIA(Rich Internet Application)
( ) is a Web application that has many of the characteristics of desktop application software, typically delivered by way of a site-specific browser, a browser plug-in, an independent sandbox, extensive use of Java Script, or a virtual machine. Adobe Flash, J avaFX, and Microsoft Silver light are currently the three most common platforms.
HTTP(Hyper Text Transfer Protocol)
It is the world's largest computer network started by ARPANET.
Computer Programmer(Programmer)
The DNA is a hierarchical naming system for computers, services, or any resource connected to the Internet or a private network. ( ) associates various information with domain names assigned to each of the participants Most importantly, it translates domain names meaningful to humans into the numerical (binary) identifiers.