Site hosted by Angelfire.com: Build your free website today!

Sagat Presents...

Software Jargon...

Abandonware
Software that is no longer being sold or supported by its publisher. Most abandonware is still considered illegal unless the publisher has re-released the software as freeware.

U.S. copyright laws state that copyrights owned by corporations are valid for 75 years from the date the software was first published. So the current availability of a product is irrelevant to its copyrighted status. Unlike trademarks, copyrights are not considered abandoned if they are no longer enforced. Copyrights do not enter the public domain just because they are no longer commercially exploited or widely available.

ABEND
(1) Acronym for abnormal end of task. It refers to software crashes or lossage. Derives from an error message on the IBM 360.

(2) Acronym for Absent By Enforced Net Deprivation. Sent in e-mail subject lines warning friends and others of forced loss of Internet access (due to moving, network outages, or illness).

ActiveX
A loosely defined set of technologies developed by Microsoft. ActiveX is an outgrowth of two other Microsoft technologies called OLE (Object Linking and Embedding) and COM (Component Object Model). As a moniker, ActiveX can be very confusing because it applies to a whole set of COM-based technologies. Most people, however, think only of ActiveX controls, which represent a specific way of implementing ActiveX technologies.

Add-In
(1) A component you can add to a computer or other device to increase its capabilities. Add-ins can increase memory or add graphics or communications capabilities to a computer. They can come in the form of expansion boards, cartridges, or chips. The term add-in is often used instead of add-on for chips you add to a board that is already installed in a computer. In contrast, add-on almost always refers to an entire circuit board.

(2) A software program that extends the capabilities of larger programs. For example, there are many Excel add-ins designed to complement the basic functionality offered by Excel. In the Windows environment, add-ins are becoming increasingly common thanks to OLE 2.0.

Add-On
Refers to a product designed to complement another product. For example, there are numerous add-on boards available that you can plug into a personal computer to give it additional capabilities. Another term for add-on board is expansion board.

Add-on products are also available for software applications. For example, there are add-on report generation programs that attach to popular database products such as dBASE, giving them additional report-generation and graphics capabilities.

The terms add-on and add-in are often, but not always, used synonymously. The term add-in can refer to individual chips you can insert into boards that are already installed in your computer. Add-on, on the other hand, almost always refers to an entire circuit board, cartridge, or program.

Aloha
1. A protocol for satellite and terrestrial radio transmissions. In pure Aloha, a user can transmit at any time but risks collisions with other users' messages. "Slotted Aloha" reduces the chance of collisions by dividing the channel into time slots and requiring that the user send only at the beginning of a time slot. Aloha was the basis for Ethernet, a local area network protocol.

2. Aloha Networks, Inc. -- A San Francisco-based company specializing in providing satellite-based Internet access to large Internet Service Providers. Founded by the inventor of the Aloha system, Norman Abramson.

3. @loha @home -- software from Media Synergy (www.mediasyn.com) that allows a user to add graphics, animation, and sound to e-mail messages.

Antivirus Program
A utility that searches a hard disk for viruses and removes any that are found. Most antivirus programs include an auto-update feature that enables the program to download profiles of new viruses so that it can check for the new viruses as soon as they are discovered.

App
Short for application. A killer app, for example, is an application that surpasses (i.e., kills) its competitors.

Application
A program or group of programs designed for end users. Software can be divided into two general classes: systems software and applications software. Systems software consists of low-level programs that interact with the computer at a very basic level. This includes operating systems, compilers, and utilities for managing computer resources.

In contrast, applications software (also called end-user programs) includes database programs, word processors, and spreadsheets. Figuratively speaking, applications software sits on top of systems software because it is unable to run without the operating system and system utilities.

Architecture
A design. The term architecture can refer to either hardware or software, or to a combination of hardware and software. The architecture of a system always defines its broad outlines, and may define precise mechanisms as well.

An open architecture allows the system to be connected easily to devices and programs made by other manufacturers. Open architectures use off-the-shelf components and conform to approved standards. A system with a closed architecture, on the other hand, is one whose design is proprietary, making it difficult to connect the system to other systems.

Authoring Tool
Also known as authorware, a program that helps you write hypertext or multimedia applications. Authoring tools usually enable you to create a final application merely by linking together objects, such as a paragraph of text, an illustration, or a song. By defining the objects' relationships to each other, and by sequencing them in an appropriate order, authors (those who use authoring tools) can produce attractive and useful graphics applications. Most authoring systems also support a scripting language for more sophisticated applications.

The distinction between authoring tools and programming tools is not clear-cut. Typically, though, authoring tools require less technical knowledge to master and are used exclusively for applications that present a mixture of textual, graphical, and audio data.

Backward Compatible
Compatible with earlier models or versions of the same product. A new version of a program is said to be backward compatible if it can use files and data created with an older version of the same program. A computer is said to be backward compatible if it can run the same software as the previous model of the computer.

Backward compatibility is important because it eliminates the need to start over when you upgrade to a newer product. A backward-compatible word processor, for instance, allows you to edit documents created with a previous version of the program. In general, manufacturers try to keep all their products backward compatible. Sometimes, however, it is necessary to sacrifice backward compatibility to take advantage of a new technology.

The flip side of backward compatibility is upward compatibility. Upward compatible is the same as backward compatible, except that it is from the point of view of the older model.

Binary Compatible
Having the exact same data format, down to the binary level. That is, two files that are binary compatible will have the same pattern of zeroes and ones in the data portion of the file. The file header, however, may be different.

The term is used most commonly to state that data files produced by one application are exactly the same as data files produced by another application. For example, many software companies now produce applications for Windows and the Macintosh that are binary compatible, which means that a file produced in a Windows environment is interchangeable with a file produced on a Macintosh. This avoids many of the conversion problems caused by importing and exporting data.

Blue Screen Of Death
An error that can appear on computers running in a Windows' environment. This includes even the earliest versions of Windows such as Windows 3.0 and 3.1, and still occurs in later versions such as Microsoft Windows 95, Windows 98, Windows NT, and Windows 2000 beta. Jokingly called the blue screen of death because when the error occurs, the screen turns blue, and the computer almost always freezes and requires rebooting.

Bundled Software
Software that is sold with a computer or other hardware component as part of a package. As competition between computer manufacturers has intensified, bundling software has become a key strategy for attracting consumers. In some cases, the bundled software is even more valuable than the hardware.

Bundled software can also be part of a software package. For example, Microsoft Windows comes with many bundled software tools.

Castanet
Software from Marimba, Inc. of Mountain View, CA (www.marimba.com) that helps administrators install and update applications and information across a network. For example, if a number of users on a network use a version of Microsoft Word that's been recently updated, the administrator can use Castanet to update the users' versions without physically installing each new package. Castanet will examine the old and the new versions, identify differences (a process called differencing), and send the changes to each user. Castenet uses channels, usually containing one kind of application, to send information to users, who receive them with a desktop application called a tuner. Administrators control content at the back-end with a transmitter.

CFML
Short for ColdFusion Markup Language, a proprietary mark up language developed by Allaire for use with ColdFusion. CFML is a tag-based Web scripting language supporting dynamic Web page creation and database access in a Web server environment. In the language, ColdFusion tags are embedded in HTML files. The HTML tags determine the page's layout while the CFML tags import content based on user input or the results of a database query. Files created with CFML have the file extension .cfm.

ColdFusion
A product created by Allaire Corporation of Cambridge, Mass. (in 2001, Allaire merged with Macromedia) that includes a server and a development toolset designed to integrate databases and Web pages. With Cold Fusion, a user could enter a zip code on a Web page, and the server would query a database for information on the nearest movie theaters and present the results in HTML form. Cold Fusion Web pages include tags written in Cold Fusion Markup Language (CFML) that simplify integration with databases and avoid the use of more complex languages like C++ to create translating programs.

Compatible
Indicates that a product can work with or is equivalent to another, better-known product. The term is often used as a shorthand for IBM-compatible PC , a computer that is compatible with an IBM PC. Another term for a compatible is clone.

The ability of one device or program to work with another device or program. The term compatible implies different degrees of partnership. For example, a printer and a computer are said to be compatible if they can be connected to each other. An IBM compatible PC, on the other hand, is a computer that can run the same software as an IBM PC.

Compatibility of two devices, such as printers, usually means that they react to software commands in the same way. Some printers achieve compatibility by tricking the software into believing that the printer is a different machine. This is called emulation.

Be aware, however, that hardware compatibility does not always extend to expansion slots. For example, two compatible printers may not accept the same font cartridges. Complete hardware compatibility is denoted by the term plug compatible.

Software products are compatible if they use the same data formats. For example, many programs are compatible with dBASE. This means that the files they produce can easily be transformed into a dBASE database or that they can import dBASE files.

Component Software
Sometimes called componentware, software designed to work as a component of a larger application. A good analogy is the way personal computers are built up from a collection of standard components: memory chips, CPUs, buses, keyboards, mice, disk drives, monitors, etc. Because all of the interfaces between components are standardized, it is possible to mix components from different manufacturers in a single system.

Similarly, the goal of component software is to standardize the interfaces between software components so that they too can work together seamlessly. Two standards -- OLE and OpenDoc -- are designed to help programmers develop components that can work together. Many analysts believe that component software is the natural extension of object-oriented programming and that it will become the standard programming paradigm for years to come.

Configuration
The way a system is set up, or the assortment of components that make up the system. Configuration can refer to either hardware or software, or the combination of both. For instance, a typical configuration for a PC consists of 32MB (megabytes) main memory, a floppy drive, a hard disk, a modem, a CD-ROM drive, a VGA monitor, and the Windows operating system.

Many software products require that the computer have a certain minimum configuration. For example, the software might require a graphics display monitor and a video adapter, a particular microprocessor, and a minimum amount of main memory.

When you install a new device or program, you sometimes need to configure it, which means to set various switches and jumpers (for hardware) and to define values of parameters (for software). For example, the device or program may need to know what type of video adapter you have and what type of printer is connected to the computer. Thanks to new technologies, such as plug-and-play, much of this configuration is performed automatically.

Configure
To set up a program or computer system for a particular application.

Copy Protection
Refers to techniques used to prevent the unauthorized copying of software. The idea of copy-protected software was created by software manufacturers who wanted to prevent software piracy -- users copying programs and giving them to friends and colleagues free of charg.

As enticing an idea as it may be, copy protection has not proved to be a viable strategy. For one, it is practically impossible to create software that cannot be copied by a knowledgeable programmer. Second, many consumers shy away from copy-protected software because backup copies are difficult to make. Thus, if their original copy of the software is damaged, the user must contact the manufacturer for a new copy. Finally, some copy-protection techniques can actually damage other software on the system. For these reasons, copy-protected software is becoming less common.

Most software producers now protect their programs by issuing registration numbers with each package. When you install the software, you must enter the registration number. This does not prevent all piracy, but it limits it. In addition, users cannot get updates to a product unless they own the original diskettes and documentation.

An alternative strategy for dealing with the problem of software piracy is shareware, where users are actually encouraged to copy and disseminate programs. Shareware publishers rely on people's honesty to pay for the products used.

Courseware
Software designed to be used in an educational program.

Crippled Version
A demonstration version of a piece of software that has one or more critical features disabled. Many software companies distribute crippled versions of their applications free with the hope that users will get hooked and buy the full version.

Customer Support
Service that computer and software manufacturers, and third-party service companies, offer to customers.

Device Dependant
Like machine-dependent, device-dependent refers to programs that can run only on a certain type of hardware.

Digital Wallet
(1) Encryption software that works like a physical wallet during electronic commerce transactions. A wallet can hold a user's payment information, a digital certificate to identify the user, and shipping information to speed transactions. The consumer benefits because his or her information is encrypted against piracy and because some wallets will automatically input shipping information at the merchant's site and will give the consumer the option of paying by digital cash or check. Merchants benefit by receiving protection against fraud.

Most wallets reside on the user's PC, but recent versions, called "thin" wallets, are placed on the credit card issuer's server. Netscape and Microsoft now support wallet technology on their browsers.

(2) Digital Wallet, a registered trademark of Minds@Work, is a self-powered portable hard drive used for storing digital camera images.

Dribbleware
Software characterized by frequent updates, fixes, and patches. The term is somewhat derogatory, indicating software that was released without sufficient testing or before all features could be added. With the intense market pressure to release software products as soon as possible, and with the increased ease of updating software via Internet downloads, dribbleware is becoming the norm rather than the exception.

EULA
Short for End-User License Agreement, the type of license used for most software.

Fatal Exception Error
A type of program error that requires that the program responsible for the error be shut down. Software applications communicate with operating systems and other applications through layers of code. An exception is an error alert that communicates the problem across the layers. When an error is detected, the exception is sent through the layers of code one by one until code is found that can handle the error. If no code has been included in any layer of the program to handle the specific error, the exception will travel through all the layers, create a fatal exception error, terminate the application and may even shut down the operating system.

For example, a program may request that the operating system reserve a block of memory for the program's use. If the operating system is unable to honor the request - if the memory request is too large or if there is not enough available memory - it will send a memory exception to the layer that made the request. The exception will continue to travel through the layers until it is dealt with. If the program does not catch the exception, because the programmer did not write code to handle that particular exception, the exception makes its way to the top layer and the operating system recognizes it as an unhandled exception and shuts down the program, resulting in a fatal exception error. Well-designed software, however, handles all exceptions.

Firmware
Software (programs or data) that has been written onto read-only memory (ROM). Firmware is a combination of software and hardware. ROMs, PROMs and EPROMs that have data or programs recorded on them are firmware

Forms Software
A type of program that enables you to design and fill in forms on a computer. Most forms packages contain a number of sample forms that you can modify for your own purposes. Newer forms software packages enable you to publish a form on the Internet so that anyone with Internet access can fill it out.

Freeware
Copyrighted software given away for free by the author. Although it is available for free, the author retains the copyright, which means that you cannot do anything with it that is not expressly allowed by the author. Usually, the author allows people to use the software, but not sell it.

Functional Specification
A formal description of a software system that is used as a blueprint for implementing the program. At minimum, a functional specification should precisely state the purpose (e.g., the function) of the software. Depending on the software engineering methodology used, the functional specification might also provide implementation details, such as how the project is divided into modules and how the different modules interact. In addition, a functional specification often describes the software from the user's perspective -- how the user interface appears and how a user would use the program to perform specific functions.

Input
Whatever goes into the computer. Input can take a variety of forms, from commands you enter from the keyboard to data from another computer or device. A device that feeds data into a computer, such as a keyboard or mouse, is called an input device.

The act of entering data into a computer.

Integrated
(1) A popular computer buzzword that refers to two or more components merged together into a single system. For example, any software product that performs more than one task can be described as integrated.

(2) Increasingly, the term integrated software is reserved for applications that combine word processing, database management, spreadsheet functions, and communications into a single package.

Intrusion Detection System
An intrusion detection system (IDS) inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system.

The firewall limits the access between networks in order to prevent intrusion and does not signal an attack from inside the network. An IDS evaluates a suspected intrusion once it has taken place and signals an alarm. An IDS also watches for attacks that originate from within a system.

Jini
(pronounced GEE-nee; loosely derived from the Arabic for magician) Software from Sun Microsystems that seeks to simplify the connection and sharing of devices, such as printers and disk drives, on a network. Currently adding such devices to a computer or network requires installation and boot-up, but a device that incorporates Jini will announce itself to the network, provide some details about its capabilities, and immediately become accessible to other devices on the network. Under this technology it would be possible to create distributed computing, whereby capabilities are shared among the machines on a common network. This would allow users to access the power and features of any device on the network and would free the desktop computer from holding all the memory, storage and processing power it needs for any job. For example, if a disk drive on a network had Jini capabilities, any computer on that network could use the drive as though it were its own. Because Jini has the potential to make operating systems incidental to the power of networks, some have seen Jini as an attempt to reduce the influence of Windows.

JNI
(Java Native Interface) A Java programming interface, or API, that allows developers to access the languages of a host system and determine the way Java integrates with native code. The JNI has been a point of contention between Sun and Microsoft, since Microsoft seeks to create its own native code interface and Sun claims this violates their licensing agreement.

Machine Dependant
Refers to a software application that runs only on a particular type of computer. Programs that run on a variety of different types of computers are called machine independent.

Almost all programs have some machine dependencies (that is, they run somewhat differently on different types of computers), but the degree of independence can vary widely. Machine-independent programs give you more flexibility: if you buy a new type of computer, you can continue using the same software package instead of learning a new one. On the other hand, machine-dependent programs often take advantage of special hardware features of a particular computer, making the programs faster.

Another term for machine dependent is device dependent, but whereas machine dependent usually refers to the computer, device dependent can refer to a dependency on any device, like a printer.

Machine Independant
Able to run on a variety of computers.

Middleware
Software that connects two otherwise separate applications. For example, there are a number of middleware products that link a database system to a Web server. This allows users to request data from the database using forms displayed on a Web browser, and it enables the Web server to return dynamic Web pages based on the user's requests and profile.

Mode
The state or setting of a program or device. For example, when a word processor is in insert mode, characters that you type are inserted at the cursor position. In overstrike mode, characters typed replace existing characters

The term mode implies a choice -- that you can change the setting and put the system in a different mode.

Modular Architecture
Refers to the design of any system composed of separate components that can be connected together. The beauty of modular architecture is that you can replace or add any one component (module) without affecting the rest of the system. The opposite of a modular architecture is an integrated architecture, in which no clear divisions exist between components.

The term modular can apply to both hardware and software. Modular software design, for example, refers to a design strategy in which a system is composed of relatively small and autonomous routines that fit together.

MTA
Short for message transfer agent, the program responsible for receiving incoming e-mails and delivering the messages to individual users. The MTA transfers messages between computers. Hidden from the average user, it is responsible for routing messages to their proper destinations. MTAs receive messages from both MUAs and other MTAs, although single-user machines more often retrieve mail messages using POP. The MTA is commonly referred to as the mail server program. UNIX sendmail and Microsoft Exchange Sever are two examples of MTA.

MUA
Short for mail user agent, the software that allows a user to access and manage e-mail, including reading, composing, disposing, printing and displaying e-mail messages. The MUA provides the interface between the user and the MTA. Eudora and Outlook are two popular MUAs.

Napster
Created by 19-year-old Shawn Fanning in 1999, Napster is an application that gives individuals access to one another's MP3 files by creating a unique file-sharing system via the Internet.

Napster lets users view and download the contents of MP3 directories from other Napster users' hard drives. Type in the artist and/or song to receive a list, compiled by Napster's servers, of all the files currently available. Double click on a song to download from user's hard drive.

Because Napster searches individual hard drives, the number and variety of MP3 files vary. Not all Napster users are online at the same time; therefore, what you may not find one day, may, in fact, be there the next.

Office Automation
The use of computer systems to execute a variety of office operations, such as word processing, accounting, and e-mail. Office automation almost always implies a network of computers with a variety of available program.

Open Source
A certification standard issued by the Open Source Initiative (OSI) that indicates that the source code of a computer program is made available free of charge to the general public. The rationale for this movement is that a larger group of programmers not concerned with proprietary ownership or financial gain will produce a more useful and bug -free product for everyone to use. The concept relies on peer review to find and eliminate bugs in the program code, a process which commercially developed and packaged programs do not utilize. Programmers on the Internet read, redistribute and modify the source code, forcing an expedient evolution of the product. The process of eliminating bugs and improving the software happens at a much quicker rate than through the traditional development channels of commercial software as the information is shared throughout the open source community and does not originate and channel through a corporation's research and development cogs.

Examples of open source software are UNIX, Linux and FreeBSD.

Output
Anything that comes out of a computer. Output can be meaningful information or gibberish, and it can appear in a variety of forms -- as binary numbers, as characters, as pictures, and as printed pages. Output devices include display screens, loudspeakers, and printers.

To give out. For example, display screens output images, printers output print, and loudspeakers output sounds.

Personal Finance Manager
A simple accounting program that helps individuals manage their finances. Personal finance managers help you balance your checkbook and keep track of investments. Some can even help you pay your bills by printing out checks or transferring money electronically from your bank account.

Public-Domain Software
Refers to any program that is not copyrighted. Public-domain software is free and can be used without restrictions. The term public-domain software is often used incorrectly to include freeware, free software that is nevertheless copyrighted.

Refactoring
Improving the design of existing software code. Refactoring doesn't change the observable behavior of the software; it improves its internal structure. For example, if a programmer wants to add new functionality to a program, he may decide to refactor the program first to simplify the addition of new functionality in order to prevent software entropy.

Screen Scraper
Software that allows a PC to intercept character-based data from a mainframe -- often presented in a green screen -- and present it in an easier to understand graphical user interface (GUI ). Newer screen scrapers present the information in HTML, so it can be accessed with a browser. Leading makers include Mozart (www.mozart.com), Flashpoint, Inc. (www.flashpt.com) and Intelligent Environments (www.screensurfer.com).

Service Pack
A service pack is an update to a software version that fixes an existing problem, such as a bug, or provides enhancements to the product that will appear in the next version of the product. When the new product version is released, it usually contains the fixes and updates from the service pack. Service packs can either be downloaded or ordered directly from the company.

Shareware
Software distributed on the basis of an honor system. Most shareware is delivered free of charge, but the author usually requests that you pay a small fee if you like the program and use it regularly. By sending the small fee, you become registered with the producer so that you can receive service assistance and updates. You can copy shareware and pass it along to friends and colleagues, but they too are expected to pay a fee if they use the product.

Shareware is inexpensive because it is usually produced by a single programmer and is offered directly to customers. Thus, there are practically no packaging or advertising expenses.

Note that shareware differs from public-domain software in that shareware is copyrighted. This means that you cannot sell a shareware product as your own.

Software
Computer instructions or data. Anything that can be stored electronically is software. The storage devices and display devices are hardware.

The terms software and hardware are used as both nouns and adjectives. For example, you can say: "The problem lies in the software," meaning that there is a problem with the program or data, not with the computer itself. You can also say: "It's a software problem"

The distinction between software and hardware is sometimes confusing because they are so integrally linked. Clearly, when you purchase a program, you are buying software. But to buy the software, you need to buy the disk (hardware) on which the software is recorded.

Software Entropy
The tendency for software, over time, to become difficult and costly to maintain. A software system that undergoes continuous change, such as having new functionality added to its original design, will eventually become more complex and can become disorganized as it grows, losing its original design structure. In theory, it may be better to redesign the software in order to support the changes rather than building on the existing program, but redesigning the software is more work because redesigning the existing software will introduce new bugs and problems.

Software Licensing
Allowing an individual or group to use a piece of software. Nearly all applications are licensed rather than sold. There are a variety of different types of software licenses. Some are based on the number machines on which the licensed program can run whereas others are based on the number of users that can use the program. Most personal computer software licenses allow you to run the program on only one machine and to make copies of the software only for backup purposes. Some licenses also allow you to run the program on different computers as long as you don't use the copies simultaneously.

Software Piracy
The unauthorized copying of software. Most retail programs are licensed for use at just one computer site or for use by only one user at any time. By buying the software, you become a licensed user rather than an owner. You are allowed to make copies of the program for backup purposes, but it is against the law to give copies to friends and colleagues.

Software piracy is all but impossible to stop, although software companies are launching more and more lawsuits against major infractors. Originally, software companies tried to stop software piracy by copy-protecting their software. This strategy failed, however, because it was inconvenient for users and was not 100 percent foolproof. Most software now requires some sort of registration, which may discourage would-be pirates, but doesn't really stop software piracy.

An entirely different approach to software piracy, called shareware, acknowledges the futility of trying to stop people from copying software and instead relies on people's honesty. Shareware publishers encourage users to give copies of programs to friends and colleagues but ask everyone who uses a program regularly to pay a registration fee to the program's author directly.

Commercial programs that are made available to the public illegally are often called warez.

Speech Synthesis
Refers to a computer's ability to produce sound that resembles human speech. Although they can't imitate the full spectrum of human cadences and intonations, speech synthesis systems can read text files and output them in a very intelligible, if somewhat dull, voice. Many systems even allow the user to choose the type of voice -- for example, male or female. Speech synthesis systems are particularly valuable for seeing-impaired individuals.

Upgrade
A new version of a software or hardware product designed to replace an older version of the same product. Typically, software companies sell upgrades at a discount to prevent users from switching to other products. In most cases, you must prove you own an older version of the product to qualify for the upgrade price. In addition, the installation routines for upgrades often check to make sure that an older version is already installed on your computer; if not, you cannot install the upgrade.

In the 90s, software companies began offering competitive upgrades, which means that you can buy a program at a discount if you can prove that you own a competing program.

Upward Compatible
Refers to software that runs not only on the computer for which it was designed, but also on newer and more powerful models. For example, a program designed to run on an Intel 386 microprocessor, which also runs on a Pentium, is upward compatible. Upward compatibility is important because it means you can move to a newer, larger, and more sophisticated computer without converting your data.

In contrast to upward compatibility, downward (backward) compatible means that a program runs not only on the computer for which it was designed, but also on smaller and older models. For example, a program designed to run under MS-DOS 6.0, which also works under MS-DOS 5.0, is downward compatible.

Vaporware
A sarcastic term used to designate software and hardware products that have been announced and advertised but are not yet available.

Viewer
A utility program that enables you to read a file in its native format . A Lotus 1-2-3 viewer, for example, enables you to read Lotus 1-2-3 files. Many shell utilities and file managers include viewers so that you can display different types of files.

Warez
Pronounced wayrz or wayrss, refers to commercial software that has been pirated and made available to the public via a BBS or the Internet. Typically, the pirate (also called a cracker) has figured out a way to de-activate the copy-protection or registration scheme used by the software. Note that the use and distribution of warez software is illegal. In contrast, shareware and freeware may be freely copied and distributed.

Wrapper
Software that accompanies resources or other software for the purposes of improving convenience, compatibility, or security. For example, a wrapper is used to compress and encrypt software that is being sold over the Internet. It is also used to make EDI - a decades-old electronic commerce standard - compatible with the Internet. The term can also apply to hardware: the casing around a Pentium II CPU is called a wrapper.

index . data . network . graphics . software . hardware

standards . programming . communications . operating systems . links

Website Created By Koded.com