Terminology means Technical Definition, here are some terminologies used for computers, they are categorized alphabetically, either you scroll down the page until you reach the terminology you wants, or it would be easier to click the terminology you want from the list. I hope you like this page and make a good use of it, also there will be an updates in the future, you may visit it regularly. 

Choose.gif (440 bytes)a.gif (124 bytes)b.gif (127 bytes)c.gif (131 bytes)d.gif (129 bytes)e.gif (116 bytes)f.gif (114 bytes)g.gif (141 bytes)h.gif (121 bytes)i.gif (71 bytes)j.gif (85 bytes)k.gif (124 bytes)l.gif (75 bytes)m.gif (142 bytes)n.gif (103 bytes)o.gif (137 bytes)p.gif (92 bytes)q.gif (140 bytes)r.gif (129 bytes)s.gif (133 bytes)t.gif (80 bytes)u.gif (127 bytes)v.gif (130 bytes)w.gif (150 bytes)x.gif (124 bytes)y.gif (119 bytes)z.gif (117 bytes)

Letter P : Partition - Pascal - PCI - PHTML - Pixel - POP3 - PPP - Proxy                           

 

  Partition

Top.gif (1083 bytes)

   In personal computers, a partition is a logical division of a hard disk created so that you can have different operating systems on the same hard disk or to create the appearance of having separate hard drives for file management, multiple users, or other purposes. A partition is created when you format the hard disk. Typically, a one-partition hard disk is labelled the "C:" drive ("A:" and "B:" are typically reserved for diskette drives). A two-partition hard drive would typically contain "C:" and "D:" drives. (CD-ROM drives typically are assigned the last letter in whatever sequence of letters have been used as a result of hard disk formatting, or typically with a two-partition, the "E:" drive.)

   When you boot an operating system into your computer, a critical part of the process is to give control to the first sector on your hard disk. It includes a partition table that defines how many partitions the hard disk is formatted into, the size of each, and the address where each partition begins. This sector also contains a program that reads in the boot sector for the operating system and gives it control so that the rest of the operating system can be loaded into RAM.

   Boot viruses can put the wrong information in the partition sector so that your operating system can't be located. For this reason, you should have a back-up version of your partition sector on a diskette known as a bootable floppy.

 

  Pascal

Top.gif (1083 bytes)

   Pascal is a strongly-typed third-generation language (3GL) with a one-pass compiler. Designed for instructional purposes about 1967-68 by Nicholas Wirth, Pascal requires a programmer to define all routines and variables fully, including the nature of their use, before using them. Pascal is the language on which many programmers first learn how to write structured, compiled programs. While commercial versions of Pascal have been made available, it has had limited success in the business world. While Pascal has been extended by compiler makers to address special-purpose needs, many programmers feel that it is too restrictive in its rules and doesn't allow a programmer to create and state new rules (for example, new data types) to the compiler. While still used as an instructional language and by hobbyists, most serious programmers today are using C, C++, and Java.

 

  PCI

Top.gif (1083 bytes)

   PCI is an interconnection system between a microprocessor and attached devices in which expansion slots are spaced closely for high speed operation. Using PCI, a computer can support both new PCI cards while continuing to support ISA expansion cards, currently the most common kind of expansion card. Designed by Intel, the original PCI was similar to the VESA Local Bus. However, PCI 2.0 is no longer a local bus and is designed to be independent of microprocessor design. PCI is designed to be synchronized with the clock speed of the microprocessor, in the range of 20 to 33 Mhz.

   PCI is now installed on most new desktop computers, not only those based on Intel's Pentium processor but also those based on the PowerPC. PCI transmits 32 bits at a time in a 124-pin connection (the extra pins are for power supply and grounding) and 64 bits in a 188-pin connection in an expanded implementation. PCI uses all active paths to transmit both address and data signals, sending the address on one clock cycle and data on the next. Burst data can be sent starting with an address on the first cycle and a sequence of data transmissions on a certain number of successive cycles.

 

  PHTML

Top.gif (1083 bytes)

   A PHTML (or it's sometimes called a PHP) page is a Web page that includes a script written in PHP, a language comparable to JavaScript or Microsoft's JBScript. Like Microsoft's Active Server Page (ASP) page, a PHTML page contains programming that is executed at the Web server rather than at the Web client (which is usually your Web browser). You may sometimes see a Web site whose address or URL ends with a file with a suffix of ".phtml"" or ".php3" Either of these suffixes indicate an HTML page that includes a PHP script.

 

  Pixel

Top.gif (1083 bytes)

   A pixel (a word invented from "picture element") is the basic unit of programmable color on a computer display or in a computer image. Think of it as a logical - rather than a physical - unit. The physical size of a pixel depends on how you've set the resolution for the display screen. If you've set the display to its maximum resolution, the physical size of a pixel will equal the physical size of the dot pitch (let's just call it the dot size) of the display. If, however, you're set the resolution to something less than the maximum resolution, a pixel will be larger than the physical size of the screen's dot.

   The specific color that a pixel describes is a some blend of three components of the color spectrum - red, green, and blue. Up to three bytes of data are allocated for specifying a pixel's color, one byte for each color. A true color or 24-bit color system uses all three bytes. However, most color display systems use only eight-bits (which provides up to 256 different colors).

   A bitmap is a file that indicates a color for each pixel along the horizontal axis or row (called the x coordinate) and a color for each pixel along the vertical axis (called the y coordinate). A GIF file, for example, contains a bitmap of an image (along with other data).

   Screen image sharpness is sometimes expressed as dots per inch (dpi). (In this usage, the term dot means pixel, not dot as in dot pitch.) Dots per inch is determined by both the physical screen size and the resolution setting. A given image will have less resolution - fewer dots per inch - on a larger screen as the same data is spread out over a larger physical area. Or, on the same size screen, the image will have less resolution if the resolution setting is made larger - resetting from 800 by 600 pixels per horizontal and vertical line to 640 by 480 means fewer dots per inch on the screen and an image that is less sharp. (On the other hand, individual image elements such as text will be larger in size.)

Pixel has generally replaced an earlier contraction of picture element, pel.

 

  POP3

Top.gif (1083 bytes)

   POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail. POP3 is a client-server protocol in which e-mail is received and held for you by your Internet server. Periodically, you (or your client e-mail receiver) check your mail-box on the server and download any mail. POP3 is built into the Netmanage suite of Internet products and one of the most popular e-mail products, Eudora. It's also built into the Netscape browser.

   An alternative protocol is IMAP (Interactive Mail Access Protocol). With IMAP, you view your e-mail at the server as though it was on your client computer. An e-mail message deleted locally is still on the server. E-mail can be kept on and searched at the server.

   POP can be thought of as a "store-and-forward" service. IMAP can be thought of as a remote file server.

   POP and IMAP deal with the receiving of e-mail and are not to be confused with SMTP, a protocol for transferring e-mail across the Internet. You send e-mail with SMTP and a mail handler receives it on your recipient's behalf. Then the mail is read using POP or IMAP.

A Client-server mail protocols FAQ is available that discusses both POP3 and IMAP and provides links to their RFC specifications.

 

  PPP

Top.gif (1083 bytes)

   PPP (Point-to-Point Protocol) is a protocol for communication between two computers using a serial interface, typically a personal computer connected by phone line to a server. For example, your Internet server provider may provide you with a PPP connection so that the provider's server can respond to your requests, pass them on to the Internet, and forward your requested Internet responses back to you. PPP uses the Internet protocol (IP) (and is designed to handle others). It is sometimes considered a member of the TCP/IP suite of protocols. Relative to the Open Systems Interconnection (OSI) reference model, PPP provides layer 2 (data-link layer) service.

   PPP is a full-duplex protocol that can be used on various physical media, including twisted pair or fiber optic lines or satellite transmission. It uses a variation of High Speed Data Link Control (HDLC) for packet encapsulation.

   PPP is usually preferred over the earlier de facto standard Serial Line Internet Protocol (SLIP) because it can handle synchronous as well as asynchronous communication. PPP can share a line with other users and it has error detection that SLIP lacks. Where a choice is possible, PPP should be preferred.

 

Selected Links
In a white paper, ACC lists the Internet Requests for Comments (RFCs) in which the Point-to-Point Protocol is defined.

 

  Proxy

Top.gif (1083 bytes)

   In an enterprise that uses the Internet, a proxy server is a server that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control, and caching service. A proxy server is associated with or part of a gateway server that separates the enterprise network from the outside network and a firewall server that protects the enterprise network from outside intrusion.

   A proxy server receives a request for an Internet service (such as a Web page request) from a user. If it passes filtering requirements, the proxy server, assuming it is also a cache server, looks in its local cache of previously downloaded Web pages. If it finds the page, it returns it to the user without needing to forward the request to the Internet. If the page is not in the cache, the proxy server, acting as a client on behalf of the user, uses one of its own IP addresses to request the page from the server out on the Internet. When the page is returned, the proxy server relates it to the original request and forwards it on to the user.

   To the user, the proxy server is invisible; all Internet requests and returned responses appear to be directly with the addressed Internet server. (The proxy is not quite invisible; its IP address has to be specified as a configuration option to the browser or other protocol program.)

   An advantage of a proxy server is that its cache can serve all users. If one or more Internet sites are frequently requested, these are likely to be in the proxy's cache, which will improve user response time. In fact, there are special servers called cache servers. A proxy can also do logging.

   The functions of proxy, firewall, and caching can be in separate server programs or combined in a single package. Different server programs can be in different computers. For example, a proxy server may in the same machine with a firewall server or it may be on a separate server and forward requests through the firewall.

 

Selected Links
Cache Now is a Web site devoted to caching, which reduces Internet traffic and gets pages to users more quickly.
Harvest and Squid (for UNIX systems) are freeware products that combine proxy and cache functions. Squid has been used successfully by at least one whatis.com user.
Microsoft's Proxy Server for its Windows NT system also serves as a firewall and cache server.

 

______________________________________________________________

Designed By Wessam Sherif, All Rights Reserved.