Spirit P8Q67-M-DO User Manual page 172

Table of Contents

Advertisement

Spirit P8Q67-M-DO (Eng) Rev 1
UNIX®: A very powerful operating system used as the basis of many high-end computer
applications.
upload: The process of transferring information from a computer to a web site (or other
remote location on a network). v. To transfer information from a computer to a web
site (or other remote location on a network).
UPS: Universal Power Supply or Uninterruptible Power Supply. An electrical power supply
that includes a battery to provide enough power to a computer during an outage to
back-up data and properly shut down.
URL: Uniform Resource Locator. 1. The protocol for identifying a document on the Web. 2.
A Web address (e.g., www.census.gov). A URL is unique to each user. See also
domain.
USB: Universal Serial Bus. An industry standard for connecting different compatible
peripheral devices across multiple platforms. Devices include printers, digital
cameras, scanners, game pads, joysticks, keyboards and mice, and storage devices.
USB peripherals offer the use of plug-and-play convenience by eliminating the need
to turn off or restart the computer when attaching a new peripheral. Users can
connect USB peripherals whenever they need them. For example, a user producing a
newsletter could easily swap a digital camera for a scanner-without any downtime.
Small, simple, inexpensive, and easy to attach, USB supports simultaneous
connection of up to 127 devices by attaching peripherals through interconnected
external hubs.
user friendly: A program or device whose use is intuitive to people with a nontechnical
background.
video teleconferencing: A remote "face-to-face chat," when two or more people using a
webcam and an Internet telephone connection chat online. The webcam enables both
live voice and video.
virus: An unauthorized piece of computer code attached to a computer program or portions
of a computer system that secretly copies itself from one computer to another by
shared discs and over telephone and cable lines. It can destroy information stored on
the computer, and in extreme cases, can destroy operability. Computers can be
protected from viruses if the operator utilizes good virus prevention software and
keeps the virus definitions up to date. Most viruses are not programmed to spread
themselves. They have to be sent to another computer by e-mail, sharing, or
applications. The worm is an exception, because it is programmed to replicate itself
by sending copies to other computers listed in the e-mail address book in the
computer. There are many kinds of viruses, for example: Boot viruses place some of
their code in the start-up disk sector to automatically execute when booting.
Therefore, when an infected machine boots, the virus loads and runs. File viruses
attached to program files (files with the extension ".exe"). When you run the infected
program, the virus code executes. Macro viruses copy their macros to templates
and/or other application document files. Trojan Horse is a malicious, security-
breaking program that is disguised as something benign such as a screen saver or
game. Worm launches an application that destroys information on your hard drive. It
also sends a copy of the virus to everyone in the computer's e-mail address book.
160
V
W

Advertisement

Table of Contents
loading

Table of Contents