Home | Computer Glossary

Computer Glossary



An easy to use glossary of computer and Internet terms with definitions that are easy to understand. Terms and definitions relating to computer, technology, Internet resources and much more.

buy zopiclone uk buy ambien uk


Pick a letter below

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z


What is Safe Mode?
Safe Mode is a way for the Windows operating system to run with the minimum system files necessary. It uses a generic VGA display driver instead of the vendor-specific driver, which means you will likely be working with only 16 colors in a resolution of 640x480. Safe Mode also turns off all third-party drivers for other peripherals such as mice, keyboards, printers, and scanners. In basic Safe Mode, networking files and settings are not loaded, meaning you won't be able to connect to the Internet or other computers on a network. So why would I ever want to boot in Safe Mode? Well, that's a good question. Sometimes, Windows may not fully load after an unexpected crash and the only way to get the computer to boot is to use Safe Mode. Once you have successfully booted the computer in Safe Mode, you can run a disk utility program to repair corrupted files or directories on the hard drive. You can also reboot into Safe Mode to see your display when you get a "Sync Out of Range" message on your screen. There may also be times when your computer is performing sluggishly and becomes annoyingly slow. Booting into Safe Mode will allow you to diagnose the problem and determine which files are slowing down the computer. When calling technical support, the support person may ask you to boot into Safe Mode to begin the troubleshooting. To boot your Windows computer into Safe Mode, hold down the F8 key while the computer is starting up. Then select Safe Mode from the list of boot options.



What is SATA?
Stands for "Serial Advanced Technology Attachment," or "Serial ATA." It is an interface used to connect ATA hard drives to a computer's motherboard. SATA transfer rates start at 150MBps, which is significantly faster than even the fastest 100MBps ATA/100 drives. For this and other reasons, Serial ATA is likely to replace the previous standard, Parallel ATA (PATA), which has been around since the 1980s. Besides faster transfer rates, the SATA interface has several advantages over the PATA interface. For one, SATA drives each have their own independent bus, so there is no competition for bandwidth like there is with Parallel ATA. They also use smaller, thinner cables, which allows for better airflow inside the computer. SATA cables can be as long as one meter, while PATA cables max out at 40cm. This gives manufacturers more liberty when designing the internal layout of their computers. Finally, Serial ATA uses only 7 conductors, while Parallel ATA uses 40. This means there is less likely to be electromagnetic interference with SATA devices. In summary, Serial ATA is a better, more efficient interface than the dated PATA standard. If you are looking to buy a computer that will support fast hard drives for years to come, make sure it comes with a SATA interface.



What is Script?
A computer script is a list of commands that are executed by a certain program or scripting engine. Scripts may be used to automate processes on a local computer or to generate Web pages on the Web. For example, DOS scripts and VB Scripts may be used to run processes on Windows machines, while AppleScript scripts can automate tasks on Macintosh computers. ASP, JSP, and PHP scripts are often run on Web servers to generate dynamic Web page content. Script files are usually just text documents that contain instructions written in a certain scripting language. This means most scripts can be opened and edited using a basic text editor. However, when opened by the appropriate scripting engine, the commands within the script are executed. VB (Visual Basic) scripts, for example, will run when double-clicked, using Windows' built-in VB scripting support. Since VB scripts can access and modify local files, you should never run a VB script that you receive as an unknown e-mail attachment.



What is SCSI?
Stands for "Small Computer System Interface," and is pronounced "scuzzy." SCSI is a computer interface that can be used to attach devices like hard drives and scanners to your computer. You can connect up to seven devices to a SCSI interface and still get good performance from all of them. SCSI can support faster data transfer rates than the other popular storage interface, IDE. For more information on the differences between SCSI and IDE, please check the Help Center. The different types of SCSI interfaces are listed below: SCSI-1: Uses an 8-bit bus, supports data transfer speeds of 4 MBps. SCSI-2: Uses a 50-pin connector instead of a 25-pin connector, and supports multiple devices. It is currently the most common type of SCSI. Data transfer speeds are typically around 5 MBps. Wide SCSI: Uses a wider cable (168 cable lines to 68 pins) to support 16-bit data transfers. Fast SCSI: Uses an 8-bit bus, but doubles the clock rate to support data transfer speeds of 10 MBps. Fast Wide SCSI: Uses a 16-bit bus and supports data transfer speeds of 20 MBps. Ultra SCSI: Uses an 8-bit bus, supports data rates of 20 MBps. SCSI-3: Uses a 16-bit bus, supports data rates of 40 MBps. Also called Ultra Wide SCSI. Ultra2 SCSI: Uses an 8-bit bus, supports data transfer speeds of 40 MBps. Wide Ultra2 SCSI: Uses a 16-bit bus, supports data transfer speeds of 80 MBps.



What is SD?
Stands for "Secure Digital." It is a type of memory card used for storing data in devices such as digital cameras, PDAs, mobile phones, portable music players, and digital voice recorders. The card is one of the smaller memory card formats, measuring 24mm wide by 32mm long and is just 2.1mm thick. To give the cards some orientation, the top-rght corner of each SD card is slanted. Even though the cards are extremely small, as of late 2004, they can hold up to 8GB of data. Part of the reason the cards are called "Secure Digital" cards is because the cards have a copyright protection feature built in. The security feature, called "key revocation" means protected data on the card can only be read by specific devices. The cards can have both secured and unsecured areas on them for copyrighted and non-copyrighted data. For more information on SD cards, visit the SD Card Association.



What is SDRAM?
Stands for "Secure Digital." It is a type of memory card used for storing data in devices such as digital cameras, PDAs, mobile phones, portable music players, and digital voice recorders. The card is one of the smaller memory card formats, measuring 24mm wide by 32mm long and is just 2.1mm thick. To give the cards some orientation, the top-rght corner of each SD card is slanted. Even though the cards are extremely small, as of late 2004, they can hold up to 8GB of data. Part of the reason the cards are called "Secure Digital" cards is because the cards have a copyright protection feature built in. The security feature, called "key revocation" means protected data on the card can only be read by specific devices. The cards can have both secured and unsecured areas on them for copyrighted and non-copyrighted data. For more information on SD cards, visit the SD Card Association.



What is SDSL?
Stands for "Symmetric Digital Subscriber Line." SDSL is a type of of DSL, which is used for transferring data over copper telephone lines. The "symmetric" part of the term means that an SDSL connection has the same maximum upload and download speeds. ADSL, on the other hand, typically provides much faster download speeds than upload speeds. Because most Internet users download much more data than they upload, ISPs usually offer ADSL connections rather than SDSL.



What is Search Engine?
A search engine is a program designed to help find files stored on a computer, for example a public server on the World Wide Web, or one's own computer. The search engine allows one to ask for media content meeting specific criteria (typically those containing a given word or phrase) and retrieving a list of files that match those criteria. A search engine often uses a previously made, and regularly updated index to look for files after the user has entered search criteria.



What is Sector?
A sector is the smallest unit that can be accessed on a hard disk. Each platter, or circular disk of a hard disk is divided into tracks, which run around the disk. These tracks get longer as they move from the middle towards the outside of the disk, so there are more sectors along the tracks near the outside of the disk than the ones towards the center of disk. This variance in sectors per track is referred to as "zoned-bit recording." Large files can take up thousands of sectors on a disk. Even if one of these sectors becomes corrupted, the file will most likely be unreadable. While a disk utility program may be able to fix corrupted data, it cannot fix physical damage. Physically damaged sectors are called "bad sectors." While your computer may recognize and bypass bad sectors on your hard disk, certain bad sectors may prevent your disk from operating properly. Yet another good reason to always back up your data



What is SEO?
Search engine optimization (SEO) is a set of methodologies aimed at improving the visibility of a website in search engine listings. The term also refers to an industry of consultants that carry out optimization projects on behalf of client sites.



What is Serial Port?
The serial port is a type of connection on PCs that is used for peripherals such as mice, gaming controllers, modems, and older printers. It is sometimes called a COM port or an RS-232 port, which is its technical name. If that's not enough to confuse you, there are two types of serial ports -- DB9 and DB25. DB9 is a 9-pin connection, and DB25 is, you guessed it, a 25-pin connection. A serial port can only transmit one bit of data at a time, whereas a parallel port can transmit many bits at once. The serial port is typically the slowest port you'll find on a PC, if you find one at all. Most newer computers have replaced serial ports with much faster and more compatible USB ports.



What is SERP?
SERP was chosen as the keyword for the initial competition, primarily due to the fact it is an acronym for Search Engine Results Page. Not a well known word, except by SEOs, this meant it was not a particularly competitive target, allowing for the tracking of competing sites to be reasonably easy.



What is Server?
Server is a computer software application that carries out some task on behalf of users. This is usually divided into file serving, allowing users to store and access files on a common computer; and application serving, where the software runs a computer program to carry out some task for the users. This is the original meaning of the term. Web, mail, and database servers are what most people access when using the internet.



What is Session ID?
Session ID (Session Identifier) is a value generated by a server that identifies a particular session.



What is Shareware?
There is commercial software and then there is shareware. With commercial software, you have to pay for the product before you use it. With shareware, you can use the product for a trial period and then decide if you want to keep it. If you want to keep the software after the trial period is up, you're supposed to (and should) register the product and pay the shareware fee. As an extra incentive to pay for the software, many shareware programs disable certain features in the non-registered version and some will keep bugging you to register the program after the trial period has expired. Shareware programs are usually less expensive than commercial software programs, but they are usually less expensive to develop as well. This is why shareware programs are typically not as robust as commercial software programs. However, there are numerous shareware programs out there, such as system utilities, that can be very useful. The most common way to get shareware these days is off the Internet.



What is Shell?
Most people know of shells as small protective coverings for certain animals, such as clams, crabs, and mollusks. You may also find a shell on the outside of an egg, which I highly recommend you remove before eating. In the computer science world, however, a shell is a software program that interprets commands from the user so that the operating system can understand them and perform the appropriate functions. The shell is a command-line interface, which means it is soley text-based. The user can type commands to perform functions such as run programs, open and browse directories, and view processes that are currently running. Since the shell is only one layer above the operating system, you can perform operations that are not always possible using the graphical user interface (GUI). Some examples include moving files within the system folder and deleting files that are typically locked. The catch is, you need to know the correct syntax when typing the commands and you may still be prompted for a password in order to perform administrative functions. Shells are most commonly associated with Unix, as many Unix users like to interact with the operating system using the text-based interface. Two common Unix shells are the Bourne shell and the C Shell, which is used by BSD. Most Unix systems have both of these shells available to the user. Windows users may be more familiar with DOS, the shell that has long been included with the Windows operating system. Most computer users have no need to use the shell interface, but it can be a fun way to perform functions on your computer, as well as impress your friends.



What is SHTML?
A file name extension that identifies web pages containing SSI commands.



What is SIMM?
Stands for "Single In-Line Memory Module." This is an older type of computer memory. A SIMM is a small circuit board with a bunch of memory chips on it. SIMMs use a 32-bit bus, which is not as wide as the 64-bit bus dual in-line memory modules (DIMMs) use. Newer processors require a 64-bit memory bus, so it is best to use DIMMs. Sometimes you can get away with installing SIMMS, but they have to be installed in pairs.



What is Skin?
This strange term refers to the appearance of a program's interface. By changing the skin of a program, you can make the interface look completely different, but usually still have all the same functions. It is similar to a "Theme" you may use to customize the appearance of your computer's desktop. Skins have become particularly popular for MP3 players. Because of the simple interface of most MP3 programs, it is easy to create different looks for the interface. Other programs, such as Netscape 6, ICQ, Yahoo Messenger, and Windows Media Player also support skins. If you're one of those people who can't stand seeing the same thing over and over again, skins are for you. Some programs that support skins even provide a skin development kit that your can use to create your own. Though this allows for an unlimited amount of interface customizing, it can make it hard to recognize or use the same program on different computers.



What is Skyscraper?
While not as common as the banner ad, the skyscraper is another prevalent form of Web advertising. Skyscraper ads, which are tall and narrow, get their name from the tall buildings you often see in big cities. They are typically placed to the left or right of the main content on the page, which allows all or part of the ad to be visible even as the user scrolls down the window. Skyscraper ads come in two standard sizes -- 120 pixels wide by 600 pixels high (120x600) and 160 pixels wide by 600 pixels high (160x600). They can contain text advertisements, images, or animations. When users click on a skyscraper ad, they are redirected to the advertiser's website.



What is Slashdot?
Press releases can often trigger increased interest in a certain topic, and if a Web site link is provided in the release, this can translate to increased hits to the Web site. If the increase in traffic is so dramatic that it causes the server to be completely unreachable, the server is said to have been "slashdotted." The name came into being after October, 1998, when a press release was published on the Slashdot.org Web site, resulting in a major surge in traffic to another Web server, causing it to go down. You can also use the term as a verb, as in, "Dude, thanks to that stupid article, our server got slashdotted today, man!"



What is SMART?
Stands for "Self-Monitoring Analysis And Reporting Technology." It is used to protect and prevent errors in hard drives. The SMART technology basically monitors and analyzes hard drives (hence the name), then checks the health of your hard drive and lets you know if there are any problems. The main purpose of SMART is to keep your hard drive running smoothly and prevent it from crashing.



What is SMS?
Stands for "Short Message Service." SMS is used to send text messages to mobile phones. The messages can typically be up to 160 characters in length, though some services use 5-bit mode, which supports 224 characters. SMS was originally created for phones that use GSM (Global System for Mobile) communication, but now all the major cell phone systems support it. While SMS is most commonly used for text messaging between friends or co-workers, it has several other uses as well. For example, subscription SMS services can transmit weather, news, sports updates, and stock quotes to users' phones. SMS can also notify employees of sales inquiries, service stops, and other information pertinent to their business. Doctors can receive SMS messages regarding patient emergencies. Fortunately, text messages sent via SMS do not require the recipient's phone to be on in order for the message to be successfully transmitted. The SMS service will hold the message until the recipient turns on his or her phone, at which point the message will be be sent to the recipient's phone. Most cell phone companies allow you to send a certain number of text messages every month for no charge. Though it would be a good idea to find out what that number is before you go text message crazy.



What is SMTP?
SMTP is a relatively simple, text-based protocol, where one or more recipients of a message are specified (and in most cases verified to exist) and then the message text is transferred. It is quite easy to test a SMTP server using the telnet program. SMTP uses TCP port 25. To determine the SMTP server for a given domain name, the MX (Mail eXchange) DNS record is used.



What is SOAP?
Stands for "Simple Object Access Protocol," and can do more than just get your hands clean. SOAP is a method of transferring messages, or small amounts of information, over the Internet. SOAP messages are formatted in XML and are typically sent using HTTP (hypertext transfer protocol). Both are widely supported data transmission standards. HTTP, which is the protocol that Web pages are sent over, has the additional advantage of avoiding most network firewalls. Since firewalls usually do not block port 80 (HTTP) traffic, most SOAP messages can pass through without any problems. Each SOAP message is contained in an "envelope" that includes a header and a body. The header may include the message ID and date the message was sent, while the body contains the actual message. Because SOAP messages all use the same format, they are compatible with many different operating systems and protocols. For example, a user can send a SOAP message from a Windows XP machine to a Unix-based Web server without worrying about the message being altered. The Unix machine can then redirect the message to the appropriate location or open the file using a program on the system. While most SOAP messages are sent over the Web via HTTP, they can also be sent via e-mail, using SMTP.



What is Socket?
When a computer program needs to connect to a local or wide area network such as the Internet, it uses a software component called a socket. The socket opens the network connection for the program, allowing data to be read and written over the network. It is important to note that these sockets are software, not hardware, like a wall socket. So, yes, you have a much greater chance of being shocked by a wall socket than by a networking socket. Sockets are a key part of Unix and Windows-based operating systems. They make it easy for software developers to create network-enabled programs. Instead of constructing network connections from scratch for each program they write, developers can just include sockets in their programs. The sockets allow the programs to use the operating system's built-in commands to handle networking functions. Because they are used for a number of different network protocols (i.e. HTTP, FTP, telnet, and e-mail), many sockets can be open at one time.



What is Solid State?
Solid state, at its most basic level, means "no moving parts." Therefore, solid state electronic devices are made up of solid components that do not move. Some examples include computer motherboards and integrated circuits. Devices that use only solid state parts, such as television sets, speakers, and digital watches, are often referred to as solid state products. Flash memory devices are solid state products, while hard drives are not. This is because hard drives use a spinning disk and moving drive head to read and write data, while flash memory uses electric charges to perform the same functions. For this reason, flash memory devices are seen as more durable than hard drives. This is why flash memory is often used in products such as portable MP3 players and digital cameras. Because solid state devices have no moving parts, they are less likely to break down than devices that have mobile mechanisms. For this reason, it is often more worthwhile to buy an extended warranty on electronics that have moving parts than those that do not. That is something you may want to think about next time you are shopping.



What is Spam?
Spamming is the use of any electronic communications medium to send unsolicited messages in bulk. In the popular eye, the most common form of spam is that delivered in e-mail as a form of commercial advertising. However, over the short history of electronic media, people have done things comparable to spamming for many purposes other than the commercial, and in many media other than e-mail. In this article and those related, the term spamming is used broadly to refer to all of these behaviors, regardless of medium and commercial intent.



What is Spider?
A spider is a program which browses the World Wide Web in a methodical, automated manner. A web crawler is one type of bot. Web crawlers not only keep a copy of all the visited pages for later processing - for example by a search engine but also index these pages to make the search narrower.



What is Spyware?
As the name implies, this is software that "spies" on your computer. Nobody likes to be spied on, and your computer doesn't like it either. Spyware can capture information like Web browsing habits, e-mail messages, usernames and passwords, and credit card information. If left unchecked, the software can transmit this data to another person's computer over the Internet. So how does spyware get on your computer? Just like viruses, spyware can be installed when you open an e-mail attachment containing the malicious software. It can also be installed when you install another program that has a spyware installer attached to it. Because of the insidious nature of spyware, most people don't even know when spyware is on their computer. Fortunately, you can purchase anti-spyware utilities that will search for spyware on your computer and stomp the unwanted software out of your system. A good way to prevent spyware from infecting your computer is to install a security program that lets you know when any program is being installed, so that you can choose to authorize or stop the installation.



What is SQL?
Structured Query Language (SQL) is the most popular computer language used to create, modify and query databases.



What is SSI?
Server Side Includes or SSI is a simple server-side scripting language used almost exclusively for the web. As its name implies, its primary use is including the contents of one file in another.



What is SSL?
Secure Sockets Layer (SSL), its successor, are cryptographic protocols which provide secure communications on the Internet.



What is Stack?
A stack is a type of data structure -- a means of storing information in a computer. When a new object is entered in a stack, it is placed on top of all the previously entered objects. In other words, the stack data structure is just like a stack of cards, papers, credit card mailings, or any other real-world objects you can think of. When removing an object from a stack, the one on top gets removed first. This method is referred to as LIFO (last in, first out). The term "stack" can also be short for a network protocol stack. In networking, connections between computers are made through a series of smaller connections. These connections, or layers, act like the stack data structure, in that they are built and disposed of in the same way.



What is Standalone?
A standalone device is able to function independently of other hardware. This means it is not integrated into another device. For example, a TiVo box that can record television programs is a standalone device, while a DVR that is integrated into a digital cable box is not standalone. Integrated devices are typically less expensive than multiple standalone products that perform the same functions. However, using standalone hardware typically allows the user greater customization, whether it be a home theater or computer system. Standalone can also refer to a software program that does not require any software other than the operating system to run. This means that most software programs are standalone programs. Software such as plug-ins and expansion packs for video games are not standalone programs since they will not run unless a certain program is already installed.



What is Static Page?
Static Page is a standard web page using only HTML. Static pages do not employ dynamic technologies (like PHP, ASP, Perl...), and have standard URL's.



What is Streaming?
Data streaming, commonly seen in the forms of audio and video streaming, is when a multimedia file can be played back without being completely downloaded first. Most files, like shareware and software updates that you download off the Internet, are not streaming data. However, certain audio and video files like Real Audio and QuickTime documents can be streaming files, meaning you can watch a video or listen to a sound file while it's being downloaded to your computer. With a fast Internet connection, you can actually stream live audio or video to your computer.



What is String?
A string is a data type used in programming, such as an integer and floating point unit, but is used to represent text rather than numbers. It is comprised of a set of characters that can also contain spaces and numbers. For example, the word "hamburger" and the phrase "I ate 3 hamburgers" are both strings. Even "12345" could be considered a string, if specified correctly. Typically, programmers must enclose strings in quotation marks for the data to recognized as a string and not a number or variable name. For example, in the comparison: if (Option1 == Option2) then ... Option1 and Option2 may be variables containing integers, strings, or other data. If the values are the same, the test returns a value of true, otherwise the result is false. In the comparison: if ("Option1" == "Option2") then ... Option1 and Option2 are being treated as strings. Therefore the test is comparing the words "Option1" and "Option2," which would return false. The length of a string is often determined by using a null character.



What is Subdomain?
In the DNS hierarchy, a subdomain is a domain that is part of a larger domain name. A DNS hierarchy consists of the root-level domain at the top, underneath which are the top-level domains, followed by second-level domains and finally subdomains.



What is Switch?
A switch is used to network multiple computers together. Switches made for the consumer market are typically small, flat boxes with 4 to 8 Ethernet ports. These ports can connect to computers, cable or DSL modems, and other switches. High-end switches can have more than 50 ports and often are rack mounted. Switches are more advanced than hubs and less capable than routers. Unlike hubs, switches can limit the traffic to and from each port so that each device connected to the switch has a sufficient amount of bandwidth. For this reason, you can think of a switch as a "smart hub." However, switches don't provide the firewall and logging capabilities that routers do. Routers can often be configured by software (typically via a Web interface), while switches only work the way the hardware was designed. The term "switch" can also be used to refer to a small lever or button on computer hardware. And while it has nothing to do with computers, "riding switch" means riding backwards in skateboarding and snowboarding.



What is System Hardening?
Most computers offer network security features to limit outside access to the system. Software such as antivirus programs and spyware blockers prevent malicious software from running on the machine. Yet, even with these security measures in place, computers are often still vulnerable to outside access. System hardening, also called Operating System hardening, helps minimize these security vulnerabilities. The purpose of system hardening is to eliminate as many security risks as possible. This is typically done by removing all non-essential software programs and utilities from the computer. While these programs may offer useful features to the user, if they provide "back-door" access to the system, they must be removed during system hardening. Advanced system hardening may involve reformatting the hard disk and only installing the bare necessities that the computer needs to function. The CD drive is listed as the first boot device, which enables the computer to start from a CD or DVD if needed. File and print sharing are turned off if not absolutely necessary and TCP/IP is often the only protocol installed. The guest account is disabled, the administrator account is renamed, and secure passwords are created for all user logins. Auditing is enabled to monitor unauthorized access attempts. While these steps are often part of operating system hardening, system administrators may choose to perform other tasks that boost system security. While both Macintosh and Windows operating systems can be hardened, system hardening is more often done on Windows machines, since they are more likely to have their security compromised.



What is System Requirements?
Whenever you purchase software or hardware for your computer, you should first make sure your computer supports the system requirements. These are the necessary specifications your computer must have in order to use the software or hardware. For example, a computer game may require you computer to have Windows XP or later, a 2.0 GHz processor, 512 MB or RAM, a 64 MB graphics card, and 500 MB or hard drive space. If your computer does not meet all of these requirements, the game will not run very well or might not run at all. It is just as important to check system requirements for hardware devices. For example, if you buy a printer, it may require either Windows XP or Mac OS X 10.3 or later. It may also require a USB port and 80 MB of available hard drive space. If your computer does not have any USB ports, you will not be able to physically connect the printer. If your machine does not have Windows XP or Mac OS X 10.3 or later, the printer drivers may be incompatible with your operating system. This means you computer will be unable to recognize the printer. Most hardware and software products have the system requirements printed on the side or bottom of the product packaging. When you are shopping for computer software or hardware, it is a good idea to first find out exactly what your system's specifications are and write them down on a piece of paper. The important information to record includes: Operating System (i.e. Windows XP, SP 2 or Mac OS X 10.3.8) Processor Speed (i.e. Pentium 4, 3.2 GHz or Power PC G5, 2.0 GHz) Memory, a.k.a. RAM (i.e. 512 MB) Graphics Card (i.e. ATI Radeon 9800 w/ 256 MB video memory) Hard Disk Space (i.e. 80 GB available) I/O Ports (i.e. USB, Firewire, Serial, Parallel, SCSI, VGA, DVI ports) By recording these specifications from your computer, you will be able to make sure your computer supports the products you are buying



What is System Resources?
Your computer has many types of resources. They include the CPU, video card, hard drive, and memory. In most cases, the term "system resources" is used to refer to how much memory, or RAM, your computer has available. For example, if you have 1.0 GB (1024 MB) of RAM installed on your machine, then you have a total of 1024 MB of system resources. However, as soon as your computer boots up, it loads the operating system into the RAM. This means some of your computer's resources are always being used by the operating system. Other programs and utilities that are running on your machine also use your computer's memory. If your operating system uses 300 MB of RAM and your active programs are using 200 MB, then you would have 524 MB of "available system resources." To increase your available system resources, you can close active programs or increase your total system resources by adding more RAM. System resources can also refer to what software is installed on your machine. This includes the programs, utilities, fonts, updates, and other software that is installed on your hard drive. For example, if a file installed with a certain program is accidentally removed, the program may fail to open. The error message may read, "The program could not be opened because the necessary resources were not found." As you can see, the term "system resources" can be a bit ambiguous. Just remember that while it usually refers to your computer's memory, it can be used to describe other hardware or software as well.



What is System Software?
System software refers to the files and programs that make up your computer's operating system. System files include libraries of functions, system services, drivers for printers and other hardware, system preferences, and other configuration files. The programs that are part of the system software include assemblers, compilers, file management tools, system utilites, and debuggers. The system software is installed on your computer when you install your operating system. You can update the software by running programs such as "Windows Update" for Windows or "Software Update" for Mac OS X. Unlike application programs, however, system software is not meant to be run by the end user. For example, while you might use your Web browser every day, you probably don't have much use for an assembler program (unless, of course, you are a computer programmer). Since system software runs at the most basic level of your computer, it is called "low-level" software. It generates the user interface and allows the operating system to interact with the hardware. Fortunately, you don't have to worry about what the system software is doing since it just runs in the background. It's nice to think you are working at a "high-level" anyway.



What is System Unit?
This is the technical term that refers to the box that houses your computer. The system unit refers to the computer itself but does not include the monitor, the keyboard, the mouse, or any other peripherals. I suppose most people will probably know what you mean when you refer to "the box," but saying "system unit" will definitely make you sound more sophisticated.



What is Systray?
The systray, short for "system tray," is located on the right side of the Windows toolbar. It is the collection of small icons on the opposite side of the Start Menu. The volume control and the date & time are default items in the systray and many more can be added. Some common icons that get placed in the systray are virus-scan, mouse, and instant messenger icons. They usually get put in the systray (whether you like it or not) when their respective programs are installed. The nice thing about the systray is that it allows quick and easy access to programs and control settings. Most systray icons will open a control panel or program when double-clicked. However, if you install too many of them, the area can get so cluttered, you may find it easier to just browse your hard drive and open the program.