Biyernes, Nobyembre 27, 2015

Counter

Counter

Counter may refer to:
  • Counter-, a prefix conveying the meaning "against":
  • Countertop, a flat surface or worktop, possibly in a kitchen, shop, or other service
  • Countertenor, a type of classical male singing voice
  • Bar (counter), the countertop at which drinks are served in a bar
  • Compter, a small jail
  • Part of a ship's stern above the waterline that extends beyond the rudder stock (see nautical terms)
  • The Counter, a global hamburger restaurant chain

Client

Client


computer network diagram of client computers communicating with a server computer via theInternet
client is a piece of computer hardware or software that accesses a service made available by a server. The server is often (but not always) on another computer system, in which case the client accesses the service by way of a network.[1] The term applies to programs or devices that are part of a client–server model.

Contents

  [hide

Chatroom

Chatroom
The term chat room, or chatroom, is primarily used to describe any form of synchronous conferencing, occasionally even asynchronous conferencing. The term can thus mean any technology ranging from real-time online chat and online interaction with strangers (e.g., online forums) to fully immersive graphical social environments.
The primary use of a chat room is to share information via text with a group of other users. Generally speaking, the ability to converse with multiple people in the same conversation differentiates chat rooms from instant messaging programs, which are more typically designed for one-to-one communication. The users in a particular chat room are generally connected via a shared interest or other similar connection, and chat rooms exist catering for a wide range of subjects. New technology has enabled the use of file sharing and webcams to be included in some programs. This can be considered a chat room.


chat

chat


Real-time communication between two users via computer. Once a chat has been initiated, either user can enter text by typing on thekeyboard and the entered text will appear on the other user'smonitor. Most networks and online services offer a chat feature.

Chain letter

Chain letter

A typical chain letter consists of a message that attempts to convince the recipient to make a number of copies of theletter and then pass them on to as many recipients as possible. In reality, the "chain" is actually a geometrically progressing pyramid that cannot be sustained indefinitely. Common methods used in chain letters include emotionally manipulative stories, get-rich-quick pyramid schemes, and the exploitation of superstition to threaten the recipient with bad luck or even physical violence or death if he or she "breaks the chain" and refuses to adhere to the conditions set out in the letter. Chain letters started as actual letters that one received in the mail. Today, chain letters are generally no longer actual letters. They are sent through email messages, postings on social network sites, and text messages.
There are two main types of chain letters:
  1. Hoaxes - Hoaxes attempt to trick or defraud users. A hoax could be malicious, instructing users to delete a file necessary to the operating system by claiming it is a virus. It could also be a scam that convinces users to send money or personal information. Phishing attacks could fall into this.
  2. Urban legends - Urban legends are designed to be redistributed and usually warn users of a threat or claim to be notifying them of important or urgent information. Another common form are the emails that promise users monetary rewards for forwarding the message or suggest that they are signing something that will be submitted to a particular group. Urban legends usually have no negative effect aside from wasted time.
In the United States, chain letters that request money or other items of value and promise a substantial return to the participants (such as the infamous Make Money Fast scheme) are illegal.[1]
Some colleges and military bases have passed regulations stating that in the private mail of college students and military personnel, respectively, chain letters are not authorized and will be thrown out. However, it is often difficult to distinguish chain letters from genuine correspondence.



Computer-generated imagery (CGI)

Computer-generated imagery

Computer-generated imagery (CGI) is the application of computer graphics to create or contribute to images in art, printed media, video games, films, television programs, commercials, videos, and simulators. The visual scenes may be dynamic or static, and may be two-dimensional (2D), though the term "CGI" is most commonly used to refer to 3D computer graphics used for creating scenes or special effects in films and television.
The term 'CGI animation' refers to dynamic CGI rendered as a movie. The term virtual world refers to agent-based, interactive environments. Computer graphics software is used to make computer-generated imagery for films, etc. Availability of CGI software and increased computer speeds have allowed individual artists and small companies to produce professional-grade films, games, and fine art from their home computers. This has brought about an Internet subculture with its own set of global celebrities, clichés, and technical vocabulary. The evolution of CGI led to the emergence of virtual cinematography in the 1990s where runs of thesimulated camera are not constrained by the laws of physics.

Contents

Byte

Byte

The byte (/ˈbt/) is a unit of digital information that most commonly consists of eight bits. Historically, the byte was the number of bits used to encode a singlecharacter of text in a computer[1][2] and for this reason it is the smallest addressable unit of memory in many computer architectures. The size of the byte has historically been hardware dependent and no definitive standards existed that mandated the size. The de facto standard of eight bits is a convenient power of twopermitting the values 0 through 255 for one byte. The international standard IEC 80000-13 codified this common meaning. Many types of applications use information representable in eight or fewer bits and processor designers optimize for this common usage. The popularity of major commercial computing architectures has aided in the ubiquitous acceptance of the 8-bit size.[3]
The unit octet was defined to explicitly denote a sequence of 8 bits because of the ambiguity associated at the time with the byte.[4] The usage of the term octad(e)for 8 bits is no longer common today.

credit to the owner