IT Glossary
Περιήγηση στο γλωσσάριο χρησιμοποιώντας αυτό το ευρετήριο
Ειδικά | Α | Β | Γ | Δ | Ε | Ζ | Η | Θ | Ι | Κ | Λ | Μ | Ν | Ξ | Ο | Π | Ρ | Σ | Τ | Υ | Φ | Χ | Ψ | Ω | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | ΟΛΑ
E |
---|
e-readerAn electronics device used to read digital media such as an e-book or e-mag. | |
Easy TransferA free application from Microsoft that copies files and operating system settings to another drive, removable media, over a network, or to another storage location. | |
ECC (error correcting code)Uses a mathematical algorithm to verify data accuracy. ECC is more expensive than parity, and the motherboard or memory controllers must also have additional circuitry to process ECC. | |
echo off'A command used from a command prompt that prevents characters from displaying on the screen. | |
Edge | |
edit | |
EEPROM (electrically erasable programmable read-only memory)A non-volatile memory technology that can store a small amount of data. EEPROMs were previously used for computer BIOS. Flash memory is used today. | |
effective permissionsThe final permissions granted for a particular resource. Folder permissions are cumulative—the combination of the group and the person’s permissions. The deny permission overrides any allowed permission set for a user or a group. When NTFS and shared folder permissions are both used, the more restrictive of the two becomes the effective permissions. | |
EFS(Encrypting File System) A Windows encryption feature in which only the authorized user may view or change a file encrypted with EFS. | |
EIDE (Enhanced Integrated Drive Electronics)Signifies two IDE connectors (four devices) and support of the ATAPI standard. | |
electrical fire safetyKnowledge of how to extinguish an electrical fire using fire extinguisher Type A-B-C or fire extinguisher Type C. | |
electronic key cardAn alternative to a key for room or building access. | |
email filteringSecurity rules specific to email that process incoming messages before forwarding on to a specific user. | |
embedded systemA computer that has a specific function within a larger system, such as in medical, manufacturing, or airport industries. | |
emergency notificationWireless emergency alert (WEA); a U.S. method of propagating an emergency announcement such as an amber alert, presidential announcement, or weather alert. | |
EMI (electromagnetic interference)Electronic noise generated by electrical devices. | |
EMP (electromagnetic pulse)A short burst of energy that can cause problems in electronic equipment. | |
emulatorA technique used to make one operating system act like another operating system. | |
encryptionA method of securing data from unauthorized users in which data is converted into an unreadable format. | |
end-of-life | |
end-point management serverA centralized solution used for distributing software, configurations, security management, profile management, imaging/re-imaging computers, and inventory management. | |
end-user acceptanceA part of change management in which the person who will use an IT system tests the changes to ensure that the deliverables or outcomes have been met. | |
end-user device configurationEvery end-user device on a wired or wireless network must be configured with some basic settings, such as an IP address, default gateway, and subnet mask. | |
end-user educationA great security method to use because by educating users, security issues get reported and dealt with earlier with less damage to a company. Part of a technician’s job might be to teach a user how to do something to avoid technical issues or to prevent security issues. | |
energy absorption/dissipationA surge protector feature. The greater number of joules that can be dissipated by the surge protector, the more effective and durable it is. | |
ENERGY STARA set of energy efficiency standards including those related to total energy requirements and low power mode(s) and an efficiency standard that a product must meet to achieve this standard. | |
entry control rosterA list of employees who are authorized in a particular area. Also called an access control roster. | |
environment variable | |
environmental enclosure | |
EPEAT rating systemA rating system that works with the Environmental Protection Agency (EPA) to identify products that have a green (and clean) design. | |
EPROM (erasable programmable read-only memory)A type of non-volatile memory (which means the contents remain when power is removed). | |
equality operatorA method in scripting used to compare two values. Another name for comparison operator or equals operator. | |
equals operatorA method in scripting used to compare two values. Another name for comparison operator or equality operator. | |
equipment groundingThe components in a device such as a computer that are at the same voltage potential. Grounding is important to personal safety because consistent grounding minimizes the potential of voltages being applied to places it shouldn’t be applied, such as the case. If a piece of equipment is not grounded, someone could receive a shock or be electrocuted simply by touching it. | |
erase lampA component inside a laser printer that neutralizes any charges left on the drum so that the next printed page receives no residuals from the previous page. | |
ERD (emergency repair disk)A disk used with older Microsoft operating systems to start the computer and begin the operating system repair process. | |
Error CheckingA Windows tool that checks the drive for file system errors, bad hard drive sectors, and lost clusters. | |
error code | |
error correcting | |
error messageAn indication provided by a system or an application that should be noted to help in troubleshooting. | |
eSATA (External Serial ATA)A port used to connect external SATA devices to a computer. | |
eSATA bracketA part that installs into an empty expansion slot that has one or more eSATA ports. Each port on the bracket has a SATA cable that attaches to an available motherboard SATA port. | |
eSATA cardAn adapter used to add external SATA ports so that external storage devices can be used. May include ports for internal SATA devices. | |
eSATA portA nonpowered port used to connect external storage devices at a maximum of 2 meters (6 feet). | |
eSATAp port | |
ESCD (Extended System Configuration Data)A specification that provides the BIOS and operating system a means for communicating with plug-and-play devices. As the computer boots, the BIOS records legacy device configuration information. Plug-and-play devices use this information to configure themselves and avoid conflicts. When an adapter has resources assigned and the resources are saved in ESCD, the resources do not have to be recalculated unless a new device is added to the computer. | |
ESD (electrostatic discharge)Occurs when stored-up static electricity is discharged in an instantaneous surge of voltage. Cumulative effects of ESD weaken or destroy electronic components. | |
ESD matA pad that is placed on a surface to prevent electrostatic discharge events. Such a mat commonly has a place to attach an antistatic wrist strap. | |
ESD strapAn item that fits around a technician’s wrist and connects to an electronic component so that the technician and the component are at the same voltage potential, thus preventing an electrostatic discharge event, which can cause damage to electronic components. | |
Ethernet | |