bookssland.com » Encyclopedia » Network Terms to Learn - Kalai Selvi Arivalagan (best love novels of all time .TXT) 📗

Book online «Network Terms to Learn - Kalai Selvi Arivalagan (best love novels of all time .TXT) 📗». Author Kalai Selvi Arivalagan



1 ... 29 30 31 32 33 34 35 36 37 38
Go to page:
was stored on the local client machine. The DFS makes it convenient to share information and files among users on a network in a controlled and authorized way. The server allows the client users to share files and store data just as if they are storing the information locally. However, the servers have full control over the data, and give access control to the clients.

 

Backpropagation Mean

 

Backpropagation is an algorithm used in artificial intelligence (AI) to fine-tune mathematical weight functions and improve the accuracy of an artificial neural network's outputs.  A neural network can be thought of as a group of connected input/output (I/O) nodes. The level of accuracy each node produces is expressed as a loss function (error rate). Backpropagation calculates the mathematical gradient of a loss function with respect to the other weights in the neural network. The calculations are then used to give artificial network nodes with high error rates less weight than nodes with lower error rates.

Backpropagation uses a methodology called chain rule to improve outputs. Basically, after each forward pass through a network, the algorithm performs a backward pass to adjust the model’s weights. An important goal of backpropagation is to give data scientists insight into how changing a weight function will change loss functions and the overall behaviour of the neural network. The term is sometimes used as a synonym for "error correction."

Term of the day - 35

 

Social Networking Site (SNS)

 

A social networking site is an online platform that allows users to create a public profile and interact with other users. Social networking sites usually allow a new user to provide a list of people with whom they share a connection, and then allow the people on the list to confirm or deny the connection. After connections are established, the new user can search the networks of connections to make more connections.  A social networking site is also known as a social networking website or social website.

 

Cyclic Redundancy Check

The cyclic redundancy check (CRC) is a technique used to detect errors in digital data. As a type of checksum, the CRC produces a fixed-length data set based on the build of a file or larger data set. In terms of its use, CRC is a hash function that detects accidental changes to raw computer data commonly used in digital telecommunications networks and storage devices such as hard disk drives.

 

Wireless Local Area Network (WLAN)


A wireless local area network (WLAN) is a wireless distribution method for two or more devices. WLANs use high-frequency radio waves and often include an access point to the Internet. A WLAN allows users to move around the coverage area, often a home or small office, while maintaining a network connection. A WLAN is sometimes called a local area wireless network (LAWN).

 

File Management System

 

A file management system is used for file maintenance (or management) operations. It is is a type of software that manages data files in a computer system. A file management system has limited capabilities and is designed to manage individual or group files, such as special office documents and records. It may display report details, like owner, creation date, state of completion and similar features useful in an office environment.  A file management system is also known as a file manager.  

 

Data Definition Language (DDL)

A data definition language (DDL) is a computer language used to create and modify the structure of database objects in a database. These database objects include views, schemas, tables, indexes, etc.  This term is also known as data description language in some contexts, as it describes the fields and records in a database table.

 

Database Security

Database security refers to the collective measures used to protect and secure a database or database management software from illegitimate use and malicious cyber threats and attacks.  Database security procedures are aimed at protecting not just the data inside the database, but the database management system and all the applications that access it from intrusion, misuse of data, and damage.  It is a broad term that includes a multitude of processes, tools and methodologies that ensure security within a database environment.

 

Processor

A processor is an integrated electronic circuit that performs the calculations that run a computer. A processor performs arithmetical, logical, input/output (I/O) and other basic instructions that are passed from an operating system (OS). Most other processes are dependent on the operations of a processor.  The terms processor, central processing unit (CPU) and microprocessor are commonly linked as synonyms. Most people use the word “processor” interchangeably with the term “CPU” nowadays, it is technically not correct since the CPU is just one of the processors inside a personal computer (PC). The Graphics Processing Unit (GPU) is another processor, and even some hard drives are technically capable of performing some processing.

 

Constructor

 

A constructor is a special method of a class or structure in object-oriented programming that initializes a newly created object of that type. Whenever an object is created, the constructor is called automatically.  A constructor is like an instance method that usually has the same name as the class, and can be used to set the values of the members of an object, either to default or to user-defined values. However, although it resembles it, a constructor is not a proper method since it doesn’t have a return type. Instead of performing a task by executing code, the constructor initializes the object, and it cannot be static, final, abstract, and synchronized.

 

Network Layer

The network layer is a portion of online communications that allows for the connection and transfer of data packets between different devices or networks.  The network layer is the third level (Layer 3) of the Open Systems Interconnection Model (OSI Model) and the layer that provides data routing paths for network communication. Data is transferred to the receiving device in the form of packets via logical network paths in an ordered format controlled by the network layer.  Logical connection setup, data forwarding, routing and delivery error reporting are the network layer’s primary responsibilities. Layer 3 can be either able to support connection-oriented or connectionless networks (but not both of them at the same time).

 

Macro

 

A macro is an automated input sequence that imitates keystrokes or mouse actions. A macro is typically used to replace a repetitive series of keyboard and mouse actions and used often in spreadsheets and word processing applications like MS Excel and MS Word.   The file extension of a macro is commonly .MAC.   The concept of macros is also well-known among MMORPG gamers (Massively Multiplayer Online Role-Playing Games) and SEO (Search Engine Optimization) specialists. In the world of programming, macros are programming scripts used by developers to re-use code.  The term macro stands for “macro-instruction” (long instruction).

 

Ethereum


Ethereum is a contract management platform created by the Ethereum Foundation, a Swiss nonprofit group. It uses the digital financial ledger technology blockchain to create contracts that the foundation calls “smart contracts” that utilize blockchain to provide a static and consistent ledger record.

 

Broadband Wireless Access


Broadband wireless access (Wireless broadband, or WiBro) refers to inherent network mobility in a geographical area and managed mobility between fixed networks. Broadband wireless access facilitates and ensures mobile device connectivity and communication.  Broadband wireless access is also known as wireless local loop (WLL), fixed-radio access (FRA), fixed wireless access (FWA), radio in the loop (RITL) and metro wireless (MW).

 

Public Cloud Storage

 

Public cloud storage is a cloud storage model that enables individuals and organizations alike to store, edit and manage data. This type of storage exists on a remote cloud server and is accessible over the internet under a subscription-based utility billing method where the users pay only for the storage capacity being used.  Public cloud storage is provided by a storage service provider that hosts, manages and sources the storage infrastructure publicly to many different users.  Public cloud storage service is also known as storage as a service, utility storage and online storage. 

 

Kubernetes

 

Kubernetes is an open-source orchestration platform for working with software containers. Originally designed by Google, Kubernetes is now maintained by the Cloud Native Computing Foundation (CNCF).  Kubernetes helps microservice-based applications to be deployed automatically.

 

Behavioral Analytics


Behavioral analytics are a subset of business analytics which focus on finding out how and why people behave the way they do when using eCommerce platforms, social media sites, online games, and any other web application.  Behavioral analytics take business analytics’ broad focus and narrows it down, which allows one to take what seem to be unrelated data points and then extrapolate, determine errors, and predict future trends. All of this is done through data exhaust that has been generated by users.

Term of the day - 36

 

Universal Serial Bus

 

A Universal Serial Bus (USB) is a common interface that enables communication between devices and a host controller such as a personal computer (PC) or smartphone. It connects peripheral devices such as digital cameras, mice, keyboards, printers, scanners, media devices, external hard drives and flash drives. Because of its wide variety of uses, including support for electrical power, the USB has replaced a wide range of interfaces like the parallel and serial port.

 

A USB is intended to enhance plug-and-play and allow hot swapping. Plug-and-play enables the operating system (OS) to spontaneously configure and discover a new peripheral device without having to restart the computer. As well, hot swapping allows removal and replacement of a new peripheral without having to reboot.

 

There are several types of USB connectors. In the past the majority of USB cables were one of two types, type A and type B. The USB 2.0 standard is type A; it has a flat rectangle interface that inserts into a hub or USB host which transmits data and supplies power. A keyboard or mouse are common examples of a type A USB connector. A type B USB connector is square with slanted exterior corners. It is connected to an upstream port that uses a removable cable such as a printer. The type B connector also transmits data and supplies power. Some type B connectors do not have a data connection and are used only as a power connection.

 

Today, newer connectors have replaced old ones, such as the Mini-USB (or Mini-B), that has been abandoned in favor of the Micro-USB and USB-C cables. Micro-USB cables are usually used for charging and data transfer between smartphones, video game controllers, and some computer peripherals. Micro-USB are being slowly replaced by type-C connectors, which are becoming the new standard for Android smartphones and tablets.


A constructor is like an instance method that usually has the same name as the class, and can be used to set the values of the members of an object, either to default or to user-defined values. However, although it resembles it, a constructor is not a proper

1 ... 29 30 31 32 33 34 35 36 37 38
Go to page:

Free e-book «Network Terms to Learn - Kalai Selvi Arivalagan (best love novels of all time .TXT) 📗» - read online now

Comments (0)

There are no comments yet. You can be the first!
Add a comment