Similar to the North America T3 high speed digital transmission, the E3
European counterpart is capable of transmitting data at 34.368 Mbps.
Extended Binary Coded Decimal Interchange Code. It is also called the
Extended ASCII Code. This is a common asynchronous code used by IBM. It is
pronounced "ehb-suh-dik". Many corporation that have legacy applications and
databases in IBM's OS/390 operating system use this code for the text files.
The 8 bit character code is used to represent 256 different bit patterns.
Error Checking and Correction. A method of detecting and correcting system
memory errors by adding additional bits and using a special algorithm.
(Electronic Document Management):
Using specific document management software, users can capture and retrieve
documents in image, audio, video and text forms.
Short for Extended Data Output, a type of dynamic random access memory. EDO
memory is much faster than DRAM because it can access more than one block of
information at a time. EDO memory accesses a block of memory and as it is
sending the information from one block it starts accessing another block to
Electrical Erasable Programmable Read Only Memory. This type of memory can
be reprogrammed and erased electronically repeatedly by using a device
programmer which provides an electric surge. This memory is similar to DRAM,
however not as fast, but EEPROM will retain its data even in the event of a
power loss. Because of its similarities to flash memory, EEPROM is sometimes
referred to as "Flash EEPROM". The difference between flash memory and
EEPROM is that EEPROM erases and rewrite data one byte at a time whereas
flash memory has the ability to erase and rewrite in blocks. Therefore flash
memory is much faster.
Enhanced Integrated Development Environment. This an enhanced version of the
IDE hardware technology but is much faster. It allows for more memory, can
access larger hard drives and can support up to four other IDE devices.
Stands for Electronic Mail. This is a system of relaying messages across the
Internet, from one Internet user to another.
When adding an element from one document to another document. Example: A
sound file is created in one document, then it is embedded in an HTML
document for publication to the Web.
This term refers to a program or device that has the ability to imitate
another. A common example would be that many printer manufactures software
emulate the Hewlett-Packard Laser Jet software because of the fact that so
many of these printers exist. Emulation does not exist only for software.
Hardware can be emulated as well.
Encryption is the process of converting data into "unreadable code" is so
that unauthorized people cannot understand the content. Encryption may be
used to make stored data private (e.g., data that is stored on a potentially
vulnerable hard disk), or to allow a nonsecure communications channel to
serve as a private communications channel. Encryption is sometimes described
as the process of converting plaintext into ciphertext. To decipher the
message, the receiver of the encrypted data must have the proper decryption
in "Search Engine"):
This is the working part of a database or application.
This is an enhanced version of the ATA-2 standard for managing the interface
between secondary storage devices and a computer system.
The interaction of all things external to a physical platform. This could be
made up of software, hardware or networking procedures that communicate with
the system to provide a particular service.
Erasable Programmable Read-Only Memory. It is pronounced "ee-prom". This
type of memory is designed to hold information until exposed to ultraviolet
light in which case the information or memory is erased. Once exposed to
this ultraviolet light, the EPROM can then be reprogrammed. A PROM burner or
PROM programmer is used for the rewriting task. The difference between EPROM
and its PROM counterpart is that the EPROM can be rewritten and PROM cannot.
This makes it possible for the manufacture to change the contents of the
EPROM to a newer or bug-free version prior to the computer being shipped.
In many cases, it may be acceptable if an input device generates a certain
number of errors. This is often referred to as the error rate and the
acceptable level will vary according to the input device being used and the
business application. Optical character recognition, for example, is
generally considered a comparatively unreliable means of entering data. At
present, a typical OCR software package will have an error rate of between
five and ten per cent.
Stands for Electro Static Discharge and is defined as a sudden flow of
electricity between two objects at different electrical potentials. ESD is a
primary cause of integrated circuit damage or failure.
Electro Static Discharge testing is one kind of test that hardware usually
has to pass to prove it is suitable for sale and use. The hardware must
still work after is has been subjected to some level of electrostatic
discharge. Some organizations have their own ESD requirements which hardware
must meet before it will be considered for purchase.
Different countries have different legal regulations about levels of ESD.
How to help
The best way to help prevent ESD is either to use a wrist strap, or a
grounding mat. However most users do not have access to such items therefore
you can follow the below guidelines to help prevent ESD as much as possible.
Insure what you are not wearing an item that conducts a lot of Electrical
Charge, such as a wool sweater. Also it is generally a good idea to remove
all jewelry as well.
Weather - When
working on your computer insure there is not an electrical storm outside
which increases the potential of ESD.
Cords - Insure
everything is removed from the back of the computer (power cord, mouse,
- Insure you and the computer are at Zero Potential by continuously touching
the un-painted metal chassis (computer frame) or the Power supply.
Standing - When
working inside the computer it is highly recommended that you stand at ALL
Surface - It is
always best to stand on a wooden surface. Avoid working on a computer in
A networking system that enables high speed data communication over coaxial
cables. The Ethernet network system supports TCP/IP, AppleTalk, Novell
Netware, and other network protocols. An Ethernet (LAN) connection is 10
Mbit/s or 100 Mbit/s, and is used to connect many computers that can all
"talk" directly to each other. Normally they will all talk with a few
servers and printers, but the network is all-to-all. The distance is
normally limited to below 1 km.
An executable file or has a file extension of .EXE. It is a type of binary
file designed to be directly executed by a computer system. Unlike source
files, an executable file cannot be read by humans. They are specifically
designed to be interpreted as a program.
Anther term for Expanded Memory is EMS (Expanded Memory Specification). In a
DOS based system there is 1 MB (megabyte) of address space available for
main memory. 384K is for high-memory and 640K is for the conventional
memory. To expand the memory capabilities, this technique is applied to the
A group of control lines that provide a buffered interface to devices
located either on the system board or on cards that are plugged into
expansion connectors. Common expansion buses included on the system board
are USB, PC Card, and PCI.
This is a circuit card that it attached to the motherboards expansion slot.
By using an expansion card, you can increase a systems functionality by
providing the access to additional devices or features.
This memory expands upon a DOS systems existing conventional memory.
A modem that is separate from the actual computer system and is
self-contained in its own box. Because of the additional expense of creating
the housing for the external modem, they tend to be a little more expensive
that its internal modem counterpart. An external modem can be easily moved
from one computer to the next because it is not attached directly to the
printed circuit board is the internal modem is.
An extranet is similar to an intranet. They both use Internet protocols. The
difference is that the extranet is designed to give a certain amount of
access to outside users where an intranet is securely set behind a firewall
and intended to be viewed by company employees or members of an organization
only. An extranet can be controlled to provide various levels of
accessibility to outside users and to what parts of the extranet they are
authorized to view. See Also: Intranet