Lista Słówek Poziomu C2 - Technologia i Internet
Tutaj nauczysz się wszystkich niezbędnych słów w rozmowie o technologii i Internecie, zebranych specjalnie dla uczniów na poziomie C2.
Przegląd
Fiszki
Pisownia
Test
a technology that converts written text into spoken voice output
tekst na mowę, sędziowanie tekstu
a technology that allows devices to be connected to a computer system and used without requiring extensive installation or configuration
plug and play, gotowy do użycia
a small hardware device that connects to a computer, smartphone, or other electronic device to provide additional functionality
dongle, adapter USB
a small, handheld computer that fits in the palm of one's hand
komputer kieszonkowy, palmtop
the process of converting data into a coded form to prevent unauthorized access
szyfrowanie, kryptografia
a set of rules used by digital systems to decide what content to show users based on their behavior and preferences
algorytm
a type of switch used in user interfaces to turn a single setting on or off
przycisk przełączający, przycisk toggle
a program that automatically loads and initializes the operating system on a computer
uruchamianie, inicjalizacja
the time it takes for data to travel from one point to another in a network
latencja
the ability of different systems, software, or devices to seamlessly communicate, exchange data, and work together effectively
interoperacyjność, zdolność do współpracy
a set of protocols and tools that allows different software applications to communicate with each other
the maximum rate of data transfer of an electronic communication system
szerokość pasma
a network for communication between computers, usually within a building
a computer or device on a network that provides services, resources, or data to other computers or devices, known as clients
host, serwer
a type of educational software or online materials designed for teaching specific subjects or skills
materiały edukacyjne, oprogramowanie edukacyjne
a harmful program that pretends to be legitimate and can give unauthorized access to a device
koń trojański
to set up a system, device, software, or components in a specific way to achieve a desired functionality
konfigurować, ustawiać
to send a signal to a computer and wait for a reply as a way to test the connection
pingować, wysłać ping do
a technology that overlays computer-generated information, such as images or data, onto the real world, enhancing the user's perception and interaction with their environment
rzeczywistość rozszerzona, technologia rzeczywistości rozszerzonej
to make a process, task, or system operate automatically, often through the use of technology or machinery, reducing the need for manual intervention
automatyzować, uczynić automatycznym
a part of a computer responsible for storing and controlling data where users cannot easily access
backend, tylna część
a part of a computer that is easily accessible and one uses constantly
interfejs użytkownika, przednia część
an individual who engages in unauthorized attempts to access computer systems, networks, or software, often with malicious intent
cracker, haker