Essential Vocabulary for the GRE - Paranoid Android

Here you will learn some English words about computer and internet, such as "trojan horse", "corrupt", "router", etc. that are needed for the GRE exam.

review-disable

review

flashcard-disable

flashcard

spelling-disable

spelling

quiz-disable

quiz

start-learning
Essential Vocabulary for the GRE
analog [adjective]

relating to or using signals in which information is represented through constant changing of physical quantities

Ex:

a harmful program that pretends to be legitimate and can give unauthorized access to a device

Ex: His computer was infected by a trojan horse that appeared as an update .

a text containing instructions in a specific order that supports a programming language which human can read and it specifies the behaviors of a computer system

Ex: The source code for the app was stored in a version control system .

to verify a device, user, or process before an access to the computer's resources is allowed

Ex: The software prompts users to authenticate via a fingerprint scan .
to boot [verb]

to start a computer, typically involves setting up hardware elements to prepare the computer for use

Ex: He booted his laptop , ready to tackle the day 's programming assignments .

a test version of software released to users to find and fix bugs before the final release

Ex: The beta version helped identify several bugs before the final release .

a program that automatically loads and initializes the operating system on a computer

Ex: Many startups use bootstrap financing methods such as crowdfunding or bootstrapping to fund their initial development and growth .
cache [noun]

(computing) a type of computer memory in which information that is often in use can be stored temporarily, a cache can be accessed quickly and is needed while a program is running

Ex: The browser stores frequently visited websites in its cache .

(computing) a temporary storage area for data that has been copied or cut

Ex: He used the clipboard to quickly gather all the necessary data .

the ability of a computer, software, or equipment to work with another device or software

Ex: Compatibility between different versions of software is crucial for smooth operation .

the set-up, hardware, and software of a computer that makes a complete system

Ex: The software was incompatible with the current configuration of the machine .

to cause errors or damage to a digital file, program, or system, either intentionally or unintentionally, due to a malfunction or interference

Ex: Opening the email attachment might corrupt your system if it 's infected .

the non-physical space in which communication over computer networks takes place

Ex: The cybersecurity team monitors cyberspace for potential threats and unauthorized access attempts .

a tool that analyzes and identifies issues, errors, or problems within the software or system

Ex: She used a diagnostic to troubleshoot the network connectivity issue .

to convert machine code back into human-readable assembly language or source code for analysis or modification

Ex: The security expert disassembled the embedded system firmware to audit its code for potential security flaws .
dongle [noun]

a small hardware device that connects to a computer, smartphone, or other electronic device to provide additional functionality

Ex: A TV dongle can be used to stream content from a smartphone or computer to a television screen .
router [noun]

an electronic device that connects computer networks and sends data between networks

Ex: A router is essential for setting up a home or office network .

a type of non-volatile memory in a computer or electronic device where data is permanently stored

Ex:

a server that acts as an intermediary between a user's device and the internet, forwarding requests and responses to enhance security, privacy, or performance

Ex: Users in countries with internet restrictions can access blocked content by using a proxy server based in a different location .
piracy [noun]

unauthorized reproduction, distribution, or use of copyrighted materials, such as software, music, movies, or books

Ex: Piracy of e-books involves the unauthorized distribution of digital books without the author 's or publisher 's consent .
patch [noun]

a small piece of code or update applied to existing software to fix issues, enhance functionality, or address vulnerabilities

Ex: The software update included a patch to fix the security vulnerability .
open-source [adjective]

(computing) describing a computer program whose source code is available to everyone

Ex: The company adopted an open-source operating system for cost savings .
overload [noun]

a condition where an electrical system or device receives more current than it can safely handle

Ex: An overload in the electrical system led to a power outage .
malicious [adjective]

(of software or a code) intentionally designed to harm, damage, or disrupt computer systems, networks, or data

Ex: The IT team worked to remove the malicious software from the server .
intranet [noun]

a private network within an organization for internal communication, collaboration, and resource sharing among members

Ex: Intranet forums provide a platform for employees to discuss projects , share insights , and seek assistance .

(computing) the program through which a user can interact with a computer, especially its design and appearance

Ex: Users can customize the interface of their operating system to suit their preferences .

to convert data or information into a coded form, mainly to prevent unauthorized access

Ex: The messaging app encrypts communications to ensure secure conversations .
codec [noun]

a technology that compresses and decompresses audio or video data; facilitating efficient storage, transmission, and playback of multimedia content

Ex: The codec efficiently compressed the large audio file for easier sharing .
firmware [noun]

(computing) a type of software stored in a way that it cannot be modified or erased

Ex: The printer 's firmware controls its internal functions .

to create a new set of data by using a mathematical or logical process to transform an existing set of data

Ex: The data analyst generates summary statistics to describe the central tendency and variability of the dataset .

the speed at which a computer can process information, expressed in (MHz)

Ex: Overclocking can increase a CPU 's clock speed beyond its rated limit .
byte [noun]

a unit for measuring the size of computer data that equals 8 bits

Ex: The program requires at least 4 gigabytes of RAM , which is equivalent to billions of bytes , to run smoothly .
binary [noun]

a numerical system that uses only two digits, 0 and 1, as its base

Ex: She converted the decimal number into binary for the assignment .
read-only [adjective]

characterized by a mode in which data or a file is accessible for viewing but cannot be modified or altered

Ex: She received a read-only link to review the proposal .
to rip [verb]

to extract audio or video content from a physical medium, such as a CD or DVD and convert it into a digital format for storage or playback

Ex: The audiophile prefers to rip his vinyl records to FLAC format for high-quality digital playback .
stack [noun]

a data structure that removes data in the reverse order of saving them and serves as a temporary storage

Ex: Pushing data onto the stack is a common operation in computing .

a network for communication between computers, usually within a building

Ex:

to identify, analyze, and resolve problems or malfunctions in a system, device, or process to restore it to proper functioning

Ex: I am troubleshooting the system error right now .

a type of computer memory tasked with temporarily storing data for a quicker access

Ex:

the visual interaction that users have with the computer through icons, menus, etc.

Ex: Users praised the application 's graphical user interface for its simplicity .