Blog Archives

IT abbreviations

There are many abbreviations in computer science. Here's a little overview to look up. To find the shortcut, use the InPlace search box. If there are several hits, use the Enter key to jump further.

IT
Electronic data processing
The science of electronic data processing.

  • EVA
    EVA principle
    input-processing-output, every electronic device works in this way. I type in this text, it is processed in the computer and displayed on the screen.

  • VGA
    Video Graphics Array Graphics
    standard for PC-compatible screens. Blue connector on cable, monitor or graphics card

  • DVI
    Digital Video Interface
    Interface to digital flat screens LCD, white connector

  • HDMI
    High Definition Multimedia Interface
    Cable for monitor, graphics card. Is an interface for high-resolution video and multi-channel audio. Used in the digital domain. Achieves a data throughput of 5GBit/s and is compatible with DVI.

  • WWW
    World Wide Web
    The good old Internet, which opens all the doors to the world for us. Was released for general use worldwide on April 30, 1993. Where is the internet actually dihei?

  • GPU
    Graphics Processing Unit
    Is a graphics processor

  • PHP
    PHP Hypertext Preprocessor
    Internet server-side scripting language, embedded in the HTML code of web pages. Particularly interesting when integrating databases such as MYSQL to create dynamic pages

  • WAN
    Wide Area Network
    SIM cards, network for large distances

  • WLAN
    Wireless Local Area Network
    A wireless local network based on the IEEE 802.11 standard

  • GDPR General
    Data Protection Regulation
    now forms a uniform legal framework for the processing of personal data in Europe. Anyone who collects and processes personal data of natural persons residing in the EU is obliged to comply with the data protection regulations of the DSGVO. See post.

  • CRM
    customer relationship management Describes customer relationship
    management or customer care. CRM often refers to a company's database in which all customer data and transactions, numbers, dates and facts are visible.

  • HTML
    Hypertext Markup Language
    The Hypertext Markup Language (HTML, dt. Hypertext markup language), often also referred to as hypertext, is a text-based markup language for structuring content such as text, images and hyperlinks in documents. HTML documents are the basis of the World Wide Web and are displayed by a web browser.

  • ISP
    Internet Service Provider
    Also just called provider or internet provider

  • PS2 connector
    Personal System/2
    Further development of PCs, second generation, purple/green connector for keyboard and mouse

  • Hotkey
    Hotkey-Shortcut
    Hotkey, shortcut, key sequence, key combination, key command, key combination are key combinations that perform or call up an action or a window.

  • EULA
    End User License Agreement
    A license agreement with end users

  • LCD
    liquid crystal display
    liquid crystal display, flat panel display. laptop screen, etc.

  • TFT
    thin-film transistor
    display with thin-film transistor control. Until around 2010 it was only used for correspondingly controlled liquid crystal displays LCDs. Individual pixel control.

  • Since then, AMOLED
    Active-Matrix Organic Light Emitting Diodes
    Thin-film transistor displays can also be flat screens with thin-film transistor control of organic light-emitting diodes. OLED displays are built on a similar amplifier structure as a liquid crystal display. Based on glass or silicon like a conventional LCD, with the difference that a light-emitting diode is operated with a current and not with a voltage.

  • ERP
    Enterprise Resource Planning
    ERP integrates a variety of business applications and operational data that are processed and stored in a central database. Enterprise resource planning refers to the entrepreneurial task of planning, controlling and managing resources such as capital, personnel, operating resources, materials and information and communication technology in a timely manner and as required in line with the company's purpose.

  • CD
    Compact Disc
    Introduced in 1980 for the digital storage of music, data, etc. 800MB

  • DVD
    Digital Video Disc
    Digital storage medium up to 4.38GB

  • MCH
    Memory Controller Hub
    Is an Intel designation for the Northbridge of a chipset

  • Shift Shift
    key
    In the days of typewriters, this key was called the shift key. The whole block was pushed up so you could write a capital letter.

  • HUD
    head-up display
    head-up display, The head-up display is a display system in which the user can maintain the direction in which he is looking and thus the position of his head because the information is projected into his field of vision. Users include aircraft pilots and car drivers. This setting is also used in video games to show or disable on-screen information.

  • TBH
    to be honest
    In the German translation, this can be translated as “To be honest…”. “tbh” is used online or in chats like WhatsApp or Telegram to emphasize the honesty of your following statement.

  • Tab
    Tab key
    The tab key with the two horizontal arrows is used to move the cursor. The Tab key can also be used to jump from one field to the next in programs or websites. If you click Shift+Tab, you can jump back one field. With Alt+Tab you can switch between open windows. With CTRL+Tab, for example, you can switch between the open windows in a browser. See Keyboard Shortcuts for Windows.

  • Ctrl
    Control key
    In Germany, this is also referred to as the control key. This is then denoted by Ctrl. Brings many advantages for a faster workflow, controls commands or program functions.

  • LMAO
    laughing my ass off
    The somewhat more vulgar abbreviation LMAO – the user of this abbreviation colloquially laughs at your ass. For comparison, the abbreviation ROFL used to be used – rolling on floor laughing.

  • prt sc
    Print Screen
    The screenshot function key on the keyboard. Saves the current screen display to the clipboard. The photo can be copied to Word or Paint with CTRL+V and saved. The selected window can be cached with CTRL+ALT+PRT

  • MB
    motherboard
    The main circuit board of the computer. Also called: mainboard, system board, mobo, logic board at Apple, planar at IBM/Lenovo, main board, PCB board, circuit board

  • Linux
    Linux systems
    OpenSource operating systems

  • S-ATA
    Serial Advanced Technology Attachment
    data bus for data exchange between CPU and HD

  • LED
    light-emitting diode
    The red light at the bottom of your mouse! Is a light-emitting semiconductor component. Very economical and bright.

  • SSD
    Solid State Disk
    Accumulation of storage components that trick a system into thinking they are a hard disk. New generation of the old mechanical hard disk drives HDD

  • UDMA
    Ultra Direct Memory Access
    hard disk controller, the green plate at the bottom of a mechanical hard disk

  • HDD
    Hard Disk Drive
    Mechanical storage medium for data, today mostly used as SSD, M.SATA 1/2.0

  • OS2
    Open Source
    Free program including insight into the source code

  • SQL
    Dynamic Structured Query Language
    Database query language, also known from MySQL databases

  • NTFS
    New Technology File System
    Windows file system offers targeted access protection compared to FAT and the data can be compressed and is lost less often. Files of up to 16 TB can be stored. Other systems can only read this file system but not write it.

  • NIC
    Network Interface Card
    PCI network card, LAN port

  • MPEG
    Moving Picture Experts Group Moving picture
    expert group

  • AFR
    Alternate Frame Rendering
    Is a mode that can be used with two linked graphics cards such as Crossfire(AMD) and SLI(Nvidia). So the graphics card 1 could render all even frames, the second card then renders all odd frames. AFR is currently the fastest mode for multi-GPUs and is therefore very popular with all manufacturers, in addition to the simplicity of implementation, also because of the speed.

  • MBR
    Master Boot Record
    Is the first data block of a partition on BIOS-based PCs

  • ISDN
    Integrated Services Digital Network
    Digital telephone network can transmit all types of data. If analogue is selected, this gray ISDN box is not required. This box distributes the calls, so it can be specified, for example, if the fax is called, the telephones will also ring, and forwarding will also be pre-programmed via this box.

  • FPP
    Full Packaged Products
    Microsoft's licensing policy, the full version of a product. Manuals and License, Eula

  • FAT16
    File Allocation Table 16
    Older file system from Microsoft, partition smaller than 512 MB, over 2 GB FAT32 must be used.

  • FAT32
    File Allocation Table 32 File
    system developed by Microsoft, usable from 2 GB on USB sticks and SD cards, up to 4 GB Large files can be saved with this file system.

  • exFAT
    Extended File Allocation Table
    Extended file format for sticks and cards, is a universal format. It can therefore also be written to by other operating systems. Files can be up to 512 TB in size.

  • ICH
    I/O Controller Hub
    Is a microchip from Intel, used as a synonym for Southbridge

  • HPFS
    High Performance File System
    Is the file system of OS/2, supports file names up to 255 characters

  • dxdiag
    DirectX
    DxDiag is a diagnostic tool for testing DirectX functionality and fixing hardware problems related to video or sound. DirectX is a collection of COM-based programming interfaces for multimedia-intensive applications on the Windows platform and is also used on the Xbox game console. The DirectX collection of software components covers almost the entire multimedia area.

  • COM
    Component Object Model
    Is a technology developed by Microsoft for interprocess communication under Windows. COM components can be implemented both in the form of runtime modules (DLLs) and as executable programs. COM is intended to enable easy reuse of program code that has already been written, sometimes even across operating system boundaries. COM components can be used independently of the programming language. COM was introduced by Microsoft in 1992.

  • FILE
    FILE
    is English and means in German file, word, excel, pdf, music, video, pictures…

  • FLV
    Flash Video
    Used for Internet broadcasting of video content

  • IDE
    Integrated Device Electronics
    Hardware interface from drives, host to the controller

  • PAP
    program
    flow chart Standardized designation for DIN 66 001

  • GMCH
    Graphics and Memory Controller Hub
    Northbridge with integrated graphics core IGP

  • FPP
    Full Packaged Products
    Software-Packet Vollversion

  • BSOD
    Blue Screen of Death
    Designation for a fatal error, system crash in Windows

  • EFS
    Encrypting File System
    Is a Windows NTFS data encryption method, data can only be decrypted with a suitable key.

  • FEK
    File Encryption Key
    With EFS encryption, this random key is first generated, which is then encrypted. Sure is sure.

  • Desktop
    working
    surface Now press the keys Win+D, that's the desktop. Press the key combinationagain and you're back here.

  • UDP
    User Datagram Protocol
    Is a minimal, connectionless network protocol

  • Redundancy
    Redundaries, overflowing
    Redundant information is mostly safety-relevant copies of information, which are useful in the event of hardware failures. Serve for functional and operational safety.

  • RAID
    Redundant Array of Independent Disks
    A RAID system is used to organize multiple hard disk drives. If redundancy generates data on a second hard disk, if one fails, it can be replaced. The new hard disk can be automatically written with the same data again using the stored data, without data loss and depending on the RAID system programming.

  • RAID-0
    Redundant Array of Independent Disks-0
    Serves to accelerate the transfer rates, especially when reading large file formats. Strictly speaking, this system does not belong to the RAID group because it does not store any redundancy as a recovery. Two hard disks are written in parallel, if one breaks, everything is broken!

  • RAID-1
    Redundant Array of Independent Disks-1
    Is the mirroring of at least two hard disks, a very safe variant since both hard disks are written identically. If one disk fails, the second can supply everything. If you replace the defective disk with a new one, the data is copied back over from the functioning disk. The idea of ​​RAID-0 can also be added here, which doubles the access performance. However, it should be considered that if one hard disk has a sector error, it will be transferred to the other, and if data has viruses, it will also be copied to the other disk. Safe, but not for backing up data.

  • RAID-2
    Redundant Array of Independent Disks-2
    bit-level striping with Hamming code-based error correction. This method was only used in mainframe computers. At least 3 hard disks are required, allowing a high data throughput.

  • RAID-3
    Redundant Array of Independent Disks-3
    byte-level striping with parity information on a separate hard disk. The idea of ​​this RAID is the highest possible gain in performance with redundancy. At least three drives are required, at least two for data, one as a parity disk which contains the sum information. RAID-3 is no longer used today, improved by RAID-4. Using RAID-5 replaces these two.

  • RAID-4
    Redundant Array of Independent Disks-4
    block-level striping with parity information on a separate hard disk. The same as with RAID-3, but not individual bytes but entire data blocks are written here.

  • RAID-5
    Redundant Array of Independent Disks-5
    performance and parity, block-level striping with distributed parity information. Here the parity information is distributed to all hard disks, thus offering a high data throughput when reading data, redundancy is created in a distributed manner. https://de.wikipedia.org/wiki/RAID

  • ESD
    Electrostatic Sensitive Devices
    Electrostatic discharge. Allows destruction of sensitive computer components, semiconductor components when repairing if there is no grounding. Because the first zeppelin exploded. It would have been nice! To protect against electrostatic discharges, workplaces must be equipped as Electrostatic Protected Areas (EPA).

  • CAPTCHA
    Completely Automated Public Turing Test To Tell Computers And Humans Apart
    Stay cool! Invention in the fight against Internet robots and automatic spam.

  • reCAPTCHA
    reCompletely Automated Public Turing Test To Tell Computers And Humans Apart
    Yes, that's great! Purchased by Google in 2009, Bot Shields are number puzzles and images used to distinguish computers from humans. Globally, 150,000 hours are spent solving captchas every day, haa!

  • Active-X
    Animating middleware
    Internet utility program, eg for playing movies, activating control elements

  • BOT
    RoBOTer
    Is a robotic computer program that automatically performs tasks

  • CPU
    Central Processing Unit
    is the heart of the computer. Processor. The King of Manager for each Computer.

  • API
    API Key
    Is a security key for unique identification.

  • API
    application programming interface
    Is an application programming interface. Allows e.g. programming software for Windows. Communication between hardware and software

  • SAP
    systems, applications, products
    The software solution came onto the market in 1972 and is still considered a milestone and is a leader in business data processing. The company behind it is the largest software manufacturer in Europe. The software called SAP is used to handle business processes in a company, with which the following areas such as accounting, controlling, administration, merchandise management, purchasing, production, warehousing and human resources can be managed.

  • RAM
    Random Access Memory
    d'workers from the computer. Writable main memory. Memory. Random access memory. Loses its information without power. The contents are written to the hard disk during the hibernation shutdown, and the information is stored again in memory upon startup. When saving energy, the content remains in memory.

  • BIOS
    Basic Input/Output System
    Unlike RAM memory, this is “non-volatile memory”. Is a chip on the motherboard that runs when the computer starts up, making the computer work. Latin bios, you German life, brings the computer to life and then starts the operating system. Has been superseded by EFI or UEFI. Hardware-related software, starts the computer.

  • POST
    Power-On Self Test
    Tests when the computer is switched on whether all the basic components of the PC are functional.

  • ATA/ATAPI
    Advanced Technology Attachment with Pachet Interface
    Interface for communication between hard disk and PC

  • Bug
    Debug
    Debugger bug in the sense of program error, is a tool for diagnosing and finding errors in computer systems. Above all in programs, but also in the hardware required for execution. The term debugging in German means to bug out. The term bug for insect, beetle, vermin had been in use among engineers for a long time as a designation for malfunctions. With bugfix English fix for repairing, mending, the correction of a program error is called. Debug information is therefore always useful for error analysis.

  • Boot Boot

    process Is when the firmware “BIOS” analyzes all connected hardware to start the boot process when the computer starts up.

  • AVI
    Audio Video Interleave
    means that audio and video data are interleaved

  • DLL
    Dynamic Link Library
    These files can contain program code (machine code), data and resources in any combination. generally refers to a dynamic program library. However, the term usually refers to the variant used for the Microsoft Windows and OS/2 operating systems.

  • UEFI / EFI
    Unified Extensible Firmware Interface
    The central interface between firmware and components of a computer. The new BIOS. EFI is the predecessor of UEFI. Secure Boot, introduced in UEFI in 2012, is a secure boot mechanism that restricts booting to pre-signed boot loaders only. Supposedly increases security at system startup

  • GRUB
    Grand Unified Bootloader
    Grand Unified Bootloader. A free bootloader program. Can be used when using multiple operating systems, to choose from at startup. Often used in Linux.

  • Beta
    Beta version
    Is a not yet completely finished version, manufacturer assumes no liability

  • GNU
    General Public License
    General publication permission or approval of software licenses.

  • MAC address
    Medium Access Control
    A MAC address is the globally unique address of your network card. physical address. The mailbox from the computer – I know where the mailbox lives!

  • AGP
    Accelerated Graphics Port
    Direct connection of the graphics card to the chipset/Northbridge.

  • Adware
    Adware Programs
    Software can be downloaded and used free of charge, Warning: Ads, Trojans & spy programs may be included. Usually associated with additional programs during installation, always install custom programs and remove hacks if function is not required.

  • ARP
    Address Resolution Protocol
    In any Internet communication, the ARP must match the IP and MAC address before a connection can be established.

  • ESD
    Electronic Software Distribution
    Means the distribution of software over the Internet without the use of physical media.

  • PID
    Process Identifier
    Used in Windows Task Manager (ctrl+shift+esc) is a unique process identification number. Helpful in finding unwanted programs on the computer.

  • Broadcast
    Send
    a message to all computers on the network from one central location.

  • Router
    Network routers
    Are network devices for connecting multiple computers, can also be used with an Internet connection

  • Modem
    modulator and demodulator
    Internet communication device. To transmit digital signals, the signal is first modulated, sent and then demodulated when it is received, hence the word modem, waou.

  • IPv4
    Internet Protocol Version 4
    Is the fourth version of the Internet Protocol. Your IP address, your Internet address, place of residence, mailbox. IPv4 uses 32-bit addresses, therefore a maximum of 4,294,967,296 IP addresses can be assigned in a network, of which 3,707,764,736 addresses can be used. Four blocks are written, for example: 168.241.101each block represents 8 bits, so each block can contain a value range from 0 to 255.

  • IPv6
    Internet Protocol Version 6
    As the internet and the world population grew, the almost 4 billion IP addresses were no longer enough, so a better, even bigger system was needed, IPv6! Uses a 128-bit address system eg: 2001:db8:85a3:8d3:1319:8a2e:370:7347, so the address space has increased to 340 sextillion, eeeeeeeeeeee that's 36 zeros after 1!

  • IP
    Internet Protocol
    Internet protocols to be able to transport data to the intended recipient. IP address the address allows each recipient to be uniquely identified, like a postal address in your place of residence.

  • SMB
    Server Message Block
    Is the LAN Manager or NetBIOS protocol. A network protocol for file, print, and other services.

  • DNS
    Domain Name System
    One of the most important services when it comes to domain names / IP addresses and the Internet. If you call up www.google.ch, your computer sends the query out to the DNS server, then i sim gstell naa, and sends the associated IP address (number) back to your computer, which in turn sends it back out to the big one wide world and now you see your internet site. Yes, many consider going to Rome. The system het mer invented because people are limited to me bizeli, it's more difficult to remember a number than to remember a name. So dörf au gladly in the future 216.58.210.3 iigeh who uf Google wetsch!

  • IBM
    International Business Machines Corporation
    World's leading company for hardware and software and services in the IT sector. On May 1, 2005, the IBM ThinkPad PC business was sold to China. $1.75 billion – Lenovo!

  • port
    port protocol
    A part of a network address, so to speak a door. Valid port numbers are 0 through 65535.

  • SMTP
    Simple Mail Transfer Protocol
    Is a protocol used to exchange emails. Used to feed and forward mails. Mostly uses port: 25 New servers also like to use port 587 to only receive authenticated user mails. Swisscom would love to have that! SSMTP (SSL) port: 465

  • POP3
    Post Office Protocol
    Is a transmission protocol to retrieve/fetch e-mails from a server. The functionalities of POP3 are very limited and kept simple. It only allows listing, fetching and deleting emails. Usually uses port 110. POP3S (SSL) port 995. The IMAP protocol is usually used for additional functions.

  • IMAP
    Internet Message Access Protocol
    Provides a network file system for email. The advantage of POP3 is that you have the same mail on all devices. So if you read your e-mails at work on your cell phone with IMAP, at home the e-mail is already marked as read or deleted. Also works with your folder structure on the server.

  • TLS
    Transport Layer Security
    Is a transport encryption protocol. TLS encrypts data on the Internet. If you send something, the typed data is encrypted and decrypted again by the recipient. Like the Enigma deciphering machines from World War II. TLS is the successor to SSL

  • SSL
    Secure Sockets Layer
    Was the predecessor of TLS encryption. SSLv2 is mostly disabled on today's browsers as they result in security warnings due to a number of security vulnerabilities. Most web servers support TLS 1.0, others also SSLv2 and v3, RSA, AES or Camellia.

  • AES
    Advanced Encryption Standard
    An algorithm. Symmetric encryption method. This method sends a key with a length of AES-128, 192 or AES-256 bits, which is required to encrypt and decrypt data.

  • ADSL
    Asymmetric Digital Subscriber Line
    New communication method that has the following specifications on normal telephone cable: line length up to 5 km; 1.5 to 8 MBit/s downstream (to the consumer); 32 to 800 kbps upstream (to the service provider). Hence the term asymmetric (not equally fast in both directions). It uses special types of modulation such as DMT or CAP. Telephoning (analogue or ISDN) is also possible on the same cable at the same time.

  • HTTP
    Hyper Text Transport Protocol
    The HTTP protocol is used on the World Wide Web. With this protocol, however, the data is not encrypted, ie if you fill out a form on a website with HTTP, your data can be intercepted and evaluated. Protocol for transferring data over a network to the web browser.

  • HTTPS
    Hyper Text Transport Protocol Secure
    This protocol adds additional encryption. Today's websites that offer a contact form or ordering process must have an HTTPS page. See also Worldsoft SSL Certificates.

  • ASCII
    American Standard Code for Information Interchange
    Is a 7-bit character encoding. A standard code for exchanging information that every computer understands. The character encoding defines 128 characters, consisting of 33 non-printable and 95 printable characters. See blog post: ASCII generator. Can also be understood as an alphabet by the computer.

  • CAT 7
    Category 7
    Are suitable for Ethernet networks with high transmission rates. Cat 7 supports high-speed Ethernet communications up to 10Gbps. CAT 8 to 2000MHz Cat 7 cable is backward compatible with Cat6, Cat5 and Cat5e cable categories. Cat 7 cabling can also support 10GBASE-T, but is designed to transmit frequencies up to 600 MHz. Since the LAN, network, RJ-45 connector cannot meet these specifications due to the close contact arrangement, new plug connections were designed = CAT cables, which essentially increase the distance between the pairs of wires. More information about CAT cable, see here.

  • WINS
    Windows Internet Naming Service
    Windows network protocol, as with DNS, a name resolution is carried out here under Windows in the local area network using an IP address.

  • WOL
    Wake On LAN
    1995 AMD in cooperation with HP published a standard to wake up a switched off computer via the built-in network card. Can be turned on or off in BIOS.

  • DSL
    digital subscriber line
    data transmission technology

  • PCI
    Peripheral Component Interconnect
    Bus standard that connects peripheral devices to a CPU's chipset

  • PCI-E
    PCI-Express
    expansion standard for connecting devices, successor to PCI & AGP

  • PC
    Personal Computer
    IBM standard microcomputer

  1. DHCP
    Dynamic Host Configuration Protocol
    Allows automatic TCP/IP configuration to be assigned. IP address in a network is searched for and registered independently, has na 255 per range in stock. With a static IP, access must be created manually.

  1. Administrator
    Super-User, Admin, King
    An Administrator is a system user with privileges. The admin can manage system settings. Distribute user rights for reading and writing.

  • a-Blending
    Alpha-Blending
    Is a technique in which different images are superimposed to form an overall image. Also used for high-resolution, large monster images in graphics and art.

  • a channel
    Alpha channel
    The a channel indicates the transparency of a graphic.

  • APID
    A-PID
    Stands for Audio Packet Identifier of an MPEG data stream and is the audio counterpart to the VPID.

  • ASF
    Atom Syndication Format
    Is a message format. A further development of RSS and XML.

  • BMP
    Bitmap
    The.bmp file extension stands for bitmap. These files are images that are saved as a two-dimensional raster graphics format.

  • Browser
    web program
    A browser, often also called a web browser, is a program with which you can view pages on the World Wide Web.

  • IE
    Internet Explorer
    One of the most popular browsers is called Windows Internet Explorer.

  • Bug
    Misconduct
    A bug generally refers to an unwanted misbehavior of a software.

  • Cache
    intermediate
    memory Cache is the English term for intermediate memory. In order to shorten loading times, cached copies are often used when building web pages. Depending on the implementation, however, this can mean that the freshly loaded pages are not always up to date.

  • CCCP
    Combined Community Codec Pack
    This is a third-party special codec pack. Includes many popular audio and video codecs.

  • CEC
    Consumer Electronic Control
    This technology has different names depending on the manufacturer: NetCommand for HDMI, Anynet+, BRAVIA Sync, Simplink.

  • Changelog Changelog
    A changelog
    is a text file that contains a human-readable changelog. It allows the viewer to make significant changes.

  • CHM
    Compressed HTML Help
    This is a file format from Microsoft for help files.

  • Codecs
    Video and Audio Codecs
    A codec specifies how data or signals are digitally encoded and decoded. There are many different codecs for multimedia content: DIVX, XVID, FFDShow, MPEG2, DVobSub, OGG Vorbis, AC3 and many more. It is possible to install a so-called codec pack, which covers many of the common video and audio formats. The K-Lite Mega Codec Pack, the CCCP and the LAV filters from ffmpeg are well known.

  • Collage
    Video Wall
    In the field of digital signage, one speaks of a collage when several monitors are connected side by side. A monitor collage is often also referred to as a multi-screen mosaic.

  • COM port
    RS-232 serial interface
    COM ports are serial bidirectional interfaces of IBM-compatible computers. Although this is a specification from the 1960's, modern devices such as monitors, motors, temperature gauges still ship with RS-232 connectors. Commands can be sent to and received from external devices via this interface. With today's monitors such as Samsung, this interface is already built into the jack format.

  • Content
    Media content
    A content describes a content. So includes all types of sound, images and moving image material, i.e. any multimedia content of a website or other display programs.

  • CSS
    Cascading Style Sheets
    On websites, the individual elements to be formatted are recorded as classes with their display properties such as size, colors and formatting in a separate file.

  • CSV
    Character separated values
    ​​Files with the extension.csv can be read with Excel and other databases. In such a file, data records such as e.g. B. Customer address can be stored. Entries are separated by a separator character.

  • DACH
    DACH or D/A/CH
    is an artificial word. It stands for the geographic area that includes Germany, Austria and Switzerland.

  • DCR
    DCR files
    is a file format for files created by Adobe Director.

  • DDC
    Display Data Channel
    This is a communication channel between the monitor/screen and the PC connected to it. As with the RS-232 COM port, screens can be toggled on and off.

  • DS
    Digital Signage
    Industry of digital displays for informational and promotional purposes. In the past, posters were printed, today more and more LED displays are mounted. Is cheaper and you are more flexible when designing and changing content. Mc Donalds and Burger King are also using this technology more and more in their menu boards.

  • Dongle
    USB stick
    This stick usually contains a license for activating hardware or software. E-banking also has security dongles for logging in. You can only log in with the dongle.

  • DPMS
    Display Power Management Signaling
    These are methods specified by VESA, which enable graphics cards that have been prepared for this purpose to tell a DPMS-capable monitor which energy-saving mode it should adopt.

  • DVB
    Digital Video Broadcasting DVB+
    These are various technical standards, some of which are already very widespread, which are mostly used in the context of digital television. Depending on the various digital video broadcasting technologies on offer, audio, video and other data are transmitted via an MPEG transport stream.

  • DXVA
    DirectX Video Acceleration
    Acceleration for graphic rendering.

  • EDID
    Extended Display Identification Data
    Standardized data structure with which a display device defines its properties, e.g. B. describes screen size. The EDID of a digital display enables a connected PC to read certain specifications of this display device in order to be able to go into its possibilities and capabilities.

  • Excel
    Microsoft Excel
    Excel is a spreadsheet program by Microsoft from the Program Office.

  • Exchange Server
    The Exchange Server
    is a groupware and messaging system from Microsoft. The resource calendar from an Exchange Server is usually set up for e-mail at companies.

  • Subtraction
    Color subtraction
    The color subtraction is based on the three primary colors blue-green. cyan, crimson magenta and yellow engl. yellow. Often, for example in the case of printing processes, one speaks of a CMY(K) system in this context. In such a system, other colors can be represented by filters absorbing and subtracting color components. Cyan filters suppress red areas, magenta filters suppress green areas, and yellow filters suppress blue areas.

  • FW
    Firewall
    On the one hand, the term firewall refers to software that runs on the connecting computers between the Internet and the intranet. It is usually used to prevent unwanted external access to devices in the intranet. If handled correctly, it can protect against unauthorized access to internal data and resources. With the appropriate configuration, it can also be used to exclude URLs from being accessed using rules or lists, e.g. B. are not suitable for minors. A firewall primarily uses the information contained in a data packet about the source and destination address and connection to decide whether this packet is allowed to pass or whether it is rejected. On the other hand, the firewall can also be used to designate your own devices in the network, which serve to increase network security. For this purpose, firewalls prevent unknown or unwanted connections. The firewall prevents data packets that are not intended for the internal network from loading it. It can also be prevented that packets from the intranet reach the Internet.

  • Frame
    Frames
    Frame is the name for individual images in films and animations.

  • HD
    Full HD
    Full HD stands for Full High Definition, which corresponds to a resolution of 1920 × 1080 pixels.

  • GIF
    Graphics Interchange Format
    From time to time you can still see the earlier spelling GIFF. It is a graphics format with lossless compression for images with low color depth, ie up to a maximum of 256 different colors per single image. In GIF files, several individual images can be saved in one file.

  • INI
    ini
    A file with the file extension.ini is a configuration file. ini stands for initialization. In principle, the INI file is just a normal text file that defines certain settings for the system. In order for the system to be able to correctly interpret this text file, the text structure is subject to a specific structure.

  • HDV
    High Definition Video
    The abbreviation HDV stands for High Definition Video. As a rule, the resolution of such a video corresponds to 1440 x 1080 pixels.

  • GADWP
    Google Analytics Dashboard for WordPress
    Google Analytics Plugin for WordPress. Statistics, visitors and other information.

  • ICS
    iCalendar
    iCalendar is a data format for exchanging calendar content. Such iCalendar files can be imported as.ics files.

  • Icon
    Icon icon
    Icons are icons, desktop icon. Starts a program or function.

  • ID
    Identifier
    This is a unique string of characters used to clearly distinguish an entry from other entries in a database.

  • JPEG
    Joint Photographic Experts Group
    image file type. Lossless compression and encoding methods for digital images. Sometimes the E is omitted in JPEG and one only speaks of JPG.

  • KBE
    Ken Burns effect
    If only a portion of a still image is displayed and this is then moved, enlarged, reduced, then this is referred to as the Ken Burns effect.

  • Log
    Log file
    Error and warning messages are logged here for later inspection and analysis.

  • MOV
    mov
    MOV is a file extension for the container format of QuickTime, Apple's multimedia architecture. Because it is a container format, a *.mov file can contain multiple sources of information, such as B. Save image and sound simultaneously in one file.

  • WYSIWYG
    What You See Is What You Get
    What you o_o that you can do. WYSIWYG is the acronym for the idea "What You See Is What You Get" also known as real-time display. With true WYSIWYG, a document is displayed exactly the same on the screen while it is being edited. Before the idea of ​​WYSIWYG existed, we were still in the DOS age.

  • MP4
    Movieng Picture
    Video compression, the abbreviation of MPEG-4.

  • MPEG-4
    Moving Picture Experts Group
    The MPEG-4 video compression standard is significantly more video compression than MPEG-2. Sometimes MP4 is written for MPEG-4 only briefly.

  • Feed
    News feed News
    feeds, sometimes also called web feeds, are usually short dynamic texts from online providers, news, weather...

  • New ticker
    treadmill
    The new ticker is the name for a ticker line of moving text with or without images.

  • NTP
    Network Time Protocol
    This is used to synchronize internal computer clocks over the network. Since digital signage networks often require coordinated device times, this technology is used in a number of applications.

  • OLE
    Object Linking and Embedding
    OLE stands for Object Linking and Embedding. This is a system, protocol developed by Microsoft, which enables the interaction of objects in different applications.

  • OPS
    Open Pluggable Specification
    This is an industry standard developed by Intel for the special requirements of digital signage displays. OPS specifies an interface, a PIN connector for image signal, audio signal, electricity. As a rule, suitable displays, pluggable players.

  • Parser
    Part of a computer program
    A parser is a piece of software, a computer program or part of a computer program, which contains structured, connected strings of characters, e.g. B. runs through XML files in order to check them for specific content and/or to filter and process them further.

  • PS
    Photoshop
    Photoshop is an image editing program from Adobe Systems.

  • Pixel
    Screen pixel
    Is the smallest display unit and is specified in screen pixels.

  • PNG
    Portable Network Graphics
    This is a graphics format for raster graphics with lossless image compression. In PNG graphics, transparency can be specified in the alpha channel.

  • PoE+
    Power over Ethernet technology
    With this technology, the power supply can be ensured via an Internet cable, twisted pair cable with RJ45 connection.

  • POI
    Point Of Interest
    POI stands for Point Of Interest and literally means place of interest. This is a marketing term that designates points of sale that are of particular importance for sales. Depending on the e-marketing concept, electronic kiosk systems or digital advertising posters are often used at such POIs.

  • POP
    Point Of Purchase
    POP stands for Point Of Purchase and means the same as POS. D'checkout station in Migros..

  • Port
    Interface
    A port is the designation of an interface or part of an address that tells a server on the Internet which Internet service must be used for an incoming message. The various services and their protocols have different connections: FTP 20 and 21, HTTP 80, etc. Figuratively speaking, the IP address is the house number and the connection is the room number.

  • POS
    Point Of Sale
    The abbreviation POS comes from marketing and stands for Point Of Sale. This is a point of sale where customers come to buy goods.

  • Key
    product key
    A product key is a unique character string that is usually used to license a product from a software manufacturer. For this reason, the product key is also often called the license key.

  • Proxy
    power of attorney
    Software that is installed on computers at the interface between the Internet and Intranet or at the ISP (Internet Service Provider). It is used, among other things, to temporarily store files that have been called up in a cache so that they can be made available more quickly if they are called up again. In addition, this reduces the data volume on the backbones of the Internet.

  • Remote address
    Address for remote access
    A remote address is the internet or intranet address for remote access.

  • Remote desktop
    Remote access to a PC
    Remote desktop from Microsoft, TeamViewer, VNC

  • RMA
    Return Merchandise Authorization
    Returning a merchandise to the manufacturer.

  • RSS
    Rich Site Summary / Really Simple Syndication
    This is an XML format. This special XML dialect serves as a description language for metadata. This is used in particular for messages that are frequently updated.

  • SEO
    Search Engine Optimization Search engine optimization
    , or English search engine optimization, refers to measures that serve to ensure that websites and their content appear in the organic search engine rankings (natural listings) at the top.

  • SMO
    Social Media Optimization
    Optimal adaptation, display, linking and tags for social networks.

  • W3C
    World Wide Web Consortium
    Standardized query language for XML documents.

  • RTF
    Rich Text Format
    Is a file format, formatted text document format, introduced by Microsoft.
    The source text of an RTF-formatted text consists of the unformatted text, extended by RTF control words and RTF control symbols that indicate the desired formatting directly in the text.

  • RTSP
    Real-Time Streaming Protocol
    It is used to control data streams which are available in UDP/TCP.

  • SLS
    Single Large Surface
    If a large connected screen is created from several smaller monitors, this is often referred to as Single Large Surface or SLS for short. This technology requires the screens used to be connected to a graphics card that offers a corresponding SLS mode for the desired screen composition.

  • SN
    S/N
    Stands for serial number. The unique number of an item.

  • SoC display
    Display with integrated PC
    A SoC display is a screen that, in addition to the necessary electronic components for operating the monitor, also contains the essential components of a usually very slimmed down, but fully functional PC internally in the housing.

  • SOCKS
    SOCKetS
    SOCKS is an Internet protocol that monitors the transfer of packets via a proxy server. With this connection concept, clients behind a firewall connect to the desired clients on the Internet via an existing SOCKS proxy server. This SOCKS proxy server checks the authorization of requesting clients and forwards authorized requests to the appropriate servers.

  • SPDIF
    S/PDIF
    is a standard for the transmission of audio signals that was developed by Sony and Philips in the 1990s and is now very common, which is now also used in digital signage networks, among other things. Depending on the requirements, the S/PDIF signals can be transmitted via coaxial cable, e.g. B. connection via cinch plug, via HDMI or DisplayPort but also non-electrically via fiber optics.

  • Default Default
    value Default values
    ​​for editable variables, set either at installation or later by the user. factory setting.

  • Stream
    Livestream
    This is sound and/or moving image data received from elsewhere. The process of receiving from another location and simultaneously playing back the data is also referred to as a live stream.

  • SWF
    Small Web Form
    The SWF file extension originally stood for ShockWave Flash. Since there is confusion in practice with Shockwave files *.dcr files created with the Adobe Director, nowadays it is said that SWF stands for Small Web Form. Sometimes people just talk about Flash files. SWF files can contain multimedia, vector graphics, and ActionScript. The more or less complex animations often offer user interactions.

  • System ID
    System identifier
    A system identifier is a character string which is usually used to uniquely identify a system, usually a device. This identifier is often used to check whether the execution of a specific action, e.g. B. Data transmission is allowed.

  • Template
    Template
    Is a template for a design representation or other template.

  • third-party
    third
    -party provider Third-party software is simply software from another provider.

  • UI
    user interface
    Graphical user interface of a software.

  • Ultra HD / UHD
    Ultra High Definition
    A term that was formerly used by LG, but is now to be regarded as a generic term. Does not specify fixed width x height values. In any case, the product must result in at least 8 million pixels. With the minimum aspect ratio of 16 to 9 z. B. it is usually a resolution of 4096 × 2304 pixels. Among other things, the minimum format 3840 x 2160, which is also known as Quad Full High Definition = QFHD: a term coined by Toshiba, is very common. In addition, the term 4k, which was first coined by Sony, is still used.

  • URL
    Uniform Resource Locator
    Is the unique designation of a resource on the Internet. www.e1de.com

  • VESA
    Video Electronics Standards Association
    Is an organization to which many well-known PC and display manufacturers belong and which has been dealing with and implementing standardization of interfaces between computer devices since the 1980s.

  • VLC
    VLC Media Player
    Initial VideoLAN Client is a portable, free media player that supports different streaming protocols. The advantage of VLC over other programs is that it supports and can play back many video formats.

  • VNC
    Virtual Network Computing
    The software offers the functionality to display the screen content of another PC via the network. The prerequisite for this is that a so-called VNC server is running on the remote computer whose desktop is to be beamed in, so to speak.

  • VOB
    Video Object
    This is a file format of DVD-Video.

  • VoIP
    Voice Over Internet Protocol
    It enables telephoning via computer networks and possibly also via gateways to other telephone networks.

  • Watchdog Watchdog
    Is
    a software technology term. The watchdog monitors the status of the software and possibly also the hardware and notes any problems that occur in a log.

  • Web interface
    UI on the web
    A operable window on the web.

  • XML
    Extensible Markup Language
    An XML file is a text file that contains data in a specific organizationally logical form. Compliance with the XML specification guarantees simple and error-free digital processing of the data embedded in structural elements. Another benefit is that XML files are human readable.

  • XPath
    query language
    XPath is a query language for XML documents standardized by the World Wide Web Consortium W3C.

  • XSL
    Extensible Stylesheet Language
    This language group is used to define layouts in XML documents.
4 Letters

JTDS

JRPS

JGHS

JMAA

JCPS

JCHS

JCMS

IPLC

IECE

IDLA

HTSD

HSES

HRSH

HPSS

HPSA

HMSD

HLCS

HISD

HFSS

HHHS

HEHS

HCSS

GVSD

GSOG

GRPS

GMSP

GJHS

GLWH

GISD

GHSS

GCHS

FYHS

FUSD

FSSM

FRMS

FMMS

FHCS

FHSF

FHMS

FFES

FAYS

ESEP

ENIS

EMOE

ELHS

ELEM

EHSS

EHHS

EECC

EECE

EBMS

EAMS

DWES

DPSS

DQPS

DMCS

DEAA

DCEA

CWMS

CUSD

CWES

CSRD

CSQC

CSFA

CSIS

CSAH

CRMS

CRLA

COSN

CNHS

CMDA

CLES

CJTS

CGPS

CDCH

CCHS

CBHC

CASD

BUSD

BSME

BPSS

BJAG

BHSF

BGIS

BCIG

BBBS

BASD

AUSD

ASNS

ANAL

AISD

ALSS

ALLS

AISB

AHSS

ADHS

KIWI

KIEF

KFEZ

KEPZ

JIPA

JCIC

JCAR

JBCE

JCIT

IPTC

IPTP

IPBD

IEPG

IDSS

IBTM

IBOR

IBEC

IAEL

IBAN

IAFL

HLCC

GSIE

GATS

GABC

FTZB

FTZA

FTSR

FTAA

FTFI

FSPR

FRAS

FDBP

FCIA

EWRP

EUSG

EUSD

ERLC

ERDF

EPCI

EPCG

EHTP

EFSM

EFSF

ECMR

DTRA

DTAG

DITF

DITS

DEEC

DBIT

DATV

CRMG

CNNC

CISG

CHEE

CFTA

CGEM

SWFC

BUSH

BOAC

BIIB

BIBA

BENE

BEDO

BEET

BCCL

BBCD

AFSL

AFDS

AECA

ADDF

WKSH

AAEN

ABGI

IBFR

WUUC

WSPU

WSPF

WSLF

WSHC

WPNZ

WLYM

WLLG

WIDC

WFYS

WFRW

WDAI

VRWC

USLP

UKIP

UGLF

UDAR

TXLC

TXCC

TSPM

TNIP

TENI

TEED

SUCI

SDMP

SACP

ROYG

RNDP

RINO

RCPI

PSPU

PPPP

POLP

PNPV

PNEM

NSSO

NUSJ

NTUC

NSDP

NNPP

NMPP

NMDP

NFPL

NDSV

MPRP

NADD

MRDD

MSNM

NABR

MPPP

MRPP

MNLF

MCCE

MAPC

LURD

MAIG

MAFO

LWGP

LPOC

LPNI

LPFC

LLCO

LIPS

LAFB

KSDL

KPPI

KMPP

JPMG

JOFA

IUML

ITAK

ISNA

IPRA

IPEG

IOTW

INLD

IISP

IHDC

IFET

IDEE

HRIC

HAVA

GOTV

GOPA

GNDM

GICC

GFCR

FILE

FFAO

FDSU

EUSF

ERAB

EPLF

ENUF

EMRO

EANP

DTOM

DMDK

DINO

DFPF

DAVE

CSVL

CTBT

COIB

COAT

CLPD

CFVI

CFAW

WEDC

CCYD

CCLU

CAFP

CADW

CAEF

BLDP

BCIO

BACU

APPC

ANPP

AMLO

ALRA

ALDE

AFDH

ADPM

ABTP

ABCF

WIFC

WWUC

WOCC

YWHS

WWCA

WSIS

WSEC

WRLA

WOMT

WOFE

WLPE

WGBF

WEMF

WECI

WDMC

WDDD

WCVM

WCSQ

WCRT

WCPT

WCNC

WCOF

WCNN

WCHE

WCDR

WCDM

WCCI

WCCM

WCAH

WCBF

WBYC

WBLC

WASR

WBLE

WAOA

WAIM

BOAH

WACG

WABF

VIFW

URPT

TPDL

TERN

TEPA

SXSW

SRRT

SOSE

SMBB

SLRC

SLDC

SEME

SFSE

SCSC

SCEF

RMBS

SAPF

RDCC

QVGA

PIKM

PELV

PILD

PCBC

OSDI

OSBC

NPHC

NDLC

NCNC

NCNP

NCVA

NCFS

NAUC

NACE

MICR

MIWF

MIEG

MGLC

ZIMS

LCCR

JCOC

JFRF

JASC

ISWC

ITEM

ITRE

ISVC

ISEF

IPMC

ISBB

IOPD

IPUM

IPTW

IPSN

IPPW

IODL

IFSF

IFRC

IIBS

IESC

IESF

IEMC

ICSQ

ICSO

ICCC

ICFP

ICCM

HRDF

IBLV

IBFI

HPSR

HLCL

GWCI

GPMM

GTAC

GRHF

GLWC

FTCE

FOWA

FSAB

FOOA

FNBC

FITO

FIMS

FIMH

FIME

FETC

FEJB

ESPM

EUSE

ERNC

ECLC

EIBR

EFSC

EFRB

EDCS

ECIC

DRCN

DRMI

DDDB

DCFF

DMBI

DCON

CTRR

CLEF

CLAI

CGPM

CCNC

CDMH

BWFA

BPIF

BHSI

BANQ

BARJ

AYPE

ASWN

APCC

APTU

ANCS

AFCE

ACLE

ACFE

ABEC

WVDV

WRBR

WMCD

WOFB

WLMK

WIII

VADC

TDWP

SUMO

PKMN

MRMC

JPII

JPGR

JCVD

IACM

HOJO

GWTS

EVII

EIIR

BXVI

BOAT

AKMA

ZTEC

YWCA

YOBS

YOMP

YMIA

YISP

YETI

YCUA

YALA

YAAB

WZCC

WYVD

WYRF

WYSB

WYIC

WYPA

WYDI

WYCR

WYCF

WWWP