Abandonware
Software that is no longer being sold or supported by its publisher. Most
abandonware is still considered illegal unless the publisher has re-released
the software as freeware.
U.S. copyright
laws state that copyrights owned by corporations are valid for 75 years
from the date the software was first published. So the current availability
of a product is irrelevant to its copyrighted status. Unlike trademarks,
copyrights are not considered abandoned if they are no longer enforced.
Copyrights do not enter the public domain just because they are no longer
commercially exploited or widely available.
ABEND
(1) Acronym for abnormal end of task. It refers to software crashes or
lossage. Derives from an error message on the IBM 360.
(2) Acronym
for Absent By Enforced Net Deprivation. Sent in e-mail subject lines warning
friends and others of forced loss of Internet access (due to moving, network
outages, or illness).
ActiveX
A loosely defined set of technologies developed by Microsoft. ActiveX
is an outgrowth of two other Microsoft technologies called OLE (Object
Linking and Embedding) and COM (Component Object Model). As a moniker,
ActiveX can be very confusing because it applies to a whole set of COM-based
technologies. Most people, however, think only of ActiveX controls, which
represent a specific way of implementing ActiveX technologies.
Add-In
(1) A component you can add to a computer or other device to increase
its capabilities. Add-ins can increase memory or add graphics or communications
capabilities to a computer. They can come in the form of expansion boards,
cartridges, or chips. The term add-in is often used instead of add-on
for chips you add to a board that is already installed in a computer.
In contrast, add-on almost always refers to an entire circuit board.
(2) A software
program that extends the capabilities of larger programs. For example,
there are many Excel add-ins designed to complement the basic functionality
offered by Excel. In the Windows environment, add-ins are becoming increasingly
common thanks to OLE 2.0.
Add-On
Refers to a product designed to complement another product. For example,
there are numerous add-on boards available that you can plug into a personal
computer to give it additional capabilities. Another term for add-on board
is expansion board.
Add-on products
are also available for software applications. For example, there are add-on
report generation programs that attach to popular database products such
as dBASE, giving them additional report-generation and graphics capabilities.
The terms
add-on and add-in are often, but not always, used synonymously. The term
add-in can refer to individual chips you can insert into boards that are
already installed in your computer. Add-on, on the other hand, almost
always refers to an entire circuit board, cartridge, or program.
Aloha
1. A protocol for satellite and terrestrial radio transmissions. In pure
Aloha, a user can transmit at any time but risks collisions with other
users' messages. "Slotted Aloha" reduces the chance of collisions
by dividing the channel into time slots and requiring that the user send
only at the beginning of a time slot. Aloha was the basis for Ethernet,
a local area network protocol.
2. Aloha
Networks, Inc. -- A San Francisco-based company specializing in providing
satellite-based Internet access to large Internet Service Providers. Founded
by the inventor of the Aloha system, Norman Abramson.
3. @loha
@home -- software from Media Synergy (www.mediasyn.com) that allows a
user to add graphics, animation, and sound to e-mail messages.
Antivirus
Program
A utility that searches a hard disk for viruses and removes any that are
found. Most antivirus programs include an auto-update feature that enables
the program to download profiles of new viruses so that it can check for
the new viruses as soon as they are discovered.
App
Short for application. A killer app, for example, is an application that
surpasses (i.e., kills) its competitors.
Application
A program or group of programs designed for end users. Software can be
divided into two general classes: systems software and applications software.
Systems software consists of low-level programs that interact with the
computer at a very basic level. This includes operating systems, compilers,
and utilities for managing computer resources.
In contrast,
applications software (also called end-user programs) includes database
programs, word processors, and spreadsheets. Figuratively speaking, applications
software sits on top of systems software because it is unable to run without
the operating system and system utilities.
Architecture
A design. The term architecture can refer to either hardware or software,
or to a combination of hardware and software. The architecture of a system
always defines its broad outlines, and may define precise mechanisms as
well.
An open architecture
allows the system to be connected easily to devices and programs made
by other manufacturers. Open architectures use off-the-shelf components
and conform to approved standards. A system with a closed architecture,
on the other hand, is one whose design is proprietary, making it difficult
to connect the system to other systems.
Authoring
Tool
Also known as authorware, a program that helps you write hypertext or
multimedia applications. Authoring tools usually enable you to create
a final application merely by linking together objects, such as a paragraph
of text, an illustration, or a song. By defining the objects' relationships
to each other, and by sequencing them in an appropriate order, authors
(those who use authoring tools) can produce attractive and useful graphics
applications. Most authoring systems also support a scripting language
for more sophisticated applications.
The distinction
between authoring tools and programming tools is not clear-cut. Typically,
though, authoring tools require less technical knowledge to master and
are used exclusively for applications that present a mixture of textual,
graphical, and audio data.
Backward
Compatible
Compatible with earlier models or versions of the same product. A new
version of a program is said to be backward compatible if it can use files
and data created with an older version of the same program. A computer
is said to be backward compatible if it can run the same software as the
previous model of the computer.
Backward
compatibility is important because it eliminates the need to start over
when you upgrade to a newer product. A backward-compatible word processor,
for instance, allows you to edit documents created with a previous version
of the program. In general, manufacturers try to keep all their products
backward compatible. Sometimes, however, it is necessary to sacrifice
backward compatibility to take advantage of a new technology.
The flip
side of backward compatibility is upward compatibility. Upward compatible
is the same as backward compatible, except that it is from the point of
view of the older model.
Binary
Compatible
Having the exact same data format, down to the binary level. That is,
two files that are binary compatible will have the same pattern of zeroes
and ones in the data portion of the file. The file header, however, may
be different.
The term
is used most commonly to state that data files produced by one application
are exactly the same as data files produced by another application. For
example, many software companies now produce applications for Windows
and the Macintosh that are binary compatible, which means that a file
produced in a Windows environment is interchangeable with a file produced
on a Macintosh. This avoids many of the conversion problems caused by
importing and exporting data.
Blue Screen
Of Death
An error that can appear on computers running in a Windows' environment.
This includes even the earliest versions of Windows such as Windows 3.0
and 3.1, and still occurs in later versions such as Microsoft Windows
95, Windows 98, Windows NT, and Windows 2000 beta. Jokingly called the
blue screen of death because when the error occurs, the screen turns blue,
and the computer almost always freezes and requires rebooting.
Bundled
Software
Software that is sold with a computer or other hardware component as part
of a package. As competition between computer manufacturers has intensified,
bundling software has become a key strategy for attracting consumers.
In some cases, the bundled software is even more valuable than the hardware.
Bundled software
can also be part of a software package. For example, Microsoft Windows
comes with many bundled software tools.
Castanet
Software from Marimba, Inc. of Mountain View, CA (www.marimba.com) that
helps administrators install and update applications and information across
a network. For example, if a number of users on a network use a version
of Microsoft Word that's been recently updated, the administrator can
use Castanet to update the users' versions without physically installing
each new package. Castanet will examine the old and the new versions,
identify differences (a process called differencing), and send the changes
to each user. Castenet uses channels, usually containing one kind of application,
to send information to users, who receive them with a desktop application
called a tuner. Administrators control content at the back-end with a
transmitter.
CFML
Short for ColdFusion Markup Language, a proprietary mark up language developed
by Allaire for use with ColdFusion. CFML is a tag-based Web scripting
language supporting dynamic Web page creation and database access in a
Web server environment. In the language, ColdFusion tags are embedded
in HTML files. The HTML tags determine the page's layout while the CFML
tags import content based on user input or the results of a database query.
Files created with CFML have the file extension .cfm.
ColdFusion
A product created by Allaire Corporation of Cambridge, Mass. (in 2001,
Allaire merged with Macromedia) that includes a server and a development
toolset designed to integrate databases and Web pages. With Cold Fusion,
a user could enter a zip code on a Web page, and the server would query
a database for information on the nearest movie theaters and present the
results in HTML form. Cold Fusion Web pages include tags written in Cold
Fusion Markup Language (CFML) that simplify integration with databases
and avoid the use of more complex languages like C++ to create translating
programs.
Compatible
Indicates that a product can work with or is equivalent to another, better-known
product. The term is often used as a shorthand for IBM-compatible PC ,
a computer that is compatible with an IBM PC. Another term for a compatible
is clone.
The ability
of one device or program to work with another device or program. The term
compatible implies different degrees of partnership. For example, a printer
and a computer are said to be compatible if they can be connected to each
other. An IBM compatible PC, on the other hand, is a computer that can
run the same software as an IBM PC.
Compatibility
of two devices, such as printers, usually means that they react to software
commands in the same way. Some printers achieve compatibility by tricking
the software into believing that the printer is a different machine. This
is called emulation.
Be aware,
however, that hardware compatibility does not always extend to expansion
slots. For example, two compatible printers may not accept the same font
cartridges. Complete hardware compatibility is denoted by the term plug
compatible.
Software
products are compatible if they use the same data formats. For example,
many programs are compatible with dBASE. This means that the files they
produce can easily be transformed into a dBASE database or that they can
import dBASE files.
Component
Software
Sometimes called componentware, software designed to work as a component
of a larger application. A good analogy is the way personal computers
are built up from a collection of standard components: memory chips, CPUs,
buses, keyboards, mice, disk drives, monitors, etc. Because all of the
interfaces between components are standardized, it is possible to mix
components from different manufacturers in a single system.
Similarly,
the goal of component software is to standardize the interfaces between
software components so that they too can work together seamlessly. Two
standards -- OLE and OpenDoc -- are designed to help programmers develop
components that can work together. Many analysts believe that component
software is the natural extension of object-oriented programming and that
it will become the standard programming paradigm for years to come.
Configuration
The way a system is set up, or the assortment of components that make
up the system. Configuration can refer to either hardware or software,
or the combination of both. For instance, a typical configuration for
a PC consists of 32MB (megabytes) main memory, a floppy drive, a hard
disk, a modem, a CD-ROM drive, a VGA monitor, and the Windows operating
system.
Many software
products require that the computer have a certain minimum configuration.
For example, the software might require a graphics display monitor and
a video adapter, a particular microprocessor, and a minimum amount of
main memory.
When you
install a new device or program, you sometimes need to configure it, which
means to set various switches and jumpers (for hardware) and to define
values of parameters (for software). For example, the device or program
may need to know what type of video adapter you have and what type of
printer is connected to the computer. Thanks to new technologies, such
as plug-and-play, much of this configuration is performed automatically.
Configure
To set up a program or computer system for a particular application.
Copy Protection
Refers to techniques used to prevent the unauthorized copying of software.
The idea of copy-protected software was created by software manufacturers
who wanted to prevent software piracy -- users copying programs and giving
them to friends and colleagues free of charg.
As enticing
an idea as it may be, copy protection has not proved to be a viable strategy.
For one, it is practically impossible to create software that cannot be
copied by a knowledgeable programmer. Second, many consumers shy away
from copy-protected software because backup copies are difficult to make.
Thus, if their original copy of the software is damaged, the user must
contact the manufacturer for a new copy. Finally, some copy-protection
techniques can actually damage other software on the system. For these
reasons, copy-protected software is becoming less common.
Most software
producers now protect their programs by issuing registration numbers with
each package. When you install the software, you must enter the registration
number. This does not prevent all piracy, but it limits it. In addition,
users cannot get updates to a product unless they own the original diskettes
and documentation.
An alternative
strategy for dealing with the problem of software piracy is shareware,
where users are actually encouraged to copy and disseminate programs.
Shareware publishers rely on people's honesty to pay for the products
used.
Courseware
Software designed to be used in an educational program.
Crippled
Version
A demonstration version of a piece of software that has one or more critical
features disabled. Many software companies distribute crippled versions
of their applications free with the hope that users will get hooked and
buy the full version.
Customer
Support
Service that computer and software manufacturers, and third-party service
companies, offer to customers.
Device
Dependant
Like machine-dependent, device-dependent refers to programs that can run
only on a certain type of hardware.
Digital
Wallet
(1) Encryption software that works like a physical wallet during electronic
commerce transactions. A wallet can hold a user's payment information,
a digital certificate to identify the user, and shipping information to
speed transactions. The consumer benefits because his or her information
is encrypted against piracy and because some wallets will automatically
input shipping information at the merchant's site and will give the consumer
the option of paying by digital cash or check. Merchants benefit by receiving
protection against fraud.
Most wallets
reside on the user's PC, but recent versions, called "thin"
wallets, are placed on the credit card issuer's server. Netscape and Microsoft
now support wallet technology on their browsers.
(2) Digital
Wallet, a registered trademark of Minds@Work, is a self-powered portable
hard drive used for storing digital camera images.
Dribbleware
Software characterized by frequent updates, fixes, and patches. The term
is somewhat derogatory, indicating software that was released without
sufficient testing or before all features could be added. With the intense
market pressure to release software products as soon as possible, and
with the increased ease of updating software via Internet downloads, dribbleware
is becoming the norm rather than the exception.
EULA
Short for End-User License Agreement, the type of license used for most
software.
Fatal
Exception Error
A type of program error that requires that the program responsible for
the error be shut down. Software applications communicate with operating
systems and other applications through layers of code. An exception is
an error alert that communicates the problem across the layers. When an
error is detected, the exception is sent through the layers of code one
by one until code is found that can handle the error. If no code has been
included in any layer of the program to handle the specific error, the
exception will travel through all the layers, create a fatal exception
error, terminate the application and may even shut down the operating
system.
For example,
a program may request that the operating system reserve a block of memory
for the program's use. If the operating system is unable to honor the
request - if the memory request is too large or if there is not enough
available memory - it will send a memory exception to the layer that made
the request. The exception will continue to travel through the layers
until it is dealt with. If the program does not catch the exception, because
the programmer did not write code to handle that particular exception,
the exception makes its way to the top layer and the operating system
recognizes it as an unhandled exception and shuts down the program, resulting
in a fatal exception error. Well-designed software, however, handles all
exceptions.
Firmware
Software (programs or data) that has been written onto read-only memory
(ROM). Firmware is a combination of software and hardware. ROMs, PROMs
and EPROMs that have data or programs recorded on them are firmware
Forms
Software
A type of program that enables you to design and fill in forms on a computer.
Most forms packages contain a number of sample forms that you can modify
for your own purposes. Newer forms software packages enable you to publish
a form on the Internet so that anyone with Internet access can fill it
out.
Freeware
Copyrighted software given away for free by the author. Although it is
available for free, the author retains the copyright, which means that
you cannot do anything with it that is not expressly allowed by the author.
Usually, the author allows people to use the software, but not sell it.
Functional
Specification
A formal description of a software system that is used as a blueprint
for implementing the program. At minimum, a functional specification should
precisely state the purpose (e.g., the function) of the software. Depending
on the software engineering methodology used, the functional specification
might also provide implementation details, such as how the project is
divided into modules and how the different modules interact. In addition,
a functional specification often describes the software from the user's
perspective -- how the user interface appears and how a user would use
the program to perform specific functions.
Input
Whatever goes into the computer. Input can take a variety of forms, from
commands you enter from the keyboard to data from another computer or
device. A device that feeds data into a computer, such as a keyboard or
mouse, is called an input device.
The act of
entering data into a computer.
Integrated
(1) A popular computer buzzword that refers to two or more components
merged together into a single system. For example, any software product
that performs more than one task can be described as integrated.
(2) Increasingly,
the term integrated software is reserved for applications that combine
word processing, database management, spreadsheet functions, and communications
into a single package.
Intrusion
Detection System
An intrusion detection system (IDS) inspects all inbound and outbound
network activity and identifies suspicious patterns that may indicate
a network or system attack from someone attempting to break into or compromise
a system.
The firewall
limits the access between networks in order to prevent intrusion and does
not signal an attack from inside the network. An IDS evaluates a suspected
intrusion once it has taken place and signals an alarm. An IDS also watches
for attacks that originate from within a system.
Jini
(pronounced GEE-nee; loosely derived from the Arabic for magician) Software
from Sun Microsystems that seeks to simplify the connection and sharing
of devices, such as printers and disk drives, on a network. Currently
adding such devices to a computer or network requires installation and
boot-up, but a device that incorporates Jini will announce itself to the
network, provide some details about its capabilities, and immediately
become accessible to other devices on the network. Under this technology
it would be possible to create distributed computing, whereby capabilities
are shared among the machines on a common network. This would allow users
to access the power and features of any device on the network and would
free the desktop computer from holding all the memory, storage and processing
power it needs for any job. For example, if a disk drive on a network
had Jini capabilities, any computer on that network could use the drive
as though it were its own. Because Jini has the potential to make operating
systems incidental to the power of networks, some have seen Jini as an
attempt to reduce the influence of Windows.
JNI
(Java Native Interface) A Java programming interface, or API, that allows
developers to access the languages of a host system and determine the
way Java integrates with native code. The JNI has been a point of contention
between Sun and Microsoft, since Microsoft seeks to create its own native
code interface and Sun claims this violates their licensing agreement.
Machine
Dependant
Refers to a software application that runs only on a particular type of
computer. Programs that run on a variety of different types of computers
are called machine independent.
Almost all
programs have some machine dependencies (that is, they run somewhat differently
on different types of computers), but the degree of independence can vary
widely. Machine-independent programs give you more flexibility: if you
buy a new type of computer, you can continue using the same software package
instead of learning a new one. On the other hand, machine-dependent programs
often take advantage of special hardware features of a particular computer,
making the programs faster.
Another term
for machine dependent is device dependent, but whereas machine dependent
usually refers to the computer, device dependent can refer to a dependency
on any device, like a printer.
Machine
Independant
Able to run on a variety of computers.
Middleware
Software that connects two otherwise separate applications. For example,
there are a number of middleware products that link a database system
to a Web server. This allows users to request data from the database using
forms displayed on a Web browser, and it enables the Web server to return
dynamic Web pages based on the user's requests and profile.
Mode
The state or setting of a program or device. For example, when a word
processor is in insert mode, characters that you type are inserted at
the cursor position. In overstrike mode, characters typed replace existing
characters
The term
mode implies a choice -- that you can change the setting and put the system
in a different mode.
Modular
Architecture
Refers to the design of any system composed of separate components that
can be connected together. The beauty of modular architecture is that
you can replace or add any one component (module) without affecting the
rest of the system. The opposite of a modular architecture is an integrated
architecture, in which no clear divisions exist between components.
The term
modular can apply to both hardware and software. Modular software design,
for example, refers to a design strategy in which a system is composed
of relatively small and autonomous routines that fit together.
MTA
Short for message transfer agent, the program responsible for receiving
incoming e-mails and delivering the messages to individual users. The
MTA transfers messages between computers. Hidden from the average user,
it is responsible for routing messages to their proper destinations. MTAs
receive messages from both MUAs and other MTAs, although single-user machines
more often retrieve mail messages using POP. The MTA is commonly referred
to as the mail server program. UNIX sendmail and Microsoft Exchange Sever
are two examples of MTA.
MUA
Short for mail user agent, the software that allows a user to access and
manage e-mail, including reading, composing, disposing, printing and displaying
e-mail messages. The MUA provides the interface between the user and the
MTA. Eudora and Outlook are two popular MUAs.
Napster
Created by 19-year-old Shawn Fanning in 1999, Napster is an application
that gives individuals access to one another's MP3 files by creating a
unique file-sharing system via the Internet.
Napster lets
users view and download the contents of MP3 directories from other Napster
users' hard drives. Type in the artist and/or song to receive a list,
compiled by Napster's servers, of all the files currently available. Double
click on a song to download from user's hard drive.
Because Napster
searches individual hard drives, the number and variety of MP3 files vary.
Not all Napster users are online at the same time; therefore, what you
may not find one day, may, in fact, be there the next.
Office
Automation
The use of computer systems to execute a variety of office operations,
such as word processing, accounting, and e-mail. Office automation almost
always implies a network of computers with a variety of available program.
Open Source
A certification standard issued by the Open Source Initiative (OSI) that
indicates that the source code of a computer program is made available
free of charge to the general public. The rationale for this movement
is that a larger group of programmers not concerned with proprietary ownership
or financial gain will produce a more useful and bug -free product for
everyone to use. The concept relies on peer review to find and eliminate
bugs in the program code, a process which commercially developed and packaged
programs do not utilize. Programmers on the Internet read, redistribute
and modify the source code, forcing an expedient evolution of the product.
The process of eliminating bugs and improving the software happens at
a much quicker rate than through the traditional development channels
of commercial software as the information is shared throughout the open
source community and does not originate and channel through a corporation's
research and development cogs.
Examples
of open source software are UNIX, Linux and FreeBSD.
Output
Anything that comes out of a computer. Output can be meaningful information
or gibberish, and it can appear in a variety of forms -- as binary numbers,
as characters, as pictures, and as printed pages. Output devices include
display screens, loudspeakers, and printers.
To give out.
For example, display screens output images, printers output print, and
loudspeakers output sounds.
Personal
Finance Manager
A simple accounting program that helps individuals manage their finances.
Personal finance managers help you balance your checkbook and keep track
of investments. Some can even help you pay your bills by printing out
checks or transferring money electronically from your bank account.
Public-Domain
Software
Refers to any program that is not copyrighted. Public-domain software
is free and can be used without restrictions. The term public-domain software
is often used incorrectly to include freeware, free software that is nevertheless
copyrighted.
Refactoring
Improving the design of existing software code. Refactoring doesn't change
the observable behavior of the software; it improves its internal structure.
For example, if a programmer wants to add new functionality to a program,
he may decide to refactor the program first to simplify the addition of
new functionality in order to prevent software entropy.
Screen
Scraper
Software that allows a PC to intercept character-based data from a mainframe
-- often presented in a green screen -- and present it in an easier to
understand graphical user interface (GUI ). Newer screen scrapers present
the information in HTML, so it can be accessed with a browser. Leading
makers include Mozart (www.mozart.com), Flashpoint, Inc. (www.flashpt.com)
and Intelligent Environments (www.screensurfer.com).
Service
Pack
A service pack is an update to a software version that fixes an existing
problem, such as a bug, or provides enhancements to the product that will
appear in the next version of the product. When the new product version
is released, it usually contains the fixes and updates from the service
pack. Service packs can either be downloaded or ordered directly from
the company.
Shareware
Software distributed on the basis of an honor system. Most shareware is
delivered free of charge, but the author usually requests that you pay
a small fee if you like the program and use it regularly. By sending the
small fee, you become registered with the producer so that you can receive
service assistance and updates. You can copy shareware and pass it along
to friends and colleagues, but they too are expected to pay a fee if they
use the product.
Shareware
is inexpensive because it is usually produced by a single programmer and
is offered directly to customers. Thus, there are practically no packaging
or advertising expenses.
Note that
shareware differs from public-domain software in that shareware is copyrighted.
This means that you cannot sell a shareware product as your own.
Software
Computer instructions or data. Anything that can be stored electronically
is software. The storage devices and display devices are hardware.
The terms
software and hardware are used as both nouns and adjectives. For example,
you can say: "The problem lies in the software," meaning that
there is a problem with the program or data, not with the computer itself.
You can also say: "It's a software problem"
The distinction
between software and hardware is sometimes confusing because they are
so integrally linked. Clearly, when you purchase a program, you are buying
software. But to buy the software, you need to buy the disk (hardware)
on which the software is recorded.
Software
Entropy
The tendency for software, over time, to become difficult and costly to
maintain. A software system that undergoes continuous change, such as
having new functionality added to its original design, will eventually
become more complex and can become disorganized as it grows, losing its
original design structure. In theory, it may be better to redesign the
software in order to support the changes rather than building on the existing
program, but redesigning the software is more work because redesigning
the existing software will introduce new bugs and problems.
Software
Licensing
Allowing an individual or group to use a piece of software. Nearly all
applications are licensed rather than sold. There are a variety of different
types of software licenses. Some are based on the number machines on which
the licensed program can run whereas others are based on the number of
users that can use the program. Most personal computer software licenses
allow you to run the program on only one machine and to make copies of
the software only for backup purposes. Some licenses also allow you to
run the program on different computers as long as you don't use the copies
simultaneously.
Software
Piracy
The unauthorized copying of software. Most retail programs are licensed
for use at just one computer site or for use by only one user at any time.
By buying the software, you become a licensed user rather than an owner.
You are allowed to make copies of the program for backup purposes, but
it is against the law to give copies to friends and colleagues.
Software
piracy is all but impossible to stop, although software companies are
launching more and more lawsuits against major infractors. Originally,
software companies tried to stop software piracy by copy-protecting their
software. This strategy failed, however, because it was inconvenient for
users and was not 100 percent foolproof. Most software now requires some
sort of registration, which may discourage would-be pirates, but doesn't
really stop software piracy.
An entirely
different approach to software piracy, called shareware, acknowledges
the futility of trying to stop people from copying software and instead
relies on people's honesty. Shareware publishers encourage users to give
copies of programs to friends and colleagues but ask everyone who uses
a program regularly to pay a registration fee to the program's author
directly.
Commercial
programs that are made available to the public illegally are often called
warez.
Speech
Synthesis
Refers to a computer's ability to produce sound that resembles human speech.
Although they can't imitate the full spectrum of human cadences and intonations,
speech synthesis systems can read text files and output them in a very
intelligible, if somewhat dull, voice. Many systems even allow the user
to choose the type of voice -- for example, male or female. Speech synthesis
systems are particularly valuable for seeing-impaired individuals.
Upgrade
A new version of a software or hardware product designed to replace an
older version of the same product. Typically, software companies sell
upgrades at a discount to prevent users from switching to other products.
In most cases, you must prove you own an older version of the product
to qualify for the upgrade price. In addition, the installation routines
for upgrades often check to make sure that an older version is already
installed on your computer; if not, you cannot install the upgrade.
In the 90s,
software companies began offering competitive upgrades, which means that
you can buy a program at a discount if you can prove that you own a competing
program.
Upward
Compatible
Refers to software that runs not only on the computer for which it was
designed, but also on newer and more powerful models. For example, a program
designed to run on an Intel 386 microprocessor, which also runs on a Pentium,
is upward compatible. Upward compatibility is important because it means
you can move to a newer, larger, and more sophisticated computer without
converting your data.
In contrast
to upward compatibility, downward (backward) compatible means that a program
runs not only on the computer for which it was designed, but also on smaller
and older models. For example, a program designed to run under MS-DOS
6.0, which also works under MS-DOS 5.0, is downward compatible.
Vaporware
A sarcastic term used to designate software and hardware products that
have been announced and advertised but are not yet available.
Viewer
A utility program that enables you to read a file in its native format
. A Lotus 1-2-3 viewer, for example, enables you to read Lotus 1-2-3 files.
Many shell utilities and file managers include viewers so that you can
display different types of files.
Warez
Pronounced wayrz or wayrss, refers to commercial software that has been
pirated and made available to the public via a BBS or the Internet. Typically,
the pirate (also called a cracker) has figured out a way to de-activate
the copy-protection or registration scheme used by the software. Note
that the use and distribution of warez software is illegal. In contrast,
shareware and freeware may be freely copied and distributed.
Wrapper
Software that accompanies resources or other software for the purposes
of improving convenience, compatibility, or security. For example, a wrapper
is used to compress and encrypt software that is being sold over the Internet.
It is also used to make EDI - a decades-old electronic commerce standard
- compatible with the Internet. The term can also apply to hardware: the
casing around a Pentium II CPU is called a wrapper.
|