The Glitch - A Friend in Computing

The Glitch was conceived during 2004, and started out simply as a site to assist people with computer problems. Today the site has grown considerably and has become a one-stop shop for many aspects of modern computing and communication


FREQUENTLY ASKED QUESTIONS


Glitch Glossary

 

AAC

 

Advanced Audio Coding

AAC is the name of an audio encoding format, deemed to be the successor to MP3.
Importantly AAC produces better quality encoded audio than MP3, it is the default format used by Apple, in it's iPod portable digital media players and on their on-line music download store called iTunes. AAC's main advantage over MP3 is in its inherent design which allows developers more flexibility in the encoding process.
 

ADSL

Asymmetric Digital Subscriber Line

ADSL is a type of internet (DSL) connection, the 'A' Stands for 'Asymmetric', so called because it's upload speed and download speed are not the same (not Symmetrical). This is currently the most common type of connection to the internet (ADSL Broadband). As an example - an ADSL broadband speed of around 8MB, could reach a 7MB download speed, but may only support a 0.4MB upload speed.
 

BIOS

 

Basic Input Output System

A computer BIOS is a program that is stored on a erasable, programmable memory chip (EPROM) that immediately runs when a computer is first switched on. The job of a computer BOIS is to correctly recognise and initiate hardware components so that they are ready for the OS (Operating System) to control.
 

BLOG

weB LOG

The name Blog is an abridgment of the word Weblog.
Blogs are often owned by individuals who like to post regular updates on a particular subject. A Blog is often seen as a poor mans website; one of the biggest differences between a Blog and a website is that little or no technical knowledge is required to create and maintain a Blog. The biggest disadvantage of a Blog is they tend to have limited functionally. 
 

BMP

 

Bitmap File

A BMP represents a graphic image format.
Bitmap files are not compressed, and store information about Every picture element (Pixel), this tends to make bitmap files quite large. The lack of compression does allow BMP images to maintain a high quality representation of images. BMP files are the standard image format for Microsoft Windows.
 

BURNING

Writing

Burning is an improper term used to describe the process of writing information to an optical disc. The term came about due to the idea that the laser in optical disc writing "burned" pits in to the disc surface, even though this is not true, the term has continued to be used!  
 

CODEC

 

Compression/Decompression Algorithm

A Codec is a small program that is able to encode or decode a digital stream of data.
Although some media file formats are known to Microsoft Windows as standard, there are many more that require specific decoding to be recognized correctly by a computer and this is where Codecs come in. Some sites are now offering 'Codec Packs' that help systems recognize all but the most obscure media formats.
 

DDR

 

Double Data Rate

This is a type of computer memory, and is the successor to SDRam (single data rate).
DDR memory is able to transfer data twice in any one clock cycle, this effectively doubles the transfer rate and increases the available memory bandwidth.
 

DDR2

 

Double Data Rate 2

This is a type of computer memory, and is the successor to DDR.
The main difference between DDR and DDR2 is that the DDR2 memory bus is clocked at twice that of the physical memory chips, thus allowing it to transfer data at twice the speed of standard DDR memory. This increase in bus speed is however at the cost of increased latency.
 

DDR3

 

Double Data Rate 3

This is a type of computer memory, and is the successor to DDR2.
The main benefits of DDR3 memory over DDR2 are that they use lower voltages and are able to operative at higher speeds (increased bandwidth). As with DDR2 memory this increase in bus speed is however at the cost of increased latency.
 

DHCP

Dynamic Host Configuration Protocol

Is a protocol that automatically assigns IP addresses to computer systems on a network, the use of this protocol removes the need to manually manage IP addresses.
 

DNS

 

Domain Name System

Translates domain names in to IP Addresses.
We use it every time we enter a website address in to our Internet Browsers, the DNS translates the easy to remember domain name in to the jumble of numbers that make up the websites IP Address.
 

DOMAIN NAME

 

Host Name

This is commonly a more memorable identification of a web address, rather than a numeric IP Address.
 

DRM

 

Digital Rights Management

DRM is a copy protection process employed by record companies to prevent people sharing music/videos without paying for them. DRM can limit the number of times files are copied from one computer to another, it can also limit the types of device that the files can be transferred to.  These limitations imposed on genuine, paying customers have made it a very unpopular technology.
 

DVI

Digital Visual Interface

A Digital Visual Interface is designed to carry uncompressed digital video information to a display device. DVI ports are often found on modern graphics cards and are used to form an all digital connection to a display device (eg TFT screen). DVI connections tend to provide a better quality signal because they are less prone to interference than older style analogue VGA connections.   
 

FTP

 

File Transfer Protocol

It is a protocol that computers use to exchange files over a network or the internet.
A server that supports FTP will allow files to be exchanged between itself and a client computer running FTP software, (An example of this is when you use an FTP program to upload a website to web-space provided by your ISP).
 

GPU

Graphics Processing Unit

A Graphics Processing Unit is a special type of processor that has been specifically designed for graphic manipulation and display. GPUs are commonly found on most modern graphics cards and on motherboards that have some form of on-board graphics.
 

HDCP

High-bandwidth Digital Content Protection

HDCP is a mandatory protection system for high definition video (like Blu-ray), the system works by detecting non-HDCP compliant devices. When detected the output device will reduce the quality of it's HD video significantly, rendering the HD signal virtually useless and so prevent it from being duplicated.
 

HDMI

 

High Definition Media Interface

HDMI is a fully digital audio/video interface (It could be seen as the HD version of a SCART connection), that has been designed to carry uncompressed digital media data. It is often found on HD capable LCD and Plasma TVs, and is used to connect compatible HD capable equipment like DVD and HD-DVD players etc. The current HDMI standard supports video resolutions up to 1920x1200(1080p), and 8-channel uncompressed digital audio at 192kHz sample rate. The standard Type A HDMI connector has 19 pins and is capable of a transmission speed of 10.2 Gbps.
 

HDR

High Dynamic Range

This is a technique used in digital photography to boost the dynamic range of photos; the idea is to take multiple pictures of the same scene at different exposure settings, then merge the resultant images together, to form a single image with a higher dynamic range.
 

HTML

 

Hyper text Markup Language

Is a markup language for creating web pages.
A markup language is one that allows standard text to be labeled with different properties, like colour, style, font, structure etc..
 

HTTP

 

Hyper Text Transfer Protocol

It is a protocol that web browsers use to send and receive data over the Internet.
This is often the initial sequence of letters in a web address.
 

IP ADDRESS

 

Internet Protocol Address

This is a unique set of numbers that identifies a computer on a network or over the Internet.
It can be thought of as a computer address, all computers connected to the internet have an IP address, this is fundamental to the way the Internet works.
Example IP Address format: 220.68.110.45
 

IPOD

 

Internet POD or Interpersonal Portable Open Database

This is the name of the very popular portable digital media player developed by Apple. The iPods popularity stems from its elegant design, intuitive user interface and the simplicity of Apple's on-line music store iTunes. iPods are able to handle AAC and MP3 music file formats. The only negative thing you can really say about the iPod is that it is too closely associated with Apple's iTunes software.
 

MAC Code

Migration Authority Code

This is a code that allows you to transfer your existing broadband service from one provider (network) to another. This transfer system works in a very similar way to the porting of numbers between mobile phone operators. You contact your current ISP and request a MAC code.
 

MP3

 

MPEG-1 Audio Layer 3

MP3 is the name of an audio encoding format.
The MP3 format allows you to compress audio files (reduce their size), making them much easier to store, but importantly without effecting the overall quality of the audio. MP3 is what is called a 'Lossy' format because it removes some audio information during the encoding process, the theory being that it only removes audio information that is outside normal human hearing.
 

OEI DSP

Original Equipment Integrator Delivery Service Partner

OEI DSP is the acronym used to define generic versions of OEM products. Where OEM products will often have a specific partner/manufacturers name printed on it's label, OEI DSP versions are more generic and lack any specific branding, but are otherwise identical to OEM versions.
Example: Lets say you purchase an HP desktop, you would have installed an HP branded OEM version of Windows, but if you went out and purchased an OEM version of Windows directly from a supplier you would more than likely be purchasing an OEI DSP generic OEM verison!
 

OEM

Original Equipment Manufacturer

OEM is the acronym given to the manufacturing company whose products or components are purchased by a second company and then often retailed under the second company's brand name. OEM products are frequently generically packaged with little or no extras, often making them cheaper alternatives to full retail products.
 

PAC Code

Port Authorisation Code

This is a code that allows you to transfer your mobile phone number from one provider (network) to another. This transfer system works in a very similar way to the transferring of broadband connections between ISPs. You simply contact your current mobile provider and request a PAC code.

 

PAE

New Item

Physical Address Extension

This is a CPU feature that allows x86 processors to access more than 4GB of physical memory on compatible 32-bit versions of Windows. All 64-bit operating systems can address more than 4GB of physical memory and so do not need PAE. Certain 32-bit versions of Microsoft Windows Server support PAE to access up to 128GB of physical memory (although this maximum might be lower as it is processor dependant). Basically, PAE allows the operating system to use three-level address translation (as apposed to two-level) which ultimately allows 64-bit memory addressing. Importantly, PAE does not change the maximum address space for any one process, which is still limited to 4GB.

 

PHISHING

Fishing for information

Phishing is when a criminal  tries to procure another person's personal information by deception. A Phishing attempt can start with a simple email, phone call or even an Instant message, basically any communication where personal information could be accidentally revealed, due to a Phisher giving misleading information or asking unnecessary questions.
 

POP3

 

Post Office Protocol version 3

This is what is called a 'Pull' protocol and is used to retrieve e-mails from a remote server.
Most ISPs use this protocol to allow users to connect to their servers and retrieve emails. POP was developed because users required a way of getting emails without having to say connected to an email server, it allowed them to bring emails into their local computers and then disconnect.
 

SaaS

Software as a Service

Sometimes referred to as 'Software on demand', this is when an application is deployed and accessed over the internet. SaaS forms part of the 'Cloud Computing' model that allows an application to be accessible from anywhere, as long as there is an internet connection. 'FaceBook' could be seen as an example of this, the application (and data) are all accessed remotely over the internet, there is nothing to install and no technical knowledge is needed to use or maintain it, it is all done in 'The Cloud'.

 

SAS

Serial Attached SCSI

This is a type of storage device interface found on enterprise class hard drives and other storage devices, it is sometimes referred to as SAS 1.1. It is mostly used in enterprise storage solutions, due to its enhanced speed and reliability. SAS is a full-duplex, point-to-point serial protocol which utilizes a standard SCSI command set. It can achieve transfer rates of up to 3Gbps, but only supports cable length of 1 meter or less.

 

SAS-2

Serial Attached SCSI 2

This is a type of storage device interface found on enterprise class hard drives and other storage devices. It is the successor to SAS 1.1, and is mostly used in enterprise storage solutions, due to its enhanced speed and reliability. The main advantages over SAS 1.1 are that it supports transfer rates of up to 6Gbps (previously only 3Gbps) and also extends permissible cable lengths to 10 meters. It is also backward compatible with SAS 1.1.
 

SDSL

Symmetric Digital Subscriber Line

SDSL is a type of internet (DSL) connection, the 'S' Stands for 'Symmetric', so called because it's upload speed and download speed are the same (Symmetrical). Due to the cost of these types of connection they are more commonly used by businesses, rather than individuals. As an example - a SDSL broadband speed of 2MB, would have both a 2MB download speed, and 2MB upload speed.
 

SKU

Stock Keeping Unit

An SKU is often used as a product identifier, thus you will get a different SKU for each product a supplier sells. Sometimes suppliers quote this acronym as part of the description of a  product,  but in reality it has no real meaning to the customer, and as such is needlessly included in the final product description.
 

SMART

Self-Monitoring Analysis and Reporting Technology

This a way for modern hard drives and other similar devices to report/predict impending failures.
SMART enabled devices monitor a number of device attributes, when any one of these attributes changes, an error message is generated to alert the user of possible problems. 
 

SMTP

 

Simple Mail Transfer Protocol

This is what is called a 'Push' protocol and is used to send e-mails to a remote server.
SMTP was developed to allow the sending of emails to one or more recipients. Most ISPs use this protocol to allow users to connect to their servers and send emails.
 

SSD

Solid State Drive

This is a type of storage device, but unlike conventional hard drives, they have no moving parts. SSD's use NAND-based flash memory chips to store information, these chips are able to attain a much faster data access/throughput, are less susceptible to physical shock but generally cost more than an equivalent HDD. Most SSD's use standard hard drive interfaces thus they are easily integrated into a standard computer.
 

THE CLOUD

A metaphor for the Internet

The Cloud is a way to describe the location of services that are delivered, on-demand over the internet. They are not hosted locally and so can only be access remotely in (via) 'The Cloud'.
See also saas.
 

TWAIN

 

Technology Without An Interesting Name (unofficial acronym)

TWAIN is not an acronym, even though it is often thought to be one. Twain is a word that describes a software interface designed to acquire images from scanners and other imaging devices.
 

URL

 

Uniform Resource Locator

A URL can be thought of as a kind of address, and is often referred to as a Web Address.
A URL uses a globally recognized syntax to define and identify the location of a particular resource/site on the Internet. Example URL: http://www.theglitch.co.uk is the URL (Web Address) for 'The Glitch'.
 

UTP

Unshielded Twisted Pair

Often used in network cables, unshielded twisted pairs are basically two simple conductors twisted together. The twisting of the conductors helps cancel out undesirable external electromagnetic interference and local crosstalk between adjacent pairs.
 

VDSL

Very-high-bit-rate Digital Subscriber Line

VDSL is a type of fast internet (DSL) connection, the 'V' Stands for 'Very-high-bit-rate', so called because it's upload speed and download speeds are significantly quicker than previous DSL connection types. As of 2011 this is still a relatively new type of connection, only seen with Fibre-optic or cable based broadband connections. As an example - an VDSL broadband speed of 24MB, could give a 20MB download speed, and around a 3MB upload speed (Significantly quicker than previous generation ADSL connections).
 

VoIP

 

Voice over Internet Protocol

This is the routing of voice conversations over a network or Internet connection. It is sometimes referred to as IP/Internet/Broadband Telephony or even VoB (Voice Over Broadband). VoIP to VoIP voice connections are often free, but a small charge is normally incurred for calling a standard land line or mobile phone number. VoIP call quality is directly linked to the quality of your Internet connection and general Internet congestion, so if you only have a limited broadband capability or you are calling someone who is located a long distance away, you may find you get momentary voice drop-outs and break-ups.
 

WMA

 

Windows Media Audio

WMA is the name of an audio encoding format developed by Microsoft, it is the main audio codec used in their Windows Operating System. WMA is seen as the main competitor to MP3 and like MP3 it is a 'Lossy' format, but like AAC it is better quality than MP3. Compatibility is generally good, but one notable exception is Apple's iPod range, which does not support the WMA format.
 

 
Top



Be Safe Online

Use a firewall

Keep anti-virus software updated

Get latest Windows updates

Use anti-spyware software




Protection Against
Phishing

Never give out personal info

Type URLs don't follow links

Check site is using encryption



 


Designed to be viewed at 1024x768 minimum