Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page: (Previous)   1  ...  11  12  13  14  15  16  17  18  19  20  ...  36  (Next)
  ALL

E

Equation editor,

"Software which contains symbols and templates to build a variety of equations within, say, a word processor.",

Equity of Access

Equity of access means that all people have the information they need-regardless of age, education, ethnicity, language, income, physical limitations or geographic barriers.

(taken from ALA)


ER

entity relationship


Expression

An expression in a programming language is a combination of values, variables, operators, and functions that are interpreted (evaluated) according to the particular rules of precedence and of association for a particular programming language, which computes and then produces (returns, in a stateful environment) another value.

eyecatcher

n. something that especially attracts oneos attention eyecatching

F

features

n. special characteristics of a product, usually leading to certain benefits

File Formats

A file format is a particular way to encode information for storage in a computer file.

url


Fill

A shape created in Flash can be made using fill. Fill is used to colour-in the shape. Colours are chosen in the Colours section of the toolbox.


Firewall

A dedicated gateway machine with special security precautions on it typically used to protect a network when it is connected to an outside network, especially the Internet.

Firewalls

A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.


Page: (Previous)   1  ...  11  12  13  14  15  16  17  18  19  20  ...  36  (Next)
  ALL