Individual work writing tasks it products Task 1


Download 0.76 Mb.
Pdf ko'rish
bet5/26
Sana25.03.2023
Hajmi0.76 Mb.
#1294355
1   2   3   4   5   6   7   8   9   ...   26
Bog'liq
2022-23 sirtqi mustaqil ta'lim-2-writing tayyori

Read-only 
memory (ROM
is 

type 
of 
non-volatile 
memory
 used in 
computers
 and other 
electronic devices
. Data 
stored in ROM cannot be electronically modified after the 
manufacture of the 
memory device
. Read-only memory is useful 
for storing 
software
 that is rarely changed during the life of the 
system, also known as 
firmware
. Software applications 
(like 
video games
) for programmable devices can be distributed 
as 
plug-in cartridges containing ROM
.
16 Encryption
In 
cryptography
encryption is 
the 
process 
of 
encoding
 information. This process converts the original 
representation of the information, known as 
plaintext
, into an 
alternative form known as 
ciphertext
. Ideally, only authorized 
parties can decipher a ciphertext back to plaintext and access 
the original information. Encryption does not itself prevent 
interference but denies the intelligible content to a would-be 
interceptor.



17 Database
In 
computing

database is 
an 
organized 
collection 
of 
data
 stored and accessed electronically. Small databases can 
be stored on a 
file system
, while large databases are hosted 
on 
computer 
clusters
 or 
cloud 
storage

The 
design 
of 
databases
 spans formal techniques and practical considerations, 
including 
data modeling
, efficient data representation and 
storage, 
query languages

security
 and 
privacy
 of sensitive data, 
and 
distributed 
computing
 issues, 
including 
supporting 
concurrent
 access and 
fault tolerance
.
18 Back up
In 
information technology
, a backup, or data backup is a copy 
of 
computer data
 taken and stored elsewhere so that it may be 
used to restore the original after a 
data loss
 event. The verb 
form, referring to the process of doing so, is "
back up
", whereas 
the noun and adjective form is "
backup
".
[1]
 Backups can be used 
to recover data after its loss from 
data deletion
 or 
corruption
, or 
to recover data from an earlier time.

[2]
 Backups provide a simple 
form of 
disaster recovery
; however not all backup systems are 
able to reconstitute a computer system or other complex 
configuration such as a 
computer cluster

active directory
 server, 
or 
database server
.
19 Server
In 
computing
, a server is a piece of 
computer
 hardware or 
software (
computer program
) that provides functionality for other 
programs or devices, called "
clients
." This 
architecture
 is called 
the 
client
–server model

Servers 
can 
provide 
various 
functionalities, often called "services," such as sharing data 
or 
resources
 among 
multiple 
clients 
or 
performing 
computations
 for a client. A single server can serve 
multiple clients, and a single client can use multiple servers. A 
client process may run on the same device or may connect over 
a network to a server on a different device.
[1]
 Typical servers 
are 
database 
servers

file 
servers

mail 
servers

print 
servers

web servers

game servers
, and 
application servers
.
20 Cloud computing 

Download 0.76 Mb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   ...   26




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling