1/49
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
analyse data
examine facts or information
assess
to make a judgement about the nature or quality of sb/sth
attend a webinar
be present at a presentation or seminar (= a meeting for discussion or training) that is conducted over the internet
backup
a copy of a file, etc. that can be used if the original is lost or damaged
beat yourself up
feel angry or annoyed with yourself
bounce back from
get over, recover from
browse the internet
look through websites without reading everything
bug
a fault in a machine, especially in a computer system or program
close
near in space or time
closely
in a close relation or position in time or space
come up against
be faced with
cookie
a computer file with information in it that is sent to the central server each time a particular person uses a network or the internet
data
information that is stored by a computer
demonstrate
show sth clearly by giving proof or evidence
enable voice recognition
allow your phone or computer to recognize your voice
examine
to consider or study an idea, a subject, etc. very carefully
firewall
a part of a computer system that prevents people from getting at information without permission, but still allows them to receive information that is sent to them
go over
examine carefully
hard
with great effort
hardly
almost none
high
at or to a position or level that is a long way up from the ground or from the bottom
highly
with admiration or praise
just
only
justly
according to what is morally right or fair
late
arriving, happening or done after the expected, arranged or usual time
lately
recently
mess up
to fail at sth or do it badly
miss out on
fail to benefit from
move on
start doing or thinking about sth new
own up to
admit to, take responsibility for
prove
to use facts, evidence, etc. to show that sth is true
resolve an issue
to find an acceptable solution to a problem or difficulty
run an application
operate a software program
save a document
to make a computer keep data by putting a copy of an electronic file in a location where it will be stored
search for information
look for information on the internet
spam
advertising material sent by email to people who have not asked for it
spyware
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
stream music
to receive music directly over the internet as a continuous flow
suggest
to put forward an idea or a plan for other people to think about
Trojan
a Trojan horse, or Trojan, is a hacking program that is a non-self-replicating type of malware
under attack
subjected to enemy attack or censure
under control
being dealt with successfully
under no obligation
not having to do sth
under pressure
being forced to do sth
under scrutiny
being watched or examined closely
under the radar
used to say that people are not aware of sth
under the weather
slightly ill/sick and not as well as usual
under your belt
to have already achieved or obtained sth
update
the most recent improvements to a computer program that are sent to users of the program
virus
instructions that are hidden within a computer program and are designed to cause faults or destroy data