EN | SK | GR | MK | IT | ES | RO

Time Scheduling

Time management is the process of planning and exercising conscious control of time spent on specific activities, especially to increase effectiveness, efficiency or productivity....  

Trojan horse

Trojan horse is a harmful program under the disguise of safe and reliable software or source. It carries a hidden destructive function. It isn’t triggered immediately after being downloaded. It awaits for user’s activity....  

Troubleshooting

Troubleshooting is the process of diagnosing the source of a problem. It is used to fix problems with hardware, software, and many other products. The basic theory of troubleshooting is that you start with the most general (and often most obvious) possible problems, and then narrow it down to more specific issues....  

Virus

Virus is a computer program with an ability to replicate. To work it uses operating system, applications and user’s identity. It is usually hidden within another program...  

Web Design

Web Design is a wide concept encompassing a set of skills and disciplines meant to create and maintain websites. Although it overlaps with the concept of web development, those two terms should not be used interchangeably. Web design refers mostly to the ‘visible’ part of a website, the way it looks, whereas web development is more concerned with functionality. ...  

Web Search Engine

It is a software system that is designed to search for information on the World Wide Web....  

Word Cloud

Word Cloud refers to an image, usually created using a specific software, composed of words related to a particular subject, where the size of the words is usually correlated to their importance into the given context. Not to be confused with cloud computing....  

Worm

Worm is a software with self-replication ability similar to virus. The main difference between worm and virus is that the worm is more independent it spreads in networks connected to the infected computer by using blanks in operating system and user’s naivety. They usually spread through email messages....  

1 2 3 4 5 6 7



This project has been funded with support from the European Commission. This web site and its contents reflects the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein.