Computer Terminology
Questions Asked in Previous Years
Firewall
Malware
MPEG
ISP
HTML
ASCII American Standard Code for Information Interchange (ASCII), pronounced is a character encoding based on the English alphabet. ASCII codes represent text in computers, communications equipment, and other devices that work with text Root Kit A rootkit is a program (or combination of several programs) designed to take fundamental control (in Unix terms “root” access, in Windows terms “Administrator” access) of a computer system, without authorization by the
system’s owners and legitimate managers. Access to the hardware (i.e., the reset switch) is rarely required as a rootkit is intended to seize control of the operating system running on the hardware.
Computer Architecture
Computer architecture is the conceptual design and fundamental operational structure of a computer system. A typical vision of a computer architecture as a series of abstraction layers: hardware, firmware, assembler, kernel, operating system and applications ,Search Engine.
CAD
CAM Computer Aided Manufacturing
CIM The Common Information Model (CIM) is an open standard that defines how managed elements in an IT environment are represented as a common set of objects and relationships between them. This is intended to allow consistent management of these managed elements, independent of their manufacturer or provider.
Thin Film Technology in Computers
Thin films are thin material layers ranging from fractions of a nanometre to several micrometres in thickness. Electronic semiconductor devices and optical coatings are the main applications benefiting from thin film construction. Some work is being done with ferromagnetic thin films as well for use as computer memory.
Artificial Intelligence
Hackers
Clock Speed
HTTP
CPU
ROM
BIOS
Modem
Spamming
Computer Virus
Computer
Handshake
Ethernet & its Use Ethernet is a family of frame-based computer networking technologies for local area networks (LANs).
Digital Signature A digital signature or digital signature scheme is a type of asymmetric cryptography used to simulate the security properties of a handwritten signature on paper. Digital signature schemes normally give two algorithms, one for signing which involves the user’s secret or private key, and one for verifying signatures which involves the user’s public key. The output of the signature process is called the “digital signature.”
DRAM Dynamic Random Access Memory
JPEG Joint Photographic Expert Group
ASCII American Standard Code for Information Interchange
IMAP Internet Message Access Protocol
WAP Enabled Phone Wireless Application Protocol. A WAP enabled mobile phone is equipped with a micro browser that allows customers to access information from the Internet and performs interactive transactions.
Digital Camera
Firewall
Multimedia In general, multimedia includes a combination of text, audio, still images, animation, video, and interactivity content forms.
HTML
FTP
MFLOPS Million floating point operations per second
PLANIT
What is Piracy Sympathetic Haptics New technology that transmits the sensation of touch over the Internet.
Special Features of Linux
Operating System
Internet Worm
DDoS Distributed Denial of Service. On the Internet, a distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system.
The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.
POSIX Portable Operating System Interface
EPROM Erasable, Programmable Read Only Memory
MODEM Modulator Demodulator
COBOL Common Business Oriented Language
E-Governance
URL
CD-ROM
USB
ITES
FORTRAN Formula Translating System
MP3 MPEG-1 Layer 3
Cyber Crime
Exabyte
XML Extensible Markup Language
MASER
SECAM Sequential Colour with Memory
TIPS Terrorism Information and Prevention System
Avatar A computer avatar is a personalized graphic file or rendering that represents a computer user. There are basically two types of avatars: those used at websites, such as on Web exchange boards, and those used in gaming and virtual worlds.
Wikipedia Terms
DDR SD RAM Double data rate synchronous dynamic random access memory. It achieves greater bandwidth than the preceding single data rate SDRAM by transferring data on the rising and falling edges of the clock signal (double pumped). Effectively, it doubles the transfer rate without increasing the frequency of the memory bus.
