Spread the love

Computer Terminology

Questions Asked in Previous Years






ASCII American Standard Code for Information Interchange (ASCII), pronounced is a character encoding based on the English alphabet. ASCII codes represent text in computers, communications equipment, and other devices that work with text Root Kit A rootkit is a program (or combination of several programs) designed to take fundamental control (in Unix terms “root” access, in Windows terms “Administrator” access) of a computer system, without authorization by the

system’s owners and legitimate managers. Access to the hardware (i.e., the reset switch) is rarely required as a rootkit is intended to seize control of the operating system running on the hardware.

Computer Architecture

Computer architecture is the conceptual design and fundamental operational structure of a computer system. A typical vision of a computer architecture as a series of abstraction layers: hardware, firmware, assembler, kernel, operating system and applications ,Search Engine.


CAM Computer Aided Manufacturing

CIM The Common Information Model (CIM) is an open standard that defines how managed elements in an IT environment are represented as a common set of objects and relationships between them. This is intended to allow consistent management of these managed elements, independent of their manufacturer or provider.

Thin Film Technology in Computers

Thin films are thin material layers ranging from fractions of a nanometre to several micrometres in thickness. Electronic semiconductor devices and optical coatings are the main applications benefiting from thin film construction. Some work is being done with ferromagnetic thin films as well for use as computer memory.

Artificial Intelligence


Clock Speed







Computer Virus



Ethernet & its Use Ethernet is a family of frame-based computer networking technologies for local area networks (LANs).

Digital Signature A digital signature or digital signature scheme is a type of asymmetric cryptography used to simulate the security properties of a handwritten signature on paper. Digital signature schemes normally give two algorithms, one for signing which involves the user’s secret or private key, and one for verifying signatures which involves the user’s public key. The output of the signature process is called the “digital signature.”

DRAM Dynamic Random Access Memory

JPEG Joint Photographic Expert Group

ASCII American Standard Code for Information Interchange

IMAP Internet Message Access Protocol

WAP Enabled Phone Wireless Application Protocol. A WAP enabled mobile phone is equipped with a micro browser that allows customers to access information from the Internet and performs interactive transactions.

Digital Camera


Multimedia In general, multimedia includes a combination of text, audio, still images, animation, video, and interactivity content forms.



MFLOPS Million floating point operations per second


What is Piracy Sympathetic Haptics New technology that transmits the sensation of touch over the Internet.

Special Features of Linux

Operating System

Internet Worm

DDoS Distributed Denial of Service. On the Internet, a distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system.

The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.

POSIX Portable Operating System Interface

EPROM Erasable, Programmable Read Only Memory

MODEM Modulator Demodulator

COBOL Common Business Oriented Language






FORTRAN Formula Translating System

MP3 MPEG-1 Layer 3

Cyber Crime


XML Extensible Markup Language


SECAM Sequential Colour with Memory

TIPS Terrorism Information and Prevention System

Avatar A computer avatar is a personalized graphic file or rendering that represents a computer user. There are basically two types of avatars: those used at websites, such as on Web exchange boards, and those used in gaming and virtual worlds.

Wikipedia Terms

DDR SD RAM Double data rate synchronous dynamic random access memory. It achieves greater bandwidth than the preceding single data rate SDRAM by transferring data on the rising and falling edges of the clock signal (double pumped). Effectively, it doubles the transfer rate without increasing the frequency of the memory bus.


Leave a Reply

Your email address will not be published. Required fields are marked *