You are on page 1of 3

Ghanshyam Thori

Computer Terminology Notes


Computer Terminology
Questions Asked in Previous Years

Firewall
Malware
MPEG
ISP
HTML
ASCII

Root Kit

Computer
Architecture
Search Engine
CAD
CAM
CIM

Thin Film
Technology in
Computers

American Standard Code for Information Interchange (ASCII), pronounced is a


character encoding based on the English alphabet. ASCII codes represent text
in computers, communications equipment, and other devices that work with
text
A rootkit is a program (or combination of several programs) designed to take
fundamental control (in Unix terms "root" access, in Windows terms
"Administrator" access) of a computer system, without authorization by the
system's owners and legitimate managers. Access to the hardware (i.e., the reset
switch) is rarely required as a rootkit is intended to seize control of the
operating system running on the hardware.
Computer architecture is the conceptual design and fundamental operational
structure of a computer system. A typical vision of a computer architecture as a
series of abstraction layers: hardware, firmware, assembler, kernel, operating
system and applications
Computer Aided Manufacturing
The Common Information Model (CIM) is an open standard that defines how
managed elements in an IT environment are represented as a common set of
objects and relationships between them. This is intended to allow consistent
management of these managed elements, independent of their manufacturer or
provider.
Thin films are thin material layers ranging from fractions of a nanometre to
several micrometres in thickness. Electronic semiconductor devices and optical
coatings are the main applications benefiting from thin film construction. Some
work is being done with ferromagnetic thin films as well for use as computer
memory.

Artificial Intelligence
Hackers
Clock Speed
HTTP
CPU
ROM
BIOS
Modem
Spamming
Computer Virus
Computer
Handshake
Ghanshyam Thori

Computer Terminology Notes

Ghanshyam Thori
Ethernet & its Use
Digital Signature

DRAM
JPEG
ASCII
IMAP
WAP Enabled Phone
Digital Camera
Firewall
Multimedia
HTML
FTP
MFLOPS
PLANIT
What is Piracy
Sympathetic Haptics
Special Features of
Linux
Operating System
Internet Worm
DDoS

POSIX
EPROM
MODEM
COBOL
E-Governance
URL
CD-ROM
USB
ITES
FORTRAN
MP3
Cyber Crime
Exabyte
Ghanshyam Thori

Computer Terminology Notes


Ethernet is a family of frame-based computer networking technologies for local
area networks (LANs).
A digital signature or digital signature scheme is a type of asymmetric
cryptography used to simulate the security properties of a handwritten signature
on paper. Digital signature schemes normally give two algorithms, one for
signing which involves the user's secret or private key, and one for verifying
signatures which involves the user's public key. The output of the signature
process is called the "digital signature."
Dynamic Random Access Memory
Joint Photographic Expert Group
American Standard Code for Information Interchange
Internet Message Access Protocol
Wireless Application Protocol. A WAP enabled mobile phone is equipped with
a microbrowser that allows customers to access information from the Internet
and performs interactive transactions.
In general, multimedia includes a combination of text, audio, still images,
animation, video, and interactivity content forms.
Million floating point operations per second
New technology that transmits the sensation of touch over the Internet.

Distributed Denial of Service. On the Internet, a distributed denial-of-service


(DDoS) attack is one in which a multitude of compromised systems attack a
single target, thereby causing denial of service for users of the targeted system.
The flood of incoming messages to the target system essentially forces it to shut
down, thereby denying service to the system to legitimate users.
Portable Operating System Interface
Erasable, Programmable Read Only Memory
Modulator Demodulator
Common Business Oriented Language

Formula Translating System


MPEG-1 Layer 3

Computer Terminology Notes

Ghanshyam Thori
XML
MASER
SECAM
TIPS
Avatar

Computer Terminology Notes


Extensible Markup Language
Sequential Colour with Memory
Terrorism Information and Prevention System
A computer avatar is a personalized graphic file or rendering that represents a
computer user. There are basically two types of avatars: those used at websites,
such as on Web exchange boards, and those used in gaming and virtual worlds.

Wikipedia
DDR SD RAM

SATA
IDE

VGA
RSS
SLR

JPEG
AVI
MPEG
HTML
ISDN

Terms
Double data rate synchronous dynamic random access memory. It achieves greater
bandwidth than the preceding single data rate SDRAM by transferring data on the
rising and falling edges of the clock signal (double pumped). Effectively, it doubles the
transfer rate without increasing the frequency of the memory bus.
Serial Advanced Technology Attachment. It is a computer bus primarily designed for
transfer of data between a computer and storage devices
IDE (Integrated Drive Electronics) is a standard electronic interface used between a
computer motherboard's data paths or bus and the computer's disk storage devices.
IDE was adopted as a standard by American National Standards Institute (ANSI) in
November, 1990. The ANSI name for IDE is Advanced Technology Attachment
(ATA).
Video Graphics Array. (Term used in VGA camera in mobiles).
Really Simple Syndication is a family of Web feed formats used to publish frequently
updated content such as blog entries, news headlines or podcasts.
Single Lens Reflex. Uses an automatic moving mirror system which permits the
photographer to see exactly what will be captured by the film or digital imaging
system, as opposed to non-SLR cameras where the view through the viewfinder could
be significantly different from what was captured on film.
Joint Photographic Experts Group
Audio Video Interleave
Moving Picture Experts Group
Hyper Text Markup Language
An integrated service digital network line can be simply looked at as a digital phone
line. ISDN connections to the Internet can be four times faster than the fastest regular
phone connection, and because it is a digital connection a modem is not needed. Any
computer hooked up to ISDN will typically require other special equipment in lieu of
the modem, however. Also, both phone companies and ISPs charge more for ISDN
connections than regular modem connections.

Additional References:
1. Magical 2 Markerts
2. Up2 the Mark

Ghanshyam Thori

Computer Terminology Notes

You might also like