You are on page 1of 3

Ghanshyam Thori Computer Terminology Notes

Computer Terminology

Questions Asked in Previous Years


Firewall
Malware
MPEG
ISP
HTML
ASCII American Standard Code for Information Interchange (ASCII), pronounced is a
character encoding based on the English alphabet. ASCII codes represent text
in computers, communications equipment, and other devices that work with
text
Root Kit A rootkit is a program (or combination of several programs) designed to take
fundamental control (in Unix terms "root" access, in Windows terms
"Administrator" access) of a computer system, without authorization by the
system's owners and legitimate managers. Access to the hardware (i.e., the reset
switch) is rarely required as a rootkit is intended to seize control of the
operating system running on the hardware.
Computer Computer architecture is the conceptual design and fundamental operational
Architecture structure of a computer system. A typical vision of a computer architecture as a
series of abstraction layers: hardware, firmware, assembler, kernel, operating
system and applications
Search Engine
CAD
CAM Computer Aided Manufacturing
CIM The Common Information Model (CIM) is an open standard that defines how
managed elements in an IT environment are represented as a common set of
objects and relationships between them. This is intended to allow consistent
management of these managed elements, independent of their manufacturer or
provider.
Thin Film Thin films are thin material layers ranging from fractions of a nanometre to
Technology in several micrometres in thickness. Electronic semiconductor devices and optical
Computers coatings are the main applications benefiting from thin film construction. Some
work is being done with ferromagnetic thin films as well for use as computer
memory.
Artificial Intelligence
Hackers
Clock Speed
HTTP
CPU
ROM
BIOS
Modem
Spamming
Computer Virus
Computer
Handshake

Ghanshyam Thori 1 Computer Terminology Notes


Ghanshyam Thori Computer Terminology Notes
Ethernet & its Use Ethernet is a family of frame-based computer networking technologies for local
area networks (LANs).
Digital Signature A digital signature or digital signature scheme is a type of asymmetric
cryptography used to simulate the security properties of a handwritten signature
on paper. Digital signature schemes normally give two algorithms, one for
signing which involves the user's secret or private key, and one for verifying
signatures which involves the user's public key. The output of the signature
process is called the "digital signature."
DRAM Dynamic Random Access Memory
JPEG Joint Photographic Expert Group
ASCII American Standard Code for Information Interchange
IMAP Internet Message Access Protocol
WAP Enabled Phone Wireless Application Protocol. A WAP enabled mobile phone is equipped with
a microbrowser that allows customers to access information from the Internet
and performs interactive transactions.
Digital Camera
Firewall
Multimedia In general, multimedia includes a combination of text, audio, still images,
animation, video, and interactivity content forms.
HTML
FTP
MFLOPS Million floating point operations per second
PLANIT
What is Piracy
Sympathetic Haptics New technology that transmits the sensation of touch over the Internet.
Special Features of
Linux
Operating System
Internet Worm
DDoS Distributed Denial of Service. On the Internet, a distributed denial-of-service
(DDoS) attack is one in which a multitude of compromised systems attack a
single target, thereby causing denial of service for users of the targeted system.
The flood of incoming messages to the target system essentially forces it to shut
down, thereby denying service to the system to legitimate users.
POSIX Portable Operating System Interface
EPROM Erasable, Programmable Read Only Memory
MODEM Modulator Demodulator
COBOL Common Business Oriented Language
E-Governance
URL
CD-ROM
USB
ITES
FORTRAN Formula Translating System
MP3 MPEG-1 Layer 3
Cyber Crime
Exabyte

Ghanshyam Thori 2 Computer Terminology Notes


Ghanshyam Thori Computer Terminology Notes
XML Extensible Markup Language
MASER
SECAM Sequential Colour with Memory
TIPS Terrorism Information and Prevention System
Avatar A computer avatar is a personalized graphic file or rendering that represents a
computer user. There are basically two types of avatars: those used at websites,
such as on Web exchange boards, and those used in gaming and virtual worlds.
Wikipedia

Terms
DDR SD RAM Double data rate synchronous dynamic random access memory. It achieves greater
bandwidth than the preceding single data rate SDRAM by transferring data on the
rising and falling edges of the clock signal (double pumped). Effectively, it doubles the
transfer rate without increasing the frequency of the memory bus.
SATA Serial Advanced Technology Attachment. It is a computer bus primarily designed for
transfer of data between a computer and storage devices
IDE IDE (Integrated Drive Electronics) is a standard electronic interface used between a
computer motherboard's data paths or bus and the computer's disk storage devices.
IDE was adopted as a standard by American National Standards Institute (ANSI) in
November, 1990. The ANSI name for IDE is Advanced Technology Attachment
(ATA).
VGA Video Graphics Array. (Term used in VGA camera in mobiles).
RSS Really Simple Syndication is a family of Web feed formats used to publish frequently
updated content such as blog entries, news headlines or podcasts.
SLR Single Lens Reflex. Uses an automatic moving mirror system which permits the
photographer to see exactly what will be captured by the film or digital imaging
system, as opposed to non-SLR cameras where the view through the viewfinder could
be significantly different from what was captured on film.
JPEG Joint Photographic Experts Group
AVI Audio Video Interleave
MPEG Moving Picture Experts Group
HTML Hyper Text Markup Language
ISDN An integrated service digital network line can be simply looked at as a digital phone
line. ISDN connections to the Internet can be four times faster than the fastest regular
phone connection, and because it is a digital connection a modem is not needed. Any
computer hooked up to ISDN will typically require other special equipment in lieu of
the modem, however. Also, both phone companies and ISPs charge more for ISDN
connections than regular modem connections.

Additional References:
1. Magical 2 Markerts
2. Up2 the Mark

Ghanshyam Thori 3 Computer Terminology Notes

You might also like