You are on page 1of 16

300 Questions Collections - Final Revision – Very Short Questions – Technical Terms

and Full Forms Collections 2080 – Computer Science [10 Marks]


Answer the following questions in one sentence.

1. What is communication?
Communication is sending and receiving information between two or more persons.

2. What is Tele-Communication?
The transmission of data and information from one place to another for the purpose of communication is
known as telecommunication.

3. What are data communication mode?


Data communication modes refer to direction of data flow between devices in a network or
communication system. Simplex, Half Duplex and Full Duplex mode are the types of communication
mode.

4. What is analog signal?


An analog signal refers to a continuous electrical signal that varies over time and represents data as a
continuous waveform.

5. What is computer network?


Computer network is a group of two or more computers and devices connected to each other through wired
or wireless media to exchange data and information and share hardware, software and other resources.

6. Give reason in short that "Computer network reduces the cost of operation."
Ans: Computer network reduces the cost of operation by sharing hardware and software.

7. What is network protocol?


A set of rules followed for interconnection and communication between computers in a network is called
network protocol.

8. What is topology?
Ans. Network topology is the inter-connected pattern of network components.

9. Define bandwidth.
Bandwidth can be defined as the maximum volume of data that can be transmitted through a
communication system.

10. Write any two examples of full duplex modes of data transmission.
Any two examples of full duplex modes of data transmission are telephone and mobile.

11. In which communication media data transfer is the fastest?


In Fiber optic cable, data transfer is the fastest.

12. Write two examples of bounded media.


Any two examples of bounded media are Twisted Pair Cable and Fiber Optic Cable

13. Which connector is used with coaxial cable?


BNC connector is used with coaxial cable

14. Which type of cable typically uses RJ-45 connector?


-Twisted pair cable
1|PagePrepared By : Deepak S hrestha – SEE COMPUTER SCIENCE 2080
300 Questions Collections - Final Revision – Very Short Questions – Technical Terms
and Full Forms Collections 2080 – Computer Science [10 Marks]
15. What is communication media?
A channel or path through which data and information are transmitted between connected devices in a
network environment is called communication media
16. What is internet?
The Internet is a global network of interconnected computers that allows people to share information and
communicate from anywhere in the world.

17. What is mail server?


A mail server is a computer system that is dedicated to handling and managing the sending, receiving, and
storage of emails.

18. What is web server?


A web server is a software or hardware that delivers web content to clients like browsers.

19. What is search engine?


Search engine is the communication program that searches documents on the basis of specified keywords
and returns a list of the web links that matches the keywords.

20. Write the name of any two search engines.


The name of any two search engines is google.com and ask.com

21. What is web browser?


Web browser is a computer program that access web pages and displays them on the user’s computer.

22. Mention any two services provided by internet.


Any two services provided by internet are Search engine and E-mail.

23. What is e-mail?


E-mail is the most widely used service on the Internet which sends and receives messages electronically
through the Internet.

24. Define E-mail address.


An email address is a unique identifier used for sending and receiving electronic messages over the
internet.

25. Write the name of the protocol used for sending email messages.
-Simple Mail Transfer Protocol (SMTP)

26. Define IP address.


IP address is an unique numerical identifier for every device or network that connects to the internet.

27. What is switch in network connecting device?


Switch is a network connectivity device which joins multiple computers together to share information
among them. The selected computer can get information through switch.

28. Which device is used to connect PC with telephone line?


MODEM is used to connect PC with telephone line.

29. Why switch is also known as smart hub?


Switch is also known as smart hub because it transfers packets to only those selected computers connected
in network.
2|PagePrepared By : Deepak S hrestha – SEE COMPUTER SCIENCE 2080
300 Questions Collections - Final Revision – Very Short Questions – Technical Terms
and Full Forms Collections 2080 – Computer Science [10 Marks]
30. Where does intranet has been used?
Intranet has been used to share internal information and resources within an organization.

31. What is the business done through internet?


The business done through internet is e-commerce.

32. What is Ecommerce?


E-commerce is also known as electronic commerce or Internet commerce which means buying and selling
of goods, products, or services through Internet.

33. What is M-Commerce?


The online transactions through the wireless handheld devices such as mobile phone, laptop, palmtop,
tablet, or any other personal digital assistant is called M-Commerce.

34. What is cyber-crime?


Cyber crime refers to criminal activities that are carried out using computers, networks and the internet.

35. What is cyber bulling?


Cyber bullying is a kind of harassment using mobiles or computers.

36. What is cyber law?


The law which governs the legal issues in the cyber space regarding the internet or WWW for digital data
processing and transaction is called cyber law.

37. Give some examples of cyber law


Computer crimes/Cyber-crime law
Intellectual property law
Data protection and privacy law
Telecommunication law

38. When was cyber law introduced in Nepal?


30th Bhadra 2061 B.S.

39. What is key logger?


A keylogger is a tool that secretly records every key pressed on a computer or mobile device.

40. What is a backup?


Backup is the system of copying data and programs into another location or creating a duplicate copy of
it in a secured place.

41. Which software is used to remove virus from Computer System?


Antivirus Software is used to remove virus from Computer System.

42. What is information security?


Information security is the practice of preventing unauthorized access, use, disclosure, modification,
recording or destruction of information.

43. Why do you connect your PC to the UPS?


We connect PC to the UPS to control fluctuation of electric voltage and provides enough backup electric
power to the computer system when there is power failure.

3|PagePrepared By : Deepak S hrestha – SEE COMPUTER SCIENCE 2080


300 Questions Collections - Final Revision – Very Short Questions – Technical Terms
and Full Forms Collections 2080 – Computer Science [10 Marks]
44. Why data decryption is necessary?
To convert encrypted (coded) data into readable form.

45. What is social media?


Social media refers to online platforms and websites that allow users to create, share, and interact with
content and other users.

46. Write opportunities and threats in social media.


Opportunities of social media is It creates awareness and innovate the way people live and Threats of
social media is personal data and privacy can be easily hacked and shared on the internet.

47. Write any two advantages of social media.


Ans: Any two advantages of social media are:
It creates awareness and innovate the way people live
Social media let us share anything with others around the world.

48. List any two commandments of computer ethics.


Any two commandments of computer ethics.
Do not use a computer to publish fake information.
Do not search the file or record of other people.

49. What is the vision of IT Policy of Nepal 2072?


The vision of IT Policy of Nepal 2072 is to transform Nepal into information and knowledge based society
and economy.

50. Define Computer security.


Computer security refers to protecting computer and its content from damage, theft or misuse and action
to prevent such incidents.

51. What is hardware security?


Hardware security is the protection given to the various hardware tools and equipment used in computer
system from the accidental or intentional harm.

52. What is Software security?


Software security is the protection of computer systems and applications from threats, such as hacking,
virus attacks, and unauthorized access, to ensure their confidentiality, integrity, and availability.

53. List any two software security measures.


Any two software security measures are password and backup

54. Write two methods for hardware security.


Any two methods for hardware security are Insurance and Regular maintenance of computer hardware.

55. List some points about how we can protect our data.
Antivirus software can detect and remove virus from the computer.
Software for backup helps in securing the information by keeping backup.

56. What is digital signature?


Digital signature is a security mechanism system used on the internet for data and information transaction
by attaching a code at the end of the electronic message that confirms the authenticity of sent message.

4|PagePrepared By : Deepak S hrestha – SEE COMPUTER SCIENCE 2080


300 Questions Collections - Final Revision – Very Short Questions – Technical Terms
and Full Forms Collections 2080 – Computer Science [10 Marks]
57. What is digital currency?
Digital currency is a type of electronic money that is stored and exchanged using computers and other
digital devices.

58. What is digital citizenship?


Digital citizenship refers to the responsible and ethical use of technology and the internet which involves
understanding, practicing, and promoting appropriate behavior when using digital tools and resources.

59. Define Cryptography.


Cryptography is the study of secure communications techniques that allow only the sender and
intended recipient of a message to view its contents

60. What is mobile computing?


Mobile computing refers to a variety of devices that allow people to access data and information from
wherever they are via a mobile device.

61. What is Online Payment?


Online payment refers to the payment for buying goods or services through the Internet using different
online payment gateway

62. Name any to modes of Electronic Payments.


Any two modes of electronic payments are:
i) Debit Card / Credit Card
ii) Mobile wallet like e-sewa, khalti

63. What is Cloud computing?


Cloud computing is a technology that allows users to access and use of computing resources, like servers
and software, over the internet.

64. Write any two benefits of cloud computing.


Any two benefits of cloud computing are
It allows to quickly and easily access, store information anywhere, anytime in the whole world, using an
internet connection.
It is easier to get back-up and restore the data.

65. List the services of Cloud Computing.


The services of cloud computing are :
Infrastructure as a Service (IaaS)
Software as a Service (SaaS)
Platform as a Service (PaaS)

66. What is AI?


Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent
machines that work and reacts like humans.

67. List some areas where Al can help us.


Robotics and Education

68. What is e-governance?


E-Governance refers to the use of the digital technology by government to enhance the delivery of public
services and engage with citizens more effectively.
5|PagePrepared By : Deepak S hrestha – SEE COMPUTER SCIENCE 2080
300 Questions Collections - Final Revision – Very Short Questions – Technical Terms
and Full Forms Collections 2080 – Computer Science [10 Marks]
69. What is e-banking?
E-banking refers to a digital banking system that enables customers to conduct financial transactions and
manage their accounts online through the internet or mobile apps without the need for a physical visit to a
bank branch.

70. What is IoT?


IoT is a system of interrelated computing device to exchange information over a network without human-
to-human or human to computer interaction.

71. Write any two examples of IOT.


Any two examples of IOT are: Smart Watch, Smart TV

72. Which data type is used to store alpha numeric characters or special symbols in MS-Access?
Text data type is used to store alpha numeric characters or special symbols in MS-Access.

73. Which data type is suitable to store photographs of students in MS-Access?


The suitable data type to store photographs of students in MS-Access is OLE object.

74. Which data types are used to store graphics and numeric characters in MS-Access?
OLE object is used for graphic and Numeric data type is used for numeric character

75. Which data type is used to store your school fee in MS-Access?
Currency is the data type used to store school fee in MS-Access.

76. Which data type is suitable to store salary of an employee in MS-Access?


Ans: Currency data type is suitable to store salary of an employee in MS-Access.

77. Which data type is used in MS-Access to store address of a person?


Memo data type is used in MS-Access to store address of a person.

78. Which data type is used to store date of birth of an employee in MS-Access?
Date/Time data type is used to store date of birth of an employee in MS-Access

79. Which in the logical data type of MS-Access?


The logical data type of MS-Access is Yes/No.

80. Which data type of MS Access is used for data that can store only one of two possible values?
The data type that can store only one of two possible values is Yes/No.

81. What data type is commonly represented as Boolean in MS - Access?


-Yes/No

82. What is the field size of yes/no field?


The field size of YES/NO field is 1 bit.

83. Write any two data type used in MS-Access database ?


Any two data type used in MS-Access database are text and number

84. Which view is used to modify a table structure in MS-Access?


Design View is used to modify a table structure in MS-Access.

6|PagePrepared By : Deepak S hrestha – SEE COMPUTER SCIENCE 2080


300 Questions Collections - Final Revision – Very Short Questions – Technical Terms
and Full Forms Collections 2080 – Computer Science [10 Marks]
85. What is the default extension of MS-Access?
The default extension of Ms-Access is : .mdb (2003 version) and .accdb (2007 version).

86. What is the default size of text field in MS-Access?


The default size of text field is : 50 (2003 version) and 255(2007 version).

87. What is the default size of number field in MS-Access?


The default size of number field in MS-Access is 4 bytes (Long Integer)

88. What is the storage size of text and currency data type?
The storage size of text data type is 255 and currency data type is 8 bytes.

89. What is the storage size of memo and text data type in MS- Access?
Text can store up to 255 characters and Memo can store up to 65,535 characters

90. What is the maximum length of field name in MS-Access?


The maximum length of field name in MS-Access 64 characters.

91. Which query is used to modify and calculate data in DBMS?


Update query is used to modify and calculate data in DBMS.

92. Which view is used to modify a record in MS-Access?


Datasheet view

93. Which object of MS-Access is used to retrieve data from the table?
Select Query

94. Which query is used to make changes in data stored in database?


Update Query

95. List any two objects of MS-Access


Query and Form

96. Which object of MS-Access is used to retrieve data from the table?
Query is used to retrieve data from a table.

97. Which object of DBMS is used to print information?


The object of DBMS which is used to print information is report.

98. What is the primary component of a database that organizes data into rows and columns?
-Table

99. What is the primary building block of a database?


-Table

100. Which object is used to store the data in database?


-Table

101. Which object of MS Access is used to provide graphical interface to enter data into a table?
-Form

7|PagePrepared By : Deepak S hrestha – SEE COMPUTER SCIENCE 2080


300 Questions Collections - Final Revision – Very Short Questions – Technical Terms
and Full Forms Collections 2080 – Computer Science [10 Marks]
102. Which query is used to view the data stored in database?
Select query is used to view the data stored in database

103. What is the purpose of a query in a database?


To ask question about the data stored in the database.

104. Which field property speeds up searching and sorting of records based on a field?
Indexing

105. Define validation text.


Validation Text is a field property which displays an error message that appears if the data entered is
invalid according to the specified validation rule.

106. Define validation rule.


Validation Rule is a field property which is used to limit the values that can be entered into a field.

107. What happens while we enter text in number data type?


It does not accept data and displays error message.

108. What is primary key?


A primary key is a field or combination of fields in a table that uniquely identifies each record, and is used
to establish relationships between tables and enforce data integrity.

109. List the importance of primary key.


The importance of primary key are
To reduce and control duplication of record in a table.
To set the relationship between tables.

110. Write two examples of primary key fields.


Any two examples of primary key fields are SEE Registration Number and Roll Number

111. Which key sets relationship between tables?


Primary Key

112. What is meant by data redundancy?


Data redundancy is the duplication of data within a database.

113. Define database.


Database is a collection of systematically organized inter-related data which stores, organizes and retrieves
data.

114. What is DBMS?


DBMS is a computerized system that stores data, processes them and provides information in an organized
form.

115. List two examples of DBMS.


Any two examples of DBMS are MS-Access and Oracle.

116. Write two features of Database Management System.


It reduces data redundancy which means duplication of data.
It allows multiple users to access the same data simultaneously.
8|PagePrepared By : Deepak S hrestha – SEE COMPUTER SCIENCE 2080
300 Questions Collections - Final Revision – Very Short Questions – Technical Terms
and Full Forms Collections 2080 – Computer Science [10 Marks]
117. What is a RDBMS?
RDBMS is a type of DBMS that uses a relational model to organize and manage data, allowing users to
easily retrieve and manipulate it.

118. Define MS Access.


MS-Access is a relational database management system developed by Microsoft Corporation which is
used to store and manipulates large volume of data in multiple tables.

119. Define Form.


Form is one of the MS-Access database objects which provides graphical interface to view, modify and
add data in a table or multiple linked tables.

120. Define relationship.


Relationship is a link between two tables that defines how they are related to each other by a common
field.

121. What terms are used to refer to a row and a column in a table?
- Row is refers to Record or Tuple and Column refers to Field or Attribute.

122. What is modular programming?


Modular programming is a technique used to divide program into many small, manageable, logical and
functional modules or blocks.

123. Write any two advantages of modular programming.


Different programmers can design different program modules independently, which is required in a large
and complex program.
It is easy to design, code and test the program modules independently.

124. Which statement is used to call sub-procedure?


CALL statement is used to call sub-procedure.

125. What are procedure in QBASIC?


Procedure is a block of statement that solves a particular problem.

126. What is module?


Module is a block of statement that solves a particular problem.

127. What is looping?


Looping is the process of repeating the execution of a statement or a block of statements guided by a
condition and is terminated when the given condition is satisfied.

128. Define Keyword with example.


Keyword is a set of special words which are already defined for some tasks.E.g. auto, double, int, long etc

129. What is local variable?


Variables which are declared inside a module and which cannot be accessed by other module are called
local variables.

130. What is a global variable?


A variable in main module which can be accessed from any module or procedure of a program is known
as a global variable.
9|PagePrepared By : Deepak S hrestha – SEE COMPUTER SCIENCE 2080
300 Questions Collections - Final Revision – Very Short Questions – Technical Terms
and Full Forms Collections 2080 – Computer Science [10 Marks]
131. Which mode is used to add data items into the already existed data file in QBASIC?
APPEND mode is used to add data items into the already existed data file in QBASIC

132. Which mode is used to read and display data from an existing sequential data file?
-Input Mode

133. List the modes of operations for opening a sequential file


INPUT, OUTPUT and APPEND Mode.

134. What is the use of EOF() function?


Ans: EOF() function is used to test the end of records with in a file.

135. What is the MKDIR command used for in Q-Basic?


Ans: MKDIR command is used to create a subdirectory which is used to manage files.

136. Write the types of parameters?


The types of parameters are actual and formal parameters.

137. What is formal parameter?


Parameters are variables that will receive data (arguments value) sent to the procedures (SUB program
and FUNCTION).

138. What is actual parameter?


Actual or Real parameters are arguments which are used to pass real value or data to the procedure.

139. List the types of procedures.


The types of procedure are SUB Procedure and FUNCTION Procedure.

140. What is the function of MOD in Qbasic?


The function of MOD in Qbasic is to find remainder.

141. What is the function of SQR in Q-Basic?


The function of SQR in Q-Basic us to calculate the square root of a given number.

142. Write the function of Kill and Name….AS statement in QBasic.


The KILL statement deletes a file. The NAME statement changes the name of a disk file or directory

143. Write any two differences between Q-Basic and C-language.


Any two differences between Q-Basic and C-language
144. QBASIC 145. C
146. It is a high level 147. It is a high level
language without feature language with some
of low level language. features of low level
language.
148. It is mostly used 149. It is mostly used
to design application to prepare system
software. software.

150. Define C-programming.


C language is a structured programming language that divides program into many functions.

10 | P a g e P r e p a r e d B y : D e e p a k S h r e s t h a – S E E C O M P U T E R S C I E N C E 2 0 8 0
300 Questions Collections - Final Revision – Very Short Questions – Technical Terms
and Full Forms Collections 2080 – Computer Science [10 Marks]
151. Write any two features of C programming language?
Any two features of c programming language are:
C is a Structured Programming Language. which break down a program in several small modules and
makes the programmer easier to manage and debug the code.
C is a case-sensitive programming language. It understands the capital alphabets and small alphabets as
different values.

152. Which is the structure programming language?


C language is the structure programming language.

153. What is structured programming language


The programming that follows a top- down approach, on which developers separate the overall program
structure into different sub section, is called structured programming.

154. Write any two data types used in C language.


Any two data types used in C language are int and char.

155. Why C is called a middle level language?


C is called middle level language because it combines elements of high level language with some features
of assembler

156. Write a feature of C language.


A feature is C language is it is mostly used to prepare system software.

157. Write any two limitations of C-Language.


Any two limitations of C-Language are:
There is no runtime checking. (the errors are not detected after each line of code.)
It does not provide strict data type checking (for example, an integer value can be passed for floating
datatype).

158. Give the name of any two header files used in C language
<stdio.h> and <conio.h>

159. Name the header/library file that handles mathematical functions in C Language.
- <math.h>

160. What will be the value of ‘y’ in given C expression, y=64%5?


The value of y will be 4.

161. What will be the value of x in given c expression x=55 % 10?


The value value of x will be 5.

162. How many keywords are in C language?


There are set of 32 keywords in C language.

163. What is an operator in C language?


Operator is a symbol that is used to perform mathematical operations.

164. Write the name of unary operators used in C-language


Increment (++) and decrement (--).

11 | P a g e P r e p a r e d B y : D e e p a k S h r e s t h a – S E E C O M P U T E R S C I E N C E 2 0 8 0
300 Questions Collections - Final Revision – Very Short Questions – Technical Terms
and Full Forms Collections 2080 – Computer Science [10 Marks]
165. Write the name of two selection statement used in C language.
- if and switch statement

166. Write any two looping statements used in C language.


for and while loop

167. List any two examples of format specifier (Conversion Character) used in C Language.
Any two examples of format specifier (Conversion Character) used in C Language are %d (int) and %f
(float)

2. Write appropriate technical terms for the following: [2×1=2]

168. Data transmission in one direction only that is to send or receive only. Simplex Mode
169. Law that governs the legal issues of cyberspace. Cyber Law
170. Laws made to prevent criminal activities through the internet. Cyber Law
171. Crimes committed using electronic devices and cyber space. Cyber crime
172. The smallest unit to represent information on a quantum computer. Qubit (Quantum bit)
173. A system of copying data and information reading in computer into another location. Backup
174. The process of making copies of data or data files to use in the event the original data or data
files are lost or destroyed. Backup
175. A company which provides services of Internet. Internet Service Provider (ISP)
176. Network of Networks. Internet
177. The arrangement of connection patterns of computers or nodes and others
resources. Network Topology
178. Arrangements of nodes in a Network. Topology
179. A concept of transferring data from your computer to server Computer. Uploading
180. Computer program that protects computer from computer virus. Antivirus software
181. A program that can disinfect a file from virus. Antivirus software
182. A malicious program of computer that damages data and Software. Malware
183. A malicious program of computer that damages data and software. Computer virus
184. A program that destroys other programs. Computer Virus
185. Learning through the electronic media. E-learning
186. Commerce done by mobile. M-Commerce
187. business through internet. E- Commerce
188. The amount of data transmitted per second through the communication channel. Bandwidth
189. The money that is exchanged electrically. Digital currency
190. A computer which provides the services to the other computer in a network. Server
191. A main computer of a computer network. Server
192. A powerful program that controls and coordinates a computer’s hardware devices and runs
software and applications. Operating System
193. The protocol that makes the network communication possible. TCP/IP
194. Digital marks created while using Internet. Digital Footprint
195. Secret group of characters which helps to protect file from unauthorized person. Password
196. A secret code that gives the user to access particular program and System. - Password
197. A type of network in which every computer works as both client and server. Peer to Peer
Network
198. The protection of computer systems and sensitive information from unauthorized access, theft
or damage. Cybersecurity
199. ) Paying money in E-Commerce using internet. Online Payment
200. The Internet tool which is used to upload download data. FTP

12 | P a g e P r e p a r e d B y : D e e p a k S h r e s t h a – S E E C O M P U T E R S C I E N C E 2 0 8 0
300 Questions Collections - Final Revision – Very Short Questions – Technical Terms
and Full Forms Collections 2080 – Computer Science [10 Marks]
201. A collective online communications channels dedicated to community based input, interaction,
content sharing and collaboration. Social media
202. A process of performing a variety of tech-enabled activities via virtual communities and
network.
203. -Social Media
204. Hacking done with permission from the client. Ethical Hacking
205. The process of identifying an individual usually based on a username and
password. Authentication
206. The mode of data communication in which data/information/signals are transmitted
in both side simultaneously. Full Duplex Mode
207. The network security systems that monitor and control the traffic flow (data packets).
Firewall
208. The process of repeatedly executing some code until condition satisfies. Looping
209. Device used to connect a PC with a telephone line. MODEM
210. Device to convert analog signal into digital signal and, vice versa. MODEM
211. Making data and information unreadable by unauthorized person. Encryption
212. it is the process of converting plain text to cipher text. Encryption
213. The technology to encode file or message. Encryption
214. The method by which information is converted into secret code that hides the information's
true meaning. Encryption
215. The conversion of encrypted data into its original form.
216. -Decryption
217. A device that controls two dissimilar networks. Gateway
218. Physical layout of computers in a network. Network Topology
219. The mode of data communication in which data can be transferred in both directions at a time.
Full Duplex Mode
220. A unique numerical identifier for every device or network that connects to the internet. IP
Address
221. Combination of private and public cloud. – Hybrid Cloud
222. Software require for browsing and surfing content on the WWW. Web Browser
223. The fake attempt to obtain sensitive information such as username, password by disguising
oneself as a trustworthy entity. Phishing
224. Network connecting device that boosts the data signals. Repeater
225. A logical collection of Internet-connected devices such as computers, smartphones or internet
of things (IoT) devices whose security have been breached and control is given away to a third party.
Botnet
226. A network device which broadcasts the information packets to all computer connected
network. Hub
227. An applications that look like they are doing something harmless, but secretly have malicious
code that does something else. Trojan Horse
228. Numbers are only allowed in the secret code. Personal Identification Number (PIN)
229. A unique numerical identifier for every device or network that connects to the internet. IP
Address
230. The issues related to cybercrime and also help in making and implementing laws over
cybercrime. Cyber Law
231. The internet service that enables to connect a remote or host computer. Telnet
232. The combination of username and password that is used to access a resource. credentials
233. Paperless payment through Internet. Online Payment
234. Any software installed on your PC that collects your information without your knowledge.
Spyware

13 | P a g e P r e p a r e d B y : D e e p a k S h r e s t h a – S E E C O M P U T E R S C I E N C E 2 0 8 0
300 Questions Collections - Final Revision – Very Short Questions – Technical Terms
and Full Forms Collections 2080 – Computer Science [10 Marks]
235. An intelligent device that has ability to determine the best possible path for data transmission.
Router
236. The kind of harmful computer code or web script designed to create system vulnerabilities.
Malicious Code
237. Combination of information technology and telecommunication technology. ICT
238. A collection of internet host systems that make services available on the Internet using the
HTTP (HyperText Transfer Protocol). WWW
239. A way to get the investment whole or part of it back in case the computer system is damaged.
Insurance

3. Write the full forms of the following: [2×1=2]


240. 1. bps: bits per second

241. 2. ADSL – Asymmetric Digital Subscriber Line

242. 3. AI: Artificial Intelligence

243. 4. ASCII - American Standard Code for Information Interchange

244. 5. B2B = Business to Business

245. 6. BIOS - Basic Input Output System

246. 7. CCTV : Closed Circuit Television

247. 8. DNS - Domain Name System

248. 9. FTP: File Transfer Protocol

249. 10. G2B - Government-to-Business

250. 11. G2G – Government to Government

251. 12. GCE : Google Compute Engine

252. 13. GPS: Global Positioning System

253. 14. ICT = Information and Communication Technology

254. 15. IoT – Internet of Things

255. 16. ISDN - Integrated Services Digital Network

256. 17. ISP – Internet Service Provider

257. 18. LAN = Local Area Network

258. 19. MAN: Metropolitan Area Network

14 | P a g e P r e p a r e d B y : D e e p a k S h r e s t h a – S E E C O M P U T E R S C I E N C E 2 0 8 0
300 Questions Collections - Final Revision – Very Short Questions – Technical Terms
and Full Forms Collections 2080 – Computer Science [10 Marks]
259. 20. MODEM - Modulator-Demodulator.

260. 21. NAS - Network Attached Storage.

261. 22. NIC – Network Interface Card

262. 23. POP: Post Office Protocol

263. 24. POS- Point Of Sale

264. 25. SIM – Subscriber Identification Module

265. 26. SMPS- Switched Mode Power Supply

266. 27. SMTP – Simple Mail Transfer Protocol

267. 28. STP: Shielded Twisted Pair

268. 29. TCP/IP – Transmission Control Protocol / Internet Protocol

269. 30. UPS - Uninterruptible Power Supply

270. 31. URL - Uniform Resource Locator

271. 32. UTP: Unshielded Twisted Pair

272. 33. VOIP - Voice Over Internet Protocol

273. 34. VPN - Virtual Private Network

274. 35. VRML- Virtual Reality Modeling Language

275. 36. WAN : Wide Area Network

276. 37. WAP: Wireless Application Protocol

277. 38. WLAN – Wireless Local Area Network

278. 39. WWW: World Wide Web

279. 40. HEVC - High Efficiency Video Coding

280. 41. VOLTE - Voice over Long Term Evolution

281. 42. EFT - Electronic Funds Transfer

282. 43. SMS - Short Message Service

15 | P a g e P r e p a r e d B y : D e e p a k S h r e s t h a – S E E C O M P U T E R S C I E N C E 2 0 8 0
300 Questions Collections - Final Revision – Very Short Questions – Technical Terms
and Full Forms Collections 2080 – Computer Science [10 Marks]
283. 44. WiFi – Wireless Fidelity

284. 45. VSAT – Very Small Aperture Terminal

285. 46. BCC – Blind Carbon Copy

286. 47. EFT – Electronic Funds Transfer

287. 48. OTP – One Time Password

288. 49. Paas – Platform as a Service

289. 50. MMS – Multimedia Messaging Service

290. 51. PDF – Portable Document Format

291. 52. GPRS – General Packet Radio Service

292. 53. Iaas – Infrastructure as a Service

293. 54. CVT – Constant Voltage Transformer

294. 55. FTTH – Fiber to the Home

295. 56. DARPA – Defence Advanced Projects Agency Network

296. 57. ETDSA – Electronic Transaction and Digital Signature Act

297. 58. EMI – Electromagnetic Interference

298. 59. IRC – Internet Relay Chat

299. 60. RJ-45 – Registered Jack – 45

300. 61. Saas – Software as a Service

301. 62. PIN – Personal Identification Number

302. 63. VRML – Virtual Reality Modeling Language

16 | P a g e P r e p a r e d B y : D e e p a k S h r e s t h a – S E E C O M P U T E R S C I E N C E 2 0 8 0

You might also like