Вы находитесь на странице: 1из 3

Ghanshyam Thori Computer Terminology Questions Asked in Previous Years Firewall Malware MPEG ISP HTML ASCII

Computer Terminology Notes

Root Kit

Computer Architecture Search Engine CAD CAM CIM

American Standard Code for Information Interchange (ASCII), pronounced is a character encoding based on the English alphabet. ASCII codes represent text in computers, communications equipment, and other devices that work with text A rootkit is a program (or combination of several programs) designed to take fundamental control (in Unix terms "root" access, in Windows terms "Administrator" access) of a computer system, without authorization by the system's owners and legitimate managers. Access to the hardware (i.e., the reset switch) is rarely required as a rootkit is intended to seize control of the operating system running on the hardware. Computer architecture is the conceptual design and fundamental operational structure of a computer system. A typical vision of a computer architecture as a series of abstraction layers: hardware, firmware, assembler, kernel, operating system and applications Computer Aided Manufacturing The Common Information Model (CIM) is an open standard that defines how managed elements in an IT environment are represented as a common set of objects and relationships between them. This is intended to allow consistent management of these managed elements, independent of their manufacturer or provider. Thin films are thin material layers ranging from fractions of a nanometre to several micrometres in thickness. Electronic semiconductor devices and optical coatings are the main applications benefiting from thin film construction. Some work is being done with ferromagnetic thin films as well for use as computer memory.

Thin Film Technology in Computers Artificial Intelligence Hackers Clock Speed HTTP CPU ROM BIOS Modem Spamming Computer Virus Computer Handshake Ghanshyam Thori

Computer Terminology Notes

Ghanshyam Thori Ethernet & its Use Digital Signature

DRAM JPEG ASCII IMAP WAP Enabled Phone Digital Camera Firewall Multimedia HTML FTP MFLOPS PLANIT What is Piracy Sympathetic Haptics Special Features of Linux Operating System Internet Worm DDoS

Computer Terminology Notes Ethernet is a family of frame-based computer networking technologies for local area networks (LANs). A digital signature or digital signature scheme is a type of asymmetric cryptography used to simulate the security properties of a handwritten signature on paper. Digital signature schemes normally give two algorithms, one for signing which involves the user's secret or private key, and one for verifying signatures which involves the user's public key. The output of the signature process is called the "digital signature." Dynamic Random Access Memory Joint Photographic Expert Group American Standard Code for Information Interchange Internet Message Access Protocol Wireless Application Protocol. A WAP enabled mobile phone is equipped with a microbrowser that allows customers to access information from the Internet and performs interactive transactions. In general, multimedia includes a combination of text, audio, still images, animation, video, and interactivity content forms. Million floating point operations per second New technology that transmits the sensation of touch over the Internet.

POSIX EPROM MODEM COBOL E-Governance URL CD-ROM USB ITES FORTRAN MP3 Cyber Crime Exabyte Ghanshyam Thori

Distributed Denial of Service. On the Internet, a distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users. Portable Operating System Interface Erasable, Programmable Read Only Memory Modulator Demodulator Common Business Oriented Language

Formula Translating System MPEG-1 Layer 3

Computer Terminology Notes

Ghanshyam Thori XML MASER SECAM TIPS Avatar Wikipedia DDR SD RAM

Computer Terminology Notes Extensible Markup Language Sequential Colour with Memory Terrorism Information and Prevention System A computer avatar is a personalized graphic file or rendering that represents a computer user. There are basically two types of avatars: those used at websites, such as on Web exchange boards, and those used in gaming and virtual worlds. Terms Double data rate synchronous dynamic random access memory. It achieves greater bandwidth than the preceding single data rate SDRAM by transferring data on the rising and falling edges of the clock signal (double pumped). Effectively, it doubles the transfer rate without increasing the frequency of the memory bus. Serial Advanced Technology Attachment. It is a computer bus primarily designed for transfer of data between a computer and storage devices IDE (Integrated Drive Electronics) is a standard electronic interface used between a computer motherboard's data paths or bus and the computer's disk storage devices. IDE was adopted as a standard by American National Standards Institute (ANSI) in November, 1990. The ANSI name for IDE is Advanced Technology Attachment (ATA). Video Graphics Array. (Term used in VGA camera in mobiles). Really Simple Syndication is a family of Web feed formats used to publish frequently updated content such as blog entries, news headlines or podcasts. Single Lens Reflex. Uses an automatic moving mirror system which permits the photographer to see exactly what will be captured by the film or digital imaging system, as opposed to non-SLR cameras where the view through the viewfinder could be significantly different from what was captured on film. Joint Photographic Experts Group Audio Video Interleave Moving Picture Experts Group Hyper Text Markup Language An integrated service digital network line can be simply looked at as a digital phone line. ISDN connections to the Internet can be four times faster than the fastest regular phone connection, and because it is a digital connection a modem is not needed. Any computer hooked up to ISDN will typically require other special equipment in lieu of the modem, however. Also, both phone companies and ISPs charge more for ISDN connections than regular modem connections.




Additional References: 1. Magical 2 Markerts 2. Up2 the Mark

Ghanshyam Thori

Computer Terminology Notes