1.
Telecommunication
is a system of transmission of sounds, images, texts or data in the form
of
electronic signals.
2.
Telecommunication
is a transmission
of data and information between computers using a communication link such as a
standard telephone line.
3.
The
interconnection of computers with or without wires in order to share
information is called computer
network.
4.
Computer network is a communication system connecting two or
more computer that work together to exchange information and share resources.
5.
The
server computer is used to
serve data and information.
6.
A
server is a computer designed
to process requests and deliver data to other (client) computers over a Local
Network or the Internet.
7.
The
server computer acts as the
storehouse and distributor for the data, information and programs.
8.
A
peer is a self sufficient
computer that acts both as a server and a client to other similar computers on
the network.
9.
A
computer on a network that uses resources of the network is workstation.
10.
A peer to peer network is a group of computers
that function both as client and server.
11.
A
centralized network is a
network in which a central host computer performs data processing and storage
on behalf of clients.
12.
The
wireless technology used for long distance is called microwave transmission.
13.
Cat
5 cable is used with RJ-45
connector.
14.
Microwave
is a wireless technology that can be used to transmit data
between two different computers.
15.
A
set of rules used to define communication is called protocol.
16.
Protocol is a set of rules that governs
the communications between computers on a network.
17.
The
smallest area covers by network is called LAN
18.
The
network of computer within the room, building or campus is LAN.
19.
A
MAN is a network that
interconnects users with computer resources in a geographic area or region
larger than that covered by even a LAN but smaller than the area covered by a
WAN.
20.
The
computer network of any two countries is WAN.
21.
The
example of WAN is internet .
22.
HUB is a hardware device used to
connect several computers together.
23.
Router is a device connecting two or
more networks that facilitates the transfer of data in the form of packets.
24.
Gatewayis a device software or a system
that converts data between dissimilar network with different protocols.
25.
Simplex mode communication is a mode of
transmission in which data flows in one direction only.
26.
Modes
for transmitting data from one device to another are simplex, Half-duplex, and full-duplex mode.
27.
Full-duplex mode means two-way communication
system. [SLC 2064]
28.
Bandwidth
is measured in bits per second.
29.
A
topology refers to the shape
of the network in which all the computers are connected together.
30.
A
physical ring topology is a
network topology in which network nodes are connected in a continuous circle.
Internet
and Its services
31.
Internet is an interconnection of several
computers of different types belonging to various network all over the world.
32.
The
Internet is network of networks.
33.
The
Internet began life in 1969 when the United States Department of Defense
started a network called
ARPA net
34.
The
internet originated from an experimental network called ARPAnetcreated in 1969.
35.
World
Wide Web is also known as internet.
36.
Dial-up
internet access requires MODEM
and telephone.
37.
A
web site
is the collection of web pages.
38.
Each
page of information is known as web
page
39.
Each
web sites is identified by the URL.
40. The
main page of the website is called homepage.
41.
Web server are computers that deliver
(serves up) Web pages.
42.
Windows
Internet Explorer and Netscape Navigator are two popular web browser.
43.
Web
browser is software that allows the user to surf the
information through the Internet.
44.
HTTP is a set of standards that allow
users of the World Wide Web to exchange information found on web pages.
45.
The
WWW is the leading
information-exchange service of the Internet.
46.
Search engine are online services that allow
users to scan the contents of the Internet to find Web sites or specific
information of interest to them.
47.
On
the Internet, a search engine is
a coordinated set of programs that receives your search request, compares it to
the entries in the index and returns result to you.
48.
E-mail is defined as the exchange of
message and computer file between computers over a computer network.
49.
Web chat on the Internet has become a
popular way for people to connect online in a group(a chat room) to share
similar interests.
50.
IRC is an online textual
communication with each other in real time.
51. The
remote login protocol is telnet
and file transfer protocol is FTP.
52.
FTP is a protocol used to upload and
download information.
53.
E-commerce refers to the buying and selling
of things over the Internet.
54.
Broadband can be simply defined as a fast
connection to the internet that is always on.
55.
Wi-Fi refers to wireless networking
technology that allows computer and other devices to communicate over a
wireless signal.
56.
Wi-max is a standard for high speed
broadband internet access over a wireless connection.
57.
Usenet is a collection of user-submitted
notes or messages on various subjects that are posted to servers on a worldwide
network.
58.
Video conference is a live video connection
between people in separate locations for the purpose of communication or
interaction.
59.
Social network is a web site on the Internet
that brings people together in a central location to talk, share ideas, share
interests, make new friends, etc.
60.
The
process of transferring a copy of a file from a remote computer to the
requesting computer is called downloading.[SLC
2064]
Computer
Security
- The protection given to the
computer hardware and software from being lost or damaged is known as computer security.
62.
Computer security focuses on protecting computers,
networks, programs, and data from unintended or unauthorized access, change or
destruction.
63.
Computer security is the process of preventing and
detecting unauthorized use of any computer.
- Hardware security protects
the machine and peripheral devices from theft, damage and electronic
instruction.
- The regular maintenance of hardware keeps the computer
devices in good operating condition and helps to find out the problems in
hardware.
- Voltage regulator an
electrical regulator designed to automatically maintain a constant voltage
level.
- The suitable temperature in the
computer room should be maintained between 21 to 24 degree Celsius.
68.
A
computer requires a constant source of 110
volt AC power.
69.
The
recommended computer room temperature should be 220celcius.
70.
UPS is a battery supported power unit
between and external power source and a computer system which supplies clean
and continuous power even during power failure.
- UPS is a device which provides
continuous power and protects the computer equipments from power surges
and voltage fluctuations
72.
A power
conditioner is an electrical device that provides “clean” AC power to
sensitive electrical equipment.
73.
A surge
suppressor is an appliance designed to protect electrical devices from
voltage spikes.
74.
The tool that is used to maintain
performance and error free file management is called scan disk.
75.
A
password is a secret series
of characters that enables a user to access a file, computer, or program.
Computer
Virus
76.
The
first person who introduced the concept of replicating program was John von nevmann.
77.
Computer
virus Is a program that spreads by first infecting files or the system
areas of a computer or network router’s hard drive and then making copies of
itself.
78.
Computer virus
is a program that can copy itself and infect a computer without the
permission or knowledge of the user.
79.
Computer virus is a program containing code that
can generate multiple copies of itself .
80.
The
capability of generating the copies of itself is called replication.
81.
Antivirus software is a class of program
that searches your hard drive and floppy disks for any known or potential
viruses.
82.
Antivirus are used to detect and remove
computer virus from infected file or memory. [SLC 2064]
83.
Message carrying viruses usually do not destruct
the computer files/programs but display interesting information to entertain
the users.
84.
Firewall
are software programs or hardware devices designed to keep
computers safe from hackers.
85.
A
MBR is an area of the
computer hard drive or a floppy disk that is executed when the computer is
started.
86.
Boot sector virus infects or substitutes its
own code for either the DOS boot sector or the master boot record(MBR)
87.
File
infector viruses infect executable program files having an extension
.exe,.com,or.dll.
88.
File
infector virus affect executable file.
89.
A
macro virus is a type of computer
virus that infects the word processing or spread sheet document or template.
90.
A
malicious program that pretends to be something useful program is known as trojan horse.
91.
A
program that is not a virus but behave like virus and can replicate is known as
worm.
92.
Multipartite viruses can infect both the
application programs and the boot sector of a disk.
93.
Polymorphic code is a code that mutates while
keeping the original algorithm intact.
94.
A polymorphic
virus is a complicated computer virus that affects data types and functions.
95.
Polymorphic viruses are very difficult to
identify and detect by anti-virus.
Multimedia
and Its Application
96.
A
computer capable of handling texts, graphics, audios, animations and videos is
called multimedia computer.
97.
Multimedia is a computer-delivered
electronic system that allows the user to control, combine and manipulate
different types of media such as sound, video, computer graphics and animation.
98.
Multimedia
is the integration of multiple forms
of media.
99. Multiple
media in one content is called multimedia
.
100.
Multimedia
enhances the information for better communication
and understanding.
101.
Graphics
provides a
visual impact.
102.
Graphics is a digital representation of
non-text information such as a drawing, chart or photographs.
103.
Graphics deal with the generations,
representations, manipulation and display of pictures with the aid of computer.
104.
Animation
represents multiple picture in a sequence.
105.
Video is the process of displaying
still images in a rapid sequence to create the illusion of movement.
106.
Video deal with recording and
displaying of a sequence of mages at a reasonable speed to create an impression
of movement.
107.
Video refers to pictures in motion.
108.
Text
is the primary component of
multimedia.
109.
Optical disk is used to store data and
information in the multimedia technology.
110.
Hoarding board is an example to use
multimedia in commercial
field.
111.
Multimedia
is used in the entertainment industry, especially to develop special effects
in movies
and animation.
112.
VR is an artificial environment
created with computer hardware and software and presented to the user in such a
way that it appears.
113.
A simulated 3-D environment is called VR.
114.
VR is the use of computer modeling
and simulation to enable a person to interact with an artificial
three-dimensional visual or other sensory environment.
115.
Virtual
reality uses head sets and data gloves.
Cyber Law
and Computer Ethics
116.
Telecommunication is the exchange of information
over significant distances by electronic means.
117.
Cyber
law includes a wide variety of legal issues to
the use of communication technology.
118.
Cyber
law is a generic term, which refers to all the
legal and regulatory aspects of internet and the world wide web
119.
Cyber
law is the law governing computers and the
Internet.
120.
Cyber
law of Nepal commonly known as the Electronic Transaction And Digital Signature
Act-Ordinance was enacted in Nepal in 2061 B.S.
121.
Cyber
crime may include thefts or actions in electric
form that causes damages or difficulty to other computer users.
122.
Cyber
crime is a criminal activity done using computers
and the Internet.
123.
Cyber
Crime refers to illegal activities involved
in any computer.
124.
The
activity of breaking into a computer system to gain an unauthorized access is
known as . hacking.
125.
The
use of communication technology, mainly the Internet to torture other
individuals is known as cyber
stalking.
126.
Computer ethics is the set of moral principles
that regulate the use of computers.
127.
Cyber space does not only include the
internet and computers, but it present where two or more cables or wires etc
meet.
128.
Cyberspace
has become synonyms with the internet.
129.
A
digital signature is an
electronic signature that can be used to authenticate the identity of the
sender of a message or the signer of the document, and possibly to ensure that
the original content of the message or document that has been sent is
unchanged.
130.
Digital
Signature is a security Mechanism system in the cyberspace for digital data processing and transaction.
131.
Intellectual property law is a term referring legal
property rights of someone over his creations of the mind , both artistic and
commercial.
132.
The
law which is enacted to ensure the preservation, integrity and reliability of
data is called data protection and
privacy law.
133.
Fair credit reporting act is a federal law enacted in
1970 to insure confidentiality of consumer credit information held by lenders
and credit reporting agencies.
134.
Video privacy protection act limits the disclosure of
personally identifiable information regarding video rentals.
135.
US
introduced fair credit reporting act in 1970
A.D.
Database
Management System
136.
Database is an organized collection of
related data in tabular form.
137.
A
collection of related data of a person or anything is known as database.
138.
DBMS
is a general program designed to manage a database.
- DBMS is a complex set of software
program that controls the organization, storage, management, retrieval of
data in database.
- Ms-Access is a relational database
management system where data is arranged in the form of tables .
141.
Data is the raw facts to generate information.
142.
Information is the processed value which we
get after we get after processing by the computer.
143.
SQL
stands for structure query language.
144.
A
primary key cannot contain the null
values.
145.
A
primary key is a fixed field
which uniquely identifies every record in a table.
146.
You
cannot enter duplicate values in a primary
field.
147.
Foreign key is the linking field between two
values.
148.
A
combination of two or more keys which can be used as a primary key is called a composite key.
149.
A
text data type allows the field to contain up to 255characters.
150.
The
default field size for text type is 50
characters.
151.
Memo
field can hold 65535
characters.
152.
Maximum
width of field is 64 characters.
153.
An
input mask is the format we will assign for the
introduction of values into a field.
154.
The default
value property is used to define a default value that is automatically
entered in field when you add a new record, at o time of data entry.
155.
Filtering allows you to retrieve specific
information from a table in Microsoft Access 2003.
156.
A
column in a table is called field and
row in a table is called record.
- The
smallest unit of data organization is called a field.
158.
Auto number field type automatically enters
number in a field which increase by one for every new record.
159.
We
can change data type of field in table
design view.
160.
Validation rule is used to make sure that the
data entered in a field is within the criteria set by the user.
161.
A
table contains records and
field.
162.
Query help us to retrieve and view only
those records from the database tables that meet a specific condition or
criteria set by us.
- A query is a database object
that creates a datasheet of selected fields and records from one or more
tables.
164.
A query
extracts and arranges information from a table in a manner that you
specify.
165.
Action query is used to change record in
a table at a single operation.
166.
Delete query is used to delete records
from the table.
167.
Query
that makes changes in table is called update
query
- A form is a database object
used primarily to display records on screen, to make it easier to enter
new records and to make changes to the existing records.
- The report design View window
is the place where you design reports from a scratch or add your own
touches to reports you create with the report wizard.
170.
Report enables you to format your data
in an attracting and informative layout for printing.
No comments:
Post a Comment