Give appropriate technical terms of the following.
1. Data
transmission in one direction only that is to send or receive only. Simplex
Mode
2. The mode of data communication in
which data can be transferred in both directions at a time. Full Duplex Mode
3. Device
used to connect a PC with a telephone line. MODEM
4. Device to convert analog signal into
digital signal and, vice versa. MODEM
5. A
network limited with a room or building. LAN
6. The
computer on which users run applications. Client
7. Cabling
structure of LAN. Network Topology
8. The arrangement of connection
patterns of computers or nodes and others resources. Network Topology
9. Each
computer or device on a network . Node
10. A
device that controls two dissimilar networks . Gateway
11. The
amount of data that can be transmitted through communication channels in a
fixed time period. Bandwidth
12. A
server where incoming emails are collected in mailbox . Mail server
13. A
computer that provides services to other computer . Server
14. A main computer of a computer
network. Server
15. Operating
system that can handle network . Network Operating System
16. Software
which controls and manages computer network. NOS (Network Operating System)
17. A powerful program that controls and
coordinates a computer’s hardware devices and runs software and
applications. Operating System
18. A
cable that transmits light signals . Fiber Optic Cable.
19. Connection
of two or more computers to share information . Computer Network
20. The
network of networks . Internet
21. Sending
and receiving messages electronically through the Internet . E-mail
22. Buying
and selling of goods, products, or services over the Internet . E-commerce
23. The
websites that search documents for specified keywords in WWW . Search engine
24. The
communication program that searches documents on the basis of specified
keywords and returns a list of the web links that matches the keywords. Search
engine
25. A
port on the back of the system unit to connect a computer in network. NIC
(Network Interface Card)
26. A
set of rules that are followed by computer network. Protocol
27. Amplify
the signal for long-distance communication in microwave. Repeater
28. Network
connecting device that boosts the data signals. Repeater
29. A
set of moral principles or code of conducts that regulate the use of computers .
Computer ethics
30. A
code of behaviour for using the Internet . Cyber ethics
31. The
use of technology as a measure of behaviour responsible for digital society .
Digital citizenship
32. The
recording of interaction with the digital world. Digital Footprint
33. Digital
marks created while using internet. Digital Footprint
34. The
legal issues related to using of inter-networked information technology . Cyber
law
35. The
issues related to cybercrime and also help in making and implementing laws over
cybercrime . Electronic Transaction Act
36. A
process of performing a variety of tech-enabled activities via virtual
communities and network. Social media
37. a collective online communications
channels dedicated to community based input, interaction, content sharing and
collaboration. Social media
38. Combination
of information technology and telecommunication technology. ICT (Information
and Communication Technology)
39. A
bullying that takes place over digital devices like cell phones, computers, and
tablets. Cyber bullying
40. The
fake attempt to obtain sensitive information . Phishing
41. The
hardware or software for recording the keys pressed on a keyboard. Keylogger
42. Law
that governs the legal issues of cyberspace . Cyber law
43. The
skilled computer expert who uses technical knowledge to overcome a problem.
Hacker
44. The
kind of harmful computer code or web script designed to create system
vulnerabilities . Malicious codes
45. A malicious program of computer that
damages data and Software. Malware
46. A
small destructive program whose intention is harms computer software and data.
Computer virus
47. The
process of identifying an individual usually based on a username and password .
Authentication system
48. A
memorized secret used to confirm the identity of a user . Password
49. The
uniquely identified by evaluating one or more distinguishing biological traits.
Biometric
50. The
network security systems that monitors and controls the traffic flow . Firewall
51. The
technology to encode file or message. Encryption
52. The method by which information is
converted into secret code that hides the information's true meaning. Encryption
53. It is the process of converting
plain text to cipher text. Encryption
54. An intelligent device that has
ability to determine the best possible path for data transmission. Router
55. A
type of program designed to detect and remove viruses from computer system.
Antivirus software
56. A program that can disinfect a file
from virus. Antivirus software
57. A
software application used by companies for marketing purposes. Adware
58. Any
software installed on your PC that collects your information without your
knowledge. Spyware
59. The
conversion of encrypted data into its original form. Decryption
60. The
study of secure communications techniques that allow only the sender and
intended recipient of a message to view its contents. Cryptography
61. Commercial
transaction through mobile devices. M-Commerce
62. Paperless
payment through Internet. Online payment
63. A
system of interrelated computing device to exchange information over a network
without human-to-human or human to computer interaction. IoT (Internet of
Things)
64. A
variety of devices that allow people to access data and information from
wherever they are. Mobile computing
65. A
set of services provided by the government to public via electronic media
especially using Internet. E-Governance
66. The
use of computer technology to create a simulated environment. Virtual Reality
67. An
emerging branch in computer science, which interprets the means and method of
making computers think like human beings.. AI (Artificial Intelligence)
68. The smallest unit to represent
information on a quantum computer. Qubit (Quantum bit)
69. Crimes committed using electronic
devices and cyber space. Cyber crime
70. Secret group of characters which
helps to protect file from unauthorized person. Password
71. A type of network in which every
computer works as both client and server. Peer to Peer Network
72. A system of copying data and
information reading in computer into another location. Backup
73. A company which provides services of
Internet. Internet Service Provider (ISP)
74. The internet service that enables to
connect a remote or host computer. Telnet
75. Learning through the electronic
media. E-learning
76. The
process of repeatedly executing some code until condition satisfies. Looping
77. The
protocol that makes the network communication possible. TCP/IP
78. The
moral principle that controls cybercrime. Computer Ethics
79. Combination
of Public and Private clouds. Hybrid Cloud
80. Hacking
done with permission from the client. Ethical Hacking
81. A Private networks that allow
organizations to share information and resources among the internal users. Intranet
82. The process of arranging the
fragmented file in computer. Defragmentation
83. A unique numerical identifier for
every device or network that connects to the internet. IP Address
84. The money that is exchanged
electronically. Digital Currency
85. Software require for browsing and
surfing content on the WWW. Web Browser
86. A concept of transferring data from
your computer to server computer. Uploading
87. A concept of transferring data from server
computer to your computer. Downloading
88. only
numbers are allowed in the secret code. PIN (Personal Identification Number)
89. The
combination of username and password that is used to access a resource. Credentials.
90. An
applications that look like they are doing something harmless, but secretly
have malicious code that does something else. Trojan
91. A
way to get the investment whole or part of it back in case the computer system
is damaged. Insurance
92. The
process of sending and receiving data and information between two or more than
two people. Communication
93. The
mode of data and information that flows in both directions but only one
direction at a time. Half Duplex Mode
94. Connect
communication media with network devices. Connectors
95. A
network device which broadcasts the information packets to all computer
connected network. Hub
96. A
network model where one or more powerful computers provide the different
network services and all other users of computer network access those services
to perform user's tasks. Client/Server Network
97. The
network in which the main computer is known as host or server computer.
Centralized network.
98. A
collection of internet host systems that make services available on the
Internet using the HTTP (HyperText Transfer Protocol). WWW
99. Protecting
our computer and its content from damage, theft or misuse and action to prevent
such incidents. Computer security
100.
A logical collection of Internet-connected
devices such as computers, smartphones or internet of things (IoT) devices
whose security have been breached and control is given away to a third party.
Botnet
No comments:
Post a Comment