Saturday, February 3, 2024

100 Technical Terms 2 MARKS - SEE COMPUTER SCIENCE 2080

 


 100 Technical Terms  2 MARKS - SEE COMPUTER SCIENCE 2080


Give appropriate technical terms of the followings.

1.    Data transmission in one direction only that is to send or receive only. Simplex Mode

2.    The mode of data communication in which data can be transferred in both directions at a time. Full Duplex Mode

3.    Device used to connect a PC with a telephone line. MODEM

4.    Device to convert analog signal into digital signal and, vice versa. MODEM

5.    A network limited with a room or building. LAN

6.    The computer on which users run applications. Client

7.    Cabling structure of LAN. Network Topology

8.    The arrangement of connection patterns of computers or nodes and others resources. Network Topology

9.    Each computer or device on a network . Node

10. A device that controls two dissimilar networks . Gateway

11. The amount of data that can be transmitted through communication channels in a fixed time period. Bandwidth

12. A server where incoming emails are collected in mailbox . Mail server

13. A computer that provides services to other computer . Server

14. A main computer of a computer network.  Server

15. Operating system that can handle network . Network Operating System

16. Software which controls and manages computer network. NOS (Network Operating System)

17. A powerful program that controls and coordinates a computer’s hardware devices and runs software and applications. Operating System

18. A cable that transmits light signals . Fiber Optic Cable.

19. Connection of two or more computers to share information . Computer Network

20. The network of networks . Internet

21. Sending and receiving messages electronically through the Internet . E-mail

22. Buying and selling of goods, products, or services over the Internet . E-commerce

23. The websites that search documents for specified keywords in WWW . Search engine

24. The communication program that searches documents on the basis of specified keywords and returns a list of the web links that matches the keywords. Search engine

25. A port on the back of the system unit to connect a computer in network. NIC (Network Interface Card)

26. A set of rules that are followed by computer network. Protocol

27. Amplify the signal for long-distance communication in microwave. Repeater

28. Network connecting device that boosts the data signals. Repeater

29. A set of moral principles or code of conducts that regulate the use of computers . Computer ethics

30. A code of behaviour for using the Internet . Cyber ethics

31. The use of technology as a measure of behaviour responsible for digital society . Digital citizenship

32. The recording of interaction with the digital world. Digital Footprint

33. Digital marks created while using internet. Digital Footprint

34. The legal issues related to using of inter-networked information technology . Cyber law

35. The issues related to cybercrime and also help in making and implementing laws over cybercrime . Electronic Transaction Act

36. A process of performing a variety of tech-enabled activities via virtual communities and network. Social media

37. a collective online communications channels dedicated to community based input, interaction, content sharing and collaboration. Social media

38. Combination of information technology and telecommunication technology. ICT (Information and Communication Technology)

39. A bullying that takes place over digital devices like cell phones, computers, and tablets. Cyber bullying

40. The fake attempt to obtain sensitive information . Phishing

41. The hardware or software for recording the keys pressed on a keyboard. Keylogger

42. Law that governs the legal issues of cyberspace . Cyber law

43. The skilled computer expert who uses technical knowledge to overcome a problem. Hacker

44. The kind of harmful computer code or web script designed to create system vulnerabilities . Malicious codes

45. A malicious program of computer that damages data and Software. Malware

46. A small destructive program whose intention is harms computer software and data. Computer virus

47. The process of identifying an individual usually based on a username and password . Authentication system

48. A memorized secret used to confirm the identity of a user . Password

49. The uniquely identified by evaluating one or more distinguishing biological traits. Biometric

50. The network security systems that monitors and controls the traffic flow . Firewall

51. The technology to encode file or message. Encryption

52. The method by which information is converted into secret code that hides the information's true meaning. Encryption

53. It is the process of converting plain text to cipher text. Encryption

54. An intelligent device that has ability to determine the best possible path for data transmission. Router

55. A type of program designed to detect and remove viruses from computer system. Antivirus software

56. A program that can disinfect a file from virus. Antivirus software

57. A software application used by companies for marketing purposes. Adware

58. Any software installed on your PC that collects your information without your knowledge. Spyware

59. The conversion of encrypted data into its original form. Decryption

60. The study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. Cryptography

61. Commercial transaction through mobile devices. M-Commerce

62. Paperless payment through Internet. Online payment

63. A system of interrelated computing device to exchange information over a network without human-to-human or human to computer interaction. IoT (Internet of Things)

64. A variety of devices that allow people to access data and information from wherever they are. Mobile computing

65. A set of services provided by the government to public via electronic media especially using Internet. E-Governance

66. The use of computer technology to create a simulated environment. Virtual Reality

67. An emerging branch in computer science, which interprets the means and method of making computers think like human beings.. AI (Artificial Intelligence)

68. The smallest unit to represent information on a quantum computer. Qubit (Quantum bit)

69. Crimes committed using electronic devices and cyber space. Cyber crime

70. Secret group of characters which helps to protect file from unauthorized person. Password

71. A type of network in which every computer works as both client and server. Peer to Peer Network

72. A system of copying data and information reading in computer into another location. Backup

73. A company which provides services of Internet. Internet Service Provider (ISP)

74. The internet service that enables to connect a remote or host computer. Telnet

75. Learning through the electronic media. E-learning

76. The process of repeatedly executing some code until condition satisfies. Looping

77. The protocol that makes the network communication possible. TCP/IP

78. The moral principle that controls cybercrime. Computer Ethics

79. Combination of Public and Private clouds. Hybrid Cloud

80. Hacking done with permission from the client. Ethical Hacking

81. A Private networks that allow organizations to share information and resources among the internal users. Intranet

82. The process of arranging the fragmented file in computer. Defragmentation

83. A unique numerical identifier for every device or network that connects to the internet. IP Address

84. The money that is exchanged electronically. Digital Currency

85. Software require for browsing and surfing content on the WWW. Web Browser

86. A concept of transferring data from your computer to server computer. Uploading

87. A concept of transferring data from server computer to your computer. Downloading

88. only numbers are allowed in the secret code. PIN (Personal Identification Number)

89. The combination of username and password that is used to access a resource. Credentials.

90. An applications that look like they are doing something harmless, but secretly have malicious code that does something else. Trojan

91. A way to get the investment whole or part of it back in case the computer system is damaged. Insurance

92. The process of sending and receiving data and information between two or more than two people. Communication

93. The mode of data and information that flows in both directions but only one direction at a time. Half Duplex Mode

94. Connect communication media with network devices. Connectors

95. A network device which broadcasts the information packets to all computer connected network. Hub

96. A network model where one or more powerful computers provide the different network services and all other users of computer network access those services to perform user's tasks. Client/Server Network

97. The network in which the main computer is known as host or server computer. Centralized network.

98. A collection of internet host systems that make services available on the Internet using the HTTP (HyperText Transfer Protocol). WWW

99. Protecting our computer and its content from damage, theft or misuse and action to prevent such incidents. Computer security

100.                 A logical collection of Internet-connected devices such as computers, smartphones or internet of things (IoT) devices whose security have been breached and control is given away to a third party. Botnet

 

 

 

 

 

No comments:

Post a Comment