300 Questions Collections - Final Revision – Very Short Questions – Technical Terms and Full Forms Collections 2080 – Computer Science [10 Marks]
Answer the following questions in one
sentence.
1.
What is communication?
Communication is sending and
receiving information between two or more persons.
2.
What is Tele-Communication?
The transmission of data and
information from one place to another for the purpose of communication is known
as telecommunication.
3.
What are data communication mode?
Data communication modes refer to
direction of data flow between devices in a network or communication
system. Simplex, Half Duplex and Full Duplex mode are the types of
communication mode.
4.
What is analog signal?
An analog signal refers to a
continuous electrical signal that varies over time and represents data as a
continuous waveform.
5.
What is computer network?
Computer network is a group of two or
more computers and devices connected to each other through wired or wireless
media to exchange data and information and share hardware, software and other
resources.
6.
Give reason in short that "Computer network
reduces the cost of operation."
Ans: Computer network reduces the
cost of operation by sharing hardware and software.
7.
What is network protocol?
A set of rules followed for
interconnection and communication between computers in a network is called
network protocol.
8.
What is topology?
Ans. Network topology is the inter-connected
pattern of network components.
9.
Define bandwidth.
Bandwidth can be defined as the
maximum volume of data that can be transmitted through a communication system.
10. Write any two examples of full
duplex modes of data transmission.
Any two examples of full duplex
modes of data transmission are telephone and mobile.
11. In
which communication media data transfer is the fastest?
In Fiber optic cable, data transfer
is the fastest.
12. Write
two examples of bounded media.
Any two examples of bounded media are
Twisted Pair Cable and Fiber Optic Cable
13. Which connector is used with
coaxial cable?
BNC connector is used with coaxial cable
14. Which
type of cable typically uses RJ-45 connector?
-Twisted pair cable
15. What
is communication media?
A channel or path through which data
and information are transmitted between connected devices in a network
environment is called communication media
16. What
is internet?
The Internet is a global network of
interconnected computers that allows people to share information and
communicate from anywhere in the world.
17. What
is mail server?
A mail server is a computer system
that is dedicated to handling and managing the sending, receiving, and storage
of emails.
18. What
is web server?
A
web server is a software or hardware that delivers web content to clients like
browsers.
19. What
is search engine?
Search engine is the communication
program that searches documents on the basis of specified keywords and returns
a list of the web links that matches the keywords.
20. Write
the name of any two search engines.
The name of any two search engines is
google.com and ask.com
21. What
is web browser?
Web browser is a computer program
that access web pages and displays them on the user’s computer.
22. Mention
any two services provided by internet.
Any two services provided by internet
are Search engine and E-mail.
23. What
is e-mail?
E-mail is the most widely used
service on the Internet which sends and receives messages electronically
through the Internet.
24. Define
E-mail address.
An email address is a unique
identifier used for sending and receiving electronic messages over the internet.
25. Write
the name of the protocol used for sending email messages.
-Simple Mail Transfer Protocol (SMTP)
26. Define
IP address.
IP address is an unique numerical
identifier for every device or network that connects to the internet.
27. What
is switch in network connecting device?
28. Which
device is used to connect PC with telephone line?
MODEM is used to connect PC with
telephone line.
29. Why
switch is also known as smart hub?
Switch is also known as smart hub because it
transfers packets to only those selected computers connected in network.
30. Where
does intranet has been used?
Intranet has been used to share
internal information and resources within an organization.
31. What
is the business done through internet?
The business done through internet is
e-commerce.
32. What
is Ecommerce?
E-commerce is also known as
electronic commerce or Internet commerce which means buying and selling of
goods, products, or services through Internet.
33. What
is M-Commerce?
The online transactions through the
wireless handheld devices such as mobile phone, laptop, palmtop, tablet, or any
other personal digital assistant is called M-Commerce.
34. What
is cyber-crime?
Cyber crime refers
to criminal activities that are carried out using computers, networks and the
internet.
35. What
is cyber bulling?
Cyber bullying is a kind of
harassment using mobiles or computers.
36. What
is cyber law?
The law which governs the legal
issues in the cyber space regarding the internet or WWW for digital data
processing and transaction is called cyber law.
37. Give
some examples of cyber law
Computer
crimes/Cyber-crime law
Intellectual
property law
Data
protection and privacy law
Telecommunication
law
38. When
was cyber law introduced in Nepal?
30th Bhadra 2061 B.S.
39. What
is key logger?
A keylogger is a tool that secretly records every
key pressed on a computer or mobile device.
40. What
is a backup?
Backup is the system of copying data and programs into another location
or creating a duplicate copy of it in a secured place.
41. Which
software is used to remove virus from Computer System?
Antivirus Software is used to remove
virus from Computer System.
42. What
is information security?
Information security is the practice
of preventing unauthorized access, use, disclosure, modification,
recording or destruction of information.
43. Why
do you connect your PC to the UPS?
We connect PC to the UPS
to control fluctuation of electric voltage and provides enough backup
electric power to the computer system when there is power failure.
44. Why data decryption is necessary?
To convert encrypted (coded) data
into readable form.
45. What
is social media?
Social media refers to online platforms and
websites that allow users to create, share, and interact with content and other
users.
46. Write
opportunities and threats in social media.
Opportunities of social media
is It creates awareness and innovate the way people live and Threats of
social media is personal data and privacy can be easily hacked and shared on
the internet.
47. Write
any two advantages of social media.
Ans: Any two advantages of social
media are:
It creates awareness and innovate the
way people live
Social media let us share anything
with others around the world.
48. List
any two commandments of computer ethics.
Any two commandments of computer
ethics.
Do not use a
computer to publish fake information.
Do not search the
file or record of other people.
49. What
is the vision of IT Policy of Nepal 2072?
The vision of IT Policy of Nepal 2072
is to transform Nepal into information and knowledge based society and economy.
50. Define
Computer security.
Computer security refers to protecting computer and its content from
damage, theft or misuse and action to prevent such incidents.
51. What
is hardware security?
Hardware security is the protection
given to the various hardware tools and equipment used in computer system from
the accidental or intentional harm.
52. What
is Software security?
Software security is the protection
of computer systems and applications from threats, such as hacking, virus
attacks, and unauthorized access, to ensure their confidentiality, integrity,
and availability.
53. List any two software security
measures.
Any two software security measures are password and
backup
54. Write
two methods for hardware security.
Any two methods for hardware security
are Insurance and Regular maintenance of computer hardware.
55. List
some points about how we can protect our data.
Antivirus software can detect and
remove virus from the computer.
Software for backup helps in securing
the information by keeping backup.
56. What is digital signature?
Digital signature is a security
mechanism system used on the internet for data and information transaction by
attaching a code at the end of the electronic message that confirms the
authenticity of sent message.
57. What
is digital currency?
Digital currency is a type of
electronic money that is stored and exchanged using computers and other digital
devices.
58. What
is digital citizenship?
Digital
citizenship refers to the responsible and ethical use of technology and the
internet which involves understanding, practicing, and promoting appropriate
behavior when using digital tools and resources.
59. Define Cryptography.
Cryptography is the study of secure
communications techniques that allow only the sender and intended recipient of
a message to view its contents
60. What is mobile computing?
Mobile computing
refers to a variety of devices that allow people to access data and information
from wherever they are via a mobile device.
61. What is Online Payment?
Online payment
refers to the payment for buying goods or services through the Internet using
different online payment gateway
62. Name
any to modes of Electronic Payments.
Any two modes of electronic payments
are:
i)
Debit Card / Credit Card
ii)
Mobile wallet like e-sewa, khalti
63. What is Cloud computing?
Cloud computing is a technology that
allows users to access and use of computing resources, like servers and
software, over the internet.
64. Write
any two benefits of cloud computing.
Any two benefits of cloud computing
are
It allows to quickly and easily access, store information
anywhere, anytime in the whole world, using an internet connection.
It is easier to get back-up and
restore the data.
65. List the services of Cloud Computing.
The
services of cloud computing are : Infrastructure as a Service (IaaS)
Software
as a Service (SaaS)
Platform
as a Service (PaaS)
66. What
is AI?
Artificial intelligence (AI) is an
area of computer science that emphasizes the creation of intelligent machines
that work and reacts like humans.
67. List
some areas where Al can help us.
Robotics and Education
68. What
is e-governance?
E-Governance refers to the use of the
digital technology by government to enhance the delivery of public services and
engage with citizens more effectively.
69. What
is e-banking?
E-banking refers to a
digital banking system that enables customers to conduct financial transactions
and manage their accounts online through the internet or mobile apps without
the need for a physical visit to a bank branch.
70. What
is IoT?
IoT is a system of interrelated
computing device to exchange information over a network without human-to-human
or human to computer interaction.
71. Write
any two examples of IOT.
Any two examples of IOT are: Smart
Watch, Smart TV
72. Which
data type is used to store alpha numeric characters or special symbols in
MS-Access?
Text data type is used to
store alpha numeric characters or special symbols in MS-Access.
73. Which
data type is suitable to store photographs of students in MS-Access?
The suitable data type to store
photographs of students in MS-Access is OLE object.
74. Which data types are used to store
graphics and numeric characters in MS-Access?
OLE object is used for graphic and
Numeric data type is used for numeric character
75. Which
data type is used to store your school fee in MS-Access?
Currency is the data type used to
store school fee in MS-Access.
76. Which
data type is suitable to store salary of an employee in MS-Access?
Ans: Currency data type is suitable
to store salary of an employee in MS-Access.
77. Which
data type is used in MS-Access to store address of a person?
Memo data type is used in MS-Access
to store address of a person.
78. Which
data type is used to store date of birth of an employee in MS-Access?
Date/Time data type is used to store
date of birth of an employee in MS-Access
79. Which
in the logical data type of MS-Access?
The logical data type of MS-Access is
Yes/No.
80. Which data type of MS Access is
used for data that can store only one of two possible values?
The data type that can store only
one of two possible values is Yes/No.
81. What
data type is commonly represented as Boolean in MS - Access?
-Yes/No
82. What
is the field size of yes/no field?
The field size of YES/NO field
is 1 bit.
83. Write
any two data type used in MS-Access database ?
Any two data type used in MS-Access
database are text and number
84. Which
view is used to modify a table structure in MS-Access?
Design View is used to modify a table
structure in MS-Access.
85. What
is the default extension of MS-Access?
The default extension of Ms-Access is
: .mdb (2003 version) and .accdb (2007 version).
86. What
is the default size of text field in MS-Access?
The default size of text field is : 50
(2003 version) and 255(2007 version).
87. What
is the default size of number field in MS-Access?
The default size of number field in
MS-Access is 4 bytes (Long Integer)
88. What
is the storage size of text and currency data type?
The storage size of text data type is
255 and currency data type is 8 bytes.
89. What
is the storage size of memo and text data type in MS- Access?
Text can store up to 255 characters
and Memo can store up to 65,535 characters
90. What
is the maximum length of field name in MS-Access?
The maximum length of field name in
MS-Access 64 characters.
91. Which query
is used to modify and calculate data in DBMS?
Update query is used to modify and calculate data in DBMS.
92. Which view is used to modify a
record in MS-Access?
Datasheet view
93. Which object of MS-Access is used
to retrieve data from the table?
Select Query
94. Which query is used to make
changes in data stored in database?
Update Query
95. List any two objects of MS-Access
Query and Form
96. Which
object of MS-Access is used to retrieve data from the table?
Query is used to retrieve data from a
table.
97. Which
object of DBMS is used to print information?
The object of DBMS which is used to
print information is report.
98. What is the primary component of a
database that organizes data into rows and columns?
-Table
99. What is the primary building block
of a database?
-Table
100.
Which
object is used to store the data in database?
-Table
101.
Which
object of MS Access is used to provide graphical interface to enter data into a
table?
-Form
102.
Which
query is used to view the data stored in database?
Select query is used to view the
data stored in database
103.
What is the purpose of a query in a database?
To ask question about the data stored
in the database.
104.
Which field property speeds up searching and
sorting of records based on a field?
Indexing
105.
Define validation text.
Validation Text is a field property
which displays an error message that appears if the data entered is invalid
according to the specified validation rule.
106.
Define validation rule.
Validation Rule is a field property
which is used to limit the values that can be entered into a field.
107.
What happens while we enter text in number data
type?
It does not accept data and displays
error message.
108.
What is primary key?
A primary key is a field or
combination of fields in a table that uniquely identifies each record, and is
used to establish relationships between tables and enforce data integrity.
109.
List
the importance of primary key.
The importance of primary key are
To
reduce and control duplication of record in a table.
To set the relationship between tables.
110.
Write two examples of primary key fields.
Any two examples of primary key
fields are SEE Registration Number and Roll Number
111.
Which key sets relationship between tables?
Primary Key
112.
What is meant by data redundancy?
Data redundancy is the duplication of
data within a database.
113.
Define database.
Database is a collection of
systematically organized inter-related data which stores, organizes and
retrieves data.
114.
What is DBMS?
DBMS is a computerized system that
stores data, processes them and provides information in an organized form.
115.
List two examples of DBMS.
Any two examples of DBMS are
MS-Access and Oracle.
116.
Write two features of Database Management
System.
It reduces data redundancy which
means duplication of data.
It allows multiple users to access
the same data simultaneously.
117.
What is a RDBMS?
RDBMS is a type of DBMS that uses a
relational model to organize and manage data, allowing users to easily retrieve
and manipulate it.
118.
Define MS
Access.
MS-Access is a relational database
management system developed by Microsoft Corporation which is used to store and
manipulates large volume of data in multiple tables.
119.
Define Form.
Form is one of the MS-Access database
objects which provides graphical interface to view, modify and add data in a
table or multiple linked tables.
120.
Define relationship.
Relationship is a link between two
tables that defines how they are related to each other by a common field.
121.
What terms are used to refer to a row and a
column in a table?
- Row is refers to Record or Tuple
and Column refers to Field or Attribute.
122.
What is modular programming?
Modular programming is a technique
used to divide program into many small, manageable, logical and functional
modules or blocks.
123.
Write any two advantages of modular programming.
Different programmers can design different program
modules independently, which is required in a large and complex program.
It is easy to design, code and test the program modules independently.
124.
Which statement is used to call sub-procedure?
CALL statement is used to call
sub-procedure.
125.
What are procedure in QBASIC?
Procedure is a block of statement
that solves a particular problem.
126.
What is module?
Module is a block of statement that
solves a particular problem.
127.
What is looping?
Looping is the process of repeating
the execution of a statement or a block of statements guided by a condition and
is terminated when the given condition is satisfied.
128.
Define Keyword with example.
Keyword is a set of special words
which are already defined for some tasks.E.g. auto, double, int, long etc
129.
What is local variable?
Variables which are declared inside a
module and which cannot be accessed by other module are called local variables.
130.
What is a global variable?
A variable in main module which can
be accessed from any module or procedure of a program is known as a global
variable.
131.
Which mode is used to add data items into the
already existed data file in QBASIC?
APPEND mode is used to add data items
into the already existed data file in QBASIC
132.
Which mode is used to read and display data from an
existing sequential data file?
-Input Mode
133.
List the modes of operations for opening a
sequential file
INPUT, OUTPUT and APPEND Mode.
134.
What is the use of EOF() function?
Ans: EOF() function is used to
test the end of records with in a file.
135.
What is the MKDIR command used for in Q-Basic?
Ans: MKDIR command is used
to create a subdirectory which is used to manage files.
136.
Write the types of parameters?
The types of parameters are actual
and formal parameters.
137.
What is formal parameter?
Parameters are variables that will
receive data (arguments value) sent to the procedures (SUB program and
FUNCTION).
138.
What is actual parameter?
Actual or Real parameters are
arguments which are used to pass real value or data to the procedure.
139.
List the types of procedures.
The types of procedure are SUB
Procedure and FUNCTION Procedure.
140.
What
is the function of MOD in Qbasic?
The function of MOD in Qbasic is to
find remainder.
141.
What is the function of SQR in Q-Basic?
The function of SQR in Q-Basic us to
calculate the square root of a given number.
142.
Write the function of Kill and Name….AS
statement in QBasic.
The KILL statement deletes a file. The NAME statement changes the
name of a disk file or directory
143.
Write any two differences between Q-Basic and
C-language.
Any two differences between Q-Basic
and C-language
144.
QBASIC |
145.
C |
146.
It is a high level language without feature of low
level language. |
147.
It is a high level language with some features of low
level language. |
148.
It is mostly used to design application software. |
149.
It is mostly used to prepare system software. |
150.
Define C-programming.
C language is a structured
programming language that divides program into many functions.
151.
Write any two features of C programming
language?
Any two features of c programming
language are:
C is a Structured
Programming Language. which break down a program in several small modules and
makes the programmer easier to manage and debug the code.
C is a
case-sensitive programming language. It understands the capital alphabets and
small alphabets as different values.
152.
Which is the structure programming language?
C language is the structure
programming language.
153.
What is structured programming language
The programming that follows a top-
down approach, on which developers separate the overall program structure into
different sub section, is called structured programming.
154.
Write any two data types used in C language.
Any two data types used in C language
are int and char.
155.
Why C is called a middle level language?
C is called middle level language
because it combines elements of high level language with some features of
assembler
156.
Write a feature of C language.
A feature is C language is it is
mostly used to prepare system software.
157.
Write any two limitations of C-Language.
Any two limitations of C-Language
are:
There is no runtime checking. (the
errors are not detected after each line of code.)
It does not provide strict data type
checking (for example, an integer value can be passed for floating datatype).
158.
Give the name of any two header files used in C
language
<stdio.h> and <conio.h>
159.
Name the header/library file that handles mathematical
functions in C Language.
- <math.h>
160.
What will be the value of ‘y’ in given C
expression, y=64%5?
The value of y will be 4.
161.
What
will be the value of x in given c expression x=55 % 10?
The value value of x will be 5.
162.
How many keywords are in C language?
There are set of 32 keywords in C
language.
163.
What is an operator in C language?
Operator is a symbol that is used to
perform mathematical operations.
164.
Write
the name of unary operators used in C-language
Increment (++) and decrement (--).
165.
Write the name of two selection statement used in C
language.
- if and switch statement
166.
Write any two looping statements used in C
language.
for and while loop
167.
List any two
examples of format specifier (Conversion Character) used in C Language.
Any two examples of format specifier
(Conversion Character) used in C Language are %d (int) and %f (float)
2. Write appropriate technical terms for the
following: [2×1=2]
168.
Data transmission in one direction only that is to send
or receive only. Simplex Mode
169.
Law that governs the legal issues of cyberspace. Cyber
Law
170.
Laws made to prevent criminal activities through
the internet. Cyber Law
171.
Crimes committed using electronic devices and cyber
space. Cyber crime
172.
The smallest unit to represent information on a quantum
computer. Qubit (Quantum bit)
173.
A system of copying data and information reading in
computer into another location. Backup
174.
The process of making copies of data or data files to
use in the event the original data or data files are lost or destroyed. Backup
175.
A company which provides services of Internet. Internet
Service Provider (ISP)
176.
Network of Networks. Internet
177.
The arrangement of connection patterns of computers
or nodes and others resources. Network Topology
178.
Arrangements of nodes in a Network. Topology
179.
A concept of transferring data from your computer to
server Computer. Uploading
180.
Computer program that protects computer from
computer virus. Antivirus software
181.
A program that can disinfect a file from virus. Antivirus
software
182.
A malicious program of computer that damages data and
Software. Malware
183.
A malicious program of computer that damages data and
software. Computer virus
184.
A program that destroys other programs. Computer
Virus
185.
Learning through the electronic media. E-learning
186.
Commerce done by mobile. M-Commerce
187.
business through internet. E-
Commerce
188.
The amount of data transmitted per second through the
communication channel. Bandwidth
189.
The money that is exchanged electrically. Digital
currency
190.
A computer which provides the services to the
other computer in a network. Server
191.
A main computer of a computer network. Server
192.
A powerful program that controls and coordinates a computer’s
hardware devices and runs software and applications. Operating
System
193.
The protocol that makes the network communication
possible. TCP/IP
194.
Digital marks created while using Internet. Digital
Footprint
195.
Secret group of characters which helps to protect file
from unauthorized person. Password
196.
A secret code that gives the user to access particular
program and System. - Password
197.
A type of network in which every computer works as both
client and server. Peer to Peer Network
198.
The
protection of computer systems and sensitive information from unauthorized
access, theft or damage. Cybersecurity
199.
)
Paying money in E-Commerce using internet. Online Payment
200.
The
Internet tool which is used to upload download data. FTP
201.
A collective online communications channels dedicated
to community based input, interaction, content sharing and collaboration. Social
media
202.
A process of performing a variety of tech-enabled activities
via virtual communities and network.
203.
-Social Media
204.
Hacking done with permission from the client. Ethical
Hacking
205.
The process of identifying an individual usually based
on a username and password. Authentication
206.
The mode of
data communication in which data/information/signals are transmitted in both
side simultaneously. Full Duplex Mode
207.
The network
security systems that monitor and control the traffic flow (data packets). Firewall
208.
The
process of repeatedly executing some code until condition satisfies. Looping
209.
Device used to connect a PC with a telephone
line. MODEM
210.
Device to convert analog signal into digital signal
and, vice versa. MODEM
211.
Making data and information unreadable by
unauthorized person. Encryption
212.
it is the process of converting plain text to
cipher text. Encryption
213.
The technology to encode file or message. Encryption
214.
The
method by which information is converted into secret code that hides the
information's true meaning. Encryption
215.
The conversion of encrypted data into its original
form.
216.
-Decryption
217.
A device that controls two dissimilar networks. Gateway
218.
Physical layout of computers in a network. Network
Topology
219.
The mode of data communication in which data can be
transferred in both directions at a time. Full Duplex Mode
220.
A unique numerical identifier for every device or
network that connects to the internet. IP Address
221.
Combination of private and public cloud. – Hybrid
Cloud
222.
Software require for browsing and surfing content on
the WWW. Web Browser
223.
The fake attempt to obtain sensitive information such
as username, password by disguising oneself as a trustworthy entity. Phishing
224.
Network connecting device that boosts the data signals.
Repeater
225.
A logical collection of Internet-connected devices such
as computers, smartphones or internet of things (IoT) devices whose security
have been breached and control is given away to a third party. Botnet
226.
A network device which broadcasts the information
packets to all computer connected network. Hub
227.
An applications that look like they are doing
something harmless, but secretly have malicious code that does something else. Trojan
Horse
228.
Numbers are only allowed in the secret code. Personal
Identification Number (PIN)
229.
A unique numerical identifier for every device or
network that connects to the internet. IP Address
230.
The issues related to cybercrime and also help in
making and implementing laws over cybercrime. Cyber Law
231.
The internet service that enables to connect a
remote or host computer. Telnet
232.
The combination of username and password that is used
to access a resource. credentials
233.
Paperless payment through Internet. Online
Payment
234.
Any software installed on your PC that collects
your information without your knowledge. Spyware
235.
An intelligent device that has ability to determine the
best possible path for data transmission. Router
236.
The kind of harmful computer code or web script
designed to create system vulnerabilities. Malicious Code
237.
Combination of information technology and
telecommunication technology. ICT
238.
A collection of internet host systems that make
services available on the Internet using the HTTP (HyperText Transfer
Protocol). WWW
239.
A way to get the investment whole or part of it back in
case the computer system is damaged. Insurance
3. Write the full forms of the
following: [2×1=2]
240.
1. bps: bits per second |
241.
2. ADSL – Asymmetric Digital Subscriber Line |
242.
3. AI: Artificial Intelligence |
243.
4. ASCII - American Standard Code for Information
Interchange |
244.
5. B2B = Business to Business |
245.
6. BIOS - Basic Input Output System |
246.
7. CCTV : Closed Circuit Television |
247.
8. DNS - Domain Name System |
248.
9. FTP: File Transfer Protocol |
249.
10. G2B
- Government-to-Business |
250.
11. G2G
– Government to Government |
251.
12. GCE
: Google Compute Engine |
252.
13. GPS:
Global Positioning System |
253.
14. ICT
= Information and Communication Technology |
254.
15. IoT – Internet of Things |
255.
16. ISDN
- Integrated Services Digital Network |
256.
17. ISP
– Internet Service Provider |
257.
18. LAN
= Local Area Network |
258.
19. MAN: Metropolitan
Area Network |
259.
20. MODEM
- Modulator-Demodulator. |
260.
21. NAS
- Network Attached Storage. |
261.
22. NIC
– Network Interface Card |
262.
23. POP: Post
Office Protocol |
263.
24. POS- Point
Of Sale |
264.
25. SIM
– Subscriber Identification Module |
265.
26. SMPS- Switched
Mode Power Supply |
266.
27. SMTP
– Simple Mail Transfer Protocol |
267.
28. STP: Shielded Twisted Pair |
268.
29. TCP/IP
– Transmission Control Protocol / Internet Protocol |
269.
30. UPS
- Uninterruptible Power Supply |
270.
31. URL
- Uniform Resource Locator |
271.
32. UTP: Unshielded Twisted Pair |
272.
33. VOIP - Voice Over Internet Protocol |
273.
34. VPN
- Virtual Private Network |
274.
35. VRML-
Virtual Reality Modeling Language |
275.
36. WAN
: Wide Area Network |
276.
37. WAP: Wireless Application Protocol |
277.
38. WLAN
– Wireless Local Area Network |
278.
39. WWW: World Wide Web |
279.
40. HEVC - High Efficiency Video Coding |
280.
41. VOLTE - Voice over Long Term Evolution |
281.
42. EFT - Electronic Funds Transfer |
282.
43. SMS - Short Message Service |
283.
44. WiFi – Wireless Fidelity |
284.
45. VSAT
– Very Small Aperture Terminal |
285.
46. BCC
– Blind Carbon Copy |
286.
47. EFT
– Electronic Funds Transfer |
287.
48. OTP
– One Time Password |
288.
49. Paas
– Platform as a Service |
289.
50. MMS
– Multimedia Messaging Service |
290.
51. PDF
– Portable Document Format |
291.
52. GPRS
– General Packet Radio Service |
292.
53. Iaas
– Infrastructure as a Service |
293.
54. CVT
– Constant Voltage Transformer |
294.
55. FTTH
– Fiber to the Home |
295.
56. DARPA
– Defence Advanced Projects Agency Network |
296.
57. ETDSA
– Electronic Transaction and Digital Signature Act |
297.
58. EMI
– Electromagnetic Interference |
298.
59. IRC
– Internet Relay Chat |
299.
60. RJ-45
– Registered Jack – 45 |
300.
61. Saas
– Software as a Service |
301.
62. PIN
– Personal Identification Number |
302.
63. VRML
– Virtual Reality Modeling Language |
No comments:
Post a Comment