Sie sind auf Seite 1von 14

NIRMAN IAS GWALIOR COMPUTER NOTES

COMPUTER
Applet Internet Explorer are today's most popular browsers
A small Java application that is downloaded by an for accessing the World Wide Web.
ActiveX or Java-enabled web browser. Once it has Bug
been downloaded, the applet will run on the user's A malfunction, due to an error in the program or a
computer. Common applets include financial defect in the equipment.
calculators and web drawing programs. Byte
Application Most computers use combinations of eight bits,
Computer software that performs a task or set of called bytes, to represent one character of data or
tasks, such as word processing or drawing. instructions. For example, the word cat has three
Applications are also referred to as programs. characters, and it would be represented by three
ASCII bytes.
American Standard Code for Information Cache
Interchange, an encoding system for converting A small data-memory storage area that a computer
keyboard characters and instructions into the binary can use to instantly re-access data instead of re-
number code that the computer understands. reading the data from the original source, such as a
Bandwidth hard drive. Browsers use a cache to store web pages
The capacity of a network connection. Bandwidth so that the user may view them again without
determines how much data can be sent along the reconnecting to the Web.
networked wires. Bandwidth is particularly CAD-CAM
important for Internet connections, since greater Computer Aided Drawing - Computer Aided
bandwidth also means faster downloads. Manufacturing. The instructions stored in a
Binary code computer that will be translated to very precise
The most basic language a computer understands, it operating instructions to a robot, such as for
is composed of a series of 0 and 1. The computer assembling cars or laser-cutting signage.
interprets the code to form numbers, letters, CD-ROM
punctuation marks, and symbols. Compact Disc Read-Only Memory, an optically
Bit read disc designed to hold information such as
The smallest piece of computer information, either music, reference materials, or computer software. A
the number 0 or 1. In short they are called binary single CD-ROM can hold around 640 megabytes of
digits. data, enough for several encyclopedias. Most
software programs are now delivered on CD-
Boot ROMs.
To start up a computer. Cold boot means restarting
computer after the power is turned off. Warm boot CGI
means restarting computer without turning off the Common Gateway Interface, a programming
power. standard that allows visitors to fill out form fields
on a Web page and have that information interact
Browser with a database, possibly coming back to the user as
Software used to navigate the Internet. Google
another Web page. CGI may also refer to
Chrome, Firefox, Netscape Navigator and Microsoft
Computer-Generated Imaging, the process in which
NIRMAN IAS GWALIOR 1 BY SANJAY GUPTA
NIRMAN IAS GWALIOR COMPUTER NOTES
sophisticated computer programs create still and but it continues to expand, offering a wide array of
animated graphics, such as special effects for resources for business and home users.
movies. Database
Chat A collection of similar information stored in a file,
Typing text into a message box on a screen to such as a database of addresses. This information
engage in dialogue with one or more people via the may be created and stored in a database
Internet or other network. management system (DBMS).
Chip Debug
A tiny wafer of silicon containing miniature electric To find and correct equipment defects or program
circuits that can store millions of bits of malfunctions.
information. Default
Client The pre-defined configuration of a system or an
A single user of a network application that is application. In most programs, the defaults can be
operated from a server. A client/server architecture changed to reflect personal preferences.
allows many people to use the same data Desktop
simultaneously. The program's main component The main directory of the user interface. Desktops
(the data) resides on a centralized server, with usually contain icons that represent links to the hard
smaller components (user interface) on each client. drive, a network (if there is one), and a trash or
Cookie recycling can for files to be deleted. It can also
A text file sent by a Web server that is stored on the display icons of frequently used applications, as
hard drive of a computer and relays back to the Web requested by the user.
server things about the user, his or her computer, Desktop publishing
and/or his or her computer activities. The production of publication-quality documents
CPU using a personal computer in combination with text,
Central Processing Unit. The brain of the computer. graphics, and page layout programs.
Cracker Directory
A person who breaks in to a computer through a A repository where all files are kept on computer.
network, without authorization and with Disk
mischievous or destructive intent. Two distinct types. The names refer to the media
Crash inside the container:
A hardware or software problem that causes A hard disc stores vast amounts of data. It is
information to be lost or the computer to usually inside the computer but can be a separate
malfunction. Sometimes a crash can cause peripheral on the outside. Hard discs are made up of
permanent damage to a computer. several rigid coated metal discs.
A floppy disc, 3.5" square, usually inserted into the
Cursor computer and can store about 1.4 megabytes of
A moving position-indicator displayed on a data. The 3.5" square floppies have a very thin,
computer monitor that shows a computer operator flexible disc inside. There is also an intermediate-
where the next action or operation will take place. sized floppy disc, trademarked Zip discs, which can
Cyberspace store 250 megabytes of data.
Slang for internet ie. An international Disk drive
conglomeration of interconnected computer The equipment that operates a hard or floppy disc.
networks. Begun in the late 1960s, it was developed
in the 1970s to allow government and university
Domain
researchers to share information. The Internet is not Represents an IP (Internet Protocol) address or set
controlled by any single group or organization. Its of IP addresses that comprise a domain. The domain
original focus was research and communications, name appears in URLs to identify web pages or in

NIRMAN IAS GWALIOR 2 BY SANJAY GUPTA


NIRMAN IAS GWALIOR COMPUTER NOTES
email addresses. For example, the email address for computers that may be across the office or around
the First Lady is first.lady@whitehouse.gov, the world.
whitehouse.gov, being the domain name. Each Emoticon
domain name ends with a suffix that indicates what A text-based expression of emotion created from
top level domain it belongs to. These are : .com for ASCII characters that mimics a facial expression
commercial, .gov for government, .org for when viewed with your head tilted to the left. Here
organization, .edu for educational institution, .biz are some examples:
for business, .info for information, .tv for television, • Smiling
.ws for website. Domain suffixes may also indicate • Frowning
the country in which the domain is registered. No • Winking
two parties can ever hold the same domain name. • Crying

Domain name Encryption


The name of a network or computer linked to the The process of transmitting scrambled data so that
Internet. Domains are defined by a common IP only authorized recipients can unscramble it. For
address or set of similar IP (Internet Protocol) instance, encryption is used to scramble credit card
addresses. information when purchases are made over the
Internet.
Download
The process of transferring information from a web Ethernet
A type of network.
site (or other remote location on a network) to the
computer. It is possible to download a file which Ethernet card
include text, image, audio, video and many others. A board inside a computer to which a network cable
can be attached.
DOS
Disk Operating System. An operating system File
designed for early IBM-compatible PCs. A set of data that is stored in the computer.
Drop-down menu Firewall
A menu window that opens vertically on-screen to A set of security programs that protect a computer
from outside interference or access via the Internet.
display context-related options. Also called pop-up
menu or pull-down menu. Folder
A structure for containing electronic files. In some
DSL
operating systems, it is called a directory.
Digital Subscriber Line, a method of connecting to
the Internet via a phone line. A DSL connection Fonts
uses copper telephone lines but is able to relay data Sets of typefaces (or characters) that come in
at much higher speeds than modems and does not different styles and sizes.
interfere with telephone use. Freeware
DVD Software created by people who are willing to give
it away for the satisfaction of sharing or knowing
Digital Video Disc. Similar to a CD-ROM, it stores
they helped to simplify other people's lives. It may
and plays both audio and video.
be free-standing software, or it may add
E-book functionality to existing software.
An electronic (usually hand-held) reading device FTP
that allows a person to view digitally stored reading File Transfer Protocol, a format and set of rules
materials. for transferring files from a host to a remote
Email computer.
Electronic mail; messages, including memos or Gigabyte (GB)
letters, sent electronically between networked 1024 megabytes. Also called gig.

NIRMAN IAS GWALIOR 3 BY SANJAY GUPTA


NIRMAN IAS GWALIOR COMPUTER NOTES
Glitch HTTP
The cause of an unexpected malfunction. Hypertext Transfer Protocol, a common system
used to request and send HTML documents on the
Gopher World Wide Web. It is the first portion of all URL
An Internet search tool that allows users to access addresses on the World Wide Web.
textual information through a series of menus, or if
using FTP, through downloads. HTTPS
Hypertext Transfer Protocol Secure often used in
GUI intracompany internet sites. Passwords are required
Graphical User Interface, a system that simplifies to gain access.
selecting computer commands by enabling the user
Hyperlink
to point to symbols or illustrations (called icons) on
Text or an image that is connected by hypertext
the computer screen with a mouse.
coding to a different location. By selecting the text
Groupware or image with a mouse, the computer jumps to (or
Software that allows networked individuals to form displays) the linked text.
groups and collaborate on documents, programs, or
Hypermedia
databases.
Integrates audio, graphics, and/or video through
Hacker links embedded in the main program.
A person with technical expertise who experiments
Hypertext
with computer systems to determine how to develop
A system for organizing text through links, as
additional features. Hackers are occasionally
opposed to a menu-driven hierarchy such as
requested by system administrators to try and break
Gopher. Most Web pages include hypertext links to
into systems via a network to test security. The term
other pages at that site, or to other sites on the
hacker is sometimes incorrectly used
World Wide Web.
interchangeably with cracker. A hacker is called a
white hat and a cracker a black hat. Icons
Symbols or illustrations appearing on the computer
Hard copy
screen that indicate program files or other computer
A paper printout of what you have prepared on the
functions.
computer.
Input
Hard drive Data that goes into a computer device.
Another name for the hard disc that stores
information in a computer. Input device
A device, such as a keyboard, stylus and tablet,
Hardware
mouse, puck, or microphone, that allows input of
The physical and mechanical components of a information (letters, numbers, sound, and video) to
computer system, such as the electronic circuitry, a computer.
chips, monitor, disks, disk drives, keyboard,
Instant messaging (IM)
modem, and printer.
A chat application that allows two or more people
Home page to communicate over the Internet via real-time
The main page of a Web site used to greet visitors, keyed-in messages.
provide information about the site, or to direct the Interface
viewer to other pages on the site. The interconnections that allow a device, a
HTML program, or a person to interact. Hardware
interfaces are the cables that connect the device to
Hypertext Markup Language, a standard of text
its power source and to other devices. Software
markup conventions used for documents on the interfaces allow the program to communicate with
World Wide Web. Browsers interpret the codes to other programs (such as the operating system), and
give the text structure and formatting (such as bold, user interfaces allow the user to communicate with
blue, or italic). the program (e.g., via mouse, menu commands,
icons, voice commands, etc.).
NIRMAN IAS GWALIOR 4 BY SANJAY GUPTA
NIRMAN IAS GWALIOR COMPUTER NOTES
Internet Laptop and notebook
An international conglomeration of interconnected Small, lightweight, portable battery-powered
computer networks. Begun in the late 1960s, it was computers that can fit onto your lap. They each
developed in the 1970s to allow government and have a thin, flat, liquid crystal display screen.
university researchers to share information. The Macro
Internet is not controlled by any single group or A script that operates a series of commands to
organization. Its original focus was research and perform a function. It is set up to automate
communications, but it continues to expand, repetitive tasks.
offering a wide array of resources for business and
home users.
Mac OS
An operating system with a graphical user interface,
IP (Internet Protocol) address developed by Apple for Macintosh computers.
An Internet Protocol address is a unique set of
numbers used to locate another computer on a
Memory
Temporary storage for information, including
network. The format of an IP address is a 32-bit
applications and documents. The information must
string of four numbers separated by periods. Each
be stored to a permanent device, such as a hard disc
number can be from 0 to 255 (i.e., 1.154.10.255).
or CD-ROM before the power is turned off, or the
Within a closed network IP addresses may be
information will be lost. Computer memory is
assigned at random, however, IP addresses of web
measured in terms of the amount of information it
servers must be registered to avoid duplicates.
can store, commonly in megabytes or gigabytes.
Java
An object-oriented programming language designed
Menu
A context-related list of options that users can
specifically for programs (particularly multimedia)
choose from.
to be used over the Internet. Java allows
programmers to create small programs or Menu bar
applications (applets) to enhance Web sites. The horizontal strip across the top of an
application's window. Each word on the strip has a
JavaScript/ECMA script
context sensitive drop-down menu containing
A programming language used almost exclusively
features and actions that are available for the
to manipulate content on a web page. Common
application in use.
JavaScript functions include validating forms on a
web page, creating dynamic page navigation menus, Merge
and image rollovers. To combine two or more files into a single file.
Kilobyte (K or KB) MHz
Equal to 1,024 bytes. An abbreviation for Megahertz, or one million
Linux hertz. One MHz represents one million clock cycles
A UNIX - like, open-source operating system per second and is the measure of a computer
developed primarily by Linus Torvalds. Linux is microprocessor's speed. For example, a
free and runs on many platforms, including both microprocessor that runs at 300 MHz executes 300
PCs and Macintoshes. Linux is an open-source million cycles per second. Each instruction a
operating system, meaning that the source code of computer receives takes a fixed number of clock
the operating system is freely available to the cycles to carry out, therefore the more cycles a
public. Programmers may redistribute and modify computer can execute per second, the faster its
the code, as long as they don't collect royalties on programs run. Megahertz is also a unit of measure
their work or deny access to their code. Since for bandwidth.
development is not restricted to a single corporation Microprocessor
more programmers can debug and improve the A complete central processing unit (CPU) contained
source code faster. on a single silicon chip.

NIRMAN IAS GWALIOR 5 BY SANJAY GUPTA


NIRMAN IAS GWALIOR COMPUTER NOTES
Minimize Output
A term used in a GUI operating system that uses Data that come out of a computer device. For
windows. It refers to reducing a window to an icon, example, information displayed on the monitor,
or a label at the bottom of the screen, allowing sound from the speakers, and information printed to
another window to be viewed. paper.
Modem Palm
A device that connects two computers together over A hand-held computer.
a telephone or cable line by converting the PC
computer's data into an audio signal. Modem is a Personal computer. Generally refers to computers
contraction for the process it performs : modulate- running Windows with a Pentium processor.
demodulate.
PC board
Monitor Printed Circuit board, a board printed or etched
A video display terminal. with a circuit and processors. Power supplies,
Mouse information storage devices, or changers are
A small hand-held device, similar to a trackball, attached.
used to control the position of the cursor on the PDA
video display; movements of the mouse on a
Personal Digital Assistant, a hand-held computer
desktop correspond to movements of the cursor on
that can store daily appointments, phone numbers,
the screen.
addresses, and other important information. Most
MS-DOS PDAs link to a desktop or laptop computer to
An early operating system developed by Microsoft download or upload information.
Corporation (Microsoft Disc Operating System).
PDF
Network Portable Document Format, a format presented by
A system of interconnected computers. Adobe Acrobat that allows documents to be shared
Open source over a variety of operating systems. Documents can
Computer programs whose original source code was contain words and pictures and be formatted to have
revealed to the general public so that it could be electronic links to other parts of the document or to
developed openly. Software licensed as open source places on the web.
can be freely changed or adapted to new uses, Pentium chip
meaning that the source code of the operating Intel's fifth generation of sophisticated high-speed
system is freely available to the public. microprocessors. Pentium means the fifth element.
Programmers may redistribute and modify the code,
as long as they don't collect royalties on their work Peripheral
or deny access to their code. Since development is Any external device attached to a computer to
not restricted to a single corporation more enhance operation. Examples include external hard
programmers can debug and improve the source drive, scanner, printer, speakers, keyboard, mouse,
code faster. trackball, stylus and tablet, and joystick.
Operating system Personal computer (PC)
A set of instructions that tell a computer on how to A single-user computer containing a central
operate when it is turned on. It sets up a filing processing unit (CPU) and one or more memory
system to store files and tells the computer how to circuits.
display information on a video display. Most PC Petabyte
operating systems are DOS (disc operated system) A measure of memory or storage capacity and is
systems, meaning the instructions are stored on a approximately a thousand terabytes.
disc (as opposed to being originally stored in the Petaflop
microprocessors of the computer). Other well- A theoretical measure of a computer's speed and
known operating systems include UNIX, Linux, can be expressed as a thousand-trillion floating-
Macintosh, and Windows. point operations per second.
NIRMAN IAS GWALIOR 6 BY SANJAY GUPTA
NIRMAN IAS GWALIOR COMPUTER NOTES
Platform Programming language instructions are converted
The operating system, such as UNIX, Macintosh, into programs in language specific to a particular
Windows, on which a computer is based. machine or operating system (machine language).
So that the computer can interpret and carry out the
Plug and play instructions. Some common programming
Computer hardware or peripherals that come set up languages are BASIC, C, C++, FORTRAN,
with necessary software so that when attached to a
Puck
computer, they are recognized by the computer and
An input device, like a mouse. It has a magnifying
are ready to use. glass with crosshairs on the front of it that allows
Pop-up menu the operator to position it precisely when tracing a
A menu window that opens vertically or drawing for use with CAD-CAM software.
horizontally on-screen to display context-related Push technology
options. Also called drop-down menu or pull-down Internet tool that delivers specific information
menu. directly to a user's desktop, eliminating the need to
Power PC surf for it. PointCast, which delivers news in user-
A competitor of the Pentium chip. It is a new defined categories, is a popular example of this
generation of powerful sophisticated technology.
microprocessors produced from an Apple-IBM- QuickTime
Motorola alliance. Audio-visual software that allows movie-delivery
via the Internet and e-mail. QuickTime images are
Printer
viewed on a monitor.
A mechanical device for printing a computer's
output on paper. There are three major types of RAID
printer: Redundant Array of Inexpensive Disks, a method
• Dot matrix - creates individual letters, made up
of spreading information across several disks set up
to act as a unit, using two different techniques:
of a series of tiny ink dots, by punching a ribbon
• Disk striping - storing a bit of information
with the ends of tiny wires. (This type of printer
across several discs (instead of storing it all on
is most often used in industrial settings, such as one disc and hoping that the disc doesn't crash).
direct mail for labelling.) • Disk mirroring - simultaneously storing a copy
• Ink jet - sprays tiny droplets of ink particles onto of information on another disc so that the
paper. information can be recovered if the main disc
• Laser - uses a beam of light to reproduce the crashes.
image of each page using a magnetic charge that RAM
attracts dry toner that is transferred to paper and Random Access Memory, one of two basic types
sealed with heat. of memory. Portions of programs are stored in
Program RAM when the program is launched so that the
A precise series of instructions written in a program will run faster. Though a PC has a fixed
computer language that tells the computer what to amount of RAM, only portions of it will be
do and how to do it. Programs are also called accessed by the computer at any given time. Also
software or applications. called memory.

Programming language Right-click


Using the right mouse button to open context-
A series of instructions written by a programmer
sensitive drop-down menus.
according to a given set of rules or conventions
(syntax). High-level programming languages are ROM
independent of the device on which the application Read-Only Memory, one of the two basic types of
(or program) will eventually run; low-level memory. ROM contains only permanent
languages are specific to each program or platform. information put there by the manufacturer.

NIRMAN IAS GWALIOR 7 BY SANJAY GUPTA


NIRMAN IAS GWALIOR COMPUTER NOTES
Information in ROM cannot be altered, nor can the information to the computer. The tablet responds to
memory be dynamically allocated by the computer pressure. The firmer the pressure used to draw, the
or its operator. thicker the line appears.
Scanner Surfing
An electronic device that uses light-sensing Exploring the Internet.
equipment to scan paper images such as text, Surge protector
photos, and illustrations and translate the images A controller to protect the computer and make up
into signals that the computer can then store, for variances in voltage.
modify, or distribute. Telnet
Search engine A way to communicate with a remote computer
Software that makes it possible to look for and over a network.
retrieve material on the Internet, particularly the Trackball
Web. Some popular search engines are Alta Vista, Input device that controls the position of the cursor
Google, HotBot, Yahoo!, Web Crawler, and Lycos. on the screen; the unit is mounted near the
keyboard, and movement is controlled by moving a
Server ball.
A computer that shares its resources and
information with other computers, called clients, on Terabytes (TB)
a network. A thousand gigabytes.
Teraflop
Shareware
A measure of a computer's speed. It can be
Software created by people who are willing to sell it
expressed as a trillion floating-point operations per
at low cost or no cost for the gratification of
second.
sharing. It may be freestanding software, or it may
UNIX
add functionality to existing software.
A very powerful operating system used as the basis
Software of many high-end computer applications.
Computer programs; also called applications.
Upload
Spider The process of transferring information from a
A process search engines use to investigate new computer to a web site (or other remote location on
pages on a web site and collect the information that a network). To transfer information from a
needs to be put in their indices. computer to a web site (or other remote location on
Spreadsheet a network).
Software that allows one to calculate numbers in a URL
format that is similar to pages in a conventional Uniform Resource Locator.
ledger. • The protocol for identifying a document on the
Web.
Storage • A Web address. URL is unique to each user. See
Devices used to store massive amounts of also domain.
information so that it can be readily retrieved.
UPS
Devices include RAIDs, CD-ROMs, DVDs.
Universal Power Supply or Uninterruptible Power
Streaming Supply. An electrical power supply that includes a
Taking packets of information (sound or visual) battery to provide enough power to a computer
from the Internet and storing it in temporary files to during an outage to back-up data and properly shut
allow it to play in continuous flow. down.
Stylus and tablet USB
An input device similar to a mouse. The stylus is A multiple-socket USB connector that allows
pen shaped. It is used to draw on a tablet (like several USB-compatible devices to be connected to
drawing on paper) and the tablet transfers the a computer.

NIRMAN IAS GWALIOR 8 BY SANJAY GUPTA


NIRMAN IAS GWALIOR COMPUTER NOTES
USENET • Macro viruses copy their macros to templates
A large unmoderated and unedited bulletin board on and/or other application document files.
the Internet that offers thousands of forums, called • Trojan Horse is a malicious, security-breaking
newsgroups. These range from newsgroups program that is disguised as something being
exchanging information on scientific advances to such as a screen saver or game.
celebrity fan clubs. • Worm launches an application that destroys
User friendly information on your hard drive. It also sends a
A program or device whose use is intuitive to copy of the virus to everyone in the computer's e-
people with a non-technical background. mail address book.
Video teleconferencing WAV
A remote "face-to-face chat," when two or more A sound format (pronounced wave) used to
reproduce sounds on a computer.
people using a webcam and an Internet telephone
connection chat online. The webcam enables both Webcam
live voice and video. A video camera/computer setup that takes live
images and sends them to a Web browser.
Virtual reality (VR)
A technology that allows one to experience and Window
A portion of a computer display used in a graphical
interact with images in a simulated three-
interface that enables users to select commands by
dimensional environment. For example, you could pointing to illustrations or symbols with a mouse.
design a room in a house on your computer and "Windows" is also the name Microsoft adopted for
actually feel that you are walking around in it even its popular operating system.
though it was never built. Wildcard
Virus Wildcard refers to a character that can be
An unauthorized piece of computer code attached to substituted for zero or more characters in a string.
a computer program or portions of a computer Wildcards are commonly used
system that secretly copies itself from one computer in computer programming
to another by shared discs and over telephone and WYSIWYG
cable lines. It can destroy information stored on the What You See Is What You Get. When using most
computer, and in extreme cases, can destroy word processors, page layout programs web page
operability. Computers can be protected from design programs, words and images will be
viruses if the operator utilizes good virus prevention displayed on the monitor as they will look on the
software and keeps the virus definitions up to date. printed page or webpage.
Most viruses are not programmed to spread
themselves. They have to be sent to another Computer worm:
A computer worm is a standalone malware that
computer by e-mail, sharing, or applications. The
spreads through computer networks. It is a self-
worm is an exception, because it is programmed to replicating software that infects computers connected
replicate itself by sending copies to other computers to a network while remaining active in the original
listed in the e-mail address book in the computer. system. It is one of the most common viruses.
There are many kinds of viruses, for example: Trojan horse:
• Boot viruses place some of their code in the A trojan horse is a malicious program which infects
start-up disk sector to automatically execute when a system by masquerading as an innocuous program.
booting. Therefore, when an infected machine It introduces the virus to a system. They do not
boots, the virus loads and runs. replicate themselves but are very destructive.
• File viruses attached to program files (files with Phishing:
the extension .exe). When you run the infected The practice of sending fake emails or trying to get
program, the virus code executes. personal information like name, password or money

NIRMAN IAS GWALIOR 9 BY SANJAY GUPTA


NIRMAN IAS GWALIOR COMPUTER NOTES
at times is known as phishing. Phishing is conducted Simplex channels - simplex is a communications
by posing as a legitimate user of a system and channel that operates in one direction at a time.
collecting data through electronic communication. Half duplex channel - A half-duplex channel can
Spoofing attack: send and receive data, but not at the same time.
When a person or program impersonates the identity Full duplex channel - Refers to the transmission of
of another by falsifying important data thereby data in two directions simultaneously.
gaining an unfair and illegitimate advantage is called Types Data communication medium
spoofing. There are various spoofing attacks that the Standard Telephone
fraudulent party can use for their own purpose. LineCo-Axial Cable
ASCII: Microwave Transmission
ASCII stands for American Standard Code for Satellite Communication
Information Interchange. Computers can only Optical Fibers
understand numbers, so an ASCII code is the Network devices
numerical representation of a character. • Network adapter is a device that enables a
HTTP: computer to connect with other computer/network
The Hypertext Protocol is the base by which one can using MAC Address
communicate World Wide Web. • Hub is a device that splits a network connection
Optical Mark reading (OMR)–Optical Mark into multiple computers
Readers reads pencil or pen marks made in pre- • Switch is a telecommunication device grouped as
defined positions on paper forms as responses to one of computer network components
questions or tick list prompts. • Cable is one way of transmission media which
Types of Computer can transmit communication signals.
1. Digital computer - digital computer is the most • Repeaters is used to regenerate or replicate
commonly used type of computer and is used to signals that are weakened or distorted by
process information with quantities using digits, transmission over long distances
usually using the binary number system. Ex - • Bridge is used two connect two LANs with the
MacBook. same standard but using different types of cables
2. Analog Computer - a computer that operates • Router is used to join multiple computer
with numbers represented by directly measurable networks together via either wired or wireless
quantities (as voltages or rotations) — compare connections.
digital computer, hybrid computer. • Gateway is a key stopping point for data on its
3. Hybrid Computer - a computer that combines way to or from other networks.
the characteristics of a digital computer and an • MODEM -Modulator-demodulator. Electronic
analog computer by its capacity to accept input device that allows computers to communicate
and provide output in either digital or analog form over telephone wires or cable-TV cable.
and to process information digitally. Types of Topology
Internet Terminology Mesh topology - Mesh is a network topology in
1 Server - a computer designed to process requests which devices are connected with many
and deliver data to other (client) computers over a redundant interconnections between network
local network or the Internet. nodes.
2. Receiver - a hardware module or device used to Star topology - Star topology is a network
receive signals topology where each individual piece of a
3. Channel – physical connection between Server & network is attached to a central node.
Receiver Ring topology - Ring topology refers to a
Transmission Channel specific kind of network setup in which devices
are connected in a ring and pass information to
NIRMAN IAS GWALIOR 10 BY SANJAY GUPTA
NIRMAN IAS GWALIOR COMPUTER NOTES
each other according to their adjacent in the ring Deep Blue
structure. Deep Blue was a chess-playing computer developed
Bus topology - Bus topology is a specific kind of by IBM. It is known for being the first computer
network topology in which all of the various chess-playing system to win both a chess game and a
devices in the network are connected to a single chess match against a reigning world champion
cable or line. under regular time controls
Tree topology – It is a combination Flame
characteristic of linear bus and star topologies. Flame also known as Flamer, sKyWIper, and
Skywiper, is modular computer malware discovered
Boot in 2012 that attacks computers running the
The boot process is the name for the various steps Microsoft Windows.
the computer takes after you turn it on, all the way
MMS
Until the operating system is loaded. Multimedia messaging service: a method of
Cold Boot-The start-up of a computer from a transmitting graphics, video or sound files
powered-down, or off, state. Also called a hard MIPS
boot. MIPS Stands for "Million Instructions Per
Warm Boot-restarting a computer via the Second." It is a method of measuring the raw speed
operating system. of a computer's processor
Adware Tunneling
This program launches the advertisements in the Tunneling is a protocol that allows for the secure
form of pop ups. Usually the add words are based on movement of data from one network to
the internet behavior of the user. another. Tunneling involves allowing private
Spam network communications to be sent across a public
These are unwanted emails. In other words we can network, such as the Internet, through a process
call them as unsolicited promotional mail. called encapsulation.
Mail Bomb Easter egg
An excessively large email (typically many In computing and software an "Easter egg" is a
thousands of messages) or one large message sent to secret message, joke or screen buried in an
a user’s email account. This is done to crash the application. Typically, Easter eggs are used to
system and prevent genuine messages from being display the credits for the development team or to
display a humorous message.
received.
Scareware Blu-ray disk (BD)
A Blu-ray disk (BD) is a high-capacity optical disk
A common trick cyber criminals use to make users
medium developed for recording, rewriting and
think that their computer has become infected with
playing back high definition video. It can store large
Malware to get them to purchase a fake application.
amounts of data and was designed to supersede the
Sniffers DVD.
A software program used to monitor the traffic in a Antivirus software:
network. The hackers may use the sniffed data to Antivirus software is a program used to protect
access important confidential data. computers from computer viruses such as malware,
Rootkit trojans and network viruses. Many prominent
A program designed to hide objects such as software companies specialize in antivirus software.
processes, files or Windows registry entries (often Some of the biggest software vendors who develop
including its own). and market antivirus software are McAfee, Norton,
Eset and Kaspersky Labs.

NIRMAN IAS GWALIOR 11 BY SANJAY GUPTA


NIRMAN IAS GWALIOR COMPUTER NOTES
Abbreviations
PC – PERSONAL COMPUTER.. JAD – JAVA APPLICATION DEVELOPMENT
HTML– HYPER TEXT MARKUP LANGUAGE JAR – JAVA ARCHIVE
AJAX–ASYNCHRONOUS JAVASCRIPT AND MIDI – MUSICAL INSTRUMENT DIGITAL
XML INTERFACE
ORACLE–OAK RIDGE AUTOMATIC MMF – MUSIC MOBILE FORMAT
COMPUTER AND LOGICAL ENGINE MP2 – MPEG AUDIO LAYER 2
RDBMS–RELATIONAL DATABASE MP3 – MPEG AUDIO LAYER 3
MANAGEMENT SYSTEM MP4 – MPEG LAYER 4
SQL – STRUCTURED QUERY LANGUAGE MPEG–MOTION PICTURE EXPERTS GROUP
XML – EXTENSIBLE MARKUP LANGUAGE PDF – PORTABLE DOCUMENT FORMAT
PERL–PRACTICAL EXTRACTION AND PNG–PORTABLE NETWORK/NEW
REPORT LANGUAGE GRAPHICS
PHP – HYPERTEXT PREPROCESSOR RM – REAL MEDIA
ASP – ACTIVE SERVER PAGES SIS – SYMBIAN INSTALLATION SOURCE
API–APPLICATION PROGRAMMING SWF - SHOCK WAVE FLASH
INTERFACES ZIP – ZONE IMPROVEMENT PLAN
XHTML–EXTENSIBLE HYPERTEXT VCD – VIDEO COMPACT DISK
MARKUP LANGUAGE VOB – VIDEO OBJECT
CSS – CASCADING STYLE SHEETS WAV – WAVEFORM PCM AUDIO
ASCII – AMERICAN STANDARD CODE FOR WMA – WINDOWS MEDIA AUDIO
INFORMATION INTERCHANGE PDF – PORTABLE DOCUMENT FORMAT
XSL-EXTENSIBLE STYLE SHEET M3G – MOBILE 3D GRAPHICS
LANGUAGE M4A – MPEG-4 AUDIO FILE
J2EE- JAVA 2 PLATFORM ENTERPRISE MMF – SYNTHETIC MUSIC MOBILE
EDITION APPLICATION FILE
JSP- JAVA SERVER PAGE XMF – EXTENSIBLE MUSIC FILE
VBS–VISUAL BASIC SCRIPTING WBMP – WIRELESS BITMAP IMAGE
LANGUAGE WML – WIRELESS MARKUP LANGUAGE
JS – JAVA SCRIPT CD – COMPACT DISK.
3GP – 3rd GENERATION PROTOCOL DVD – DIGITAL VERSATILE DISK.
3GPP–3rd GENERATION PARTNERSHIP CRT – CATHODE RAY TUBE.
PROJECT DAT – DIGITAL AUDIO TAPE.
AAC – ADVANCED AUDIO CODEC DOS – DISK OPERATING SYSTEM.
AC3 – DOLBY DIGITAL SOUND FILE GUI – GRAPHICAL USER INTERFACE.
AIFF–AUDIO INTERCHANGE FILE FORMAT HTTP – HYPER TEXT TRANSFER
AMR – ADOPTIVE MULTI RATE PROTOCOL.
AWB– ADOPTIVE MULTI RATE WIDEBAND HTTPS – HYPER TEXT TRANSFER
AVI – AUDIO VIDEO INTERLEAVED PROTOCOL SECURE.
CDA – COMPACT DISK AUDIO IP – INTERNET PROTOCOL.
DLL – DYNAMIC LINK LIBRARY ISP – INTERNET SERVICE PROVIDER.
DVD – DIGITAL VIDEO DISK TCP–TRANSMISSION CONTROL
EXE – EXECUTABLE FORMAT PROTOCOL.
FLAC – FREE LOSSLESS AUDIO CODEC UPS – UNINTERRUPTIBLE POWER SUPPLY.
FLV – FLASH LIVE VIDEO VHF – VERY HIGH FREQUENCY.
JPEG–JOINT PHOTOGRAPHIC EXPERT UHF – ULTRA HIGH FREQUENCY.
GROUP ALU- ARITHMETIC LOGIC UNIT
BMP – BITMAP URL – UNIFORM RESOURCE LOCATOR.
GIF – GRAPHICS INTERCHANGE FORMAT
NIRMAN IAS GWALIOR 12 BY SANJAY GUPTA
NIRMAN IAS GWALIOR COMPUTER NOTES
WINDOWS–WIDE INTERACTIVE BIOS – Basic Input Output System
NETWORK FOR DEVELOPMENT OF OFFICE VDU – Visible Display Unit
WORK SOLUTION LED – Light Emitting Diode
AMD – ADVANCE MICRO DEVICE LCD – Liquid Crystal Display
ASPI–ADVACNE SCSI PROGRAMMING USB – Universal Serial Bus
INTERFACE VGA – Video/Visual Graphic Adapter
ASIC–APPLICATION SPECIFIC LAN – Local Area Network
INTEGRATED CIRCUIT WAN – Wide Area Network
EPROM–ERASABLE PROGRAMMABLE MAN – Metropolitan Area Network
READ ONLY MEMORY. HLL – High Level Language
FPS – FRAME PER SECOND LLL – Low Level Language
USB – UNIVERSAL SERIAL BUS. MIPS – Million of Instruction Per Second
VIRUS –VITAL INFORMATION RESOURCE Mbps – Mega Bytes Per second
UNDER SEIZED. Kbps – Kilo Bytes per second
RAM–RANDOM ACCESS MEMORY KB – KILOBYTE
ROM–READ ONLY MEMORY MB – MEGA BYTE
MIME–MULTIPURPOSE INTERNET MAIL GB – GIGA BYTE
EXTENSIONS GiB – GIBI BYTE
SMTP–SIMPLE MAIL TRANSFER TB – TERA BYTE
PROTOCOL TiB – TEBI BYTE
IMAP–INTERNET MESSAGE ACCESS PB – PETA BYTE
PROTOCOL PiB – PEBI BYTE
HSDPA – HIGH SPEED DOWNLINK PACKET EB – EXA BYTE
ACCESS. EiB – EXBI BYTE
EDGE – ENHANCED DATA RATE FOR GSM ZB – ZETTA BYTE
EVOLUTION. ZiB – ZEBI BYTE
GPRS–GENERAL PACKET RADIO SERVICE. YB – YOTTA BYTE
3G – 3rd GENERATION. YiB – YOBI BYTE
GSM–GLOBAL SYSTEM FOR MOBILE NTFS – NEW TECHNOLOGY FILE SYSTEM
COMMUNICATION. FAT – FILE ALLOCATION TABLE
CDMA–CODE DIVISION MULTIPLE DOC – DOCUMENT
ACCESS. TXT – TEXT
UMTS–UNIVERSAL MOBILE SD – SECURE DIGITAL
TELECOMMUNICATION SYSTEM. USB – UNIVERSAL SERIAL BUS
ARPANET–ADVANCED RESEARCH IT – INFORMATION TECHNOLOGY
PROJECT AGENCY NETWORK. NET – INTERNET
AM/FM–AMPLITUDE/ FREQUENCY IP – INTERNET PROTOCOL
MODULATION. AP – ACCESS POINT
WLAN – WIRELESS LOCAL AREA DNS – DOMAIN NAME SYSTEM
NETWORK RSS – REALLY SIMPLE SYNDICATION
CPU – CENTRAL PROCESSING UNIT DMCA–DIGITAL MILLENNIUM
RAM – RANDOM ACCESS MEMORY COPYRIGHT ACT
ROM – READ ONLY MEMORY IPV4 – INTERNET PROTOCOL VERSION 4
PROM – Programmable Read Only Memory IPV6 – INTERNET PROTOCOL VERSION 6
HDD – Hard Disk Drive VOIP – VOICE OVER INTERNET PROTOCOL
FDD – Floppy Disk Drive SEO – SEARCH ENGINE OPTIMIZATION
I/O – Input & Output 1024 Bytes – 1 Kilo Byte ( KB )
SMPS – Switch Mode Power Supply 1024 KB – 1 Mega Byte ( MB )
POST – Power ON Self Test 1024 MB – 1 Giga Byte ( GB )

NIRMAN IAS GWALIOR 13 BY SANJAY GUPTA


NIRMAN IAS GWALIOR COMPUTER NOTES
1024 GB – 1 Tera Byte ( TB )
1024 TB – 1 Peta Byte ( PB )
1024 PB – 1 Exa Byte ( EB )
1024 EB – 1 Zetta Byte ( ZB )
1024 ZB – 1 Yotta Byte ( YB)
EDSAC - Electronic Delay Storage Automatic
Calculator
EDVAC - Electronic Discrete Variable Automatic
Computer
E-mail - Electronic Mail
ENIAC - Electronics Numerical Integrator And
Calculator
Wi-Fi - Wireless fidelity.
WLAN - Wireless Local Area Network
ASCII - American Standard Code for Information
Interchange
COBOL – Common Business Oriented Language
SMS – Short messaging service
GIF – Graphics Interchange Format
CHAT-Conversational Hypertext Access
Technology

NIRMAN IAS GWALIOR 14 BY SANJAY GUPTA

Das könnte Ihnen auch gefallen