COMPUTER TERMINOLOGIES for IBPS PO,IBPS Clerk,IBPS RRB,RBI Assistant

COMPUTER TERMINOLOGIES for IBPS PO,IBPS Clerk,IBPS RRB,RBI Assistant

COMPUTER TERMINOLOGIES for IBPS PO,IBPS Clerk,IBPS RRB,RBI Assistant

COMPUTER TERMINOLOGIES for IBPS PO,IBPS Clerk,IBPS RRB,RBI Assistant

To Download This File Click On The Download- Download Now 
Download Free Study Material
  • Computer is a scoring section in banking exams like IBPS PO ,IBPS Clerk ,SBI PO ,SBI Clerk etc .
  • where you can easily earn marks just by reading some Important Computer Abbreviations , Computer terminologies and Basic Fundamentals of Computer.
  • Here in this post we have made a full list of all the important computer terminologies for you.

COMPUTER TERMINOLOGIES

  1. Active Server Pages (ASP): A standard for scripting server side web pages.
  2. Active Cell: The cell in MS Excel with dark boundary is called the active cell.
  3. Analog: Describing a system particularly an electronic device that uses a continuous physical quantity to represent information.
  4. API (Application Programming Interface): It is a set of tools for building software applications. A good API makes it easier to develop a program by providing all the building blocks .A programmes then put the building blocks together
  5. Back-up File: A copy of all the files created as a safety precaution in case any harm occurs to the original.
  6. BASIC (Beginner’s All-Purpose Symbolic Instruction Code): An easy to use High Level language which is now replaced by improved version of Microsoft Visual Basic.
  7. Blind Carbon Copy (BCC): In e-mail, a copy of message that is sent to one or more persons without the knowledge of other recipients.
  8. Bit: Basic unit of computer which has two values ‘0’ and ‘1’.
  9. Byte: One byte is a collection of 8 bits.
  10. Basic Input /Output System (BIOS): It handles the start up operations and low-level control for hardware .Also known as ROM BIOS.
  11. Boot Loader: It reads the main portion of the operating system form secondary memory.
  12. Boot: An initiating automatic routine that is read into RAM when a computer is first turned on. This provides the necessary environment for subsequent loading of all or part of the operating system, software application etc. It prepares the computer for use. The process of starting a computer is called boot and restarting is called warm boot.
  13. Bootstrap Protocol (BOOTP): It a computer networking protocol that which is used by a client to obtain an IP address form a server. It is used to establish a connection during a computer’s initial boot up during the Bootstrap process.
  14. Bandwidth: It tells about the data transmission rate of a network or internet connection. Bandwidth is used to calculate the amount of time that is required to send a data over a specific connection.
  15. Bus: A bus is a communication system that allows the data to be passed back and forth inside a computer or between the computers.
  16. Bug: An error in a software program is called a bug.
  17. Cache: A cache is a temporary storage area where frequently accessed data can be stored for rapid access. It acts as a buffer between CPU and memory.
  18. Clock speed: A rate at which a processor can complete a processing cycle is called clock speed.
  19. .Com: .Com (Commercial) is a top level domain name used by businesses, although individual register.
  20. CGI (Common Gateway Interface): A standard method used to generate dynamic content on web pages and web applications.
  21. Cookie: Cookie is user data that is stored in a user’s browser to notify the application server of the user’s previous activity regarding that application
  22. Copyright: It means the material and information are the personal property of the owner or producer.
  23. Counter feiting: It is the process of making and distributing illegal copies of software packages.
  24. DBMS: It stands for Data Base Management System. It is a software package to manage database.
  25. Data processing: It is process to get meaningful information from data.
  26. DHTML (Dynamic Hper Text Markup Language): It is used to create dynamic content on web pages.
  27. Digital Signature: It is a cryptographic scheme to preserve the originality of digital documents
  28. Dots per inch (depi): It measures the resolution that states the number of dots that the device can print, scan or display in a linear inch.
  29. DNS (Domain Name System): Is a system that distributes unique name to internet resources that identifies those resources across internet network
  30. ERP (Enterprise Resource Planning): It is management software used in enterprises to collect, store and manage their resources
  31. Ethernet: It is the most popular type of LAN, in which communication through radio frequency signals is carried by a co-axial cable.
  32. Ethernet Card: A network adapter that enables a computer to connect to an Ethernet.
  33. Ethics: Ethics are rules and belief.
  34. FTP (File Transfer Protocol): A client/ server protocol for exchanging files with a host computer.
  35. FAX: Facsimile- used to send printed pages between two locations using the telephone line.
  36. Firewall: They provide some protection form online intrusion but they don’t protect against some unpatched vulnerabilities in the application packages.
  37. File: A file is a collection of related records.
  38. .GOV: It is a government domain name denoting government office or agency.
  39. .GIF (Graphic Interchange Format): It is a file extension which is used on the internet to encode and exchange graphics.
  40. GUI (Graphical User Interface): A computer program that enables a person to communicate with a computer through the use of symbols, visual metaphors and pointing devices.
  41. Gateway: Gateway is server that routes between different networks
  42. Google: Google is a search engine.
  43. Hyperlink: A highlighted word in a text or picture in a document or web page which can be used to go to another page by clicking it with a mouse.
  44. Hard Disk: A hard disk is a secondary memory which can store anywhere from 10MBs to several GBs.
  45. Hub: Hub connects multiple ethernet devices together into a single network
  46. Hacker: A hacker is a person who breaks into a computer system to get access the information stored there.
  47. HTML: HTML (Hyper Text Markup Language) is a markup language used to create web pages.
  48. HTTP: Hyper text transfer protocol is used often to transfer information form WWW servers to browsers.
  49. ICMP (Internet Control Message Protocol): Protocol to send error messages.
  50. IMAP (Internet Message Access Protocol): Protocol for email access and management.
  51. IP (Internet Protocol): It is a standard that describes that how an internet connected computer break down data into packets for transmission across the network and how these packets should be addressed so that they arrive at their destination.
  52. IP Address: It is a 32- bit binary number that uniquely identifies the location of a particular user on the internet.
  53. Internet Service Provider (ISP): An organization that provides the services of Internet to the Subscriber based customers.
  54. Intranet: It is a private network that is contained with an enterprise.
  55. JPEG: Joint Photographic Experts Group is a graphics format that is ideal for complex pictures /graphics.
  56. Kb: Kilobit
  57. LAN: A LAN (Local Area Network) connects network devices over a relatively short distance.
  58. LCD: Liquid Crystal Display. It Used in Laptop computers small battery power electronic devices.
  59. LED: Light Emitting Diode. A small electronic device made from semiconductor materials.
  60. LINUX: It is a UNIX like Operating System with graphical user interface
  61. Mainframe: Mainframe is a very large in size and an expensive computer capable of supporting hundreds, or even thousands, of users simultaneously. Mainframe executes many programs concurrently. Mainframes support many simultaneous programs execution
  62. MIME: Multipurpose Internet Mail Extension. It specifies that how the multimedia files can be transferred through the E-mail programs and web browsers.
  63. MIPS: Million Instructions Per Second. It is a method of measuring the rate at which the computer executes microprocessor instructions.
  64. MODEM: A modem is the device needed to translate between the analog phone line and the digital computer. Its function is modulated /demodulates the digital signal.
  65. MIDI: Musical Instrument Digital Interface. It is a standard communication protocol for the exchange of information between computers and musical synthesisers.
  66. Malware: Malware is software which is designed specifically to damage a computer system.
  67. Morphing: It is used in computer animation in which an image change smoothly from one image to another.
  68. M-Commerce: It is used for the commercial transactions that are done by Mobile Phones.
  69. Mozilla: Mozilla is a web browser
  70. Multitasking: Multitasking is the method with multiple tasks processes sharing common processing resources such as CPU
  71. MAC OS: It is an Operating System used in Macintosh Computer developed by Apple.
  72. NIBBLE: A group of 4-bits.
  73. Network: A group of two or more computers that are linked together.
  74. NIC (Network Interface Card): It is a computer component which is used to connect a computer to a computer network.
  75. ODBC: Open Database Connectivity. It is a standard that enables applications to communicate with variety of database applications.
  76. OOP: Object Oriented Programming
  77. OS: Operating system provides an interface between the human user and the computer hardware
  78. PDF: Portable Document Format. It is file extension created by Adobe systems.
  79. POP3: Post Office Protocol. An internet e-mail standard that specifies how an internet connected communicates as mail handling agent.
  80. POST: Power on Self-Test. It is internal testing which is performed when the computer is started or reset.
  81. Piracy: It is the legal reproduction and distribution of software application
  82. Primary Key: It is a field with unique value for each record
  83. Primary Memory: It temporarily/permanently holds the data received form input/output device. It holds the data being processed and intermediate results being generated.
  84. Port: a physical docking point using which an external device can be connected to the computer.
  85. PPP: Point to Point Protocol.
  86. Protocol: It is set of riled or standards designed so that computers can exchange information with a minimum error
  87. Peripherals: A device that connects to and works with the computer eg Mouse, Keyboard.
  88. Password: A sequence of characters which is used to check the authenticity of the user.
  89. Query: It is used to extract information from a database.
  90. RAM: A RAM constitutes the internal memory of the CPU for storing data, program and program result. It is read/write memory. It is called random access memory (RAM).
  91. RDBMS: Relational Database Management System. A database management system that is based on the relational model.
  92. Record: It is the collection of the related fields.
  93. ROM (Read only memory): The data store in this cannot be changes and it’s a non-volatile memory.
  94. Secondary Memory: used to store data and information permanently .Data is stored permanently even if power is switched off.
  95. Software: It is set of programs that guides the hardware through its job
  96. System Software: System software refers to all the programs, which make the computer work and is based on controlling the internal computer operations.
  97. SMTP (Simple Mail Transfer Protocol): An internet Protocol that governs the transmission of e-mail over computer networks.
  98. Scanner: Scanner is an input device, which works more like a photocopy machine. It is used when some information is available on a paper and it is to be transferred to the hard disc of the computer for further manipulation.
  99. Spoof: It is to deceive or to fake, especially with the intension of gaining unauthorised access to computer resources.
  100. Spam: An irrelevant and unsolicited message sent over the internet.
  101. SPOOL: Simultaneous peripheral Operations on Line
  102. Search Engine: It is program which is used to search a document with a specific keyword when use will enter its keyword it returns a list of matching documents.
  103. Sorting: It is arranging of data in order
  104. Trash: A folder in the e-mail which kept all the deleted mails.
  105. Tag: It is a part of HTML .It determines the way, the browser display text in web page.
  106. Topology: A network topology is the physical layout of the networks in which all the devices are connected among themselves.
  107. Telnet: Telnet is network protocol with the help of which a user one computer can log into another computer that is the part of the same network.
  108. Trojan horse: A programme that appears to perform a valid function but has some hidden instructions in its code that can cause server damage to the system on which the programme runs.
  109. UPS: Uninterruptable Power Supply. A battery system that can supply continuous power to a computer in the event of a power failure for some times.
  110. URL: Uniform Resource Locator. It is the unique address for a file that is accessible over the internet.
  111. USB: Universal Serial Bus enables the communication between the computer and the peripheral devices
  112. UNIX: It is a powerful multiuser operating system. It uses command text in Web Page.
  113. VAN (Value Added Network): A public data network that provides value added services for corporate customers including end-to-end dedicated lines with guaranteed security.
  114. Virus: A virus is a computer program that can copy itself and infect a computer. A virus can spread from one computer to another computer when its host is taken to the target computer.
  115. W3 (WORLD WIDE WEB): It is a system of interlinked hypertext documents accused via internet.
  116. WAN (Wide area Network): A WAN is a geographically dispersed collection of LANs.
  117. WORM (Write Once Read many): It is a storage device to store data in which once the information is written it cannot be erased or modified.
  118. Web Browser: It is a software application for retrieving, presenting and traversing information resources on the World Wide Web
  119. Wi-Fi: It stands for Wireless- fidelity. It is used by the most personal computer operating systems, many video game consoles, laptops, printers and other peripherals.
  120. XML: Extensible Markup Language.
  121. .ZIP: Compressed File (File name Extension.)