CETP - Computer Related TERMs for Module 1

See this post as well for your exam preparation:

https://ifsamityenglish.blogspot.com/2023/03/vocabulary-lists-notes-for-cetp-ifs.html


Some Terms are given below - you need to understand the meaning and must be able to make a MEANINGFUL Sentence in the exam.

  • Algorithm: A set of step-by-step instructions or rules used to solve a specific problem or perform a task.
  • API (Application Programming Interface): A set of protocols and tools that allows different software applications to communicate and interact with each other.
  • Backend: Refers to the behind-the-scenes components of a software application or website that handle data processing and server-side operations.
  • Bandwidth: The maximum amount of data that can be transmitted over a network connection in a given period of time, usually measured in bits per second (bps).
  • Big Data: A term used to describe huge and complex data sets that cannot be easily processed using traditional methods.
  • BIOS (Basic Input/Output System): A firmware program stored on a computer's motherboard that initializes hardware components and boots the operating system.
  • Blockchain: A decentralized and distributed digital ledger that records transactions across multiple computers, providing transparency and security.
  • Bug: A defect or error in a software program that causes it to behave unexpectedly or not function as intended.
  • Cache: A high-speed storage area that temporarily stores frequently accessed data to improve system performance.
  • Cloud Computing: The delivery of computing services, including storage, servers, databases, and software, over the internet.
  • Compiler: A software program that translates source code written in a programming language into machine code that can be executed by a computer.
  • Cookie: A small piece of data stored by a website on a user's computer to remember information about the user for future interactions.
  • Cybersecurity: The practice of protecting computer systems, networks, and data from unauthorized access, attacks, and damage.
  • Data Mining: The process of analyzing large data sets to discover patterns, correlations, and other useful information.
  • Firewall: A network security device that monitors and controls incoming and outgoing network traffic, based on predetermined security rules.
  • Frontend: The visible part of a software application or website that users interact with, including the user interface and user experience.
  • Gigabyte (GB): A unit of digital storage that represents approximately one billion bytes of data.
  • HTML (Hypertext Markup Language): The standard markup language used for creating web pages and displaying content on the internet.
  • IP Address (Internet Protocol Address): A unique numerical label assigned to each device connected to a computer network, enabling its identification and communication.
  • Latency: The time delay between the initiation of a request and the response or execution of that request in a computer system or network.
  • Machine Learning: A branch of artificial intelligence that enables computers to learn from data and improve their performance without being explicitly programmed.
  • Malware: Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or networks.
  • Metadata: Data that provides information about other data, such as file size, creation date, or authorship, used for organizing and categorizing information.
  • Open Source: Software that is freely available and allows users to view, modify, and distribute its source code.
  • Packet: A unit of data transmitted over a network, containing the actual data being sent along with control information.
  • Phishing: A fraudulent practice in which malicious entities impersonate legitimate organizations or individuals to deceive users into revealing sensitive information.
  • RAM (Random Access Memory): A type of computer memory that stores data and instructions temporarily while a program is running.
  • Agile: An iterative and collaborative approach to software development that emphasizes flexibility, adaptability, and customer involvement.
  • Backdoor: A hidden or undocumented method of accessing a computer system or software application, often used for unauthorized purposes.
  • Bot: Short for "robot," a bot is a software program that performs automated tasks, typically online.
  • CAPTCHA: An acronym for "Completely Automated Public Turing Test to tell Computers and Humans Apart," it is a security measure designed to distinguish humans from automated bots.
  • Docker: An open-source platform that allows developers to automate the deployment and scaling of applications inside software containers.
  • Encryption: The process of encoding data to make it unreadable to unauthorized users, ensuring its confidentiality and security.
  • Firewall: A network security device that monitors and controls incoming and outgoing network traffic, based on predetermined security rules.
  • Hacking: The act of gaining unauthorized access to computer systems or networks, often with malicious intent.
  • IPv6 (Internet Protocol version 6): The most recent version of the Internet Protocol provides a larger address space to accommodate the growing number of devices connected to the internet.
  • Kernel: The core component of an operating system that manages system resources and provides essential services for other software.
  • Machine Vision: The field of computer science that enables computers to interpret, analyze, and understand visual information, similar to human vision.
  • NAT (Network Address Translation): A technique used to map IP addresses from one network to another, allowing devices on different networks to communicate with each other.
  • OAuth: An open standard for authorization that allows users to grant third-party applications limited access to their resources without sharing their passwords.
  • Packet Sniffing: The practice of capturing and analyzing network traffic to intercept and inspect packets of data being transmitted.
  • Ransomware: Malicious software that encrypts a victim's data and demands a ransom payment in exchange for its release.
  • Sandbox: A controlled and isolated environment where software programs can run and be tested without affecting the rest of the system.
  • SSL/TLS (Secure Sockets Layer/Transport Layer Security): Protocols that provide secure communication over a computer network, commonly used for securing online transactions and sensitive data.
  • Trojan Horse: A type of malware disguised as legitimate software or files that, when executed, allows unauthorized access to a computer system.
  • Virtual Reality (VR): A computer-generated simulation of a three-dimensional environment that can be interacted with and explored by users.
  • Zero-Day Vulnerability: A security vulnerability in software or hardware unknown to the vendor or developer, leaving it open to exploitation by attackers.
  • Webinar: A web-based seminar or presentation conducted over the Internet, allowing participants to attend remotely and interact with the presenter.
  • URL (Uniform Resource Locator): The address used to access a resource on the internet, typically starting with "http://" or "https://".
  • RSS (Really Simple Syndication): A technology that allows users to subscribe to and receive updates from websites or blogs by aggregating their content in a standardized format.
  • SEO (Search Engine Optimization): The practice of improving a website's visibility and ranking in search engine results pages to attract organic (non-paid) traffic.
  • Hyperlink: A clickable element on a web page that, when clicked, directs the user to another location, such as another webpage or a specific section within the same page.


Artificial Intelligence:

WebPage

Upload

Recycle Bin



Comments