Skip to main content

CETP - Computer Related TERMs for Module 1

See this post as well for your exam preparation:

https://ifsamityenglish.blogspot.com/2023/03/vocabulary-lists-notes-for-cetp-ifs.html


Some Terms are given below - you need to understand the meaning and must be able to make a MEANINGFUL Sentence in the exam.

  • Algorithm: A set of step-by-step instructions or rules used to solve a specific problem or perform a task.
  • API (Application Programming Interface): A set of protocols and tools that allows different software applications to communicate and interact with each other.
  • Backend: Refers to the behind-the-scenes components of a software application or website that handle data processing and server-side operations.
  • Bandwidth: The maximum amount of data that can be transmitted over a network connection in a given period of time, usually measured in bits per second (bps).
  • Big Data: A term used to describe huge and complex data sets that cannot be easily processed using traditional methods.
  • BIOS (Basic Input/Output System): A firmware program stored on a computer's motherboard that initializes hardware components and boots the operating system.
  • Blockchain: A decentralized and distributed digital ledger that records transactions across multiple computers, providing transparency and security.
  • Bug: A defect or error in a software program that causes it to behave unexpectedly or not function as intended.
  • Cache: A high-speed storage area that temporarily stores frequently accessed data to improve system performance.
  • Cloud Computing: The delivery of computing services, including storage, servers, databases, and software, over the internet.
  • Compiler: A software program that translates source code written in a programming language into machine code that can be executed by a computer.
  • Cookie: A small piece of data stored by a website on a user's computer to remember information about the user for future interactions.
  • Cybersecurity: The practice of protecting computer systems, networks, and data from unauthorized access, attacks, and damage.
  • Data Mining: The process of analyzing large data sets to discover patterns, correlations, and other useful information.
  • Firewall: A network security device that monitors and controls incoming and outgoing network traffic, based on predetermined security rules.
  • Frontend: The visible part of a software application or website that users interact with, including the user interface and user experience.
  • Gigabyte (GB): A unit of digital storage that represents approximately one billion bytes of data.
  • HTML (Hypertext Markup Language): The standard markup language used for creating web pages and displaying content on the internet.
  • IP Address (Internet Protocol Address): A unique numerical label assigned to each device connected to a computer network, enabling its identification and communication.
  • Latency: The time delay between the initiation of a request and the response or execution of that request in a computer system or network.
  • Machine Learning: A branch of artificial intelligence that enables computers to learn from data and improve their performance without being explicitly programmed.
  • Malware: Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or networks.
  • Metadata: Data that provides information about other data, such as file size, creation date, or authorship, used for organizing and categorizing information.
  • Open Source: Software that is freely available and allows users to view, modify, and distribute its source code.
  • Packet: A unit of data transmitted over a network, containing the actual data being sent along with control information.
  • Phishing: A fraudulent practice in which malicious entities impersonate legitimate organizations or individuals to deceive users into revealing sensitive information.
  • RAM (Random Access Memory): A type of computer memory that stores data and instructions temporarily while a program is running.
  • Agile: An iterative and collaborative approach to software development that emphasizes flexibility, adaptability, and customer involvement.
  • Backdoor: A hidden or undocumented method of accessing a computer system or software application, often used for unauthorized purposes.
  • Bot: Short for "robot," a bot is a software program that performs automated tasks, typically online.
  • CAPTCHA: An acronym for "Completely Automated Public Turing Test to tell Computers and Humans Apart," it is a security measure designed to distinguish humans from automated bots.
  • Docker: An open-source platform that allows developers to automate the deployment and scaling of applications inside software containers.
  • Encryption: The process of encoding data to make it unreadable to unauthorized users, ensuring its confidentiality and security.
  • Firewall: A network security device that monitors and controls incoming and outgoing network traffic, based on predetermined security rules.
  • Hacking: The act of gaining unauthorized access to computer systems or networks, often with malicious intent.
  • IPv6 (Internet Protocol version 6): The most recent version of the Internet Protocol provides a larger address space to accommodate the growing number of devices connected to the internet.
  • Kernel: The core component of an operating system that manages system resources and provides essential services for other software.
  • Machine Vision: The field of computer science that enables computers to interpret, analyze, and understand visual information, similar to human vision.
  • NAT (Network Address Translation): A technique used to map IP addresses from one network to another, allowing devices on different networks to communicate with each other.
  • OAuth: An open standard for authorization that allows users to grant third-party applications limited access to their resources without sharing their passwords.
  • Packet Sniffing: The practice of capturing and analyzing network traffic to intercept and inspect packets of data being transmitted.
  • Ransomware: Malicious software that encrypts a victim's data and demands a ransom payment in exchange for its release.
  • Sandbox: A controlled and isolated environment where software programs can run and be tested without affecting the rest of the system.
  • SSL/TLS (Secure Sockets Layer/Transport Layer Security): Protocols that provide secure communication over a computer network, commonly used for securing online transactions and sensitive data.
  • Trojan Horse: A type of malware disguised as legitimate software or files that, when executed, allows unauthorized access to a computer system.
  • Virtual Reality (VR): A computer-generated simulation of a three-dimensional environment that can be interacted with and explored by users.
  • Zero-Day Vulnerability: A security vulnerability in software or hardware unknown to the vendor or developer, leaving it open to exploitation by attackers.
  • Webinar: A web-based seminar or presentation conducted over the Internet, allowing participants to attend remotely and interact with the presenter.
  • URL (Uniform Resource Locator): The address used to access a resource on the internet, typically starting with "http://" or "https://".
  • RSS (Really Simple Syndication): A technology that allows users to subscribe to and receive updates from websites or blogs by aggregating their content in a standardized format.
  • SEO (Search Engine Optimization): The practice of improving a website's visibility and ranking in search engine results pages to attract organic (non-paid) traffic.
  • Hyperlink: A clickable element on a web page that, when clicked, directs the user to another location, such as another webpage or a specific section within the same page.


Artificial Intelligence:

WebPage

Upload

Recycle Bin



Comments

Popular posts from this blog

First Assignment of March 2023 - Semester II of IFS - Section 1 and 2 - ETSLP

This is the First Assignment of March 2023 - Semester II of IFS - Section 1 and 2 - ETSLP - Parveen Kumar SUBMIT on 14 March 2023! (Use the 5 blank Pages for the Answers.  Add more if you need them. You can TYPE Your Answers in this Word File using your computer and then make a proper format. Keep FONT size 12 and Times New Roman Font. The line space should be 1.5 only. The TEXT should be Justified.)  List of 10 Questions for Your Answers Write your answers in 60-120 words for each question. 1. Tell me about yourself, your education and experience and skills.  2. Can you work under pressure? 3. Give me an example of your creativity (analytical skill…managing ability, etc.) 4. What was the toughest challenge you’ve ever faced? 5. What are your greatest strengths? 6. What is your dream job in your career based on your degree? 7. What are your main technical and professional skills? 8. How will you solve a problem between two team members as Team Leader? 9. ...

Reading Comprehension Practice - 2

Read the following paragraph carefully and answer the questions that follow. I always enjoy the drive into Marley. It is a good straight road, with some pleasant views of the countryside on either side. There are woods and hills, villages and farms and, about halfway, a large lake. And because there is rarely much traffic on the road, I can usually enjoy the view as I drive along. I was rather annoyed the other morning, therefore, when a small green car began to drive very close behind me. I went a little faster, hoping to leave the car behind. But whenever I slowed down, the little car caught up with me. The driver, a middle-aged man, was grinning and waving to me. However, I did not recognize either him or the car. Again, I began to drive a little faster but the car caught up with me whenever I slowed down. “Perhaps I am doing something wrong,” I thought. I checked my lights and my indicator, but they were both in order. And I certainly had not got a puncture. The man was a lun...

Syllabus for Communication Skills (BC 206) in Semester II

 Syllabus for Communication Skills (BC 206) in Semester II Module I: Writing Process and Workplace Communication • Writing process: Pre-writing, Writing and Post-writing  • Developing Effective Sentences  • Letters  • Agenda  • Minutes of Meeting Module II: Reports & Proposals Reports • Significance of Reports  • Types of Reports: Periodic/Routine, Special, Analytical, Informational, Formal, Non-formal  • Format of Report: Letter, Printed forms, Manuscript  • Effective use of Visual Aids   Proposals • Purpose of Proposals  • Internal Proposals  • External Proposals  • Format of a Proposal Module III: Digital Literacy & Social Media • Importance of Digital Literacy  • Netiquette  • E-mail  • Advantages of Social Media   • Effective ways of using Social Media  • Professional Blogging  • Professional Profile on Web Module IV: Read...