See this post as well for your exam preparation:
https://ifsamityenglish.blogspot.com/2023/03/vocabulary-lists-notes-for-cetp-ifs.html
Some Terms are given below - you need to understand the meaning and must be able to make a MEANINGFUL Sentence in the exam.
- Algorithm: A set of step-by-step instructions or rules used to solve a specific problem or perform a task.
- API (Application Programming Interface): A set of protocols and tools that allows different software applications to communicate and interact with each other.
- Backend: Refers to the behind-the-scenes components of a software application or website that handle data processing and server-side operations.
- Bandwidth: The maximum amount of data that can be transmitted over a network connection in a given period of time, usually measured in bits per second (bps).
- Big Data: A term used to describe huge and complex data sets that cannot be easily processed using traditional methods.
- BIOS (Basic Input/Output System): A firmware program stored on a computer's motherboard that initializes hardware components and boots the operating system.
- Blockchain: A decentralized and distributed digital ledger that records transactions across multiple computers, providing transparency and security.
- Bug: A defect or error in a software program that causes it to behave unexpectedly or not function as intended.
- Cache: A high-speed storage area that temporarily stores frequently accessed data to improve system performance.
- Cloud Computing: The delivery of computing services, including storage, servers, databases, and software, over the internet.
- Compiler: A software program that translates source code written in a programming language into machine code that can be executed by a computer.
- Cookie: A small piece of data stored by a website on a user's computer to remember information about the user for future interactions.
- Cybersecurity: The practice of protecting computer systems, networks, and data from unauthorized access, attacks, and damage.
- Data Mining: The process of analyzing large data sets to discover patterns, correlations, and other useful information.
- Firewall: A network security device that monitors and controls incoming and outgoing network traffic, based on predetermined security rules.
- Frontend: The visible part of a software application or website that users interact with, including the user interface and user experience.
- Gigabyte (GB): A unit of digital storage that represents approximately one billion bytes of data.
- HTML (Hypertext Markup Language): The standard markup language used for creating web pages and displaying content on the internet.
- IP Address (Internet Protocol Address): A unique numerical label assigned to each device connected to a computer network, enabling its identification and communication.
- Latency: The time delay between the initiation of a request and the response or execution of that request in a computer system or network.
- Machine Learning: A branch of artificial intelligence that enables computers to learn from data and improve their performance without being explicitly programmed.
- Malware: Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or networks.
- Metadata: Data that provides information about other data, such as file size, creation date, or authorship, used for organizing and categorizing information.
- Open Source: Software that is freely available and allows users to view, modify, and distribute its source code.
- Packet: A unit of data transmitted over a network, containing the actual data being sent along with control information.
- Phishing: A fraudulent practice in which malicious entities impersonate legitimate organizations or individuals to deceive users into revealing sensitive information.
- RAM (Random Access Memory): A type of computer memory that stores data and instructions temporarily while a program is running.
- Agile: An iterative and collaborative approach to software development that emphasizes flexibility, adaptability, and customer involvement.
- Backdoor: A hidden or undocumented method of accessing a computer system or software application, often used for unauthorized purposes.
- Bot: Short for "robot," a bot is a software program that performs automated tasks, typically online.
- CAPTCHA: An acronym for "Completely Automated Public Turing Test to tell Computers and Humans Apart," it is a security measure designed to distinguish humans from automated bots.
- Docker: An open-source platform that allows developers to automate the deployment and scaling of applications inside software containers.
- Encryption: The process of encoding data to make it unreadable to unauthorized users, ensuring its confidentiality and security.
- Firewall: A network security device that monitors and controls incoming and outgoing network traffic, based on predetermined security rules.
- Hacking: The act of gaining unauthorized access to computer systems or networks, often with malicious intent.
- IPv6 (Internet Protocol version 6): The most recent version of the Internet Protocol provides a larger address space to accommodate the growing number of devices connected to the internet.
- Kernel: The core component of an operating system that manages system resources and provides essential services for other software.
- Machine Vision: The field of computer science that enables computers to interpret, analyze, and understand visual information, similar to human vision.
- NAT (Network Address Translation): A technique used to map IP addresses from one network to another, allowing devices on different networks to communicate with each other.
- OAuth: An open standard for authorization that allows users to grant third-party applications limited access to their resources without sharing their passwords.
- Packet Sniffing: The practice of capturing and analyzing network traffic to intercept and inspect packets of data being transmitted.
- Ransomware: Malicious software that encrypts a victim's data and demands a ransom payment in exchange for its release.
- Sandbox: A controlled and isolated environment where software programs can run and be tested without affecting the rest of the system.
- SSL/TLS (Secure Sockets Layer/Transport Layer Security): Protocols that provide secure communication over a computer network, commonly used for securing online transactions and sensitive data.
- Trojan Horse: A type of malware disguised as legitimate software or files that, when executed, allows unauthorized access to a computer system.
- Virtual Reality (VR): A computer-generated simulation of a three-dimensional environment that can be interacted with and explored by users.
- Zero-Day Vulnerability: A security vulnerability in software or hardware unknown to the vendor or developer, leaving it open to exploitation by attackers.
- Webinar: A web-based seminar or presentation conducted over the Internet, allowing participants to attend remotely and interact with the presenter.
- URL (Uniform Resource Locator): The address used to access a resource on the internet, typically starting with "http://" or "https://".
- RSS (Really Simple Syndication): A technology that allows users to subscribe to and receive updates from websites or blogs by aggregating their content in a standardized format.
- SEO (Search Engine Optimization): The practice of improving a website's visibility and ranking in search engine results pages to attract organic (non-paid) traffic.
- Hyperlink: A clickable element on a web page that, when clicked, directs the user to another location, such as another webpage or a specific section within the same page.
Artificial Intelligence:
WebPage
Upload
Recycle Bin
Comments
Post a Comment