Fbise Notes-Computer | Glossary 9th Class



glossary

GLOSSARY   9TH CLASS



➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤     A    ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤



Adware:

A type of malware that attaches itself to free software on the internet and infects other computers when it is downloaded.


Analog Computer:

A computer that represents and processes data by measuring quantities such as voltage and current to solve a problem.


Application Software:

Software developed for computer users to solve their problems is called application software. 
It is the second type of software. e.g MS- Word, Calculator and Paint program.



Asynchronous Transmission:

A method of data transmission in which time interval between characters is not the same.

Attenuation:

Strength of signal fall off with distance in guided or unguided media is called attenuation.





➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤     B    ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤



Bandwidth: 

Overall data transmission capacity of a medium or channel is called bandwidth.


Bluetooth:

Bluetooth is a wireless communication technology that uses radio waves to connect portable electronic devices over short distance.



Bus Topology:

A topology that consists of a single central cable know as bus, to which all the devices are connected along its length to communicate with each other.



➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤     C    ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤

Cache:

Very small amount of extremely fast memory inside the microprocessor or on the motherboard is known as cache.


Client Computer:

A computer that accesses or uses the resources  that are shared by other computers
in a network.

Client / Server Network:

A network in which each computer acts as either a server or a client.

Command Line Interface: 

User interface in which commands are given to computer with keyboard. For example; DOS.

Computer Ethics:

Moral guidelines concerned with the ethical use of computer technology are called computer ethics.


Computer Network:

Interconnection between computers and devices to provide facilities among users to exchange information and share resources such as printer, hard disk and internet etc.

Computer Software:

A set of instructions that tells a computer what to do and how to do is called computer software.

Computer Virus:

A type of malware that spreads by inserting a copy of itself into another program or file.

Cross Talk:

Interference that occur in guided media when undesired signals enter the path of transmitted signals.

Cyber Crime:

Any crime committed by means of computer and internet technology is called cyber crime.


➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤     D    ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤


Data Validation:

Allowing only certain values or the type of data that is defined by the user to be entered into cells in Excel is called data validation.

Database Administrator:

A person who is responsible for the design, implementation and maintenance of a database in an organization is called a database administrator.

Digital Computer:

A general purpose programmable machine that works with binary digits and has the ability to store, retrieve and process data at high speed.

Distortion:

Change in form of digital signal when it reaches the receiver during data transmission is called distortion.

➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤     E    ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤

Expansion Slots:

Long narrow sockets on the motherboard used for installing expansion cards are called
expansion slots

➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤     F    ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤

Filtering Data:

Displaying only the information that the user needs based on a condition in Excel is called
filtering data.

Full-duplex Mode:

A type of data transmission mode used to transmit data / information in both directions simultaneously is called full duplex mode


➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤     G    ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤

Graphical User Interface:

A type of user interface that is based on windows, icons, menus and pointers is called graphical     user interface

Guided Media:

Transmission media  taht uses cabling system that guides data signals along a specific path is called guided media.


➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤     H    ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤


Hacker:

A person who illegally breaks into computer systems to destroy, modify or steal information is called a hacker.

Half-Duplex Mode:

A type of data transmission mode used to transmit data / information in both direction but not simultaneously is called half duplex mode.

Hybrid Computer:

A type of computer that is a combination of analog and digital computers is called hybrid computer.




➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤     I    ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤


IC Chip:

A silicon chip that contains a large number of transistors is called IC Chip.



➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤     L    ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤


Language Processor:

System software used to translate computer programs into machine language.

Local Area Network:

A network that covers a limited area such as a small office or a campus of nearby buildings is called local area network or LAN.



➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤     M    ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤

Mesh Topology:

A topology in which all the network nodes are connected to all the other nodes is called mesh topology.

Metropolitan Area Network:

A network that spans area larger than LAN but smaller than WAN such as a city is called metropolitan area network or MAN

Motherboard:

Main circuit board inside the system unit that contains microprocessor, main memory, expansion cards, many IC chips, connectors and other electronics components is called a motherboard.



➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤     N    ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤

Network Administrator:

A person responsible for installation, configuration, and maintenance of computer networks in organizations is called a network administrator.

Network Interface Card:

Expansion card used to connect computers together to create computer network is called network interface card or NIC card.

Network Topology:

Physical arrangement of network nodes. A node represents a computer or a network device.\



➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤     O    ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤

Operating System:

A collection of system software that controls the working of computer system is called operating system.

Output Devices:

Devices used to display text, graphics and images on monitor or print on paper are called output devices.

➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤     P    ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤

Peer-to-Peer Network:

A network in which all the computers have the same status and there is no distinction at all between servers and clients.

Personal Identification Number:

A confidential numeric password used to authenticate a user to get access to a computer system is called personal identification number.

Ports:

Interface used for connecting various devices to the system unit are called ports.


Protocol:

Set of rules between two communicating devices that govern the process of data communication is called protocol.



➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤     R    ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤

Registers:

Small memory units inside the microprocessor used to temporarily store some information during the execution of a program.

Ring Topology:

A topology shaped just like a ring to which nodes are connected is called a ring topology.

Router:

Communication device that is used when two networks have to be connected for communication.




➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤     S    ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤

Server Computer:

A computer that shares resources for  others to use on a network is called server.

Simplex Mode:

A type of transmission mode that provides data / information transmission in only one direction is called simplex mode.

Software Piracy:

Making illegal copies of software for use or sale for financial benefit.

Spreadsheet:

A grid of rows and columns in which numbers and text are entered is called spreadsheet.

Spyware:

A type of malware developed to spy on computer users by gathering information about their activities.

Star Topology:

A topology in which all the nodes are connected to a central device called switch is called a star topology.

Switch / Access Point:

Communication device used for connecting computers together in a local area network is called switch or access point.


Synchronous Transmission:

A method of data transmission in which time interval between characters is always the same.

System Software:

A collection of programs which makes the use of computer easy and efficient is called system software.

System Unit:

Main part of computer that consists of motherboard, power supply and drives inside the computer casing is called a system unit.

➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤     T    ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤

Transmission Medium:

Physical path over which data is sent from sender to receiver is called transmission medium.





➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤     U    ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤


Unguided Media:

Transmission of data signals through open space, that is, without using cables.

➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤     W    ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤


Wide Area Network:

A network that spans a large area, connecting several locations of an organization across cities, countries and continents is called a wide area network.

Word Processing:

Use of computer to create, edit, format and print documents is called word processing.

Word Processor:

Computer application software used for creation of documents on computers is called a word processor.

Worm:

A type of malware that transmits itself over a network to infect other computers is called a worm.





Fbise Notes-Computer | Glossary 9th Class Fbise Notes-Computer | Glossary 9th Class Reviewed by fbisenotes on July 28, 2019 Rating: 5

No comments:

Powered by Blogger.