GLOSSARY 9TH CLASS
➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤ A ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤
Adware:
A type of malware that attaches itself to free software on the internet and infects other computers when it is downloaded.
Analog Computer:
A computer that represents and processes data by measuring quantities such as voltage and current to solve a problem.
Application Software:
Software developed for computer users to solve their problems is called application software.
It is the second type of software. e.g MS- Word, Calculator and Paint program.
Asynchronous Transmission:
A method of data transmission in which time interval between characters is not the same.
Attenuation:
Strength of signal fall off with distance in guided or unguided media is called attenuation.
➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤ B ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤
Bandwidth:
Overall data transmission capacity of a medium or channel is called bandwidth.Bluetooth:
Bluetooth is a wireless communication technology that uses radio waves to connect portable electronic devices over short distance.Bus Topology:
A topology that consists of a single central cable know as bus, to which all the devices are connected along its length to communicate with each other.
➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤ C ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤
Cache:
Very small amount of extremely fast memory inside the microprocessor or on the motherboard is known as cache.Client Computer:
A computer that accesses or uses the resources that are shared by other computersin a network.
Client / Server Network:
A network in which each computer acts as either a server or a client.Command Line Interface:
User interface in which commands are given to computer with keyboard. For example; DOS.Computer Ethics:
Moral guidelines concerned with the ethical use of computer technology are called computer ethics.Computer Network:
Interconnection between computers and devices to provide facilities among users to exchange information and share resources such as printer, hard disk and internet etc.Computer Software:
A set of instructions that tells a computer what to do and how to do is called computer software.Computer Virus:
A type of malware that spreads by inserting a copy of itself into another program or file.Cross Talk:
Interference that occur in guided media when undesired signals enter the path of transmitted signals.Cyber Crime:
Any crime committed by means of computer and internet technology is called cyber crime.
➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤ D ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤
Data Validation:
Allowing only certain values or the type of data that is defined by the user to be entered into cells in Excel is called data validation.Database Administrator:
A person who is responsible for the design, implementation and maintenance of a database in an organization is called a database administrator.Digital Computer:
A general purpose programmable machine that works with binary digits and has the ability to store, retrieve and process data at high speed.Distortion:
Change in form of digital signal when it reaches the receiver during data transmission is called distortion.
expansion slots
filtering data.
➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤ E ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤
Expansion Slots:
Long narrow sockets on the motherboard used for installing expansion cards are calledexpansion slots
➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤ F ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤
Filtering Data:
Displaying only the information that the user needs based on a condition in Excel is calledfiltering data.
Full-duplex Mode:
A type of data transmission mode used to transmit data / information in both directions simultaneously is called full duplex mode
➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤ G ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤
Graphical User Interface:
A type of user interface that is based on windows, icons, menus and pointers is called graphical user interfaceGuided Media:
Transmission media taht uses cabling system that guides data signals along a specific path is called guided media.
➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤ H ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤
Hacker:
A person who illegally breaks into computer systems to destroy, modify or steal information is called a hacker.Half-Duplex Mode:
A type of data transmission mode used to transmit data / information in both direction but not simultaneously is called half duplex mode.Hybrid Computer:
A type of computer that is a combination of analog and digital computers is called hybrid computer.
➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤ I ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤
IC Chip:
A silicon chip that contains a large number of transistors is called IC Chip.
➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤ L ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤
Language Processor:
System software used to translate computer programs into machine language.Local Area Network:
A network that covers a limited area such as a small office or a campus of nearby buildings is called local area network or LAN.
➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤ M ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤
Mesh Topology:
A topology in which all the network nodes are connected to all the other nodes is called mesh topology.Metropolitan Area Network:
A network that spans area larger than LAN but smaller than WAN such as a city is called metropolitan area network or MANMotherboard:
Main circuit board inside the system unit that contains microprocessor, main memory, expansion cards, many IC chips, connectors and other electronics components is called a motherboard.
➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤ N ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤
Network Administrator:
A person responsible for installation, configuration, and maintenance of computer networks in organizations is called a network administrator.Network Interface Card:
Expansion card used to connect computers together to create computer network is called network interface card or NIC card.Network Topology:
Physical arrangement of network nodes. A node represents a computer or a network device.\
➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤ O ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤
Operating System:
A collection of system software that controls the working of computer system is called operating system.Output Devices:
Devices used to display text, graphics and images on monitor or print on paper are called output devices.
➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤ P ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤
Peer-to-Peer Network:
A network in which all the computers have the same status and there is no distinction at all between servers and clients.Personal Identification Number:
A confidential numeric password used to authenticate a user to get access to a computer system is called personal identification number.Ports:
Interface used for connecting various devices to the system unit are called ports.Protocol:
Set of rules between two communicating devices that govern the process of data communication is called protocol.
➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤ R ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤
Registers:
Small memory units inside the microprocessor used to temporarily store some information during the execution of a program.Ring Topology:
A topology shaped just like a ring to which nodes are connected is called a ring topology.Router:
Communication device that is used when two networks have to be connected for communication.
➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤ S ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤
Server Computer:
A computer that shares resources for others to use on a network is called server.Simplex Mode:
A type of transmission mode that provides data / information transmission in only one direction is called simplex mode.Software Piracy:
Making illegal copies of software for use or sale for financial benefit.Spreadsheet:
A grid of rows and columns in which numbers and text are entered is called spreadsheet.Spyware:
A type of malware developed to spy on computer users by gathering information about their activities.Star Topology:
A topology in which all the nodes are connected to a central device called switch is called a star topology.Switch / Access Point:
Communication device used for connecting computers together in a local area network is called switch or access point.Synchronous Transmission:
A method of data transmission in which time interval between characters is always the same.System Software:
A collection of programs which makes the use of computer easy and efficient is called system software.System Unit:
Main part of computer that consists of motherboard, power supply and drives inside the computer casing is called a system unit.
➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤ T ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤
Transmission Medium:
Physical path over which data is sent from sender to receiver is called transmission medium.
➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤ U ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤
Unguided Media:
Transmission of data signals through open space, that is, without using cables.
➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤ W ➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤➤
Wide Area Network:
A network that spans a large area, connecting several locations of an organization across cities, countries and continents is called a wide area network.Word Processing:
Use of computer to create, edit, format and print documents is called word processing.Word Processor:
Computer application software used for creation of documents on computers is called a word processor.Worm:
A type of malware that transmits itself over a network to infect other computers is called a worm.
Fbise Notes-Computer | Glossary 9th Class
Reviewed by fbisenotes
on
July 28, 2019
Rating:
No comments: