Monday, February 2, 2026

Asmita’s Chapter Wise Technical Term [2 Marks]

 

Asmita’s Chapter Wise Technical Term:

  1. A company that provides services of internet. ISP (Internet Service Provider)
  2. A computer network limited within a room. LAN (Local Area Network)
  3. A network which is extended beyond the boundary of the countries. WAN (Wide Area Network)
  4. Network of networks. Internet
  5. A device which can convert analog signal to digital codes and vice versa. MODEM
  6. The device used to connect PC with telephone line. MODEM (Modulator-Demodulator)
  7. The communication device that converts digital data into analog and vice versa in computer network. MODEM
  8. A main computer in the computer network. Server
  9. A computer in a network which can provide services to other computers. Server
  10. A computer which provides services to other computers in a network. Server
  11. Hub or switch-based network topology. Star Topology
  12. The interconnection between two or more computers through physical and logical components to share resources. Computer Network
  13. Network sharing and exchanging information between different people. Computer Network
  14. The data carrying capacity of communication channel. Bandwidth
  15. Number of bits that can be transferred per second over a given transmission medium. Bandwidth
  16. A card through which a computer is connected to the network. NIC (Network Interface Card)
  17. A type of network in which every computer works as both client and server. Peer-to-Peer Network
  18. A device that can connect networks which may use different communication protocols. Gateway
  19. The physical layout of local area network. Network Topology
  20. Buying and selling product and services online. E-Commerce
  21. Business through internet. E-Commerce
  22. The use of Internet to buy and sell goods and services. E-Commerce
  23. Rules and format to accept and transfer data in computer network. Network Protocol
  24. A set of rules that governs how computer exchange information over computer Network. Network Protocol
  25. The rules that makes the network communication possible. Network Protocol
  26. A set of rules that governs the communication among the computers in a network. Network Protocol
  27. Communications protocol for the transfer of information on the internet. TCP/IP (Transmission Control Protocol / Internet Protocol)
  28. A standard protocol for electronic mail transmissions across the Internet. SMTP (Simple Mail Transfer Protocol)
  29. A protocol used to retrieve email from a mail server. POP (Post Office Protocol)
  30. A set of communications protocols used for the Internet and other similar networks. TCP/IP (Transmission Control Protocol / Internet Protocol)
  31. A protocol used for transmitting and displaying information in the form of web pages on browsers. HTTP (Hypertext Transfer Protocol)
  32. A unique address of assigned to each computer connected to the internet. IP Address
  33. An Internet protocol that is required to use Internet Telephony service. VOIP (Voice over Internet Protocol)
  34. The protocol used by e-mail client to download e-mails from the e-mail server. POP (Post Office Protocol)
  35. An Internet tool that helps to upload/download the file. FTP (File Transfer Protocol)
  36. The protocol that makes the communication possible. Network Protocol
  37. An internet tool that helps to upload/download the file. FTP (File Transfer Protocol)
  38. A software which enables to view HTML pages in the Internet. Web Browser
  39. A company that provides the Internet facility. ISP (Internet Service Provider)
  40. Protocol used to receive e-mail form the mail server. POP (Post Office Protocol)
  41. The business conducted through Internet. E-commerce
  42. The process of transferring data or information between computers. FTP (File Transfer Protocol)
  43. The mode of transmission in which communication takes place from both the sides simultaneously. Full-Duplex Mode
  44. The mode of only one way communication system. Simplex Mode
  45. The virtual message sharing method of communication. Video Conference
  46. The network architecture in which drives. files and printers on every computer can be available to every other computer on the network. Peer-to-Peer Network
  47. The rules required to help entities communicate or understand each other or complete set of rules and standards that allow different devices to hold conversation. Network Protocol
  48. The computer on which users run applications. Client
  49. The amount of data that can be transmitted through communication channels in fixed time period. Bandwidth
  50. Any network device that can connect to the network and can generate process or transfer network data. Node
  51. The device which controls the flow of data between computers in a network. NIC (Network Interface Card)
  52. A form of wireless transmission in which signals are sent via pulses of infrared light. Infrared
  53. Wireless communication media for short distance. Bluetooth
  54. A form of wireless transmission in which signals are sent via pulses of electromagnetic energy in the microwave region of the spectrum. Microwave Transmission
  55. A form of wireless communication in which signals are sent via radio frequencies. Radio Wave Transmission
  56. A device with multiple ports that joins multiple computers together. Hub
  57. The network architecture in which all the computers have equivalent capabilities and responsibilities. Peer-to-Peer (P2P) Network
  58. The software which controls and manages all the operation in computer network. Network Operating System (NOS)
  59. The computer that controls and coordinates all the activities of the entire computer in a network. Server
  60. The physical layout or cabling structure of computers on local area. Network Topology
  61. The topology in which all the computers are connected by a common distribution channel. Bus Topology
  62. The topology in which all the computers are connected to each other in a close loop in a single cable. Ring Topology
  63. A communication media which use light to carry a data signal through the cable. Fiber Optic Cable
  64. A wireless technology that can be used to transmit data between two different networks. Wi-Fi (Wireless Fidelity)
  65. A device that connects and controls two dissimilar networks together. Gateway
  66. The network architecture consisting at least one server and one or more clients. Client-Server Architecture
  67. The device which connects similar networks having same protocols. Bridge
  68. The device which accepts weak signals regenerates them and sends them back their way. Repeater
  69. The language used for creating web pages. Hypertext Markup Language (HTML)
  70. First computer network system. ARPANET (Advanced Research Projects Agency Network)
  71. The visual communication of parties around the world. Video Conferencing
  72. The process of sending and receiving messages electronically through the internet. E-mail
  73. The bulletin board service (BBS) or public message group service of Internet. Usenet
  74. Internet service that allows people to communicate with each other by typing in real time. IRC (Internet Relay Chat)
  75. A single page of website that contains information in specific topic or subject. Web Page
  76. Collection of web files on a particular subject. Website
  77. The huge collection of hypertext documents on Internet. World Wide Web (WWW)
  78. The very first page of every web site. Home Page
  79. It is the address which is used by various devices in the network for accurate location of logical address. IP Address
  80. A unique address for a collection of related hypertext documents in web server. URL (Uniform Resource Locator)
  81. The program that allows to log into another computer on the Internet. Telnet
  82. Software or programs that search the websites for us. Search Engine
  83. Standardized naming convention for identifying a web document or file, in a sense the address of a link. URL (Uniform Resource Locator)
  84. Software that is used for surfing information through the internet. Web Browser
  85. Message sent electrically through computer network. E-mail
  86. An audio video communication system using internet. Video Conferencing
  87. The process of copying files, documents, programs from users computer to the web server. Upload
  88. The smallest unit to represent information on quantum computer. Quantum Bit (Qubit)
  89. Learning through the electronic media. E-Learning
  90. A powerful program that control and coordinates a computer's hardware devices and runs software and application. Operating System (OS)
  91. An illegal activity done through computer and internet. Cyber Crime
  92. The rate at which data is transmitted through a given medium. Data Transfer Rate / Bandwidth
  93. The websites that search documents for specified keywords in WWWSearch Engine
  94. The recording of interaction with the digital world. Digital Footprint
  95. Digital trails created while using internet. Digital Footprint
  96. Data transmission in only one direction. Simplex Mode
  97. Learning through the electronic media. E-Learning
  98. Laws regarding Internet or Legal issues of Cyber Space. Cyber Law
  99. The rules and regulations to systematize the computer related technology. Cyber Law
  100. The law which controls the crime which is done with the help of computer and Internet. Cyber Law
  101. Moral rules to be followed by computer and other professionals. Computer Ethics
  102. The moral principles that control cyber crime. Computer Ethics
  103. A program that destroys other program. Computer Virus
  104. A program that effect the normal functioning of computer. Computer Virus
  105. Program used to detect and eliminate computer virus. Antivirus Software
  106. The software that protects computer from virus. Antivirus Software
  107. A program that can disinfect a file from virus. Antivirus Software
  108. Any illegal activities that involves a computer, computer system or computer network. Cybercrime
  109. A program that detects and prevents computer from the computer viruses. Antivirus Software
  110. A computer program that entertain and damages user's files. Computer Virus
  111. A malicious program does not hide in other files but spread to other computer without infecting files. Computer Worm
  112. A category of malicious code that includes viruses, worms, and Trojan horses. Malware
  113. A person who breaks and use password of others computer and file illegally. Hacker
  114. A self-replicating computer program which does not need to attach itself to an existing program. Computer Worm
  115. A program that can disinfect a file from virus. Antivirus Software
  116. Anyone who uses digital tools such as computers, cell phones or the internet. Digital Citizen
  117. A legal right that grants the creator of an original work. Copyright
  118. An electronic form of signature that can be used to authenticate the identity of the sender of message. Digital Signature
  119. Digital marks created while using internet. Digital Footprint
  120. A secret group of characters used to protect computer system from unauthorized users. Password
  121. A program that can disinfect a file from virus. Antivirus Software
  122. A system of copying data and information residing in computer into another location. Backup System
  123. A secret code that gives the user to access particular program and system. Password
  124. A secret word that gives user access to a particular program or computer system. Password
  125. Secret group of characters which helps to protect file from unauthorized person. Password
  126. Making duplicate copy of file for security purpose. Backup
  127. A spare copy of important program and documents. Backup
  128. Making an extra copy of data and software. Backup
  129. A branch of technology that protects the machine from theft, corruption, or natural disaster. Computer Security
  130. Device used for power protection. Volt Guard
  131. An electric device that supplies electric current when electricity is cut off. UPS (Uninterruptible Power Supply)
  132. The method of consolidating fragmented files on the computer. Disk Defragmentation
  133. A person who steals or destroys other's data, information and program. Hacker
  134. Device used to protect electronic device from high voltage. Surge Protector
  135. A copy of file that is used when the original file is corrupted. Backup
  136. A program that checks and keeps hard disk in good condition. Scan Disk
  137. A program that rearranges the fragmented files. Defragmenter
  138. The process of rearranging the fragmented files in the contiguous spaces on the disk. Disk Defragmentation (Corrected from "Volt Guard")
  139. A device that protects computer system from the fluctuation of electric voltage. Volt Guard
  140. The process of restoring encrypted data to its original form. Decryption
  141. A malicious code designed to gain access to a system. Malware
  142. The process of selling or exchanging products, services or information using electronic media. E-commerce
  143. The process of doing business electronically. E-commerce
  144. The online transaction through mobile phones. M-commerce
  145. An electronic exchange of currency for purchasing goods and services. Electronic Payment (E-payment)
  146. An artificial environment created by computer system that appears real. Virtual Reality (VR)
  147. The act of making financial transaction on a mobile device. Mobile Banking
  148. The process of conducting financial transactions through internet. Online Banking
  149. The transaction between government to employee. G2E (Government-to-Employee)

 

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home