Monday, February 2, 2026

Asmita’s Chapter Wise Technical Term [2 Marks]

 

Asmita’s Chapter Wise Technical Term:

    1. A company that provides services of internet. ISP (Internet Service Provider)
    2. A computer network limited within a room. LAN (Local Area Network)
    3. A network which is extended beyond the boundary of the countries. WAN (Wide Area Network)
    4. Network of networks. Internet
    5. A device which can convert analog signal to digital codes and vice versa. MODEM
    6. The device used to connect PC with telephone line. MODEM (Modulator-Demodulator)
    7. The communication device that converts digital data into analog and vice versa in computer network. MODEM
    8. A main computer in the computer network. Server
    9. A computer in a network which can provide services to other computers. Server
    10. A computer which provides services to other computers in a network. Server
    11. Hub or switch-based network topology. Star Topology
    12. The interconnection between two or more computers through physical and logical components to share resources. Computer Network
    13. Network sharing and exchanging information between different people. Computer Network
    14. The data carrying capacity of communication channel. Bandwidth
    15. Number of bits that can be transferred per second over a given transmission medium. Bandwidth
    16. A card through which a computer is connected to the network. NIC (Network Interface Card)
    17. A type of network in which every computer works as both client and server. Peer-to-Peer Network
    18. A device that can connect networks which may use different communication protocols. Gateway
    19. The physical layout of local area network. Network Topology
    20. Buying and selling product and services online. E-Commerce
    21. Business through internet. E-Commerce
    22. The use of Internet to buy and sell goods and services. E-Commerce
    23. Rules and format to accept and transfer data in computer network. Network Protocol
    24. A set of rules that governs how computer exchange information over computer Network. Network Protocol
    25. The rules that makes the network communication possible. Network Protocol
    26. A set of rules that governs the communication among the computers in a network. Network Protocol
    27. Communications protocol for the transfer of information on the internet. TCP/IP (Transmission Control Protocol / Internet Protocol)
    28. A standard protocol for electronic mail transmissions across the Internet. SMTP (Simple Mail Transfer Protocol)
    29. A protocol used to retrieve email from a mail server. POP (Post Office Protocol)
    30. A set of communications protocols used for the Internet and other similar networks. TCP/IP (Transmission Control Protocol / Internet Protocol)
    31. A protocol used for transmitting and displaying information in the form of web pages on browsers. HTTP (Hypertext Transfer Protocol)
    32. A unique address of assigned to each computer connected to the internet. IP Address
    33. An Internet protocol that is required to use Internet Telephony service. VOIP (Voice over Internet Protocol)
    34. The protocol used by e-mail client to download e-mails from the e-mail server. POP (Post Office Protocol)
    35. An Internet tool that helps to upload/download the file. FTP (File Transfer Protocol)
    36. The protocol that makes the communication possible. Network Protocol
    37. An internet tool that helps to upload/download the file. FTP (File Transfer Protocol)
    38. A software which enables to view HTML pages in the Internet. Web Browser
    39. A company that provides the Internet facility. ISP (Internet Service Provider)
    40. Protocol used to receive e-mail form the mail server. POP (Post Office Protocol)
    41. The business conducted through Internet. E-commerce
    42. The process of transferring data or information between computers. FTP (File Transfer Protocol)
    43. The mode of transmission in which communication takes place from both the sides simultaneously. Full-Duplex Mode
    44. The mode of only one way communication system. Simplex Mode
    45. The virtual message sharing method of communication. Video Conference
    46. The network architecture in which drives. files and printers on every computer can be available to every other computer on the network. Peer-to-Peer Network
    47. The rules required to help entities communicate or understand each other or complete set of rules and standards that allow different devices to hold conversation. Network Protocol
    48. The computer on which users run applications. Client
    49. The amount of data that can be transmitted through communication channels in fixed time period. Bandwidth
    50. Any network device that can connect to the network and can generate process or transfer network data. Node
    51. The device which controls the flow of data between computers in a network. NIC (Network Interface Card)
    52. A form of wireless transmission in which signals are sent via pulses of infrared light. Infrared
    53. Wireless communication media for short distance. Bluetooth
    54. A form of wireless transmission in which signals are sent via pulses of electromagnetic energy in the microwave region of the spectrum. Microwave Transmission
    55. A form of wireless communication in which signals are sent via radio frequencies. Radio Wave Transmission
    56. A device with multiple ports that joins multiple computers together. Hub
    57. The network architecture in which all the computers have equivalent capabilities and responsibilities. Peer-to-Peer (P2P) Network
    58. The software which controls and manages all the operation in computer network. Network Operating System (NOS)
    59. The computer that controls and coordinates all the activities of the entire computer in a network. Server
    60. The physical layout or cabling structure of computers on local area. Network Topology
    61. The topology in which all the computers are connected by a common distribution channel. Bus Topology
    62. The topology in which all the computers are connected to each other in a close loop in a single cable. Ring Topology
    63. A communication media which use light to carry a data signal through the cable. Fiber Optic Cable
    64. A wireless technology that can be used to transmit data between two different networks. Wi-Fi (Wireless Fidelity)
    65. A device that connects and controls two dissimilar networks together. Gateway
    66. The network architecture consisting at least one server and one or more clients. Client-Server Architecture
    67. The device which connects similar networks having same protocols. Bridge
    68. The device which accepts weak signals regenerates them and sends them back their way. Repeater
    69. The language used for creating web pages. Hypertext Markup Language (HTML)
    70. First computer network system. ARPANET (Advanced Research Projects Agency Network)
    71. The visual communication of parties around the world. Video Conferencing
    72. The process of sending and receiving messages electronically through the internet. E-mail
    73. The bulletin board service (BBS) or public message group service of Internet. Usenet
    74. Internet service that allows people to communicate with each other by typing in real time. IRC (Internet Relay Chat)
    75. A single page of website that contains information in specific topic or subject. Web Page
    76. Collection of web files on a particular subject. Website
    77. The huge collection of hypertext documents on Internet. World Wide Web (WWW)
    78. The very first page of every web site. Home Page
    79. It is the address which is used by various devices in the network for accurate location of logical address. IP Address
    80. A unique address for a collection of related hypertext documents in web server. URL (Uniform Resource Locator)
    81. The program that allows to log into another computer on the Internet. Telnet
    82. Software or programs that search the websites for us. Search Engine
    83. Standardized naming convention for identifying a web document or file, in a sense the address of a link. URL (Uniform Resource Locator)
    84. Software that is used for surfing information through the internet. Web Browser
    85. Message sent electrically through computer network. E-mail
    86. An audio video communication system using internet. Video Conferencing
    87. The process of copying files, documents, programs from users computer to the web server. Upload
    88. The smallest unit to represent information on quantum computer. Quantum Bit (Qubit)
    89. Learning through the electronic media. E-Learning
    90. A powerful program that control and coordinates a computer's hardware devices and runs software and application. Operating System (OS)
    91. An illegal activity done through computer and internet. Cyber Crime
    92. The rate at which data is transmitted through a given medium. Bandwidth
    93. The websites that search documents for specified keywords in WWWSearch Engine
    94. The recording of interaction with the digital world. Digital Footprint
    95. Digital trails created while using internet. Digital Footprint
    96. Data transmission in only one direction. Simplex Mode
    97. Learning through the electronic media. E-Learning
    98. Laws regarding Internet or Legal issues of Cyber Space. Cyber Law
    99. The rules and regulations to systematize the computer related technology. Cyber Law
    100. The law which controls the crime which is done with the help of computer and Internet. Cyber Law
    101. Moral rules to be followed by computer and other professionals. Computer Ethics
    102. The moral principles that control cyber crime. Computer Ethics
    103. A program that destroys other program. Computer Virus
    104. A program that effect the normal functioning of computer. Computer Virus
    105. Program used to detect and eliminate computer virus. Antivirus Software
    106. The software that protects computer from virus. Antivirus Software
    107. A program that can disinfect a file from virus. Antivirus Software
    108. Any illegal activities that involves a computer, computer system or computer network. Cybercrime
    109. A program that detects and prevents computer from the computer viruses. Antivirus Software
    110. A computer program that entertain and damages user's files. Computer Virus
    111. A malicious program does not hide in other files but spread to other computer without infecting files. Computer Worm
    112. A category of malicious code that includes viruses, worms, and Trojan horses. Malware
    113. A person who breaks and use password of others computer and file illegally. Hacker
    114. A self-replicating computer program which does not need to attach itself to an existing program. Computer Worm
    115. A program that can disinfect a file from virus. Antivirus Software
    116. Anyone who uses digital tools such as computers, cell phones or the internet. Digital Citizen
    117. A legal right that grants the creator of an original work. Copyright
    118. An electronic form of signature that can be used to authenticate the identity of the sender of message. Digital Signature
    119. Digital marks created while using internet. Digital Footprint
    120. A secret group of characters used to protect computer system from unauthorized users. Password
    121. A program that can disinfect a file from virus. Antivirus Software
    122. A system of copying data and information residing in computer into another location. Backup System
    123. A secret code that gives the user to access particular program and system. Password
    124. A secret word that gives user access to a particular program or computer system. Password
    125. Secret group of characters which helps to protect file from unauthorized person. Password
    126. Making duplicate copy of file for security purpose. Backup
    127. A spare copy of important program and documents. Backup
    128. Making an extra copy of data and software. Backup
    129. A branch of technology that protects the machine from theft, corruption, or natural disaster. Computer Security
    130. Device used for power protection. Volt Guard
    131. An electric device that supplies electric current when electricity is cut off. UPS (Uninterruptible Power Supply)
    132. The method of consolidating fragmented files on the computer. Disk Defragmentation
    133. A person who steals or destroys other's data, information and program. Hacker
    134. Device used to protect electronic device from high voltage. Surge Protector
    135. A copy of file that is used when the original file is corrupted. Backup
    136. A program that checks and keeps hard disk in good condition. Scan Disk
    137. A program that rearranges the fragmented files. Defragmenter
    138. The process of rearranging the fragmented files in the contiguous spaces on the disk. Disk Defragmentation 
    139. A device that protects computer system from the fluctuation of electric voltage. Volt Guard
    140. The process of restoring encrypted data to its original form. Decryption
    141. A malicious code designed to gain access to a system. Malware
    142. The process of selling or exchanging products, services or information using electronic media. E-commerce
    143. The process of doing business electronically. E-commerce
    144. The online transaction through mobile phones. M-commerce
    145. An electronic exchange of currency for purchasing goods and services. Electronic Payment (E-payment)
    146. An artificial environment created by computer system that appears real. Virtual Reality (VR)
    147. The act of making financial transaction on a mobile device. Mobile Banking
    148. The process of conducting financial transactions through internet. Online Banking
    149. The transaction between government to employee. G2E (Government-to-Employee)

     


0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home