Don't forget to use the search option to find stuff

No of Tech Terms and counting

Tech Terminology

Most frequently takled

Completely removes the file from the computer, which is useful if you don’t want it anymore. As with any deleted file, a file that your antivirus program deletes is no longer visible and can’t be used.

What is Clean a file ?

Removes the infection from the file but does not actually delete the file itself. This is the best option if you need to keep the file.

Software is not often operating system based.Ii does not need user interaction for functioning.

What is Application ?

Application is operation system based.Application need user interaction for functioning.

A single instruction that expands automatically into a set of instructions to perform a particular task

What is Code ?

A language understood by the computer. Coding makes it possible  to create computer software

Broadband is a high-capacity high-speed Data transmission medium.Broadband technology can be used to transmit voice, data and video over long distances simultaneously.

What is router ?

Routers capture the information that come through broadband connection via a modem and deliver it to your computer. Routers are multiport devices and more sophisticated as compared to repeaters and bridges.

Broadcasting in Networking

In networking, a broadcast means that we send something that everyone receives, whether they need/want it or not.

What is Broadcast Domain ?

Broadcast domain is a collection of eligible (Logical ) network devices that receive broadcast traffic from each other.​

What is Network Switch ?

A network switch (Hardware device ) operates on the network layer and channelise incoming data from multiple input ports to a specific output port.

What is Network bridge ?

Network device (Software ) whcih work on data link layer to interconnect two LANs together and separate network segments.

NAT ( Network Address Translation ) translates the IP addresses of computers in a local network to a single IP address.

In computer networking, port forwarding mapping is an application of network address translation (NAT)

The router connects various networks simultaneously

The switch connects various devices simultaneously

core router is a wired or wireless router that distributes Internet data packets within a network

Edge router is between one or more networks, but does not distribute data packets within a network.

What is hardware router ?

Wired routers or non wired routers are physical hardware for receiving internet data

What is virtual router ?

Virtual router is a software-based routing framework that allows the host machine to perform as a typical hardware router over a local area network.

What is positive trigger in logic bomb ?

Logic bomb is triggred on specific date and time or the removal of an employee’s name from the salary database

What is negative trigger, in logic bomb ?

Logic bomb is triggred in condition such as a particular employee failing to input a command by a certain time

Artificial Intelligence is not a system,but is implemented in the system.It is the broad discipline of creating intelligent machines

Machine Learning is an application of AI that provide system the ability to automatically learn and improve from experience.It is the acquisition of knowledge or skill

The precautions taken to guard against crime that involves the Internet, especially unauthorized access to computer systems and data connected to the Internet. Cyber security is all about protecting data in its electronic form.

IT Security, is the process of implementing measures and systems designed to securely protect and safeguard information utilizing various forms of technology.  IT security is  considered a bit broader than cyber security.

The Internet of Things (IoT) is a system of physical things embedded with sensors, software, electronics and connectivity to allow it to perform better by exchanging information with other connected devices

The Internet of Overwhelming Things (IoOT) refers to the effects of the Internet of Things (IoT) on the IT world. IoOT is also referred to as Internet of old things

A computer trapdoor, also known as a back door, provides a secret or at least undocumented method of gaining access to an application, operating system or online service.

Spyware, as its name suggests, is designed to spy on what a user is doing. Hiding in the background on a computer.

3G is a collection of third generation cellular data technologies. In order to be labeled “3G,” a cellular data transfer standard must meet a set of specifications defined by the International Telecommunications Union, known as IMT-2000.

4G is a collection of fourth generation cellular data technologies. It succeeds 3G and is also called “IMT-Advanced,” or “International Mobile Telecommunications Advanced.” It became available in the United States in 2009, with Sprint being the first carrier to offer a 4G cellular network.

Alexa is Amazon’s Voice Service, accessed through Amazon Echo. After the set up process, you simply say the word ‘Alexa’ and Echo will light up and Alexa will respond

Alexa Voice Service (AVS) is Amazon’s suite of services built around its voice-controlled AI assistant for the home and other environments

The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information

A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host.

The Internet is essentially the wiring that allows computers all over the world to communicate.

The World Wide Web is a system that operates via this wiring. Web pages are transmitted via Internet connections

Smart mobile devices have image readers that can decode barcodes and QR codes.You can download barcode apps also.

QR code is a type of barcode (D2),which contain more information as compared to Barcode (D1).

RFID stands for “Radio-Frequency Identification.” RFID is a system used to track objects, people, or animals using tags that respond to radio waves.

Barcode is a machine-readable code in the form of numbers and a pattern of parallel lines of varying widths, printed on a commodity and used especially for stock control.

What is Intrusion ?

An adverse event in which an attacker attempts to gain entry into an information system or disrupt its normal operations, almost always with the intent to do harm

What is Sand Box ?

A sandbox is a tightly controlled environment where programs can be run. Sandboxes restrict what a piece of code can do, giving it just as many permissions as it needs without adding additional permissions that could be abused.

What is meant by IDS ?

An intrusion detection system (IDS) is a type of security software designed to automatically alert administrators when someone or something is trying to compromise information system through malicious activities or through security policy violations.

what is computer virus ?

A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions. … It can self-replicate, inserting itself onto other programs or files, infecting them in the process.

What is Computer ?

A computer is a machine or device that performs processes, calculations and operations based on instructions provided by a software or hardware program. It is designed to execute applications and provides a variety of solutions by combining integrated hardware and software components.

Basic components of Computer

 The  five units  (The functional units) correspond to the five basic operations performed by all computer systems and are integral parts of a computer.
Input Unit, Output Unit, Storage Unit, Central Processing Unit (CPU), Arithmetic and Logic Unit (ALU)

What is software ?

Software is a set of instructions or programs instructing a computer to do specific tasks.

What is data mining ?

Data mining is the process of looking at large banks of information to generate new information”

Close Menu