SLC Preparation

This site helps in many sectors of education and tries to provide information on many sectors. And noticed that it may also be helpful for the students for their SLC education. Recently the site contains info about computer science (in IT Zone) and is updating about furthers also. Please keep on visiting.

www.theinfozones.com

IT Tech Terms Collections

  1. Networks of networks.
  2. Physical layout of network.
  3. A card used to connect the computer in network.
  4. Software that detects or removes the computer virus.
  5. The combination of multiple media such as text, images, videos, animation and audio.
  6. A set of rules by which computers communicate with each other over a network.
  7. Number of bits transferred per second over a transmission medium.
  8. A web service which contains answers to the questions commonly asked by many users.
  9. The method of consolidating fragmented files on the computer's hard disk.
  10. The integration of text, graphics, audio, animations, videos etc.
  11. A device that amplifies the incoming signals, creates a new copy of it and transmits the signals on the network.
  12. A wireless technology or line of sight communication that can be used to transmit data between two different networks or computers.
  13. A program that can replicates itself without user's knowledge or permission.
  14. The array or link pattern of computers and other network.
  15. Protocol used to connect computer on internet.
  16. The array or link pattern of computers and other network.
  17. Technique of providing medical information and services through the internet.
  18. A block of data at the end an electronic message that attests the authenticity of the message.
  19. The sharpness of the image on the monitor screen determined by the number of pixels that make up the image.
  20. The device used to connect dissimilar network.
  21. A set of rules by which computers communicate with each other over a network.
  22. Moral rules to be followed bye computer and other professional.
  23. Rules and format to accept and transfer data in computer network.
  24. Making an extra copy of data and software.
  25. A virus that corrupts system files of operating system.
  26. Buying and selling products and services online.
  27. Cabling structure of LAN.
  28. Group of computers that can share resource.
  29. A program that destroys the other program.
  30. An organization offering access to some or all the services available on the internet.
  31. A device which provides continuous power to the computer equipment.
  32. The world wide network of computers.
  33. A device with multiple ports that allow network devices to be connected together.
  34. A worldwide discussion group in which people share information and ideas on a particular area of interest.
  35. A computer program designed to infect executable program files having extension .exe, .com, or . dll.
  36. It is volatile memory of computer.
  37.  A program that can translate assembly language into machine code.
  38. The device that gives continuous power to the computer even at the time of power cut.
  39. The output that can be changed easily.
  40. The combination of analog and digital computer.
  41. A small portable computer that runs on a single main battery or from an AC/DC adapter.
  42. A computer program that allows other programs to interact with computer hardware.
  43. A device that gives soft-output.
  44. Set of codes used in writing program.
  45. A part of computer that stores data and information temporarily.
  46. The main circuit board containing the vital components of a PC.
  47. A highly general or generic term usually referring to the provision of services via the internet.
  48. A technology used to store, communicate and manipulate information.
  49. Early counting device using beads on strings.
  50. The computer which works on the basis of signal produced due to the variation in physical quanties.
  51. The system diagnostic program stored in ROM.
  52. A programming language that uses binary codes.
  53. A software is designed to solve the particular kind of task in the computer.
  54. A printer produce more sound and provides less quality output.
  55. The process of detecting and removing errors in the computer programs.
  56. A collection of related information.
  57. A long narrow socket on the motherboard into which we can plug an expansion card.
  58. The combination of multiple media such as text, images, video, animation and audio.
  59. The main information processor in a digital computer capable of executing a program.
  60. A unit performing mathematical and logical operations.
  61. A peripheral device for producing text, images on paper for present and future use.
  62. A computer capable of solving problems by processing information in discrete form.
  63. A pathway or connection where the electronic impulses travel along within the microprocessor and system unit.
  64. The legal issued adopted by the government to minimize the computer crime.
  65. A medical procedure in which a computer is used to generate a 3-D image of a body part.
  66. A representation of an element in windows desktop.
  67. An electronic device capable of storing electrical energy.
  68. An electronic device that controls the flow of electrons in a vacuum.
  69. A blinking point of light displayed on the screen to help the user in the input data.
  70. The act of entering data and instructions into a computer.
  71. The virus that infect master control program software and delete the file having the extension .exe, .sys, .com.
  72. The nerve centre of the CPU that directs and coordinates the activities of the entire computer.
  73. The smallest unit of information handled by a computer.
  74. A photoelectric scanner that reads the bar codes.
  75. A device is used to make menu selection and draw freehand shapes on a screen.
  76. The connector that passes data in and out of a computer peripheral device.
  77. A device that converts digital signal to analog and vice-versa.
  78. The concentric circles that is divided on the surface of the floppy disk
  79. Binary code were devised by ....
  80. A long-term memory used to store program and data for the future reference.
  81. A network serving a single organization or site that is modeled after the internet.
  82. A measure of machine cycle time; equals one thousandth of second.
  83. Compiler, interpreter and assembler are called .....
  84. It is the computer errors caused due to incorrect input data programs.
  85. A topology in which all the nodes are connected in a single communication line.
  86. It is the online non-commercial interaction between government organization and the government employees.
  87. Linux operating system was developed in ....
  88. It is a small high speed memory located between main memory and microprocessor.
  89. A collection of four bits.
  90. Set of programs, which makes computer work.
  91. A world wide network of networks.
  92. Protocol used by e-mail client to download e-mails from e-mail server.
  93. The program which scans and removes viruses from computer.
  94. The process of loading system files into computer memory.
  95. The secret word that provides software security for the computer users. - password
  96. The process of rearranging files and blank spaces on disk. - disk defragmentation
  97. Keeping the copy of important file and software which can be used if the original one will be damaged - backup
  98. A device with a rechargeable battery used for giving the power backup to computer system in the absence of electricity. - UPS
  99. A program that controls the function of the hardware device. - device driver
  100. A device that connects multiple networks that use the same protocol.
  101. The scattering of the parts of the same file over different location in the disk. - fragmentation
  102. A type of virus that pretends to be a normal useful program. - trojan horse
  103. The process of encoding information in such a way that it is unreadable to all unless it is restored to original form. - encryption
  104. Number of bits that can be transferred per second over a given transmission medium. - bandwidth
  105. The process of restoring encrypted data to its original form. - decryption
  106. A formula used to generate digital signatures. - hash algorithm
  107. Laws related to the internet and cyberspace. - cyber law
  108. The application of IT for the functioning of the government.
  109. A person who breaks and used password of other computer and file illegally. - hacker
  110. A simulation of movement created by displaying a series of images and text with special effects. - animation
  111. An artificial environment created with computer hardware and software. - virtual reality
  112. A hardware device that provide common wiring point in LAN. - HUB
  113. The bulletin board service or public message group service of internet.
  114. Used to instruct as a master. - multimedia
  115. A technology which store text, sound, graphics and other information as digital data.  - multimedia technology
  116. Face-to-face interaction among participating users. - multimedia conferencing
  117. Moving text or image. - animation
  118. A software that can cause malfunction in normal functioning of a computer. - virus
  119. A program equivalent to machine language. - object program
  120. An error caused by missing comma, type mismatching etc. - syntax error
  121. The process of converting coded data into its original data. - decoding
  122. An integration of audio, video, graphics and text. - multimedia technology
  123.  The integration of text, audio, sound and animation.
  124. The moving graphics or images.
  125. The still-frame pictures displayed on screen.
  126. The artificial environment created by computer technology.
  127. A hardware or software that connects two dissimilar networks. - gateway
  128. A device used in network with multiple port. - hub
  129. A device that converts analog signals to digital and vice-versa. - modem
  130. Cable lines or path through which data flows in a specified path. - guided media
  131. The internal interference produced by adjacent pair of twisted pair cables. - noise  
  132. The difference between the highest and lowest frequencies of a transmission channel. - bandwidth
  133. The process of transferring a file from remote computer to the requesting computer. - downloading
  134. The tool that is used to maintain performance and error free file management. - scandisk

Computer Virus Examples:

  • Boot Sector Viruses:
    • C-Brain, Stone, Disk Killer, Danish boot, Devel 941 etc.
  • File Infecting Viruses:
    • Acid rain, Enigma, Nemesis, Cascade, Crazy, Alien .298 etc.
  • Macro Viruses:
    •  DMV, Nuclear, word concept etc.
  • Multipartite Viruses:
    • Invader, Flip, Tequila etc. 
  • Polymorphic Viruses:
    • Chameleon, Cascade, Evil, Phoenix, Proud etc.
  • Stealth Virus:
    • Frodo, Joshi, Whale, The 4096 virus etc. 
  • Parasitic Virus:
    • Jerusalam 

Categories following into:
Boot sector virus, file infecting virus, stealth virus, macro virus, polymorphic virus,
  • friday the 13th, w97m. melissa, stoned, frodo, involuntary

Networking And Internet - Page 6

Q1: The slowest transmission speeds is in:
    • a) fiber optic cable 
    • b) coaxial cable 
    • c) twisted pair cable 
    • d) satellite


Q2: Protocol to fetch the mail from the mail server is ...
    • a) FTP 
    • b) POP 
    • c) SMTP
    • d) ARP


Q3: The topology which has dedicated point to point link to the central hub.
    • a) bus
    • b) star
    • c) ring
    • d) tree


Q4: A wireless network uses .... as its transmission media.
    • a) satellite 
    • b) radio waves
    • c) twisted pair
    • d) frequency wave


Q5: The topology which has circular loop of point to point links.
    • a) ring
    • b) bus
    • c) star
    • d) tree


Q6: WLAN can be set up by using ....
    • a) coaxial cable
    • b) UTP cable 
    • c) bluetooth 
    • d) all of above


Q7: ......... is a mode of communication that transmits data in only one directions.
    • a) hub 
    • b) half duplex 
    • c) simplex 
    • d) repeater


Q8: Which of the following is basic internet protocol?
    • a) HTTP 
    • b) POP 
    • c) TCP/IP
    • d) none


Q9: In which topology network devices are connected through hub?
    • a) ring
    • b) bus
    • c) star
    • d) none


Q10: It is difficult to identify faults and add new component in ... topology.
    • a) ring
    • b) bus
    • c) star
    • d) all


I will Practice Again For Better Reminding or Go To Next Page

Networking And Internet - Page 5

Q1: Internet is an example .....
    • a) CAN 
    • b) LAN
    • c) MAN
    • d) WAN


Q2: Token passing system is used in ..... topology.
    • a) star
    • b) ring
    • c) bus
    • d) all


Q3: Which of the following is not communication device?
    • a) modem 
    • b) CSU/DSU 
    • c) multiplexer 
    • d) microwave


Q4: Which is the connector of coaxial cable?
    • a) RJ-45
    • b) BNC
    • c) ST
    • d) RJ-11


Q5: In which communication media data transfer is high?
    • a) twisted pair
    • b) coaxial cable 
    • c) fiber optics 
    • d) microwave


Q6: Which is a guided media?
    • a) fiber optics
    • b) microwave 
    • c) infrared
    • d) radiowave


Q7: Telephone is example of .....
    • a) WAN
    • b) LAN
    • c) MAN
    • d) IT


Q8: Which of the following protocol is used to fetch Email from mail server to the concerned client?
    • a) POP
    • b) SMTP
    • c) FTP
    • d) TCP


Q9: Which is the network OS?
    • a) Mac OS
    • b) MS DOS 
    • c) LINUX 
    • d) Client


Q10: What type of network is used for large geographical area?
    • a) LAN 
    • b) MAN 
    • c) WAN
    • d) none


I will Practice Again For Better Reminding or Go To Next Page