Computer Abbreviations - Part 1
Computer Abbreviations - Part 1
ACE
ACL
ADO
ADSL
AGP
AI
ALGOL
ALU
ANSI
AOL
API
APIPA
APT
ARD
ARP
ARPA
ARPANET
ASCII
ASF
ASM
ASP
ATAPI
ATM
AUI
AVI
B2B
B2C
BASIC
BCD
BDPS
BHTML
BIOS
BIU
BLOG
BMP
BPS
BS
C DAC
CAD
CADD
CAI
CAM
CAR
CASE
CCIS
CCNA
CD
CD RW
CD WORM
CDMA
CDONTS
CDROM
CFG
CGI
CGM
CIDR
CIM
CISC
CIX
CLR
CMOS
CMS
CMYK
COBOL
COM
CORBA
CPI
CPU
CRC
CRM
CROM
CRT
CUI
DAC
DAO
DARPANET
DAT
DBA
DBMS
DCA
DCL
DCOM
DCP
DDL
DDOS
DDP
DFD
DFS
DHCP
DHTML
DLC
DLL
DMA
DML
DMTF
DNA
DNS
DOD
DOM
DOS
DPI
DRAM
DSL
DSN
DTD
DVD
E
EAROM
EBCDIC
EDC
EDCDIC
EEPROM
EFS
EJB
ENIAC
EPROM
EROM
ERP
EULA
FAT
FDD
FDDI
FDMA
FIFO
FLOPS
FO
FORTRAN
FPS
FRAM
FTP
GB
GIF
GIGO
GML
GNU
GPL
GUI
HDD
HFS
HP
HPC
HPFS
HSR
HTML
HTTP
HW
IO
IBM
IC
ICMP
ICS
ICT
IDE
IE
IGMP
IIS
IL
IOP
IP
IPX
IRAM
IRC
IRDA
IRQ
ISAPI
ISDN
ISO
ISP
ISR
IT
ITPL
JCL
JDBC
JHTML
JPEG
JSP
KB
KBPS
L2TP
LAN
LCD
LDAP
LIFO
LIPS
LOC
LSI
LSP
MAC
MAN
MAU
MB
MBONE
MBPS
MBR
MCP
MCS
MCSA
MCSD
MCSE
MDE
MDI
MDS
MFC
MFT
MG
MICR
MIDI
MIMD
MIME
MIPS
MISD
MODEM
MP3
MPEG
MS
MSDN
MSIIS
MSIL
MSMQ
MSN
MSRAP
MSRPC
MTS
MTU
MUDS
NAS
NASSCOM
NCP
NDIS
NDRO
NETBEUI
NIC
NIIT
NNTP
NOW
NSFNET
NT (WINDOWS)
NTFS
NTP
OCP
OCR
ODBC
OLE
OMR
ONE
OOA
OOAD
OOP
OOPS
OPEN GL
OS
OSI
PC
PCI
PCMCIA
PDA
PDF
PDL
PDU
PHP
PIC
PILOT
PLA
PLC
Microsoft Network
Microsoft Remote Administration Protocol
Microsoft Remote Procedure Call
Microsoft Transaction Server
Maximum Transmission Unit
Multi-User Dungeons
Network Attached Storage
National Association Of Software & Service Companies
Network Control Protocol
Network Driver Interface Specification
Nondestructive Read Out
Netbios Enhanced User Interface
National Informatics Centre,
National Institute Of Information Technology
Network News Transfer Protocol
Network Of Workstations
National Science Foundation Network
New Technology
New Technology File System
Network Time Protocol
Oracle Certified Professional
Optical Character Readers
Open Data Base Connectivity
Object Linking And Embedding
Optical Mark Reader
Open Network Architecture
Object Orient Analysis
Object Oriented Analysis And Design
Object Oriented Programming
Object Oriented Programming System
Open Graphics Library
Operating System
Open System Interconnection
Personal Computer
Peripheral Component Interconnect
Personal Computer Memory Card International
Association
Personal Digital Assistant
Portable Document Format
Page Description Language
Protocol Data Unit
Php Hypertext Processor
Programming Interrupt Control
Programmed Inquiry Learning Or Teaching
Programmable Logic Array
Programmable Logic Controller
PNG
PNP
POP
POST
PPP
PPTP
PROM
PS
PSI
PSN
PSW
QOS
R DAT
RADSL
RAID
RAM
RAMDAC
RAS
RD RAM
RDBMS
RDO
RDP
RFC
RGB
RICS
RIP
RISC
ROM
RPC
RTC
RTF
RTOS
S DAT
SACK
SAM
SAP
SCMP
SCSI
SD RAM
SDD
SDK
SDL
SDN
SDRAM
SDSL
SG RAM
SGML
SIM
SIMD
SISD
SIU
SMP
SMS
SMTP
SNA
SNAP
SNMP
SNOBOL
SOAP
SPX
SQA
SQL
SRAM
SRS
STP
SVVP
SW
TAPI
TB
TCP
TCP-IP
TDI
TDMA
TPM
TSR
UDD
UDP
UI
UML
UNC
UNIX
URL
USB
USRT
UTP
VAN
VAST
VB
VC++
VCD
VDL
VGA
VHS
VLIW
VLSI
VPN
VRAM
VRML
VS
VSNL
VVR
VXD
W3C
WAIS
WAN
WAP
WBEM
WDM
WHQL
WINDOWS ME
WINDOWS NT
WINDOWS XP
WINS
WMI
WML
WORM
WSH
WWW
WYSIWYG
XHTML
XML
XSL
Y2K
ZIF
Input Devices :
o
Keybord : To type the data
o
Mouse : To point and click the objects
o
Tracker Ball : Works similar to mouse, used by Graphic Designers
Input Devices
Printers : There are many types of printers. These are used for
converting the Soft-copy into Hard-copy (Printing the data on Paper)
Plotter : It is also similar to printer, but it can draw continuous pointto-point lines directly from vector graphics files or commands. So you can expect more
clarity than printers.
OutPut Devices
Storage : The Random Access Memory (RAM) or Memory temporarily stores your
date while you are working with that.
o
Storage Devices :
Hard Disk : Internal Drive of High capacity which stores larger and
important files including your Operating System.
Floppy Disk : Its helps you to store smaller amount of data and take
CD/CD ROM :
Capacity 650+MB
DVD :
Computers - Generations
The development of computer technology is generally divided into the following phases :
First Generation (1942 - 1956) - Vacuum Tubes
Vacuum tubes is the only electronic components available during those days.
These computers were the fastest calculating devices of that time. They could perform
calculations in Milli-Seconds but there were many disadvantages in them. They were too big
in size, Not portable, Air-Conditioning was required for their commercial use and
production was also difficult. The UNIVAC (UNIVersal Automic Computer) and ENIAC
(Electronic Numerical Integrator and Computer) are the examples of First Generation
Computers.
UNIVAC was the first Commercial Computer to a business client the U.S.
Census Bureau in 1951 (till then, all computers were for research purpose).
ENIAC was the world's first Operational Electornic Digital COmputer.
Second Generation (1956-1963) - Transistors
The
Transistor,
a
smaller
and
more
r
eliable source than the vacuum tube was invented in 1947 at Bell Labs. This Transistor is a
device made by semiconductor material that amplifies the signal or opens or closes a circuit.
However computer that used transistors was not produced in quantity. The second
generation emerged with transistors being the brain of Computer. It was smaller in size as
compared to first generation computers and more reliable. The disadvantages of it were the
requirement of air-conditional room, frequent maintenance that it required, commercial
production.
A new technology called Integrated Circuit was invented in 1963. This technology made a
big change in Computer world. The third Generation computers were developed by using
this IC technology. In this technology Transistors were miniaturized and placed on Silicon
Chips. These Silicon Chips are also called as Semiconductors. These Semiconductors
helped to increase the speed and efficiency of Computers.
The fifth Generation Computers are based on Artificial Intelligence. Simply Machine Brains.
These systems works with the help of Neural Networks. The target of this is to make
computers which can think like human. Currently there is no computer in the world which
can exibit full artificial intelligence (i mean, to simulate COMPLETE human behavior).
Scientists are stilly working on these type of systems. So, we put them in Fifth Generation.
There is...... If you have enough money, You can hire a person who
knows your language as well as Chinese and he will work as a MEDIATOR for both of you
people.. :)
Now come to our Subjects...... As we know, computer cant understand our Hais and
hellos....
And we too cant understand Computer's 0's and 1's... So how to talk to the computer and
make it works according to your orders?
Can you teach English to computer? Its impossible, because its a machine. It cant
understand anything except LOW VOLTAGE (0) and HIGH VOLTAGE (1)... On and Off in
simple words...
We too are TALLENTED enough to use CTRL+C and CTRL+V so we are not ready to write
big codes which looks like 00011 01001 110100 1001001 01001 11001 11111 0111010 101010
10101011 01111 1101010 11101 1010101 01010 n bla bla........
So what can we do now? we write a Software Code which acts as a TRANSLATOR and
converts your instructions into 0's and 1's and gives them to computer and vice versa.. We
call this SOFTWARE CODE as COMPILER.. Thats it :)
What exactly is the Compiler? is it a for Translating or for Debugging?
Lets go back to our Chinese Man, assume that you are communicating with him with the
help of a Translator. And you have some problem with your TONGUE... (assume)..... So,
what will happn if you use some adjectives like "Poker face and ######## (censored :P) " .
Now say, what if the Mediator translates that POKER FACE stuff as it is in Chinese???
Your relationship with the Chinese man, will collapsed and you will get some injuries if he is
expert in those Chinese martial arts...
So, before going to translate your words in Chinese, your mediator (or Translator) warns
you about the outcomes of your words (may be you will get kicked or killed, depends upon
the intensity of your words :P) and confirms whether to translate them as they are or not...
Heare also same... Some programmer (like me) writes a program with so many errors. If the
compiler translates as it is, the computer may collapse (as it cant hit you for your errors)...
So the compiler warns you about your errors so that you can correct them and resubmit
your program. So, the main task of the compiler is to TRANSLATE, in-order to translate an
Error free program, it warns you about your errors :)
The Technical Definition : So, technically you can say that "The compiler is a software
program which converts the program written in High level language / Programming
Language / User Language into the Machine Language / Binary Language to make an
Executable Program.
the
Basics HERE
3.
4.
5.
6.
The Symbol Table is a Data Structure which is useful to store the identifiers in the
program.
The Error Handler is useful in Detecting and Reporting the errors.
These two are useful from the starting to the ending of the conversion. ( I mean from the
starting phase to the ending phase).
NOTE : We can group these phases into two parts..
Analysis : In which the compiler ANALYZES the given program. For this, the
compiler SCANS and DIVIDES the program into parts. The first THREE phases comes
under this category (shortcut : Check the names, if you can find the terms Analysis or
Analiser, then that phase comes under the ANALYSIS category
Synthesis : In which the compiler JOINS the parts of the divided program and
makes the target program. (The last two phases comes under this category)
Syntax Analysis : Syntax is nothing but the structure. It is nothing but to Analyze the
structure of the program (whether it is correct or not)
Semantic Analysis : In this the compiler checks the MEANING of the program.
(Note : The above two process will execute simultaniously, so in some books they combine
these two names and call the process as Syntax and Semantic Analysis)
Intermediate Code Generation : After scanning the program, the compiler generates an
intermediate code (which is neither High level code nor Low level code, which looks like the
Microprocessor Code)
Note : Most of the compilers generates the TAC (Three Address Code) as the Intermediate
Code. It contains, maximum 3 variable, so we call it as the Three Address Code. (note : we
can convert any problem into this TAC form).
it just look like, Temp1 = Temp2 + Temp3 (temporary variables)
or Temp2 = Id + Temp4 etc,
Code Optimization : It helps to improve the Intermediate Code. It make assure that the
target code will run EFFICIENTLY in LESS TIME ( i mean, it should give the desired output
in less amount of time)
Code Generation : It is the final phase. It generates the relocatable machine code or
assembly code. It takes care about the target machine and where to store the variables in the
target machine. Yea ofcourse, it takes care about the ORDER of the instruction execution
too.
Thats all for now Friends.. Happy Reading..
Shortcut Keys
Description
F2
F5
F7
F11
Create chart.
Ctrl + Shift + ;
Ctrl + ;
Alt + Shift + F1
Shift + F3
Shift + F5
Ctrl + A
Ctrl + B
Ctrl + I
Ctrl + K
Insert link.
Ctrl + U
Ctrl + 5
Ctrl + P
Ctrl + Z
Ctrl + F9
Ctrl + F10
Ctrl + F6
Ctrl + Page up
Ctrl + Tab
Alt + =
Ctrl + '
Insert the value of the above cell into cell currently selected.
Ctrl + Shift + !
Ctrl + Shift + $
Ctrl + Shift + #
Ctrl + Shift + %
Ctrl + Shift + ^
Ctrl + Shift + @
Ctrl + Space
Shift + Space
Description
Ctrl + 0
Ctrl + A
Ctrl + B
Ctrl + C
Ctrl + E
Ctrl + F
Ctrl + I
Ctrl + J
Ctrl + K
Insert link.
Ctrl + L
Ctrl + M
Ctrl + P
Ctrl + R
Ctrl + T
Ctrl + U
Ctrl + V
Ctrl + X
Ctrl + Y
Ctrl + Z
Ctrl + Shift + L
Ctrl + Shift + F
Increase selected font +1pts up to 12pt and then increases font +2pts.
Ctrl + ]
Ctrl + [
Ctrl + / + c
Ctrl + ' +
Insert a character with an accent (grave) mark, where is the character you
want. For example, if you wanted an accented you would use Ctrl + ' + e as
your shortcut key. To reverse the accent mark use the opposite accent mark,
often on the Tilde Key.
Ctrl + Shift + *
Ctrl +
Ctrl +
Ctrl +
Ctrl +
Ctrl + Del
Ctrl + Backspace
Ctrl + End
Ctrl + Home
Ctrl + Spacebar
Ctrl + 1
Single-space lines.
Ctrl + 2
Double-space lines.
Ctrl + 5
1.5-line spacing.
Ctrl + Alt + 1
Ctrl + Alt + 2
Ctrl + Alt + 3
Alt + Ctrl + F2
Ctrl + F1
Ctrl + F2
Ctrl + Shift + F6
F1
Open Help.
F4
F5
F7
F12
Save as.
Shift + F3
Shift + F7
Shift + F12
Save.
Shift + Enter
Shift + Insert
Paste.
Shift + Alt + D
Shift + Alt + T
Insert the current time.
Liked this post? Read more Here>>
Hard Ware : It includes physical connection (using adapter, cable, router, bridge
etc)
These are the larger networks than LANs, these are limited to city or group of Nearby
Offices. Simply we can say that a group of LANs are called a MAN (but guys, this is not a
standard definition, its jst for your understanding purpose).
Now lets have a look at some basic differences between these three...
Area :
o
o
o
o
o
o
Error Rates :
LAN : Lowest
WAN : Highest
MAN : Moderate
o
o
o
Transmission speed :
LAN : High Speed
WAn : Low Speed
MAN : Moderate speed
Cost :
LAN : Uses inexpensive equipment (i mean, if you have two systems, its
hardly costs nothing (almost) to connect them with each other)
o
WAN : Uses most expensive equipment (Connecting systems via internet)
o
MAN : Uses moderately expensive equipment ( Connecting two systems in
different buildings)
Till now we have discussed about the types of Networks. Now we shall discuss about HOW
should we connect them.
Network Topology : A network Topology is the method or process which tells us about
how to connect the Systems.
There are several types of Topologies are there.
Line Topology : If we connect several computers in a line then it is called as the LINE
TOPOLOGY
Treee Topology : If we connect several systems in a hierarchical order, then it is called as
the TREE TOPOLOGY
Bus Topology : If we connect several computers to a back bone (A wire) then it is called as
the BUS TOPOLOGY.
Star Topology : If we connect several computers to a central hub (system) then it is called
as the STAR TOPOLOGY.
Ring Topology : In line topology if we connected the last system to the starting system,
then it is called as the Ring topology.
Mesh Topology : If we connect several systems with each other (There is no necessity that
one system should connect with all the remaining systems in the network, see the diagram)
then it is called as the Mesh Topology.
Fully Connected : In a Network if everysystem is connected with all the remaining
systems then it is called as the Fully Connected topology.
duplication of data (Remember the warning message "The file named XYZ.JPG is already
exist. do you want to replace it???", yea the same thing
Data Independence and Efficient Access : The files stored in Database are
independent of their storage details.And the change in one file doesnt effect the other
(until and unless they related to each other).
Data Integrity : Data Integrity means, that the data values entered in the database
must be checked to ensure that they fall within the correct format and range. Confused?
lets see an example. Suppose I am entering the students details of a School. what is I
entered the age of the student as 55 ??? people will laugh at me. So the value should be
less than 17. And ofcourse, the Data Integrity also checks whether the referring field is
existing or not. I mean, if i want to enter the marks of a person named shivani sharma,
first of all it checks whether the name of that person exists in its database or not...
Data Security : All of us knows about Security. So no need to discuss. We shall
discuss about this in detail later...
Less Application Development Time : With the help of some Predefined
functions like Concurrency control, Crash Recovery etc, DBMS helps us to develop
applications in very less time.
Conflict Resolution : It helps us in resolving the conflicts among various users to
access the same data file
Data Administration : DBMS provides maintenance and administration of data
by providing a common base for the large collection of data being shared by several users.
Concurrent Access : Number of users can access a single file Concurrently (I
mean, at the same time).
Crash Recovery : The DBMS maintains a continuous record for the changes made
to the data, so , if there is any system crash by power failure or something, it can restore
the Database...
11. A computer consists of two or more computers and other devices that are
connected for the purpose of sharing data and programs.
(A) network
(B) system
(C) workstation
(D) device
(E) None of these
Ans : (A)
12. The taskbar is located
(A) on the Start menu
(B) at the bottom of the screen
(C) on the Quick Launch toolbar
(D) at the top of the screen
(E) None of these
Ans : (B)
13. Once information is input into a computer, it becomes
(A) objects
(B) data
(C) ideas
(D) facts
(E) None of these
Ans : (B)
14. Generally, you access the Recycle Bin through an icon located
(A) on the desktop
(B) on the hard drive
(C) on the shortcut menu
(D) in the Properties dialog box
(E) None of these
Ans : (A)
15. Computer programs are written in a high-level programming language; however, the
humanreadable version of a program is called
(A) cache
(B) instruction set
(C) source code
(D) word size
(E) None of these
Ans : (C)
16. The Recycle Bin stores discarded items until
(A) another user logs on
(B) the computer is shut down
(C) the end of the day
(D) you empty it
(E) None of these
Ans : (D)
17. A is a collection of information saved as a unit.
(A) folder
(B) file
(C) path
(D) file extension
(E) None of these
Ans : (B)
18. Input, output, and processing devices grouped together represent a(n)
(A) mobile device
(B) information processing cycle
(C) circuit board
(D) computer system
(E) None of these
Ans : (D)
19. One thousand bytes is a
(A) kilobyte
(B) megabyte
(C) gigabyte
(D) terabyte
(E) None of these
Ans : (E)
20. What part of the computer provides only temporary storage of files ?
(A) ROM memory
(B) RAM memory
(C) Hard drive
(D) Mother board
(E) Processor
Ans : (B)
21. A(n) backup contains a copy of every program, data, and system file on a
computer.
(A) restoration
(B) bootstrap
(C) differential
(D) full
(E) None of these
Ans : (D)
22. Every component of your computer is either
(A) application software or system software
(B) software or CPU/RAM
(C) hardware or software
(D) input devices or output devices
(E) None of these
Ans : (C)
23. A blinking symbol on the screen that shows where the next character will appear
(A) delete key
(B) arrow key
(C) cursor
(D) return key
(E) Esc key
Ans : (C)
24. Being means being familiar enough with computers that you understand their
capabilities and limitations.
(A) computer literate
(B) computer competent
(C) computer savvy
(D) technology literate
(E) None of these
Ans : (A)
25. Which of the following could you do to remove a paragraph from a report you had
written ?
(A) Delete and edit
(B) Copy and paste
(C) Cut and paste
(D) Undo typing
(E) Highlight and delete
Ans : (E)
26. The computer monitor is which type of device ?
(A) Scanning
(B) Input
(C) Processor
(D) Software
(E) Output
Ans : (E)
27. The arrow keys can be used to
(A) delete text
(B) move the cursor in the text that has already been entered