COMPUTER TERMINOLOGIES
1. CPU (Central Processing Unit)
The CPU, often called the "brain" of the computer, is responsible for executing instructions
from programs. It performs basic arithmetic, logic, control, and input/output operations
specified by the instructions.
2. GPU (Graphics Processing Unit)
The GPU is specialized hardware designed to accelerate graphics rendering. It is commonly
used for rendering images, videos, and animations, and is essential for gaming and
applications like video editing.
3. Protocol
A protocol is a set of rules for transmitting data over a network. It defines how data packets
are formatted, addressed, transmitted, routed, and received.
Examples: HTTP for web browsing, FTP for file transfer, TCP/IP for internet communication.
4. Hard Disk Drive (HDD) and Solid State Drive (SSD)
HDD and SSD are storage devices that store all the data, including the operating system,
applications, and files.
HDD: Uses spinning disks coated with magnetic material to store data. It has a read/write arm
that accesses data by moving to the correct disk sector.
SSD: Uses flash memory to store data, which makes it much faster than HDDs since there are
no moving parts.
5. MULTITASKING, MULTIPROGRAMMING, MULTIPROCESSING
6. Registry
The Windows Registry is a database in Windows that stores configuration settings and options
for the operating system and installed software.
7. Operating system
An Operating System (OS) is system software that manages computer hardware, software
resources, and provides common services for computer programs. It acts as an intermediary
between the user and the hardware, making it easier to run applications and use the
computer's resources efficiently.
8. Kernel
The kernel is the core component of an operating system. It manages system resources, like
CPU, memory, and devices, and provides essential services for all other parts of the OS.
Tasks: Process scheduling, memory management, and I/O operations.
9. Access time
The performance of a hard drive or other storage device - how long it takes to locate a file.
10. ASCII (pronounced ask-key )
American Standard Code for Information Interchange. a commonly used data format for
exchanging information between computers or programs.
11. Clipboard
A portion of memory which temporarily stores information. Called a Copy Buffer in many PC
applications because it is used to hold information which is to be moved, as in word processing
where text is "cut" and then "pasted".
12. Crash
A system malfunction in which the computer stops working and has to be restarted.
13. Cursor
The pointer, usually arrow or cross shaped, which is controlled by the mouse.
14. Wares in Computing
15. IP number
Internet protocol; a computer's unique address or number on the Internet.
16. Bandwidth
Bandwidth refers to the maximum amount of data that can travel a communications path in a
given time, usually measured in seconds.
17. Bit
A bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up
1 byte.
18. CAD
Computer-aided design (CAD) is a type of software that allows users to create 2D and 3D
design and modelling. CAD is used by architects, engineers, artists and other professionals to
create precise technical drawings.
19. Chip
A chip is a microprocessor that performs many functions and calculations that make your
computer run. Your computer's chip is also referred to as the CPU (Central Processing Unit) or
the processor.
20. Cloud computing
Cloud computing refers to the storing and accessing of data and programs over the Internet
instead of on another type of hard drive. Examples of Cloud services include iCloud, Google
Cloud and Dropbox.
21. Gateway
A point within a network that interconnects with other networks.
22. Bug
A software bug is an error, flaw, failure, or fault in a computer program or system produces an
incorrect or unexpected result.
23. Bus
A pathway along which electronic signals travel between the components of a computer
system.
24. Fax
It stands for ‘Facsimile machine’. It is used to transmit a copy of a document electronically.
25. MIPS
An acronym derived from Million of Instruction Per Second (MIPS) It is used to measure the
speed of a processor.
26. Morphing
The transformation of one image into another image.
27. Patch
A patch is a piece of software designed to update a computer program or its supporting data,
to fix or improve it.
28. Piracy
Unauthorized copying of some purchased software.
29. Response time
The time a computer takes to execute a command.
30. Telnet
A protocol that allows a computer to connect with a host computer on the Internet.
IMPORTANT MCQS
1. What is the term for the time it takes for a storage device to locate a file?
A. Boot Time
B. Access Time
C. Response Time
D. Data Retrieval Time
2. What is the name of the application or window that is in the foreground on the monitor?
A. Inactive window
B. Background window
C. Active program
D. Task manager
3. What is an application?
A. A program that controls the hardware
B. A file that the user creates
C. A program in which you do your work
D. A copy of a backup
4. ASCII stands for:
A. American System Code for Internet Interaction
B. Advanced Software Communication Information Interface
C. American Standard Code for Information Interchange
D. ASCII Standard Code Interchange
5. What does "background" refer to in computing?
A. A screen color
B. The desktop wallpaper
C. A program that runs behind the main application
D. A type of storage
6. What is a "bit" in computer language?
A. A storage device
B. A group of eight bytes
C. The smallest piece of information, either 0 or 1
D. A unit of processing power
7. Which term is used to describe starting up a computer?
A. Boot
B. Log in
C. Refresh
D. Load
8. What is the meaning of "bug" in computer terminology?
A. A virus that infects a computer
B. A programming error causing unexpected behavior
C. A type of software update
D. A part of hardware that overheats
9. A "bus" in computing is:
A. A vehicle for data transport
B. An electronic pathway for data transmission
C. A type of computer network
D. A special memory chip
10. What does "CPU" stand for?
A. Central Processing Unit
B. Computer Power Unit
C. Central Power Unit
D. Computer Processing Utility
11. A program that causes a computer system to stop working and requires a restart is called
a:
A. Glitch
B. Crash
C. Freeze
D. Bug
12. The small flashing marker that indicates where your next typing will begin in word
processing is called:
A. Cursor
B. Highlight
C. Caret
D. Insertion point
13. What does the acronym "DOS" stand for?
A. Data Operating System
B. Disk Operating System
C. Digital Output System
D. Desktop Operating Suite
14. "Ethernet" refers to:
A. A type of wireless connection
B. A protocol for fast communication in a network
C. A type of hard disk
D. An expansion slot for peripherals
15. A program that reduces the size of a saved file by eliminating redundancies is called:
A. Compressor
B. Compiler
C. De-fragmenter
D. Optimizer
16. What does RAM stand for?
A. Random-Access Memory
B. Read-Always Memory
C. Rapid Access Module
D. Read and Modify
17. What is a "clipboard" used for in computing?
A. To display error messages
B. To store information temporarily during cut or copy operations
C. To hold backup files
D. To increase system memory
18. Which term is used to refer to a port that allows data to be transmitted in a series, one
after another?
A. Serial port
B. USB port
C. Ethernet port
D. Parallel port
19. What is a "server" in a computer network?
A. A device that displays data
B. A central computer that sends and receives data from other computers
C. A piece of software used to format a disk
D. A type of RAM
20. A "gigabyte" is equal to:
A. 1024 bytes
B. 1024 kilobytes
C. 1024 megabytes
D. 1024 bits
COMPUTER TERMINOLOGIES
31. Blockchain: Block chain is a type of shared database that differs from a
typical database in the way it stores information; blockchains store data in
blocks linked together via cryptography. Different types of information can be
stored on a blockchain, but the most common use has been as a transaction
ledger.
32. Cloud: A common shorthand for a provided cloud computing services (or
even an aggregation of all existing cloud services) is “The Cloud”. The cloud,
simply, refers to software and services that run on the Internet instead of your
computer. Cloud services are computing resources, such as storage, software,
and databases, that are delivered over the internet to customers.
Apple iCloud, Dropbox, Netflix, Amazon Cloud Drive, Flickr, Google Drive,
Microsoft Office 365, Yahoo Mail — those are all cloud services.
33. Database: A collection of information organized so that a computer
application can quickly access selected information; it can be thought of as an
electronic filing system. Traditional databases are organized by fields, records (a
complete set of fields), and files (a collection of records). Alternatively, in a
Hypertext database, any object (e.g., text, a picture, or a film) can be linked to
any other object
34. A denial-of-service (DoS) attack is a cyber-attack that prevents authorized
users from accessing a network or computer. The goal of a DoS attack is to make
a service inaccessible or degrade its performance.
35. Mail server: A networked computer dedicated to supporting electronic mail.
You use a client program like Microsoft Outlook for retrieving new mail from the
server and for composing and sending messages.
36. Phishing: Phishing is a type of social engineering where an attacker sends a
fraudulent message designed to trick a human victim into revealing sensitive
information to the attacker or to deploy malicious software on the victim's
infrastructure like ransomware.
37. USB: Universal Serial Bus; a connector on the back of almost any new
computer that allows you to quickly and easily attach external devices such as
mice, joysticks or flight yokes, printers, scanners, modems, speakers, digital
cameras or webcams, or external storage devices.
38. URL: A uniform resource locator, or URL, is also known as a web address. The
current URL is displayed in your web browser’s address bar.
39. Bitmap :
The file format which is used for Digital pictures format.
40. Buffer :
For storing data on for storing data on a temporary basis which is showing
various factors like printing disk access etc this helps in increasing the speed.
41. Demodulation :
This process is used by a telephone company through which the analogue signal
is used in computer by converting into a digital signal.
Modulation and demodulation are processes that are essential for transferring
information over communication networks:
Modulation
The process of encoding information into a carrier signal for
transmission. Modulation is done on the transmitter side.
Demodulation
The process of recovering the original information from the modulated signal at
the receiver end.
42. Executable File :
This is the exe , a binary file which is used to do work through a computer system
this cannot be opened by a human this is made for understanding things just like
a program.
43. GIF :
Graphical interchange format is a process this is made ready by the campus this
is a format of a picture.
44. HTML :
Hypertext Markup Language which is used for structural and formatting tags
which is used for creating a web page.
45. HTTP :
Hypertext transfer protocol which is used in World Wide Web server.
46. ISP :
The internet service provider is a company which provide you the facility of
internet.
47. ISDN :
ISDN or Integrated Services Digital Network, is a circuit-switched telephone
network system that transmits both data and voice over a digital line. You can
also think of it as a set of communication standards to transmit data, voice, and
signaling.
48. JPEG :
Joint photographic experts group this is the picture format.
49. PDF :
Portable document format this is used by the Adobe through which you can
convert the files into a picture file, this is my mistake anything get disturbed
there will be no no loss or change that will occur on it.
50. Peripheral :
Any external device that is connected to a computer like printer, driver display,
monitor, keyboard, mouse etc.
51. Port :
Slots in the motherboard through which the parts are joined in a computer is
known as port.
52. Botnet:
A botnet is a system of devices that are infected with malware and is controlled
by an attacker.
53. Dark Web:
The dark web is a part of the internet that isn’t accessible to the general public. It
can only be accessed by using special software so that users can remain
anonymous.
54. Data Mining:
Data mining is the process of examining and manipulating data sets to find
patterns and prepare data for deeper analysis.
55. Data Visualization:
Data visualization is the representation of data through visual elements like
charts, plots, info graphics, maps, etc.
56. Encryption:
Encryption is the process of concealing private information by converting digital
information into something that can only be read with a key related to the type
of conversion.
57. Open-source Software:
Open-source software has code that can be modified and seen by anyone. What
developers are allowed to do with it afterward depends on the specific open-
source license that is used.
58. Social Engineering:
Social engineering is the method of gaining the trust of a user so that the
attacker can acquire sensitive information that can be used to access data.
59. Spoofing:
Spoofing is when cybercriminals use deception to appear as another person or
source of information.
60. Troubleshooting:
Troubleshooting is the process of identifying problems with a network through a
rigorous and repeatable process and then solving those problems using testable
methods.
PRACTICE MCQS
1. What is Blockchain?
a) A type of cloud service
b) A collection of connected records secured by cryptography
c) A social engineering technique
d) A method to compress images
2. Which of the following is NOT a cloud service?
a) Google Drive
b) Netflix
c) Microsoft Word installed on a PC
d) Apple iCloud
3. What is a DoS attack intended to do?
a) Speed up website performance
b) Disrupt or block access to a network or service
c) Steal sensitive information
d) Secure networks through encryption
4. What does a mail server do?
a) Sends and receives emails
b) Stores databases of user information
c) Manages cloud storage
d) Hosts phishing attacks
5. What is Phishing?
a) A type of computer programming
b) A form of malware
c) A cyberattack tricking people into revealing sensitive data
d) A method to encrypt information
6. What does USB stand for?
a) Universal Serial Block
b) United Storage Bus
c) Universal Serial Bus
d) User Storage Board
7. Which term refers to the unique address of a web resource?
a) IP Address
b) MAC Address
c) URL
d) ISP
8. What is the purpose of a buffer?
a) To encrypt sensitive data
b) To temporarily store data to improve performance
c) To manage cloud services
d) To prevent malware attacks
9. What does GIF stand for?
a) Graphic Integrated Format
b) Graphical Interchange Format
c) General Internet File
d) Graphic Internet Format
10. What is encryption?
a) A way to visualize data
b) A method to convert digital information into an unreadable format without a
key
c) A tool to prevent phishing attacks
d) A form of cloud storage
11. Which of the following is an example of open-source software?
a) Microsoft Office
b) Adobe Photoshop
c) Linux
d) Netflix
12. What is Social Engineering?
a) Manipulating people to disclose sensitive information
b) Encrypting data to prevent breaches
c) A method for mining cryptocurrency
d) A programming technique for building websites
13. What is the Dark Web?
a) A type of malware
b) A hidden part of the internet accessible with special software
c) A cloud-based service
d) A cybersecurity firewall
14. What is Data Mining?
a) The process of encrypting large datasets
b) Examining data sets to find patterns and prepare for analysis
c) Storing data in the cloud
d) Developing open-source software
15. Which of the following is a Peripheral device?
a) CPU
b) Printer
c) RAM
d) Motherboard
16. When the pointer of a monitor is positioned on a _____, it is shaped like a
hand.
a) Grammatical error
b) Hyperlink
c) Spelling error
d) Formatting error
17. The smallest unit of information a computer can understand and process is
known as a-
a) Digit
b) Byte
c) Bit
d) Megabyte
18. A terabyte represents _________ bytes.
a) 1 million
b) 1 billion
c) 1 kilobyte
d) 1 trillion
19. The peripheral devices of a basic computer system does NOT include the :
a) Printer
b) Keyboard
c) Monitor
d) CPU
20. _________ is a diagrammatic representation of a program logic.
a) Process
b) Data
c) Flowchart
d) Legend
Answers:
b) A collection of connected records secured by cryptography
c) Microsoft Word installed on a PC
b) Disrupt or block access to a network or service
a) Sends and receives emails
c) A cyberattack tricking people into revealing sensitive data
c) Universal Serial Bus
c) URL
b) To temporarily store data to improve performance
b) Graphical Interchange Format
b) A method to convert digital information into an unreadable format
without a key
c) Linux
a) Manipulating people to disclose sensitive information
b) A hidden part of the internet accessible with special software
b) Examining data sets to find patterns and prepare for analysis
b) Printer
b) hyperlink
c) bit
d) 1 trillion
d) CPU
c) flowchart