Computer Terminology / Computer Glossary in english - IT/ITes-NSQF & GK

Computer Terminology / Computer Glossary in english

Hello all of you are welcome to our website:-

"https://raazranga.blogspot.com".

Today we will get information about "Computer Terminology / Computer Glossary in english" through this post.           

                              I will keep posting more important posts on my Website for all of you. Please give your support and love. 


===============================

There are many technical words in computer and mobile which are very important to know, this terminology is very big. Let us know about some technical terms (Computer Terminology / Computer Glossary) Is:-

1) Address bar:- This is the part of your web browser where you type any web address and search for information.

2) Antivirus:- This is a type of software that protects your computer from Virus. Some of these antivirus are as follows:- Bitdefender Antivirus Plus, Norton AntiVirus Plus, Avira Antivirus Pro, F-Secure Antivirus, Trend Micro Antivirus+ Security, Webroot SecureAnywhere AntiVirus, ESET NOD32 Antivirus, G-Data Antivirus, Quick heal, MaCafee, Panda antivirus etc.

3) Abacus:- Abacus was the first computer that could calculate. Abacus was created by Chinese scientists. In a rectangular frame, wooden tablets were attached to iron rods, which were calculated or calculated by moving up and down. It was the first computer to run without electricity that actually relied on your hands to do this work. They were used centuries before the beginning of the written system. Even today it is used by traders in many places like Asia, Africa etc. Its user is called ginatare.

4) Active cell:- This word is used in Microsoft Excel, which cell is selected with the help of mouse or keyboard and a dark black border is formed around that cell, this cell is called Active cell.

5) Access:- When you legitimately access or open your computer or email address, for which you use a username and password, and in common language, it will be said that you are able to access your account.

6)Acrobat Reader:- Adobe company has developed a file format named .PDF (Portable Document Format). Now Adobe Acrobat Reader designed to read or open this PDF, any type of PDF file can be read and printed in it.

6) Account:- This is a type of membership that you create on any network such as online shopping, online banking, email service or on your personal computer, to create an account, your personal information such as your name, address, your mobile number or even your email ID. may involve.

7) Adobe Photoshop:- Photoshop is the most popular software used for Digital Imaging in the world, it is made by Adobe company.

8) Admin:- It is also called Administrator or superuser. If you have complete control of computer or any network or any social media group, then you are called its admin or administrator.

9) AdSense:- It is known as Google AdSense AdSense provides website and blog owners a way to earn money online from website and blog content.

10) Adware:- It is a type of virus that gets automatically installed in your browser, and displays you unwanted and excessive advertisements all over the webpage.

11) Android:- Android is the world's fastest growing operating system of mobile phones. Which is made by Google and it is completely free. The Android operating system is also popular because of its interesting names. Its first version was released on 23 Sept 2008. Some example of android:- Jelly bean, ice cream sandwich, Android Nougat, Marshmallow, Android Pie, Android Oreo etc. 

12) Application:- All computer and Android programs that are made to do different things are called applications. Popular applications are Microsoft Word, Microsoft PowerPoint, Microsoft Excel, Adobe Photoshop, Google Chrome etc.

13) AdWords:- AdWords is Google's advertising service that works for blogs, YouTubers and other website publishers. In this you can advertise any of your business and website or YouTube channel, for this you need to create an AdWords account.

14) Affiliate Marketing:- E-commerce companies use Affiliate Marketing to attract and promote new customers. For Affiliate Marketing, only common users are used and some commission is given to the users in the benefits that users do Affiliate Marketing are called Affiliates.

15) Antikythera Mechanism:- It was actually an astronomical calculator used in ancient Greece to track solar and lunar eclipses. Antikythera device is about 2000 years old, scientists got this instrument in a dilapidated condition in 1901 from a completely destroyed ship on Antikythera Island. The Antikythera system is credited with being the first known analog computer of the modern era.

16) Airplane mode:- Airplane travel is completely dependent on the instructions sent by Air Traffic Control, signals sent by the radar and the electronic systems of the airplane. These signals are sent in a particular frequency. But mobile networks can damage the aircraft's electronic systems. Mobile networks are completely turned off when the mobile is put on Airplane Mode during air travel. You can do all the other things from the phone like listening to music, playing games, watching videos etc. and enjoy air travel to the fullest without any hassle and boredom.

17) Anonymous Email:- Often sometimes we need to give information by hiding our identity at some place. With the help of Anonymous-email, you can e-mail any person without your email id. Anonymous-email is called that email whose name is not known or even if it is, then it is absolutely Fake.

18) BIOS:- It identifies and configures the RAM, processor, keyboard, mouse, hard drive when the computer is turned on. The full form of BIOS is Basic Input Output System.

19) Booting:- When the computer is started, the CPU (Central Processing Unit) and the BIOS-Basic input output system together scan the computer. The BIOS searches the booting device and starts the Windows. This process is called booting.

20) Binary System:- Our computer system runs on binary calculations because in electronics there are only two states of on or off any signal, in binary number system any number is written through only 2 digits. Those two digits are 0 and 1.

21) Barcode:- Barcode is printed on each item with a combination of thin and dark thick black lines, which are scanned with the help of computers in shops or supermarkets. It gives all kinds of information (name of the item, quantity of the item, its value etc.) about that item. Barcode reader is used to read it.

22) Bad Sector:- The part of the hard disk that is no longer capable of storing data, that is, becomes useless. It is called the Bad Sector. This can be fixed to some extent by scan disk. The bad sector is shown in red color.

23) Beta:- Before launching any new software, its test version is launched. So that his shortcomings can be known. This test version is also called beta version.

24) Bitcoin:- Bitcoin is a virtual currency i.e. Virtual Currency, Cryptography is used for its use and payment. That is why it is also called crypto currency.

25) batch file:- A batch file contains dos commands written in a sequential manner. It is usually written to get the repetitive work done automatically. Instead of having to type the command over and over again. This work can be done by creating a batch file.

26) Bitmap:- Data is kept in the form of 0's and 1's in the computer, it is called bit and when a map of these information is prepared. So it is called Bitmap. In ms paint also we make by default Bitmap image flie.

27) Blog:- A blog is a type of online personal diary, where you can write anything. The term was first used in the US in 1997. Blog in Hindi language is called "Chittha".

28) Bloger:- A person writing a blog is called a blogger or blogger.

29) Blogging:- Blogging is called blogging by the blogger continuously posting articles, audios or videos etc.

30) Blu Ray Disc:- Blu Ray Disc is used to store movies and data after CDs and DVDs. The light used to read it is blue in colour. 200 GB data can be stored on Blu Ray Disc.

31) Bot:- They are also called web robots. This is a set layout of software coding. Bot is an artificially intelligent program. They have been designed for your convenience. These are of many types like chatting bot, shopping bot, advisory bot etc.

32) Bookmarks:- Bookmarks are the links of the website which are saved in your web browser and by clicking on Bookmarks anytime you can go directly to your favorite webpages.

33) Back Space:- By using the Backspace button in the computer keyboard, the left key of the cursor and the character written can be erased. By doing this the cursor moves to the left, erasing the character typed at the end.

34) Chrome:- It is known as Google Chrome. Google Chrome is a fast, secure, and free web browser built for the modern web. It was launched by Google on 2/9/2008. It is the most used web browser.

35) Captcha:- Captcha is a type of challenge test. Captcha's full form Completely Automated Public Turing Test to tell Computers and Humans Apart which can be solved only by humans.

36) Caps Lock: - In the keyboard of mobile and computer, the Caps Lock function is given in the keyboard. On activating it, all the words typed from the keyboard are capitalized i.e. typed in capital letters of English.

37) Cloud Computing:- All types of data like documents, photos, music, videos etc. can be saved on computer as well as on the Internet. In this, documents are saved on google drive or any online server.

38 CGI:- The full meaning of CGI is Computer Graphics Image. This technique is being used in all the films of today. Using CGI, you can create any type of set, which looks exactly like the original.

39) Cache Memory:- Cache Memory, whether of phone or computer, does any work very fast. Actually Cache memory is very small in size but much faster than the main memory of the computer. It is also called memory of CPU.

40) Cookie:- Surfing information used by you is secretly stored by the browser in the form of small text files. These text files are called cookies.

41) Cyber Crime:- It is also called hacking in simple language. With this, cyber criminals steal your personal information by entering your computer network and misuse it.

42) Default:- Default in the language of the computer means to take any software to the setting on which the programmer created it.

43) DNS:- DNS means Domain Name System is called DNS in short. This is the main address or web address of your site like Google's domain name, www.yahoo.com, it has ".com" domain.

44) Download:- If data is received in the computer through the Internet or any other means, then this process is called Download.

45) Data Processing:-  To get information from the stored data by the computer, many actions are performed such as addition, subtraction, counting, division. All these activities are called Data Processing.

46) Data Transfer Rate: - The time taken to transfer data from one device to another is called Data Transfer Rate. It is also called DTR in short. It is measured in KBPS, MBPS, GBPS etc.

47) Emoji:- Cartoon faces or emoji are used on the Internet to express one's feelings. If someone wants to say that I am angry then angry emoji, if you want to tell someone that you are happy then you can use smiling emoji.

48 Emoticon - This is also similar to emoji. Emoticon also express emotion but you can make it directly with the help of keyboard for example like for happy face -:) .

49) Ethernet:- Ethernet is a protocol for creating a local area network (LAN). Ethernet is used for multiple computers to connect to the Internet.

50) Electronic Article Surveillance: - There are new age Anti-thief systems. Such people who steal goods from the library or shopping mall even during the day, saving people's eyes. This technique is for catching those people. It is also called E.A.S. in short.

51) Encryption:- Encryption is a process of sending a message or information in which electronic data is converted into a different format and only the sender and receiver of the information can read it.

52) Facebook:- Facebook is currently the largest social networking website in the world. It was created by Mark Zuckerberg on 4 February 2004. When he used to study in college.

53) File extension:- To identify the computer file, some words i.e. file extension are added behind it. With which we can easily find out what type of file this file is. It is called file extension. For example, the file extension of ms word is -docx.

54) FAT32:- Full meaning of FAT32 is File Allocation Table, it is used to show the type of storage of Hard Disk Drive (HDD).

55) FTP:- File Transfer Protocol is an Internet Protocol, in which files are exchanged between two computers through TCP/IP connections.

56) Gateway:- Gateway is a network made through the Internet that acts as a bridge between two or more computers. By which data can be transferred between them.

57) GPU:- The full meaning of GPU is Graphics Processing Unit. GPU works like a processor inside which graphics calculations are done. The GPU sees all the graphics work in the computer.

58) GIS:- The full meaning of GIS is Geographical Information System. Through this, the geographical figures, terrains, etc. of the earth are presented in digital form.

59) GPS:- GPS stands for Global Positioning System. It is satellite based navigation system which gives real time location.

60) Google Drive - Google Drive is Google's cloud storage service. google drive provides us 15 GB free storage.

61) Google:- Google is currently the largest search engine in the world. Google is used to search anything on the Internet. It is a powerful tool for searching information on the internet.

62) Gigahertz:- Gigahertz refers to the clock speed of the computer's processor that how much data it can calculate in 1 second. Its speed is measured in KHz, MHz, GHz.

63) Hyperlink:- Hyperlink is a link that is attached to a word, image or video and when you click on it, you go to another page which is associated with it.

64) Hub:- Hub is such a hardware device that works to connect many computers to the network simultaneously.

65) HTML:- Full meaning of HTML is Hypertext Markup Language, it is used for designing web pages.

66) HTTP:- Full meaning of HTTP is Hyper Text Transfer Protocol. It is an application protocol used to transfer data over the Internet.

67) Hard Copy:- If you are printing a copy of a document by a printer, then you are actually making a hard copy or a paper copy of it. That is called hard copy.

68) Hardware:- Hardware is the machinery part of the computer such as monitor, keyboard, mouse, UPS etc which can be seen by touching. By combining these machinery parts, the external part of the computer is prepared. All the hardware of the computer is the same.

69) Hard Disk:- All the programs and data of the computer are kept safe in the hard disk. The memory of the hard disk is permanent, so even when the computer is turned off, the protected programs and data in it are not lost. In this, the operating system store of the computer resides.

70) Hibernate:- Hibernate is the process in which you can shutdown the computer without closing or ending all the work being done inside your computer. This option works like the sleep option.

71) Install:- Installing a program on a computer is called Install. We can use any software only after installing it.

72) Index:- Index means to prepare a list of data in the computer. Which can also contain all your files and database entries.

73) Icon:- Icon is a small picture of a program or a folder on the computer. By which that folder or program can be identified and by clicking the program and folder can be opened.

74) Inbox:- The word inbox is associated with email. The place or folder in which you receive incoming emails is called Inbox.

75) ICS:- ICS means Internet Connection Sharing, through this you can share your computer's Internet Connection with other computers in Local Area Network.

76) Interface:- Through interface the user is able to communicate better with the computer. In computer it is called graphical user interface (GUI).

77) Jail Break:- Jail Break is used in iPhone. When you are jailbreaking the iPhone, you have actually broken the default security of the iPhone. You can make any changes you want to the system. Like Android is rooted.

78) Junk File: - Junk File of useless and unusable files lying in the computer. These are also called Temporary files.

79) Jammer:- Jammer is a device which prevents mobile phone from receiving signal from base station. It is also called Phone Jammer.

80) Joomla:- Joomla is also a free platform like blogger. Where you can blog

81) Java (JAVA):- Java is a programming language originally developed by James Gosling of Sun Microsystems and released as a core component of Sun Microsystems' Java platform in 1995.

82) Keyboard shortcuts:- To open a program instead of a mouse or to apply a command, a combination is made by pressing some buttons of the keyboard together, as instead of saving the file with the mouse, you can save with Ctrl + s. This is called keyboard shortcuts.

83) Keylogger:- Keylogger is a Spy Tool. Which is used to record the keyboard. If you type anything from the keyboard, then that too gets recorded.

84) Keywords:- Keywords are the words that you use to search something on the Internet. You type in a search engine like Google or Yahoo and the search engine searches the keywords you type in blogs and websites. So this is the data showing results similar to your keywords.

85) Keystroke:- The number of times you press the keyboard button while typing on the keyboard. That is called a keystroke. In this the space button is also counted. If you typed raazranga, it took a total of 9 keystrokes.

86) Linux:- Linux is an open source ie free operating system. Currently ubuntu is the most popular operating system of Linux.

87) LinkedIn:- LinkedIn is a Business Social Networking Website. Only professional people create accounts here. Here you can search for jobs and build your professional network.

88) Login:- If you already have an account on the Internet. So just enter your account by entering your email address or phone number and password. This process is called login.

89) Log out: - The process of exiting the logged out account is called log out.

90) LAN:- The full meaning of LAN is local area network. It is a type of network that through a local area network the computers of the office, home or school are interconnected by cable or WiFi and can transfer files and share printers etc. without internet.

91) Laser Printer:- Laser printer is used professionally as compared to color printer. It is printed on paper with the help of laser technology. With capacities ranging from 18 pages per minute, the fastest models can print over 200 pages per minute. This is a very advanced technology printer.

92) Laptop:- Laptop is a type of portable computer. It can be easily brought and carried anywhere. It is a small size computer.

93) Mail Merge:- Mail Merge lets you send multiple emails, envelopes and labels with different information to multiple people at once. With which you can easily create a letter for many people by preparing a single word template. And you can send to different people.

94) Mega Pixels:- Pixel is the smallest unit of any screen or photo. Any photo or screen is made up of these pixels. 1 megapixel is made up of 10 lakh pixels, which means there are 10 lakh pixels in 1 megapixel. The more pixels there are, the better the picture will be.

95) Motherboard:- This is the part of the computer that connects your input and output devices, memory and processor. It is a type of printed circuit board. You also know it by the name of mb, mainboard, system board, PCB. It is a main part of the computer.

96) NIC:- The full form of NIC is Network Interface Card, it is also called Ethernet card and network adapter. It is a card that can be connected to the motherboard to connect the computer to the Internet or network with an Ethernet cable.

97) NFC:- The full form of NFC is Near Field Communication. It is a High Frequency Wireless Communication Technology. Which can transfer data between two devices from a short distance i.e. a maximum distance of 10 cm. Near field communication is a standard by which radio communication can be established by touching or bringing smartphones and other devices to each other. Current applications of NFC include contactless transactions, data exchange, and simplifying the setup of complex communications such as Wi-Fi.

98) Northbridge:- It is a part of the motherboard. In fact, the motherboard is divided into two parts, the North bridge and the South Bridge, out of which the work of the North Northbridge is to reach the calculated data and information data of the CPU and CPU to the South Bridge.

99) Optical Scanner:- Optical Scanner is a hardware device that converts any hardcopy, whether it is a photo, print or hand written paper, into digital format by scanning it by light. You can keep it safe in the computer. Nowadays optical scanner is also being used to collect biometric data.

100) OTG Cable:- The full form of USB OTG - On the Go is an OTG compatible device that supports OTG. 

101) Bluetooth:- It is a wireless technology by which two or more electronic devices can exchange voice and data with each other through Bluetooth technology.

Tags:-

process in computer terminology is analogous to,

in computer terminology ocr stands for,

computer terminology,

in computer terminology information means,

what is the meaning of cipher in computer terminology,

in computer terminology a compiler means,

basic computer terminology,

computer terminology,

in computer terminology what is a network,

basic computer terminology,

computer terminology dictionary, 

computer terminology for

dummies,

computer terminology pdf,

computer terminology word search answer key

===============================

Thanks for read my blog|| राज रंगा

===============================

No comments

If you have any doubt, please let me know

भारतीय इतिहास के सभी महान हस्तियों के / All the great personalities of Indian history

 *भारतीय इतिहास के सभी महान हस्तियों के / All the great personalities of Indian history* *1. वल्लभभाई पटेल / Vallabhbhai Patel* 👉 लौह पुरुष...

Powered by Blogger.