1. CAM: Computer Aided Manufacturing: also know as computer aided modeling or Computer Aided Machining is the use of software to control the machine tool and related once in the manufacturing of work piece.
2. MICR: Magnetic Ink Code Reader: The term magnetic ink code reader (MICR) refer to the line of numbers that appears at the button of a check. The MICR line is a group of three numbers, which are check number, account number and bank routing number.
3. UPC: Universal Product Code: is a bar code symbology .
4. BCD: Binary Coded Decimal : is a system of writing numerals thart assign a four-digits binary code to each digit 0 through 9 in a decimal base 10 numeral. The four-bit BCD code for any particular signals base 10 digits is its representation in binary notation, as follows:
0 - 0000
1= 0001
2=0010 and so on
5. Object Program: a program into which another program is translated by an assembler or compiler.
6. A Trojan Horse : A trojan horse or trojan, is a type of malicious code or software that looks legitimate. but take control of your computer.A Trojan is designed to damage , disrupt , steal or in general inflict some other harmful action on your date or Network.
A Trojan acts like a bonafide application of file to trick you
7. What is De facto Standard in networking? A format, language or protocol that has become a standard not because i has been approved by a standard organization but because it is widely used and recognized by the industry as being standard. some examples of de facto standards include Hayes command set controlling modems, Kemit communication Protocol
8. Keyboard Controller: is a device that interface a keyboard to a computer. its main function is to inform the computer when a key is pressed or released. when data from keyboard arrives, the controller raises an interrupt to allow the CPU to handle the input.
9. Access time: is the time delay or latency between a request to an electronic system, and the access being completed or the requested data returned in a computer.
DRAM have access time of 50 to 150 nanoseconds (billionth of a second)
10. Token Ring : is a LAN in which all computers are connected in a ring or star topology and pass one or more logical tokens from host to host. only a host that holds the token can send data, and token are released when receipt of the data is confirmed.
11.Ethernet : is a standard communication protocol embedded in software and hardware devices. it is used for building a LAN. The LAN is a computer network that interconnect a group of computer and shares the information through cables or wires.
12. Dot Matrix printer: sometimes called impact matrix printer.

Follow Us
Were this world an endless plain, and by sailing eastward we could for ever reach new distances