CSS DAILY DOSE

 1. CAM: Computer Aided Manufacturing: also know as computer aided modeling or Computer Aided Machining is the use of software to control th...

Computer Science Important Concepts / Definations.

 1. CAM: Computer Aided Manufacturing: also know as computer aided modeling or Computer Aided Machining is the use of software to control the machine tool and related once in the manufacturing of work piece.


2. MICR: Magnetic Ink Code Reader: The term magnetic ink code reader (MICR) refer to the line of numbers that appears at the button of a check. The MICR line is a group of three numbers, which are check number, account number and bank routing number.


3. UPC: Universal Product Code: is a bar code symbology .


4. BCD: Binary Coded Decimal : is a system of writing numerals thart assign a four-digits binary code to each digit  0 through 9 in a decimal base 10 numeral.  The four-bit BCD code for any particular signals base 10 digits is its representation in binary notation, as follows:

0 - 0000

1= 0001

2=0010 and so on 

5. Object Program:  a program into which another program is translated by an assembler or compiler.


6. A Trojan Horse :  A trojan horse or trojan, is a type of malicious code or software that looks legitimate. but take control of your computer.A Trojan is designed to  damage , disrupt , steal or in general inflict some other harmful  action on your date or Network.

A Trojan acts like a bonafide application of file to trick you 


7. What is De facto Standard in networking? A format, language or protocol that has become a standard not because i has been approved by a standard organization but because it is widely used and recognized by the industry as being standard. some examples of de facto standards include Hayes command set controlling modems, Kemit communication Protocol


8. Keyboard Controller: is a device that interface a keyboard to a computer. its main function is to inform the computer when a key is pressed or released. when data from keyboard arrives, the controller raises an interrupt to allow the CPU to handle the input.


9. Access time: is the time delay or latency between a request to an electronic system, and the access being completed or the requested data returned in a computer. 

DRAM have access time of 50 to 150 nanoseconds (billionth of a second)


10. Token Ring : is a LAN in which all computers are connected in a ring or star topology and pass one or more logical tokens from host to host. only a host that holds the token can send data, and token are released when receipt of the data is confirmed.


11.Ethernet : is a standard communication protocol embedded in software and hardware devices. it is  used for building  a LAN. The LAN is a computer network that interconnect a group of computer and shares the information  through cables or wires.


12. Dot Matrix printer: sometimes called impact matrix printer.




0 coment�rios:

  Important & Selected Computer MCQs for All Competitive Exams (Set-I) 1.  who is the father of Internet : Vint Cerf 2. The first com...

Important & Selected Computer MCQs for All Competitive Exams (Set-I)

 Important & Selected Computer MCQs for All Competitive Exams (Set-I)



1.  who is the father of Internet : Vint Cerf
2. The first computer worm is Creeper.
3. Linux is developed by Linus Torvals.
4. The inventor of the QWERTY keyboard is Cristopher Latham Sholes. 
5. C programming language is created by Dennis Richie
6. who is the founder of IBM: Thomas j. Waston
7.Which tool is used to find a similar word in document? Thesaurus
8. CBT is abbreviation for : Computer Based Training.
9. A virus which it-self replicate and spread across network is called : WORM
10. --------- is a condition created within a database or data storage technology in which the same piece of data is held in two separate place. Data Redundancy.
11. conio.h is abbreviation for : Console input output.
12. ---------- refers to the way data store in a file. File Organization.
13.--------- register stores the result of ALU operations. Accumulator Register.
14. A relation that contains minimal redundancy and allow easy use is called : Well-Structured 
15.--------- refers to the transmission of data in just one direction at a time. Half Duplex.
16. The device which use parallel transmission is called: Printer
17. --------------- is a conceptual and representational model of data used to represent the entity framework infrastructure. ERD.
18. ---------- connecting two different connecting together and providing communication between them. Bridge 
19. DPI is an abbreviation for : Dot per Inch 
20. ---------- may hold an instruction, a storage or any kind of data. Register
21. Which of the following is used to control all the parts of a manufacturing process? CAM - Computer Aided Manufacturing.
22. MICR is an abbreviation for : Magnetic Ink Character reader.
23. --------------- operators are used to evaluate compound conditions.Logical.
24. What is Caps lock. Toggle Key
25. ------------ is the basic unit of programmable color on a computer display or in a computer image. Pixels.
26. Which of the following type is commonly used to read UPC code (Universal Product Code) ?  Bar Code Reader.
27. GPS is an abbreviation for : Global Positioning System.
28. The internet surfing is also know as : Half Duplex 
29. ---------- coding scheme uses 4- bits code : BCD(Binary Coded Decimal) 
30. ------------------ communication medium requires "Line-of-Sight" : Microwave
31. ------------ program is the assembly that compiler generates, which is understandable by your computer. Object Program.
32. A computer software designed to provide a platform to other software is called ? System Software (Eg: OS)
33. The Virus or malicious code that are used to attack mobile platform as well as personal computer is called: Trojan Horse.
34. A modulator is used to for the conversion of : Digital Signals into Analog Signals.
34. Which of the following is a Dot Matrix Printer: Impact Printer.
35. NTFS is an abbreviation for : New Technology File System.
36. CRT is an abbreviation for : Cathode Rays Tube.
37. Which type of reader commonly used to read bank cheques: Magnetic-Ink Reader.
38. The standards were developed without any formal planning is called : De Facto 
39. The computer can move instructions and data between memory and storage as needed, in a process is known as: Swapping.
40. When you press a key, ----------- device notifies  the system software. Keyboard Controller.
41. DOS or Disk Operating System is introduced by: IBM
42. ---------- operating system is based on open source software. Linux
43. --------- includes a brief (short) latency(time delay) period. Access Time.
44.   ----------- is a technique used to protect a computer system from loss of data and other potential losses. Disk mirroring

45. ----------- is the buttom most layer of OSI model. Physical Layer.

46. Instant messaging, video conferencing, webcam, MUDs,MOOs and chat  are example of ?   Synchronous 

47. Which is the important property of fiber optics? Refraction.

48. ------------------ is extracting the original information - bearing  signal from a carrier wave. Demodulation

49. An attributes in database is called: Field 

50. Which Virus is polymorphic Virus. Rudolf 



0 coment�rios: