Computer SystemSoftware Questions
Computer SystemSoftware Questions
[pic]
• Digital computers are computer are classified into four categories what are they?
Micro Computers, Mainframe Computer and Super Computers
• PC/XT stands for:
Personal Computers Extended Technology
• PC/AT stands for:
Personal Computers Advance Technology
• MIPS is
Million Instructions per Second
• Examples of Mini computer
IBM AS/400/B60, VAX 8842, WIPROGENIUS, WIPRO LANDMARK 860, HP9000 etc.
• In the case of micro computer speed of CPU is:
(1-10MPS)
Speed of CPU in case of mini computer
(20-50 MIPS)
• The program change that makes up the operating system along with associated utility program change, as distinct from an application program is:
System software
• 4GL stands for:
Fourth generation language
• The basics of Internet:
TCP/IP
• A standard protocol that that describes communication between computers, synthesizers and musical instrument:
MIDI
• The main memories have three distinct parts, what are they?
RAM, ROM, Cache
• Language processing means:
Analysis of source program +synthesis phase
• Language processor consists of two phases. What are they?
Analysis phase and synthesis phase
• The process of recognizing the lexical component in a source string is called:
Scanning
• There are two fundamental approaches to parsing. What are they?
Top Down parsing and Bottom Up parsing
• MDT stands for:
Macro Definition Table
• SST stands for:
Sequencing Symbol Table
• ATP stands for:
Actual Parameter Table
• In compiler, which analyzer convert s the source program into a sequence of atomic units called tokens?
Lexical Analyzer
• Identifiers, keywords, constants, operators, and punctuation
Symbols such as commas and parentheses are typical:
Tokens
• The name of device used for user to computer communications, usually the display and keyboard is called:
Consol
• What is CON?
It is the abbreviation for consol
• CAE stands for:
Computer aided engineering
• CADD stands for:
Computer aided drafting and design
• The leading personal computer software company Microsoft Corporation founded in which year?
1975 by Bill Gates & Paul Allen
• What is Microsoft’s first product?
A BASIC Interrupter for the Intel 8080 up
• Windows 3 was released in which year?
March 1990
• POSIX stands for:
Portable Operating System Interface
• PASCAL was developed by:
Niklaus Wirth
COMPUTER GENERAL QUIZ QUESTIONS
[pic]
• COBOL is acronym for:
Common Business Oriented Language
• BASIC is acronym for:
Beginners All Purpose Symbolic Instruction Code
• KB, MB, GB, is respectively:
Kilo Bites Mega Bites Giga Bites
• A set of 8 bits is called:
Bite
• A set of 4 bit is called:
Nibble
• HDD and FDD are respectively:
Hard Disk Drive, Floppy Disk Drive
• Winchester drive is also called:
Hard disk Drive
• The center processing unit of a computer consist 3 units namely:
Arithmetic Logic Unit, Control Unit, Memory Unit
• A program written using binary codes is called:
Machine language
• The computer which has incorporated the characters of analog and digital computers is:
Hybrid computers
• The medium is used by input dives light pen for graphical input is:
CRT screen
• SMPS stands for:
Switch Mode Power Supply
• UPS stands for:
Uninterrupted Power Supply
• The translator program that translates each line of the source program as it run is called:
Interpreter
• The pictorial representation of the procedure proposed to solve a problem by a program:
Flow chart
• ANCII stands for:
American Standard Code for Information Interchange
• ANSI stands for:
American National Standard Institute
• EBCDIC is the acronym for:
Extended Binary Coded Decimal Interchange Code
• ERP packages are:
Enterprise Resource Planning Package
• Example for ERP packages:
SAP, BAN etc..
• Write office automation package of Microsoft:
Ms Office
• The time gap during the failure of a computer system is also called
Down Time
• What is meant by ‘system analyst’?
A person who examine and defines actives, flow and problems to be solved and system and procedures to determine hoe best the necessary operation can accomplished
• Fetch means:
To retrieve data or instructions from storage
• UNIX was developed by:
Bell laboratory s
• What is INTERNET?
Internet is the world's largest computer network, the "network of networks". Scattered all over the world
• When was the INTERNET Created?
It was created thirty six years ago as a project of U.S Department of Defense,
• What Internet service provider (ISP)?
It is the companies that provide INTERNET access.
• What is WWW?
It is the system based hypertext and HTTP for providing organizing and accessing wide verity of resources that are available by the INTERNET.
• What is web page?
It is a unit of information often called a document that is available over the WWW.
• Name the protocol that allows a computer to use the TCP/IP protocol and connected directly to the Net using a standard voice telephone line and high speed modem:
P P P (point-to-point protocol)]
• It is a software program that acts as an interface between the user and WWW what is it?
Web Browser
• Name two different type of Web Browser:
Text-based browser and Graphical Browser
• It collects and organizes resources that are available via the WWW, and designed to provide a starting point for locating information. Name it:
Web Index
• It is an interactive tool that enables to locate information available via Name it:
Search Engine
• It is unique, numeric identifier used to specify a particular host computer on a particular network, and is part of a global , standard’s scheme of identifying machines that are connected with INTERNET Name it:
IP Address (Internet Protocol)
• It is the way of identify and locate computers connected to the INTERNET Name it:
Domain Name
• It provides hierarchical way of identifying and locating INTERNET resources on the WWW Name It:
Uniform Resources Locater (URL)
• A binding document signed by all users that explains the rules of INTERNET use at an institution. Name it:
Acceptable user policy (AUP)
• What is gopher?
It is a protocol designed to search, retrieve and display documents from remote site on the Internet
• It is an Internet search tool that has the capability of searching many databases at one time. Name it:
Wide area information service (WAIS)
• What is FTP (file transfer protocol?)
The medium that allows transferring of files between computers on the net using an FTP program or via Netscape
• What is E-Journal?
It is an electronics publications, typically found in academic circles
• What is NNTP?
Network News Transport Protocol-This is used to distribute network news
• Name the security feature that allows access to information on an individual basis:
Authentication
MIPS is an acronym for:
Millions of instructions per second
The duplicate copy of data/program on a separate storage medium is called:
Back up
A center processor placed on a semi-conductor chip is called as a:
Microprocessor
Who invented the modem?
AT&T Information System, USA
Which is standard internet protocol for distributing E-Mail?
SMTP (Simple Mail Transfer Protocol)
The computer generated environment is called:
Virtual
Who coined the term hypertext in 1965?
Ted Nelson
Which protocol provides basis for the net?
Internet Protocol –IP
What is a kernel module?
Answer A kernel module is a set of code that can be dynamically loaded and unloaded into the Operating System kernel at run-time. Typically, a kernel module is used to encode a device driver to allow the operating system to interact with a new piece of hardware (e.g. your mouse, keyboard, robot, camera etc.).
What is CVS and what is it used for?
Answer CVS, stands for Concurrent Versions System. It is a tool (a set of programs) that maintain a central repository that records the full history of changes to the files stored in the repository. Typically, you would store the code you are working on for a project in a CVS repository. By keeping the full history of changes you can keep track of your work, and also restore (or backup) from a recent change e.g. you introduced a bug.
What is SCP and what is it used for?
Answer SCP, (Secure CoPy), is a copying program that allows you to securely copy files between two different computers that are linked via the internet. It essentially runs a copy program using SSH to get the secure connection.
What is dynamically stable walking, explain and give an example?
Answer Dynamically stability for a walking robot (or animal) means that at some time during its walking cycle its center of gravity, when projected onto the ground, is not located within the support hull of its ground contact points. In simpler english, it means that the robot must actively balance itself to prevent falling. If it were to freeze, it would fall over. Most wheeled robots are statically stable. Humans, and most biped robots and humanoids, are dynamically stable meaning they must continuously control their balance to prevent falling over.
What is grep and what is it used for?
Answer Grep is a program for searching through files for lines that match a given regular expression. For example, if I wanted to find the name Noura in a set of text files I could run grep with: grep Noura my_text_file1.txt text_file2.txt etc.
What is GPS? How does it work?
Answer GPS, or Global Positioning System, is a satellite-based navigation system. GPS works via a system of satellites and receiving devices used to compute positions on the Earth. The basis of GPS is "triangulation" from satellites. To "triangulate," a GPS receiver measures distance using the travel time of radio signals. To measure travel time, GPS needs very accurate timing which it achieves with some tricks. Along with distance, you need to know exactly where the satellites are in space. High orbits and careful monitoring are the secret. Finally you must correct for any delays the signal experiences as it travels through the atmosphere.
What is the name of the wheel configuration/drive mechanism on the MARS rovers? Why did NASA pick this mechanism?
Answer The current Mars rovers use a rocker-bogie suspension system which allows a rover to safely navigate steps and obstacles twice the height of its wheels. NASA's Jet Propulsion Laboratory patented this suspension system. The rocker-bogie suspension joins the three wheels on each side with only two swinging joints, and it connects the whole three-wheeled bogie to the chassis at a single point. The structure has no springs, and the freely rotating joints flex to conform to ground contours and climb obstacles. The rover combines independent drive and individual steering (Ackerman steering) for each wheel.
What is an advantage and a disadvantage of using sonar? (in comparison to other sensors)
Answer Sonar as used in robots, typically consists of sending out a pulse of sound and listening for the echo. By calculating the time from the initial pulse to the return echo, and knowing the speed of sound, it becomes possible to calculate the distance to the target object. Variants on sonar include changing the frequency of the sound wave generated, and using psuedo random pulse sequences and looking for the range that gives the maximum likelihood response.
Advantages of sonar:
• Relatively simple sensor, so low cost with easy electronics
• An active sensor that gives range to nearest surface
• Very good underwater, where nearly every other sensor is not good
Disadvantages:
• Distance estimates can vary a lot and be quite noisy for a number of reasons:
o Speed of sound varies as a function of air pressure and temperature. Ability of sound to travel is also a function of air humidity.
o Reflection strength depends upon the properties of the surface and the incidence angle
o Multiple reflections are possible.
• Cross-talk between multiple sensors is sometimes a problem (they hear one another)
• sensor projects in a cone so it is not a fine resolution sensor.
What was the goal of the NASA mission that sent Spirit and Opportunity to Mars? Did it succeed?
Answer NASA's twin robot geologists, the Mars Exploration Rovers, launched toward Mars on June 10 and July 7, 2003, in search of answers about the history of water on Mars. They landed on Mars January 3 and January 24 PST (January 4 and January 25 UTC). The Mars Exploration Rover mission is part of NASA's Mars Exploration Program, a long-term effort of robotic exploration of the red planet. Primary among the mission's scientific goals is to search for and characterize a wide range of rocks and soils that hold clues to past water activity on Mars. The spacecraft are targeted to sites on opposite sides of Mars that appear to have been affected by liquid water in the past. The mission was considered a success when Opportunity found new evidence of water on Mars.
Who is the current director of the Robotics Institute and what is his/her area of expertise?
Answer The current director of the Robotics Institute is Professor Matthew T. Mason. Matt Mason earned his BS, MS, and PhD degrees in Computer Science and Artificial Intelligence at MIT, finishing his PhD in 1982. Since that time he has been on the faculty at Carnegie Mellon University, where he is presently Professor of Computer Science and Robotics, and Director of the Robotics Institute. His research interests are in robotic manipulation, including manufacturing automation, mobile manipulation, and robotic origami. He is co-author of "Robot Hands and the Mechanics of Manipulation" (MIT Press 1985), co-editor of "Robot Motion: Planning and Control" (MIT Press 1982), and author of "Mechanics of Robotic Manipulation" (MIT Press 2001). He is a winner of the System Development Foundation Prize, a Fellow of the AAAI, and a Fellow of the IEEE.
In Robotics, what does SLAM stand for? What is it used for?
Answer SLAM stands for Simultaneous Localization and Mapping. As indicated by the term, it is used for getting a robot to provide a fully autonomous answer to the question ``Where am I?. It demands that the robot derive a map from its perceptions while moving through the environment and simultaneously determine its own position in that map.
Who was the founding director of the Robotics Institute? What is his/her most recent link to Qatar?
Answer The founding director of the Robotics Institute is Professor Raj Reddy who was recently honored with an endowed professorship from Qatar: the Mozah Bint Nasser University Professor of Computer Science and Robotics.
What are particle filters and Kalman filters most commonly used for in Robotics?
Answer Particle filters and Kalman filters are state estimation filtering techniques. Both of these are use d alot in robotics to estimate the state of a system. For example, we could use them to estimate the location of the robot (this is localization), or where objects are around the robot (tracking). These are probabilistic techniques, and are very good for handling noise, uncertainty, and all of the general limitations found in real sensors. Essentially, instead of just keeping track of the state, the two methods estimate the probability distribution over the state space. Kalman filters use a Gaussian noise assumption, so they only keep track of the mean and variance of the state estimate (as that is all you need for a gaussian). Particle filters are non-parametric and can represent any distribution if you have enough particles. These methods are mostly used for localization, tracking of objects, inferring the behavior of say another robot, and to estimate when things may be broken.
What is a genetic algorithm? How does it work?
Answer Genetic algorithms are a part of evolutionary computing; a popular area of artificial intelligence. Genetic algorithms are inspired by Darwin's theory of evolution. Simply said, problems are solved by an evolutionary process resulting in a best (fittest) solution (survivor) - in other words, the solution is evolved. When using a genetic algorithm we represent a solution to a given problem as a genome (or chromosome). The genetic algorithm then creates a population of solutions and applies genetic operators such as mutation and crossover to evolve the solutions in order to find the best one(s).
Name a robot that Carnegie Mellon University sent to the Antarctic and a robot we sent to the Arctic. What were the missions of these robots? Did they succeed?
Answer Carnegie Mellon University sent the Nomad robot to the Antarctic to perform autonomous search of meteroites, and the Hyperion robot to the Arctic to demonstrate sun-synchronous circumnavigation (i.e. can a solar-powered robot plan and execute a circuitious route that takes into account its energy requirements and the position of the sun and shadows). Both robots succeeded in their missions.
The Robotics Institute has had 4 directors to date. You’ve learned about the founding director and the current director so far. Who were the other two directors and what were their areas of expertise?
Answer The second director of the Robotics Institute was Professor Takeo Kanade and the third director was your own Dean Chuck Thorpe. Dr. Kanade received his Ph.D. in Electrical Engineering from Kyoto University, Japan, in 1974. After being on the faculty at Department of Information Science, Kyoto University, he joined Computer Science Department and Robotics Institute in 1980. He became Associate Professor in 1982, a Full Professor in 1985, the U. A. and Helen Whitaker Professor in 1993, and a University Professor in 1998. He became the Director of the Robotics Institute in 1992. He served as the founding Chairman (1989-93) of the Robotics Ph. D. Program at CMU, probably the first of its kind in the world. Dr. Kanade has worked in multiple areas of robotics, ranging from manipulator, sensor, computer vision, multi-media applications and autonomous robots, with more thatn 200 papers on these topics. He has been the founding editor of International Journal of Computer.
Charles E. “Chuck” Thorpe is the first dean of Carnegie Mellon University in Qatar, and a member of its faculty teaching robotics and advising Ph.D. students. Previously he was the director of Carnegie Mellon University’s Robotics Institute, where he had been a principal research scientist and founding head of its robotics master’s program. Thorpe holds a doctor’s degree from the School of Computer Science and is one of the university’s first alumni to pursue a career in robotics. His advisers were Raj Reddy, founding director of the Robotics Institute, and Hans Moravec, one of the world’s first developers of autonomous mobile robots. In 1984, he wrote his doctoral thesis in vision and path planning. Thorpe’s research has focused on the development of outdoor robotic vehicles, concentrating on computer vision, sensing, planning and architectures for these machines.
Explain the following Linux commands: (1) ls –a (2) chmod +x foo (3) find . –name “*.java”
Answer The founding director of the Robotics Institute is Professor Raj Reddy who was recently honored with an endowed professorship from Qatar: the Mozah Bint Nasser University Professor of Computer Science and Robotics.
You learnt about “ruby” when setting up your computers recently. What is ruby and what is it good for?
Answer Ruby is a pure object-oriented scripting language, developed by Yukihiro Matsumoto in Japan. It was primarily designed to handle text processing and systems management tasks. The Ruby syntax will be familiar to anyone who has written in a scripting language such as Perl or PHP. However, unlike Perl or PHP, which require the use of a semi-colon as a line terminator, Ruby requires no line termination. Some developers may at first find themselves a little confused by this, but it can actually speed up development.
What is “SourceForge” and why is it important?
Answer SourceForge is the world's largest Open Source software development web site, hosting more than 100,000 projects and over 1,000,000 registered users with a centralized resource for managing projects, issues, communications, and code. SourceForge has the largest repository of Open Source code and applications available on the Internet, and hosts more Open Source development products than any other site or network worldwide. SourceForge provides a wide variety of services to projects they host, and to the Open Source community.
Name a robot in each of the following categories: 1 leg, 2 legs, 4 legs, 6 legs, 8 legs
Answer A 1-legged robots: Bow-legged hopper. A 2-legged (biped) robot: SONY Qrio. A 4-legged (quadruped) robot: SONY AIBO. A 6-legged (hexapod) robot: RHex. An 8-legged robot: Dante I (or Dante II).
NETWORK DEVICES:
Repeater:
Also called a regenerator, it is an electronic device that operates only at physical layer. It receives the signal in the network before it becomes weak, regenerates the original bit pattern and puts the refreshed copy back in to the link.
Bridges:
These operate both in the physical and data link layers of LANs of same type. They divide a larger network in to smaller segments. They contain logic that allow them to keep the traffic for each segment separate and thus are repeaters that relay a frame only the side of the segment containing the intended recipent and control congestion.
Routers:
They relay packets among multiple interconnected networks (i.e. LANs of different type). They operate in the physical, data link and network layers. They contain software that enable them to determine which of the several possible paths is the best for a particular transmission.
Gateways:
They relay packets among networks that have different protocols (e.g. between a LAN and a WAN). They accept a packet formatted for one protocol and convert it to a packet formatted for another protocol before forwarding it. They operate in all seven layers of the OSI model.
Switches (L2)
--------
It breaks collasion domain.Uses MAC address to communicate. Faster than bridges.
Router- routtes between differnet network.it take routing decision by refering routing table and therefore it is also called as layer 3 device.
switch-switches within same subnet.it refers mac table for forwarding decions so it is called as a layer 2 device.
All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
2. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A
3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B
4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A
5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C
6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C
7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B
8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A
9. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A
10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D
12. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D
13. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B
14. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B
15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B
16. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C
17. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D
18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D
19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C
20. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B
21. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C
22. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C
23. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A
24. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C
25. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D
26. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Answer: A
27. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Answer: B
28. The ____________, also called the “brains� of the computer, is responsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Answer: D
29. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer: B
30. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Answer: A
31. ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Answer: B
32. System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together.
A. management
B. processing
C. utility
D. application
Answer: D
33. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Answer: A
34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Answer: C
35. Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Answer: A
36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Answer: D
37. ____________ are specially designed computers that perform complex calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Answer: B
38. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Answer: D
39. The difference between people with access to computers and the Internet and those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Answer: A
40. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer: A
41. Which of the following is the correct order of the four major functions of a computer?
A. Process à Output à Input à Storage
B. Input à Outputà Process à Storage
C. Process à Storage à Input à Output
D. Input à Process à Output à Storage
Answer: D
42. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
Answer: A
43. The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1
Answer: B
44. A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Answer: C
45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Answer: B
46. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Answer: C
47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Answer: B
48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Answer: A
49. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Answer: D
50. The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Answer: A
Fill in the Blank:
51. Between PCs and Macs, the ____________ is the platform of choice for graphic design and animation.
Answer: Mac
52. The ____________ is the program that manages the hardware of the computer system, including the CPU, memory, storage devices, and input/output devices.
Answer: operating system
53. The type of operating system software you use depends on your computer’s ____________.
Answer: platform
54. ____________software helps you carry out tasks, such as typing a document or creating a spreadsheet.
Answer: Application
55. ____________are the fastest and most expensive computers.
Answer: Supercomputers
56. A ____________ is approximately 1,000 bytes.
Answer: kilobyte
57. Input devices are used to provide the steps and tasks the computer needs to process data, and these steps and tasks are called ____________.
Answer: instructions
58. A computer gathers data, processes it, outputs the data or information, and ____________ the data or information.
Answer: stores
59. The binary language consists of two digits: ____________ and ____________.
Answer: 0 and 1
60. A string of ____________ 0s and 1s is called a byte.
Answer: eight (8)
61. The devices you use to enter data into a computer system are known as ____________ devices.
Answer: input
62. The devices on a computer system that let you see the processed information are known as ____________ devices.
Answer: output
63. ____________ is the set of computer instructions or programs that enables the hardware to perform different tasks.
Answer: Software
64. When you connect to the ____________, your computer is communicating with a server at your Internet service provider (ISP).
Answer: Internet
65. ____________ are computers that excel at executing many different computer programs at the same time.
Answer: Mainframes
66. ____________is the application of computer systems and techniques to gather legal evidence.
Answer: Computer forensics
67. ____________ is the science that attempts to create machines that will emulate the human thought process.
Answer: Artificial intelligence (AI)
68. Macintosh computers use the Macintosh operating system (Mac OS), whereas PCs generally run ____________ as an operating system.
Answer: Microsoft Windows
69. A process known as ____________ tracks trends and allows retailers to respond to consumer buying patterns.
Answer: data mining
70. Hard disk drives and CD drives are examples of ____________ devices.
Answer: storage
71. You would use ____________ software to create spreadsheets, type documents, and edit photos.
Answer: application
72. ____________ are computers that support hundreds or thousands of users simultaneously.
Answer: Mainframes
73. ____________ is the term given to the act of stealing someone’s identity and ruining their credit rating.
Answer: Identity theft
74. Surgeons are using ____________ to guide robots to perform delicate surgery.
Answer: computers
75. Patient ____________ are life-sized mannequins that have a pulse and a heartbeat and respond to procedures just like humans.
Answer: simulators
True and False
76. Currently, the performance of tasks by robots is based on preprogrammed algorithms.
Answer: True
77. Data can be a number, a word, a picture, or a sound.
Answer: True
78. Strictly defined, a computer is a data processing device.
Answer: True
79. The discrepancy between the “haves� and “have-nots� with regard to computer technology is commonly referred to as the digital society.
Answer: False (digital divide)
80. One of the benefits of becoming computer fluent is being a savvy computer user and consumer and knowing how to avoid viruses, the programs that pose threats to computer security.
Answer: True
81. Trend-spotting programs, developed for business, have been used to predict criminal activity.
Answer: True
82. Employers do not have the right to monitor e-mail and network traffic on employee systems used at work.
Answer: False
83. Clicking on an icon with the mouse is a form of giving an instruction to the computer.
Answer: True
84. Output devices store instructions or data that the CPU processes.
Answer: False (memory)
85. The CPU and memory are located on a special circuit board in the system unit called the motherboard.
Answer: True
86. Nanostructures represent the smallest human-made structures that can be built.
Answer: True
87. The main difference between a supercomputer and a mainframe is that supercomputers are designed to execute a few programs as quickly as possible, whereas mainframes are designed to handle many programs running at the same time (but at a slower pace).
Answer: True
88. Being computer fluent means that you should be able to build a computer yourself.
Answer: False
89. Embedded computers are self-contained computer devices that have their own programming and do not receive input.
Answer: True
90. A Web browser is a special device that is installed in your computer that allows it to communicate with other devices on a network.
Answer: False (network adapter)
91. With a wireless network, it is easier to relocate devices.
Answer: True
92. The most common type of memory that the computer uses to process data is ROM.
Answer: False (RAM)
Why the document you created at home displays with a different font at school?
Because you have a different printer at school than at home Because you have a different monitor at school than at home
font you used at home is not installed on your school computer Because the version of Windows is different
2. Which keyboard shortcut centers selected text?
Ctrl+C Alt+C There is no keyboard shortcut for this operation Ctrl+E
3. What is the default file extension for all Word documents?
TXT WRD FIL DOC
4. Which key moves your cursor from one cell to the next in a table?
Tab Shift Enter Ctrl+Enter
5. How many different documents can you have open at one time?
No more that three Only one As many as your computer memory will hold No more than your Taskbar can display
6. In order to email a Word document from within Word:
Go to File/Send To/Mail Recipient Save the file as an email attachment Start Outlook and attach the file while open in Word. This is an impossible operation
7. Which keystroke will take you at the beginning or the end of a long document?
Ctrl+PageUp and Ctrl+PageDown Shift+Home and Shift+End Ctrl+Home and Ctrl+End The only way is by using the right scroll bar
8. How many margins are on a page?
Two (header and footer) Four (top, bottom, right, left) Two (landscape and Portrait) Two (top and bottom)
9.In order to save a Word document as a web page you need to:
Put the appropriate graphics and links on the document Save the document in simple text format Use your web browser as an editor and save as URL Save as HTML
10. A document in portrait prints:
The same characters per line with the same document in landscape More characters per line than the same document in landscape Less characters per line than the same document in landscape Smaller fonts in order to fit the same amount of characters per line with landscape
1. ------- is associated with web services.
a) WSDL b) WML c) web sphere d) web logic
Ans: a
2.any large single block of data stored in a database, such as a picture or sound file, which does not include record fields, and cannot be directly searched by the database’s search engine.
a) TABLE
b) BLOB
c) VIEW
d) SCHEME
Ans: b
3.A reserved area of the immediate access memory used to increase the running speed of the computer program.
a) session memory
b) bubble memory
c) cache memory
d) shared memory
Ans: c
4.a small subnet that sit between a trusted internal network and an untruster external network, such as the public internet.
a) LAN
b) MAN
c) WAN
d) DMZ
Ans: d
5.technologies that use radio waves to automatically identify people or objects,which is very similar to the barcode identification systems,seen in retail stores everyday.
a) BLUETOOTH
b) RADAR
c) RSA SECURE ID
d) RFID
Ans: d
6.main(){
float fl = 10.5;
double dbl = 10.5
if(fl ==dbl)
printf(“UNITED WE STAND”);
else
printf(“DIVIDE AND RULE”)
}
What is the output?
a) compilation error
b) UNITED WE STAND
c) DIVIDE AND RULE
d) Linkage error.
Ans: c
7.main(){
static int ivar = 5;
printf(“%d”,ivar--);
if(ivar)
main();
}
What is the output?
a)1 2 3 4 5
b) 5 4 3 2 1
c)5
d) Compiler error:main cannot be recursive function.
Ans: b
8.main()
{
extern int iExtern;
iExtern = 20;
printf(“%d”,iExtern);
}
What is the output?
a)2
b) 20
c) compile error
d) linker error
Ans: d
9..#define clrscr() 100
main(){
clrscr();
printf(“%d\n\t”, clrscr());
}
What is the output?
a)100 b)10 c)compiler errord)linkage error
Ans: a
10.main()
{
void vpointer;
char cHar = ‘g’, *cHarpointer = “GOOGLE”;
int j = 40;
vpointer = &cHar;
printf(“%c”,*(char*)vpointer);
vpointer = &j;
printf(“%d”,*(int *)vpointer);
vpointer = cHarpointer;
printf(“%s”,(char*)vpointer +3);
}
What is the output?
a) g40GLE
b) g40GOOGLE
c) g0GLE
d) g4GOO
Ans: a
11.#define FALSE -1
#define TRUE 1
#define NULL 0
main() {
if(NULL)
puts(“NULL”);
else if(FALSE)
puts(“TRUE”);
else
puts(“FALSE”);
}
What is the output?
a) NULL
b) TRUE
c) FALSE
d)0
Ans: b
12.main() {
int i =5,j= 6, z;
printf(“%d”,i+++j);
}
What is the output?
a)13
b)12
c)11
d) Compiler error
Ans: c
13.main() {
int i ;
i = accumulator();
printf(“%d”,i);
}
accumulator(){
_AX =1000
}
What is output?
a)1
b)10
c)100
d)1000
Ans: d
14.main() {
int i =0;
while(+(+i--)!= 0)
i- = i++;
printf(“%d”,i);
}
What is the output?
a) -1
b) 0
c) 1
d) Will go in an infinite loop
Ans: a
15.main(){
int i =3;
for(; i++=0;)
printf((“%d”,i);
}
What is the output?
a) 1
b) 2
c) 1 2 3
d) Compiler error : L value required.
Ans: d
16. main(){
int i = 10, j =20;
j = i ,j?(i,j)?i :j:j;
printf(“%d%d”,i,j);
}
What is the output?
a) 20 20
b) 20 10
c) 10 20
d) 10 10
Ans: d
17.main(){
extern i;
printf(“%d\t”,i);{
int i =20;
printf(“%d\t”,i);
}
}
What is the output?
a) “Extern valueof i “ 20
b) Externvalue of i”
c) 20
d) linker Error: unresolved external symbol i
Ans: d
18.int DIMension(int array[]){
return sizeof(array/sizeof(int);}
main(){
int arr[10];
printf(“Array dimension is %d”,DIMension(arr));
}
What is output?
a) array dimension is 10
b) array dimension is 1
c) array dimension is 2
d) array dimension is 5
Ans: b
19. main(){
void swap();
int x = 45, y = 15;
swap(&x,&y);
printf(“x = %d y=%d”x,y);
}
void swap(int *a, int *b){
*a^=*b, *b^=*a, *a^ = *b;
What is the output?
a) x = 15, y =45
b) x =15, y =15
c) x =45 ,y =15
d) x =45 y = 45
Ans: a
20.main(){
int i =257;
int *iptr =&i;
printf(“%d%d”,*((char*)iptr),*((char *)iptr+1));
}
What is output?
a)1, 257
b)257 1c)0 0d)1 1
Ans: d
21.main(){
int i =300;
char *ptr = &i;
*++ptr=2;
printf(“%d”,i);
}
What is output?
a) 556
b) 300
c) 2
d) 302
Ans: a
22.#include
main(){
char *str =”yahoo”;
char *ptr =str;
char least =127;
while(*ptr++)
least = (*ptr
printf(“%d”,least);
}
What is the output?
a) 0
b)127
c) yahoo
d) y
Ans: a
23.Declare an array of M pointers to functions returing pointers to functions returing pointers to characters.
a) (*ptr[M]()(char*(*)());
b) (char*(*)())(*ptr[M])()
c) (char*(*)(*ptr[M]())(*ptr[M]()
d) (char*(*)(char*()))(*ptr[M])();
24.void main(){
int I =10, j=2;
int *ip = &I ,*jp =&j;
int k = *ip/*jp;
printf(“%d”,k);
}
What is the output?
a) 2
b) 5
c) 10
d) compile error:unexpected end of file in comment started in line 4
Ans: d
25.main(){
char a[4] =”GOOGLE”;
printf(“%s”,a);
}
What is the output?
a) 2
b) GOOGLE
c) compile error: yoo mant initializers
d) linkage error.
Ans: c
26.For 1MB memory, the number of address lines required
a) 12
b) 16
c) 20
d) 32
Ans: 16
27.There is a circuit using 3 nand gates with 2 inputes and 1 output,f ind the output.
a) AND
b) OR
c) XOR
d) NAND
Ans: b (not sure)
28. What is done for push operation
a) SP is incremented and then the value is stored.
b) PC is incremented and then the value is stored.
c) PC is decremented and then the value is stored.
d) SP is decremented and then the value is stored.
Ans: d
29.Memory allocation of variables declared in a program is:
a) Allocated in RAM
b) Allocated in ROM
c) Allocated in stack
d) Assigned in registers.
Ans: c
30.What action is taken when the processer under execution is interrupted by TRAP in 8085MPU?
a) Processor serves the interrupt request after completing the execution of the current instruction.
b) processer serves the interrupt request after completing the current task.
c) processor serves the interrupt immediately.
d) processor serving the interrupt request depent deprnds upon the priority of the current task under execution.
Ans: a
31.purpose of PC (program counter)in a microprocessor is:
a) To store address of TOS(top of stack)
b) To store address of next instructions to be executed
c) count the number of instructions
d) to store the base address of the stack.
Ans: b
32.conditional results after execution of an instruction in a microprocess is stored in
a) register
b) accumulator
c) flag register
d) flag register part of PSW (program status word)
Ans: c
33.The OR gate can be converted to the NAND function by adding----gate(s)to the input of the OR gate.
a) NOT
b) AND
c) NOR
d) XOR
Ans: a
34. In 8051 microcontroller , has a dual function.
a) port 3
b) port 2
c) port 1
d) port 0
Ans: b
35.An 8085 based microprocessor with 2MHz clock frequency,will execute the following chunk of code with how much delay?
MVI B,38H
HAPPY: MVI C, FFH
SADDY: DCR C
JNZ SADDY
DCR B
JNC HAPPY
a) 102.3
b)114.5
c)100.5
d)120
36.In 8085 MPU what will be the status of the flag after the execution of the following chunk of code.
MVI B,FFH
MOV A,B
CMA
HLT
a) S = 1, Z = 0, CY = 1
b) S = 0, Z = 1, CY = 0
c) S = 1, Z = 0, CY = 0
d) S = 1, Z = 1 ,CY = 1
37.A positive going pulse which is always generated when 8085 MPU begins the machine cycle.
a) RD
b) ALE address latch enable…
c) WR
d) HOLD
Ans: b
38.when a ----- instruction of 8085 MPU is fetched , its second and third bytes are placed in the W and Z registers.
a) JMP
b) STA
c) CALL
d) XCHG
Ans: c
39.what is defined as one subdivision of the operation performed in one clock period.
a) T- State
b) Instruction Cycle
c) Machine Cycle
d) All of the above
Ans: a
40.At the end of the following code, what is the status of the flags.
LXI B, AEC4H
MOV A,C
ADD HLT
a) S = 1, CY = 0, P = 0 , AC = 1
b) S =0 , CY = 1, P = 0,AC = 1
c) S = 0, CY = 1, P = 0 , AC = 1
d) S = 0, CY = 1, P = 1 , AC = 1
41.In 8051 micro controller what is the HEX number in the accumulator after the execution of the following code.
MOV A,#0A5H
CLR C
RRC A
RRC A
RL A
RL A
SWAP A
a)A6
b)6A
c)95
d)A5.
Ans: a
42.The Pentium processor requires ------------ volts.
a)9 b)12 c)5 d)24
ans; c
43. The data bus on the Celeron processor is-------bits wide.
a)64 b)32 c)16 d)128. Ans: a
44.K6 processor
a) Hitachi b) toshiba c) zilog d) AMD. Ans: d
45. What is the control word for 8255 PPI,in BSR mode to set bit PC3.
a)0EH b)0FH c)07H d)06H. ans:c
46.The repeated execution of a loop of code while waiting for an event to occur is called ---------.The cpu is not engaged in any real productive activity during this period,and the process doesn’t progress towards completion.
a) dead lock b) busy waiting c) trap door d) none.
Ans: b
47. Transparent DBMS is defined as
a) A DBMS in which there are no program or user access languages. b) A DBMS which has no cross file capabilities but is user friendly and provides user interface management. c) A DBMS which keeps its physical structure hidden from user d) none.
Ans: c
48.Either all actions are carried out or none are. users should not have to worry about the effect of incomplete transctions.DBMS ensures this by undoing the actions of incomplete transctions.this property is known as
a) Aggregation b) atomicity c) association d) data integrity.
ans : B…
49.------ algorithms determines where in available to load a program. common methods are first fit,next fit,best fit.--------- algorithm are used when memory is full , and one process (or part of a process) needs to be swaped out to accommodate a new program.The ------------- algorithm determines which are the partions to be swaped out.
a) placement, placement, replacement
b) replacement, placement, placement
c) replacement, placement, replacement
d) placement, replacement, replacement Ans: D
50.Trap door is a secret undocumented entry point into a program used to grant access without normal methods of access authentication. A trap is a software interrupt,usually the result of an error condition.
a)true b)false.
Ans: A
51. Given a binary search tree,print out the nodes of the tree according t5o post order traversal.
4
/ \
2 5
/ \
1 3
a)3,2,1,5,4. b)1,2,3,4,5. c)1,3,2,5,4. d)5,3,1,2,4. Ans: C
52.which one of the following is the recursive travel technique.
a)depth first search b)preorder c)breadth first search d)none.
53.which of the following needs the requirement to be a binary search tree.
a) 5
/ \
2 7
/
1
b) 5
/ \
6 7
c) 5
/ \
2 7
/\
1 6
d) none.
54.in recursive implementations which of the following is true for saving the state of the steps
a) as full state on the stack
b) as reversible action on the stack
c) both a and b
d) none
55.which of the following involves context switch
a)previliged instruction
b)floating point exception
c)system calls
d)all
e)none
ans : c
56.piggy backing is a technique for
a)acknowledge
b)sequence
c)flow control
d)retransmission
ans:A
57. a functional dependency XY is ___________dependency if removal of any attribute A from X means that the dependency does not hold any more
a)full functional
b) multi valued
c)single valued
d)none
ans : a
58)a relation schema R is in BCNF if it is in ___________and satisfies an additional constraints that for every functional dependency XY,X must be a candidate key
a)1 NF
b)2 NF
c)3 NF
d)5 NF
59) a _________sub query can be easily identified if it contains any references to the parent sub query columns in the _________ clause
A) correlated ,WHERE
b) nested ,SELECT
c) correlated,SELECT
d) none
60) hybrid devise that combines the features of both bridge and router is known as
a)router b)bridge c)hub d)brouter
61) which of the following is the most crucial phase of SDLC
a)testing b)code generation c) analysys and design d)implementation
Ans: c
62)to send a data packet using datagram ,connection will be established
a)no connection is required
b) connection is not established before data transmission
c)before data transmission
d)none
Ans: c
63)a software that allows a personal computer to pretend as as computer terminal is
a) terminal adapter
b)terminal emulation
c)modem
d)none
Ans: b
64) super key is
a) same as primary key
b) primary key and attribute
c) same as foreign key
d) foreign key and attribute
Ans: b
65.In binary search tree which traversal is used for ascending order values
a) Inorder b)preorder c)post order d)none
Ans: a
66.You are creating an index on ROLLNO colume in the STUDENT table.which statement will you use?
a) CREATE INDEX roll_idx ON student, rollno;
b) CREATE INDEX roll_idx FOR student, rollno;
c) CREATE INDEX roll_idx ON student( rollno);
d) CREATE INDEX roll_idx INDEX ON student (rollno);
Ans: c
67.A________class is a class that represents a data structure that stores a number of data objects
a. container ponent c.base d.derived
Ans: a
68.Which one of the following phases belongs to the compiler Back-end.
a. Lexical Analysis b.Syntax Analysis c. Optimization d.Intermediate Representation.
Ans: c
69.Every context _sensitive language is context_free
a. true b.false
Ans: b
70.Input:A is non-empty list of numbers L
Xß-infinity
For each item in the list L,do
If the item>x,then
Xß the item
Return X
X represents:-
a)largest number
b)smallest number
c)smallest negative number
d) none
71.Let A and B be nodes of a heap,such that B is a child of A. the heap must then satisfy the following conditions
a)key(A)>=key(B)
b)key(A)
c)key(A)=key(B)
d)none
72.String ,List,Stack,queue are examples of___________
a)primitive data type
b)simple data type
c)Abstract data type
d)none
Ans: c
73.which of the following is not true for LinkedLists?
a)The simplest kind of linked list is a single linked list ,which has one link per node .this link points to the next node in the list,or to a null value or emptylist if it is the last node.
b)a more sophisticated kind of linked list is a double linkedlist or two way linkedlist .Each node has two links ,one to the previous node and one to the next node.
c) in a circleLinkedList ,the first and last nodes are linked together.this can be done only for double linked list.
d) to traverse a circular linkedlist ,u begin at any node and follow the list in either direction until u return to the original node.
Ans: c
74.sentinel node at the beginning and /or at the end of the linkedlist is not used to store the data
a) true
b) false
Ans:a
1. Do u know abt Recursive functions?? YES. Then write a recursive function to display Fibonacci series.
2. Fibonacci using normal loops and conditional statements.
3. Wat do u mean by scope of variables??
4. Then He gave me a program where one was a global, one was extern and so on and he asked me the o/p.
5. Write an algorithm to add a node to a linked list using pointers:
i) at the start,
ii) at the end,
iii) in the middle.
6. Wat do u mean by Dynamic memory allocation?
7. Wat is the difference between Malloc and Calloc??
8. Syntax for malloc while initializing a node in linked list
9. How do u use malloc to initialize an array?
10.Wat is the difference between C and C++?
11. An array of numbers from 1 to 100. random selection of 99 numbers. write an efficient algorithm to find the unselected number.
12.These and some basic questions based on strings lik strlen, strcmp, concatenating of strings.
13. He gave me a program where an array of size 10 was initialized, a string of size 6 was input and after concatenating another string of size6 wats the o/p?
Computers General knowledge Questions and answers
Where are files and websites on the internet stored?
Ans:The internet is a collection of a large number of client-server based systems. So all files and other resources on it are stored on secondary storage devices of the respective servers. Servers of websites are termed as web servers. So when you type in a URL of a website in the address bar of your browser, it makes a connection to that web server which in turn fetches the data from the secondary storage device (such as the hard disk) that they must be using and returns it to the respective browser. The same holds true for any other resource (image, MP3 file, zipped file, etc.) that you access on the internet.
2 Who invented the QWERTY keyboard?
Ans: QWERTY keyboard (also known as universal keyboard) is used in modern computers. The name QWERTY comes from the first six letters in the top row. It was invented by C L Sholes in 1872.
3 What is the full form of TFT in computer and mobile screens?
Ans: Thin Film Transistor (TFT) is a type of LCD flat-panel display screen. It’s called so because each pixel is controlled by transistors. TFT technology provides the best resolution of all the flat-panel technologies, but it is also the most expensive. TFT displays are usually designed to run at a specific resolution.
4 What does the term ‘screen slave’ mean?
Ans: Screen slaves refers to people who are abnormally addicted to the computer. For example, screen slaves would communicate via e-mail with people sitting right next to them. The screen slave culture, which is particularly rampant in offices the world over, is adding to the sedentary lifestyle of white collar workers, thereby increasing related disorders such as obesity, heart disease and Repetitive Stress Injury.
5 What is a TFT monitor?
Ans: Thin Film Transistor (TFT) Liquid Crystal Display technology does away with the traditional bulky Cathode Ray Tube (CRT). LCDs use a strong backlight as the light source and control how much of this light is allowed to reach the dots (pixels) by selectively allowing the light to reach each pixel. LCDs achieve this by taking advantage of a key property of ‘twisted’ liquid crystal molecules; their ability to naturally block polarised light but then let it through by degrees when a small electric field is applied. LCD cells are accurately controlled and arranged in a flat matrix of rows and columns.
6 What is a ‘firewall’ in computer terminology?
Ans: In computer security, a firewall is a device that blocks unauthorised access to an organisation’s local area network. A firewall can reside on the administrative computer, the server that acts as the LAN’s gateway to the Internet. The firewall keeps track of every file entering or leaving the local area network in order to detect the source of viruses and other problems that might enter the network.
7 What is a handshake in computers?
Ans: Handshake is the process by which two computers initiate communication. A handshake begins when one sends a message to another indicating that it nature of quantum mechanics and space and time. In String Theory, all forces and particles emerge in an elegant geometrical way, realising Einstein’s dream of building everything from the geometry of space-time.
8 What is utility computing?
Ans: Utility computing is a service provisioning model in which a service provider makes computing resources and infrastructure management available to the customer as needed, and charges them for specific usage rather than a flat rate. Like other types of on-demand computing (such as grid computing), the utility model seeks to maximise the efficient use of resources and/ or minimise associated costs.
9 What is the difference between an inverter and a UPS?
Ans: Practically, both are same. An inverter converts DC power supply into AC supply. A UPS (Uninterupted Power Supply) is an electronic device which uses inverter technology in it. UPS uses AC supply when power is there, converts into DC power and stores it. This DC power is converted back to AC supply and provides stand by power when electricity goes off.
10 What is e-waste?
Ans: All obsolete electronic devices such as computers, servers, printers, monitors, TVs, cellphones, calculators, CDs, floppies, chips, processors, motherboard, PCB etc. end up as e-waste. E-waste contains many hazardous substances like PVC, plastics, heavy metals, Brominated Flame Retardants etc.
Computer-Related Abbreviations and Acronyms.
A
A-D Analog to Digital
AA Author's Alteration
AA Auto Answer
AAL5 ATM Adaption Layer 5
ABEND Abnormal End
ABI Application Binary Interface
ABR Available Bit Rate
AC97 Audio Codec 97
ACB Access method Control Block
ACDS Active Control Data Set
ACE Asynchronous Communications Element
ACF Advanced Communication Facility
ACIA Asynchronous Communications Interface Adapter
ACK Acknowledge
ACS Asynchronous Connection Server
ACS Automatic Class Selection
ACSE Application Control Service Element
ACT Application Control Table
ACU Automatic Calling Unit
ADC Analog Digital Converter
ADDMD Administrative Directory Management Domain
ADMD Administrative Management Domain
ADO ActiveX Data Object
ADSL Asymetric Digital Subscriber Line
AEA Activity End Acknowledge
AEI Application Entity Invocation
AF Application Framework
AFP Advanced Function Printing
AGP Accellerated Graphics Port
AGS Advanced Graphics System
AI Artificial Intelligence
AIU Application Interface Unit
AIX Advanced Interactive eXecutive
AIX Alternate IndeX
ALGOL ALGOrithmic Language
ALS Application Layer Structure
ALS Automatic Line Switching
ALT Application Load Table
ALU Arithmetic and Logic Unit
AM Access Method
AMH Automated Material Handling
AMI Alternate Mark Inversion
AMIS Audio Messaging Interchange Specification
AMR Audio Modem Riser
AMS Access Method Services
ANR Automatic Network Routing
ANS Advanced Network Services
ANSI American National Standards Institute
AOCE Apple Open Collaboration Environment
AOW Asian and Oceanic Workshop for open systems
AP Access Point
AP Automation Protocol
APA All Points Addressable
APDU Application Protocol Data Unit
API Application Programming Interface
APIA API Association
APL A Programming Language
APPC Advanced Program-to-Program Communication
APPI Advanced Peer-to-Peer Internetwork(ing)
APPN Advanced Peer-to-Peer Network(ing)
APS Advanced Production System
AR Attention Routine
ARP Address Resolution Protocol
ARPA Advanced Research Projects Agency
ARPANET Advanced Research Projects Agency Network
ARU Audio Response Unit
AS Activity Start
AS Autonomous System
ASC Accredited Standards Committee
ASCII American Standard Code for Information Interchange
ASE Application Service Element
ASIC Application-Specific Integrated Circuit
ASN Abstract Syntax Notation
ASN.1 Abstract Syntax Notation One
ASO Application Service Object
ASP Active Server Pages
ASR Automatic Speech Recognition
ASTs Asynchronous System Traps
AT Advanced Technology
ATM Adobe Type Manager
ATM Asynchronous Transfer Mode
ATM Automatic Teller Machine
ATMP Ascend Tunnel Management Protocol
ATSF Alert Transport Service Facility
AU Access Unit
AVR Automatic Volume Recognition
AWG American Wire Gauge
B
B8ZS Binary Eight Zero Substitution
BABT British Approvals Board for Telecommunications
BAL Business Application Language
BAM Basic Access Methods
BAS Basic Activity Subset
BASH Bourne-Again SHell
BASIC Beginners All-Purpose Symbolic Instruktion Code
BBS Bulletin Board System
BCC Block Check Character
BCD Binary Coded Decimal
BCF Bridge Control Facility
BCPL Basic Combined Programming Language
BCS Basic Catalog Structure
BCS Basic Combined Subset
BDAM Basic Direct Access Method
BDR Basic Density Range
BEL Bell
BER Bit Error Rate
BES Bursty Errored Seconds
BG BackGround
BHT Branch History Table
BIOS Basic Input/Output System
BIS Business Information System
BISYNC Binary Synchronous Communication
BIT Binary Digit
BITNIC Bitnet Network Information Center
BLOB Binary Large Object
BMIC Bus Master Interface Controller
BMP BitMaP
BMS Basic Mapping Support
BNN Boundary Network Node
BOC Bell Operating Companies
BOT Begin Of Tape
BP Base Pointer
BPAM Basic Partitioned Access Method
BPI Bytes Per Inch
BPS Bites Per Second
BRA Basic Rate Access
BRI Basic Rate Interface
BS Backspace / British Standard
BSA Basic Service Area
BSAM Basic Sequential Access Method
BSC Binary Synchronous Communication
BSD Berkeley Software Distribution
BSDS BootStrap Data Set
BSI British Standards Institute
BSS Basic Synchronous Subset
BTAC Branch Target Address Cache
BTAM Basic Teleprocessing Access Method
BTA-ES Basic Teleprocessing Access Method - Extended Storage
BYP Bypass
C
CA Collision Avoidance
CA... Computer Aided ...
CAA Computer Aided Architecture
CAD Computer Aided Design
CADD Computer Aided Design and Drafting
CADIS Computer Aided Design Interactive System
CAE Common Application Environment
CAE Computer Assisted Education, Computer Aided Engineering = CAD +
CAP + CAQ
CAH Computer Aided Handling
CAI Computer Aided Instruction = CIM + CAO
CAISE Computer Aided Integrated Software Engineering
CALS Computer Aided Acquisition and Logistic Support
CAM Computer Aided Manufacturing / Content Adressable Memory
CAMAC Computer Automated MeAsurement Control
CAN Cancel
CAO Computer Aided Office
CAP Computer Aided Planning / Computer Aided Publishing
CAPP Computer Aided Production Planning
CAPPC Computer Aided Production Planning and Control
CAPSC Computer Aided Production Scheduling and Control
CAQ Computer Aided Quality Assurance
CAR Computer Aided Roboting
CAR Computer Assisted Radiology
CAS Computer Aided Selling
CASE Common Application Service Elements
CASE Computer Aided Software-Engineering
CAT Computer Aided Testing
CATV CAble TeleVision
CBDS Connectionless Broadband Data Service
CBEMA Computer and Business Equipment Manufacturers' Association
CBR Constant Bit Rate
CBT Computer Based Training
CCD Charge-Coupled Device
CCETT Centre Commun d'Etudes de Telediffusion et Telecommunications
CCIR International Radio Consultative Committee
CCITT Comite Consultatif International Telegraphique et Telephonique
CCR Committment, Concurrency and Recovery
CCS Common Communication Support
CCTA Central Computer and Telecommunications Agency
CCU Communication Control Unit
CCW Channel Command Word
CD Collision Detection
CD Compact Disk
CDB Command Descriptor Block
CDC Century Date Change
CDDA Compact Disk - Digital Audio
CDDI Copper Data Distribution Interface
CDE Common Desktop Environment
CDG Compact Disk - Graphic
CDI Compact Disk Interactive
CDMA Code Division Multiple Access
CDPD Cellular Digital Packet Data
CDR Copy Density Range
CDROM Compact Disk ROM
CDTV Commodore Total Vision
CDXA Copmact Disk eXtended Architecture
CEC Commission of European Communities
CEFIC Conseil Européen des Federations de l'Industrie Chimique
CELP Code Excited Linear Prediction
CEN Comité Européen de Normalisation
CENELEC Comité Européen de Normalisation Electrotechnique
CEO Comprehensive Electronic Office
CEPT Conference Européenne des Administrations des Postes et
des Telecommunications
CERN Conseil Européen pour la Recherche Nucléaire
CF Call Forwarding
CF Carry Flag
CF Control Function
CFV Call For Votes
CGA Colour Graphics Adapter
CGI Common Gateway Interface
CGI Computer Graphics Interface
CGM Computer Graphics Metafile
CHAP Challenge-Handshake Authentication Protocol
CHL-I CHanneL Interface
CHPID CHannel Path IDentifier
CI Computer Interconnect
CI Control Interval
CIAM Computer Integrated and Automated Manufacturing
CIB Computer Integrated Business
CICS Customer Information Control System
CID Configuration, Installation and Distribution
CIF Cells In Frames
CIF Common Intermediate Format
CIF Computer Integrated Factory = CIO + CIM
CIM Computer Input by Microfilm
CIM Computer Integrated Manufacturing = PPS + CAE + CAM
CIO Computer Integrated Office
CIR Committed Information Rate
CIS Card Information Structure
CISC Complex (Complete) Instruction Set Computer
CIT Computer Integrated Telephony
CIV Conversation Verb Interface
CKD Count Key Data
CL Core Image Library
CL Connectionless
CLI Call Level Interface
CLIM Compaq/Lotus/Intel/Microsoft
CLNS Connectionless Network Service
CM/2 Communication Manager / 2
CMC Communication Management Configuration
CMEA Council for Mutual Economic Assistance
CMIP Common Management Information Protocol
CMIS Common Management Information Service
CMOS Cellular Management Operation System
CMOS Complimentary Metal Oxide Semiconductor
CMOT Common Management Information Protocol (CMOT) Over TCP/IP
CMR Communications Resource Manager
CMS Conversational Monitor System
CMYK Cyan, Magenta, Yellow, Black
CN Corporate Network
CNC Computerized Numerical Control
CNLP Connectionless Network Protocol
CNM Communication Network Management
CNMA Communication Network for Manufacturing Applications
CNR Carrier-to-Noise-Ratio
COBOL COmmon Business Oriented Language
COCOM Coordinating Comittee on Multilateral Export Controls
CODASYL COnference on DAta SYstems Languages
Codec Coder/Decoder
COFF Common Object File Format
COM Common Object Model
COM Computer Output on Microfilm
COMAL COMmon Algorithmic Language
COMREG Communication Region
CONS Connection-Oriented Network Service
CORBA Common Object Request Broker Architecture
COS Corporation for Open Systems
COSE Common Open Software Environment
COSINE Cooperation for OSI Networking in Europe
COSS Cross Operating System Service
CP Control Program
CP-SVR Control Point to Server
CP/M Control Program/Monitor (for Microcomputer)
CPE Customer Premises Equipment
CPI Characters Per Inch
CPI Common Programming Interface
CPI Computer to PABX Interface
CPIC Common Programming Interface for Communications
CPL Current Privilege Level
CPR Computerized Patient Record
CPS Characters Per Second
CPU Central Processing Unit
CR Carriage Return
CR Communication Region
CRC Cyclic Redundancy Check
CRJE Conversational Remote Job Entry
CRS Computer Reservation System
CRS Configuration Report Server
CRT Cathode Ray Tube
CS Communications Server
CSA Common System Area
CSC Cross System Consistency
CSDN Circuit Switched Data Network
CSECT Control Section
CSI Consolidated Software Inventory
CSLIP Compressed SLIP
CSMA/CA Carrier Sense Multiple Access with Collision Avoidance
CSMA/CD Carrier Sense Multiple Access with Collision Detection
CSP Control Sequence Prefix
CSP Cross System Product
CSPDN Circuit Switched Public Data Network
CSS Cascading Style Sheet
CST Computer Supported Telephony
CSU Channel Service Unit
CSU/DSU Channel Service Unit / Data Service Unit
CT Continuous Tone
CT2T Continuous Tone To Tape
CTC Channel To Channel
CTC CICS To CICS
CTS Clear To Send
CTS Conformance Test System
CTS-WAN Conformance Testing Services for WAN
CU Control Unit
CUA Common User Access
CUT Control Unit Terminal
CVOL Control VOLume
CWS Coalition for Working Systems
D
D/A Digital/Analog
DA Desk Accessory
DAC Digital Analog Converter
DAC Dual Attachment Concentrator
DAI Distributed Artificial Intelligence
DAM Direct Access Method
DAP Directory Access Protocol
DAP Document Application Profile
DARPA Defense Advanced Research Projects Agency
DAS Dual Attachment Station
DASD Direct Access Storage Device
DAT Digital Audio Tape
DAT Dynamic Address Translation
DB Database
DBCS Double Byte Character Set
DBMS DataBase Management System
DBRT Directed Beam Refresh Terminal
DC Data Cartridge
DC Data Communication
DCA Document Content Architecture
DCAF Distributed Console Access Facility
DCB Data Control Block
DCB Disk Coprocessor Board
DCC Diskette Controller Chip
DCE Data Circuit terminating Equipment
DCE Data Communications Equipment
DCE Distributed Computing Environment
DCI Display Control Interface
DCL Digital Command Language
DCS Desktop Color Separation
DCT Destination Control Table
DCT Discrete Cosine Transform
DD Data Definition
DDCMP Digital Data Communications Message Protocol
DDCS Distributed Database Connecion Services/2
DDE Dynamic Data Exchange
DDES Digital Data Exchange Specifications
DDI Device Driver Interface
DDK Driver Development Kit
DDL Data Definition Language
DDL Document Description Language
DDM Distributed Data Management
DDN Defense Data Network
DDP Distributed Data Processing
DDRM Device driver interface/Driver kernel interface
Reference Manual
DDS Dataphone Digital Service
DDS Decision Support System
DECT Digital European Cordless Telephone
DECUS Digital Equipment Computer Users Society
DEL Delete
DES Data Encryption Standard
DF Direction Flag
DFC Distributed Coordination Function
DFDSS Data Facility Data Set Services
DFHSM Data Facility Hierarchical Storage Manager
DFP Data Facility Product
DFR Document Filing and Retrival
DFS Distributed File System
DFSMS Data Facility Storage Management Subsystem
DFSORT Data Facility Sort
DFT Distributed Function Terminal
DFWMAC Distributed Foundation Wireless Media Access Control
DHCP Dynamic Host Configuration Protocol
DHTML Dynamic HTML
DIA Document Interchange Architecture
DIB Data Input Bus
DIB Device Independent Bitmap
DIFS Distributed coordination function InterFrame Space
DIMM Dual Inline Memory Module
DIP Dual Inline Package
DIS Draft International Standard
DISSOS Distributed Office Support System
DIT Directory Information Tree
DKI Driver Kernel Interface
DL Data Length
DL Directory Listing
DL/1 Data Language 1
DLBL Disk Label
DLCI Data Linc Connection Identifier
DLE Data Link Escape
DLL Dynamic Link Library
DLS Device Level Selection
DLSE Device Level Selection Enhanced
DLSw Data Link Switching
DLUR Dependent LU Requester
DLUR/S Dependent LU Requester / Server
DLUS Dependent LU Server
DMA Direct Memory Access
DMCI Direct Memory Communications Interface
DMD Directory Management Domain
DMI Digital Multiplexed Interface
DML Data(base) Manipulation Language
DMNL Direct Multi Network Link
DMP Dot Matrix Printer
DN Distinguished Name
DNA Digital Network Architecture
DNS Domain Name Service
DOC Display Operator Console
DOE Distributed Objects Everywhere
DOMF Distributed Object Management Facility
DOS Declaration Of Support
DOS Disk Operating System
DOS/VS Disk Operating System / Virtual Storage
DOS/VSE Disk Operating System / Virtual Storage Extended
DP Data Processing
DP Draft Proposal
DPA Document Printing Application
DPF Data Private Facility
DPI Dots Per Inch
DPL Descriptor Privilege Level
DPMS Display Power Management Signaling
DPS Dynamic Path Selection
DQDB Distributed Queue Dual Bus
DRAM Dynamic Random Access Memory
DRQ Data ReQuest
DS Digit Select
DS Directory System
DSA Directory System Agent
DSA Distributed Systems Architecture
DSA Dynamic Storage Area
DSF Device Support Facility
DSL Direct Swift Link
DSN DataSetName
DSN Distributed Systems Network
DSNL Direct Swift Network Link
DSOM Distributed System Object Model
DSP Digital Signal Processor
DSP Directory System Protocol
DSR Data Set Ready
DSSI Digital Storage Systems Interconnect
DSU Data Service Unit
DTAM Document Transfer, Access and Manipulation
DTD Document Type Definition
DTE Data Terminal Equipment
DTI Department of Trade and Industry (UK)
DTP DeskTop Publishing
DTR Data Terminal Ready
DU Data Unit
DUA Directory User Agent
DUN Dispatch Unit Number
DVI Digital Video Interface
DVST Direct View Bistable Storage
DXI Data eXchange Interface
E
E1 2,048 Mbps
E3 34 Mbps
EARN European Academic and Research Network
EB Error Bell
EB ExaByte (1,152,921,504,606846,976 bytes)
EBAM Electronic Beam-Addressable Memory
EBCD Extended Binary Coded Decimal
EBCDIC Extended Binary Coded Decimal Interchange Code
ECC Error Checking and Correction
ECC Error Correction Code
ECE Economic Commission for Europe
ECF Enhanced Connectivity Facility
ECITC European Committee fo IT Testing and Certification
ECKD Extended Count-Key Data
ECMA European Computer Manufacturers Association
ECTUA European Counsil for Telecommunications Users Association
EDC Enterprise Database Connectivity
EDF Execution Diagnostic Facility
EDG Electronic Dot Generation
EDI Electronic Data Interchange
EDICON EDI Community for the Construction Industry (UK)
EDIF Electronic Design Interchange Format
EDIFACT Electronic Data Interchange For Administration, Commerce and
Transport
EDIM Electronic Data Interchange Message
EDIMS EDI Messaging System
EDM Engineering Data Management
EDP Electronic Data Processing
EDR Early Device Release
EEMA European Electronic Mail Association
EFT Electronic Funds Transfer
EGA Enhanced Graphics Adapter
EGP Exterior Gateway Protocol
EHLLAPI Emulator High Level Language Applications Programming Interface
EIB Execute Interface Block
EIP Execute Interface Program
EISA Extended Industry Standard Architecture
EIT Encoding Information Type
EIUF European ISDN User Forum
ELAN European LAN
ELAN Extended LAN
ELAN Emulated LAN
EM End of Medium
EMA Enterprise Management Architecture
EMS Expanded Memory Specification
EMUG European MAP Users Group
EN European Norme
ENE Enterprise Network Event
ENP Enable Presentation
ENQ Enquiry
EO Eight Ones
EOB End of Block
EOC End of Cylinder
EOF End of File
EOJ End of Job
EOP End of Procedure
EOT End of Transmission
EOV End of Volume
EP Emulation Program
EPDE Electronic Product Data Exchange
EPOW Emergency Power Off Warning
EPROM Eraseable Programable Read Only Memory
EPS Encapsulated PostScript
EPSF Encapsulated PostScript Format
ER Entity Relationship
ERDS Error Recording Data Set
EREP Environmental Record Editing and Printing program
ES Errored Second
ESA Extended Service Area
ESC Escape
ESCON Enterprise System Connection Architecture
ESD Electronic Software Distribution
ESD External Symbol Dictionary
ESDI Enhanced Small Device Interface
ESDS Entry Sequenced Data Set
ESF Extended SuperFrame
ESPRIT European Strategic Programme for Research and development in
Information Technology
ESQA Extended System Queue Area
ETB End of Transmission Block
ETCOM European Testing and Certification for Office and
Manufacturing protocols
ETS European Telecommunication Standard
ETSI European Telecommunication Standards Institute
ETX End of Text
EUnet European Unix Network
EUUG European Unix User Group
EVI EVent Information
EWOS European Workshop for Open Systems
EXCP EXecute Channel Program
EZ Excessive Zeros
F
F/STP Foil STP
FA Foreign Agent
FAQ Frequently Asked Questions
FAST Federation Against Software Theft
FAT File Allocation Table
FBA Fix Block Architecture
FBA Fixed Blocked ANSI-defined printer control characters
FBM Fix Block Modus
FC File Control
FCB Format Control Buffer
FCP File Control Program
FCS Frame-Check Sequence
FCT File Control Table
FDD Fixed Disk Drive
FDDI Fiber Distributed Data Interface
FEAL Fast Data Encipherment Algorithm
FEP Front-End Processor
FF Formfeed
FH Frame Handler
FIFO First In, First Out
FIPS Federal Information Processing Standard
FLOPS Floating-point operations per second
FMLI Forms and Menu Language Interpreter
FOB Form Overlay Buffer
FOND Font family descriptor
FORTRAN FORmula TRANslator
FPU Floating Point Unit
FRAD Frame Relay Access Device
FROM Factory ROM
FRU Field Replaceable Unit
FS Field Separator
FS File Separator
FSB Front Side Bus
FSF Free Software Foundation
FSK Frequency Shift Keying
FT Fault Tolerant
FTAM File Transfer and Access Method
FTP File Transfer Protocol
FTP Foil Twisted Pair
FTTC Fibre To The Curb
FTTH Fibre To The Home
FTTP Fibre To The Building
FUP Funktionsplan
G
GAL Global Address List
GATF Graphic Arts Technical Foundation
GB GigaByte (1,073,741,824 bytes)
GCR Group Coded Recording
GDG Generation Data Group
GDS Global Directory Service
GDT Global Descriptor Table
GDTR Global Descriptor Table Register
GE Graphic Escape
GETVIS GET VIrtual Storage
GID Group ID
GIF Graphics Interchange Format
GIS Generalized Information System
GIX Global Internet Exchange
GKS Graphical Kernel System
GML Generalized Markup Language
GOSIP Government OSI Profile
GP General Protection
GPIB General-Purpose Interface Bus
GRS Global Resource Serialization
GS Group Separator
GTF Generalized Trace Facility
GUI Graphical User Interface
GUIP Graphical User Interface for Blind people
GUUG German Unix User Group
H
H&J Hyphenation and Justification
HA Home Address
HA Host Agent
HADA High Availability Disk Array
HCL Hue, Chroma, and Luminance
HDA Head-Disk Assembl
HDBV Host Data Base View
HDLC High Level Data Link Communications
HDSL High-bit rate Digital Subscriber Loop
HDTV High Definition TV
HE High End (system)
HGC Hercules Graphics Card
HIC Host Interface Computer
HLL High Level Language
HLS Hue-Lightness-Saturation
HMD Head-Mounted Display
HMMP HyperMedia Management Protocol
HMMS HyperMedia Management Schema
HPCL Hewlett-Packard Control Language
HPFS High Performance File System
HPGL Hewlett-Packard Graphical Language
HPR High Performance Routing
HR Horizontal Rule
HSB Hue-saturation-brightness
HSELAN High Speed ELAN
HSI Hue-Saturation-Intensity
HSLAN High Speed LAN
HSSI High Speed Serial Interface
HSV Hue-Saturation-Value
HT Horizontal Tab
HTML Hypertext Markup Language
HTTP Hypertext Transfer Protocol
Hz Hertz
I
I-Net Intranet
I/O Input/Output
I/O Input/Output
IA5 International Alphabet Five
IAB Internet Activities Board
IC Integrated Circuit
ICEM Integrated Computer Engineering and Manufacturing
ICMP Internet Control Message Protocol
ID Identifier
IDA Indirect Data Addressing
IDA Intelligent Drive Array
IDE Integrated Drive Electronics
IDEA International Data Encryption Algorithm
IDL Interfacce Definition Language
IDT Interrupt Descriptor Table
IEC InterExchange Carrier
IEEE Institute of Electrical and Electronic Engineers
IETF Internet Engineering Task Force
IF Interrupt Flag
IFF Interchange File Format
IFIP International Federation of Information Processing
IFS Interchange File Separator
IFS InterFrame Space
IGES Initial Graphics Exchange Specification
IGMP Internet Group Membership Protocol
IGS Interchange Group Separator
II Interactive Interface
IISP Interim Interswitch Signaling Protocol
IKT Informatione- und Kommunikationstechnik
ILC InterLanguage Communication
IML Initial Microcode Load
IMPL Initial Microprogram Load
IMR Interrupt Mask Registers
IMS Information Management System
IMS/VS Information Management System / Virtual Storage
INP Inhibit Presentation
INT INTerrupt
IOC ISDN Ordering Code
IOCP Input/Output Configuration Program
IOCS Input/Output Control System
IOGEN Input/Output device GENeration
IOPL Input/Output Privilege Level
IOS Input/Output Supervisor
IP Internet Protocol
IPL Initial Program Load
IPM InterPersonal Message
IPSE Integrated Project Support Environment
IPX Internet Packet Exchange
IR Index Return
IRC Internet Relay Chat
IRDS Information Resource Dictionary System
IRQ Interrupt ReQuest
IRS Interchange Recors Separator
IS Information System
IS Intermediate System
IS International Standard
ISA Industry Standard Architecture
ISAM Indexed Sequential Access Method
ISDN Integrated Services Digital Network
ISFMS Indexed Sequential File Management System
ISMF Interactive Storage Management Facility
ISO International Standardization Organisation
ISO IEC ISO International Electrotechnical Commitee
ISODE ISO Development Environment
ISP Internet Service Provider
ISPF Interactive System Produvtivity Facility
ISPF/PDF ISPF Program Development Facility
ISR Information Storage and Retrieval
ISR Intermediate Session Routing
ISSE Intel SIMD Sreaming Extension
ISV Independent Software Vendor
IT Indent Tab
ITB Intermediate Transmission Block
ITLD International Top-Level Domain
ITRC Information Technology Requirements Council
ITU International Comunication Union (ehem. CCITT)
ITV Interactive TeleVision
IUS Interchange Unit Separator
IWS Intelligent WorkStation
J
JCC Job Control Command
JCL Job Control Language
JCS Job Control Statement
JCT JES Control Table
JCT Journal Control Table
JECL Job Entry Control Language
JEIDA Japan Electronics Industry Development Association
JES Job Entry Subsystem
JPEG Joint Photographic Experts Group
K
K Kilobyte
KB KiloByte (1,024 Bytes)
KBPS KiloBits Per Second
kHz KiloHertz
KIP Kinetics Internet Protocol
KIPS Kilo Instructions per second
KL Key Length
KOPS Kilo Operations per second
KSDS Key Sequenced Data Set
KVA KiloVolt Ampere
L
L2F Layer 2 Forwarding
L2TP Layer 2 Tunneling Protocol
LAN Local Area Network
LAPS LAN Adapter Protocol Support Program
LBL Label
LCD Liquid Crystal Display
LCS Lotus Communication Server
LDAP Lightweight Directory Access Protocol
LDMF Librarian Disc Master File
LDS Linear Data Set
LDT Local Descriptor Table
LE Low End (system)
LEC LAN Emulation Client
LEC Local Exchange Carrier
LED Light Emitting Diode
LF Linefeed
LIC Line Interface Computer
LIFO Last In, First Out
LILO Last In, Last Out
LILO Linux Loader
LIM-EMS Lotus Intel Microsoft EMS
LIOCS Logical Input/Output Control System
LISP List Programming
LLC2 Logical Link Control Layer 2
LOC Lines Of Code
LOS Local Operator System
LPI Lines Per Inch
LRC Longitudinal Redundancy Checking
LRU Least Recently Used
LSD Least Significant Digit
LSI Large Scale Integration -> VLSI
LU Logical Unit
LUB Logical Unit Block
LUT Look Up Table
LVT Light Valve Technology
LW Line Work
LZ Lempel-Ziv
LZW Lempel-Ziv-Welch
M
MAC Media Access Control
MAN Metropolitan Area Network
MAP Maintenance Analysis Procedure
MAP Manufacturing Automation Protocol
MAPI Messaging Applications Programming Interface
MB MegaByte (1,048,576 bytes)
MBCS Multiple Byte Character Set
MBONE Multicast Backbone
MBPS MegaBits Per Second
MCA Micro Channel Architecture
MCBF Mean Cycles Between Failures
MCCOI Multimedia Communications Community of Interest
MCGA MultiColour Graphics Array
MCI Media Control Interface
MD Management Domain
MD5 Message Digest 5
MDA Monochrome Display Adapter
MEB Memory Expansion Board
MFA Modify Field Attribute
MFC Microsoft Foundation Classes
MFKS Multifunktionales Konferenzsystem
MFLOPS Million Floating-Point Operations Per Second
MFM Modified Frequency Modulation
MFV Multi File Volume
MFWS MultiFunction WorkStation
MGA Monochrome Graphic Adapter
MH Mobile Host
MHS Message Handling System
MI Multiple Inheritance
MIB Management Information Database
MICR Magnetic Ink Character Reader
MIDI Musical Instrument Digital Interface
MIME Multipurpose Internet Mail Extensions
MIPS Millions of Instructions Per Second
MISC Minimum Instruction Set Computer -> CISC, RISC
MLPPP MultiLink PPP
MMDF Multi-Channel Memorandum Distribution Facility
MMDS Multi-Megabit Data Services
MMFS Manufacturing Manage Format Standard
MMX Multi Media eXtensions
MNP Microcom Network Protocol
MODEM MOdulator/DEModulator
MOPS Mega Operations per second
MOTIS Message-Oriented Text Interchange Systems
MP Multiprocessing
MPC Multimedia PC
MPEG Motion Picture Experts Group
MPOA MultiProtocol Over Asynchronous transfer mode
MPSD MultiPath Storage Director
MPX multiplex
MS Message Store
MS-DOS Microsoft Disk Operating System
MSA Metropolitan Statistical Area
MSD Most Significant Digit
MSG Message
MSM MultiSession Monitor
MSW Machine Status Word
MTA Message Transfer Agent
MTBF MeanTime Between Failures
MTDA Mean Time Data Availability
MTS Message Transfer System
MUD Multi-User Dungeon
MULTICS MULTiplexed Information and Computing Service
MUMPS Massachusetts General Hospital Utility Multi-Programmings System
MUMPS Multi-User Multi-ProgrammingSystem
MVS Multiple Virtual System
MVS/ESA Multiple Virtual System / Extended System Architecture
MVS/XA Multiple Virtual System / Extended Architecture
MVSCP MVS Configuration Program
N
NAC Network Adapter Card
NAK Negative Acknowledgement
NAP Network Access Point
NAS Network Access Server
NAT Network Address Translation
NAU Network Addressable Unit
NBS National Bureau of Standards
NBS Numeric BackSpace
NC Numeric Control
NCCF Network Communication Control Facility
NCP Network Control Processor
NCP Network Control Program
NCP/VS Network Control Program/Virtual Storage
NDIS Network Driver Interface Specification
NetSP Network Security Program
NFNT New font numbering table
NFS Network File System
NHRP Next Hop Routing Protocol
NIC Network Interface Card
NIC Network Information Center
NIS Network Information Service
NIST National Institute for Standards and Technology
NJE Network Job Entry
NL New Line
NLQ Near Letter Quality
NLT Nucleus Load Table
NMI NonMaskable Interrupt
NNTP Network News Transport Protocol
NSA National Security Agency
NSC1 Network Systems Cypher One
NSP Numeric Space
NSS NATURAL Security-System
NT Network Termination
NTS/2 Network Transport Services/2
NTSC National Television System Committee
NUI Network User Identification
NUL Null
NUMA Non-Uniform Memory Access
NVOD Near Video On Demand
NVRAM NonVolatile Random Access Memory
NVS NonVolatile Storage
O
O/R Originator / Recipient
OC3 155 Mbit/s
OCR Optical Character Recognition
OCX OLE Control Extension
ODA Open Document Architecture
ODSI Open Directory Service Interfaces
OEM Original Equipment Manufacturer
OI Object Interface
OLE Object Linking and Embedding
OLTEP On-Line Test Executive Program
OLTP On-Line Transaction Processing
OMG Object Management Group
OMR Optical Mark Recognition
OO Objektorientierung
OOA Objektorientierte Analyse
OODBMS Object Oriented DBMS
OOP Objektorientierte Programmierung
OOPL Object Oriented Programming Language
OOPS Object Oriented Programming System
OP Operator Panel
OPI Open Prepress Interface
ORB Object Request Broker
OS Operating System
OS/2 Operating System/2
OSA Office Systems Architecture
OSA Open System Architecture
OSF Open Software Foundation
OSI Open Systems Interconnection
OSI/RM OSI Reference Model
OSNS Open Systems Network Support
OSPF Open Shortest Path First
OSTC Open System Testing Consortium
OTPROM One Time Programable ROM
OWL Object Windows Library
P
PABX Private Automatic Branch Exchange
PAD Packet Assembly Disassembly
PAL Phase Alternating Line
PAL Programmable Array Logic
PAM Partitioned Access Method
PAP Password Authentication Protocol
PB PetaByte (1,125,899,906,842,624 bytes)
PBX Private Branch Exchange
PC Personal Computer
PC Personal Computing
PC Program Control
PCB Printed Circuit Board
PCB Program Control Block
PCI Peripheral Component Interface
PCI Program Controlled Interuption
PCIL Private Core Image Library
PCL Printer Control Language
PCM Plug Compatible Manufacturers
PCMCIA Personal Computer Memory Card International Association
PCN Personal Communication Network
PCP Program Control Program
PCS Personal Communication Services
PCT Private Communication Technology
PCT Program Control Table
PD Public Domain
PDA Personal Digital Assistant
PDAD Proposed Draft Addendum
PDAU Physical Data Access Unit
PDF Program Development Facility
PDL Page Description Language
PDO Portable Distributed Objects
PDS Partitioned Data Set
PDS Premise Distribution System
PDS Processor Direct Slot
PDU Protocol Data Unit
PDX Printer Description Extension
PE Printer's error
PE Protection Enabled
PEARL Processor and Experiment Automation Realtime Language
PEM Privacy Enhanced Mail
PEP Partitioned Emulation Program
PER Program Event Recording
PERL Practical Extraction and Report language
PF Parity Flag
PFK Program Function Key(board)
PFM Printer Font Metric
PGA Professional graphics adapter
PGP Pretty Good Privacy
PIB Program Information Block
PID Process ID
PIFS Point InterFrame Space
PIM Personal Information Management
PIN Personal Identification Number
PIOCS Physical Input/Output Control System
PL Procedure Library
PL/1 Programming Language 1
PLI Programming Language 1
PLPA Pageable Link Pack Area
PLT Program List Table
PLU Primary Logical Unit
PMMU Paged memory management unit
PMS Pantone Matching System
PMS Project Management System
PMT Photomechanical Transfer (photostat)
PMT Photomultiplier Tube
PNNI Private Network-to-Network Interface
POC Program-Operator Communication
POP Point Of Presence
POP Post Office Protocol
POSIX Portable Operating System Interface for UNIX
POTS Plain Old Telephone System
POWER Priority Output Writer, Execution processors and input Readers
PP Presentation Position
PPD PostScript Printer Description
PPGA Plastic Pin Grid Array
PPM Pages Per Minute
PPP Point-to-Point Protocol
PPT Processing Program Table
PPTP Point-to-Point Tunneling Protocol
PPV Pay Per View
PRDMD Private Directory Management Domain
PRL Private Relocatable Library
PRMD Private Management Domain
PROM Programable Read Only Memory
PSB Program Specification Block
PSDN Packet Swiched Data Network
PSRAM Pseudo SRAM
PSSL Private Source Statement Library
PSTN Public Swiched Telephone Network
PSW Program Status Word
PTF Program Temporary Fix
PTR PoinTeR
PU Physical Unit
PUB Physical Unit Block
PVC Permanent Virtual Circuit
PVP Packet Video Processor
PWB Printed Wire Board
PWS Programmable WorkStation
Q
QAM Quadrature Amplitude Modulation
QBE Query By Example
QCIF Quater Common Intermediate Format
QIC Quarter-Inch Cartridge
QSAM Queued Sequential Access Method
QTAM Queued Teleprocessing Access Method
R
R0 Record zero
RACF Resource Access Control Facility
RAID Redundant Array of Inexpensive Disks
RAID Redundant Array of Independent Disks
RAM Random Access Memory
RARP Reverse Address Resolution Protocol
RBA Relative Byte Adresse
RC Robot Control
RCP Remote Communication Processor
RCS Revision Control System
RDA Remote Data Access
RDBMS Relational DataBase Management System
RDN Relative Distinguished Name
RES Restore
RF Resume Flag
RFC Request For Comments
RFF Required Form Feed
RFS Remote File System
RGB Red, Green, Blue
RGM Red, Green, Blue (Monitor)
RIFF Resource Interchange File Format
RIP Raster Image Processor
RIP Router Information Protocol
RISC Reduced Instruction Set Computer
RJE Remote Job Entry
RL Relocatable Library
RLD Relocation Dictionary
RLE Run Length Encoded file
RLL Run Length Limited
RMF Resource Management Facility
RNL Required New Line
ROM Read Only Memory
RPC Remote Procedure Call
RPG Report Program Generator
RPL Requestor's Privilege Level
RPL Research Programming Language
RPM Revolutions Per Minute
RPS Rotational Position Sensing
RPT Repeat
RRDS Relative Record Data Set
RRED Right Reading Emulsion Down
RREU Right Reading Emulsion Up
RS Record Separator
RSP Required Space
RSVP Resource Reservation Protocol
RTC Real Time Clock
RTCP Realtime Transport Control Protocol
RTF Rich Text Format
RTM/SF Realtime Monitor / Systems Facility
RTP Realtime Transport Protocol
RTSE Reliable Transfer Service Element
RWSI Remote Workstation Interface
S
S.W.I.F.T. Society for Worldwide Interbank Financial Telecommunication
S/STP Shielded STP
SA Set Attribute
SAA Storage Accounting Area
SAA System Application Architecture
SAM Sequential Access Method
SAP Service Access Point
SAP Service Advertising Protocol
SAR Segmentation And Reassembly
SBCS Single Byte Character Set
SBS Subscript
SC Storage Control
SCA Shared Control Array
SCCS Source Code Control System
SCDS Source Control Data Set
SCI Scalable Coherent Interconnect
SCODL Scanned Conversion Object Description Language
SCP Storage Control Program
SCP System Control Program
SCRAM Static Column Random Access Memory
SCSI Small Computer Systems Interface
SDH Synchronous Digital Hierarchy
SDK Software Development Kit
SDL System Directory List
SDLC Synchronous Data Link Control
SDRAM Synchronous DRAM
SDSF System Display and Search Facility
SE Software Entwicklung
SE System Engineer
SECC Single Edge Contact Connector
SECAM Sequential Couleur a'Memorie
SEL Select
SEPP Single Edge Processor Package
SET Software-Engineering-Technology
SF Sign Flag
SF Support Facility
SFA Salesforce Automation
SFBI Shared Frame Buffer Interconnect
SFE Start Field Extended
SFT System Fault Tolerance
SFTP Shielded Foil Twisted Pair
SGML Standard Generalized Markup Language
SHTTP Secure HTTP
SHY Syllable Hyphen
SI Shift In
SI Single Inheritance
SI Standard Interface
SIFS Short InterFrame Space
SIFT Stanford Information Filtering Tool
SIG Special Interest Group
SIM Service Information Message
SIMD Single Instruction Multiple Data
SIMM Single In-line Memory Module
SIRDS Single Image Random Dot Stereogram
SIT System Initialization Table
SL Source Statement Library
SLD Structured Logic Design
SLED Single Large Expensive Disk
SLIP Serial Line Internet Protocol
SLR Service Level Reporter
SLU Secondary Logical Unit
SM Set Mode
SMDS Switched Multimegabit Data Service
SMF System Management Facility
SML MVS Storage Management Library
SMLI Stateful MultiLayer Inspection
SMP Symetric MultiProcessing
SMP System Modification Program
SMS Storage Management Subsystem
SMTP Simple Mail Transfer Protocol
SNA System Network Architecture
SNADS SNA Distribution Services
SNMP Simple Network Management Protocol
SNOBOL String Oriented Symbolic Language
SNT Sign-On Table
SO Shift Out
SOD Service On Demand
SOH Start Of Heading
SOM System Object Model
SOS Start Of Significance
SP Space
SPA Software Publishers Association
SPARC Scalar Processor ARChitecture
SPDU Session Protocol Data Unit
SPM System Performance Monitor/2
SPOOL Simultaneous Peripheral Operations On Line
SPP Scalable Parallel Processing
SPS Superscript
SPX Sequenced Packet eXchange
SQL Structured Query Language
SQL/DS Structured Query Language / Data System
SRAM Static Random Access Memory
SRT System Recovery Table
SRU Shared Resource Unit
SS Single Sided
SS Stack Segment
SSCP System Service Control Point
SSID SubSystem IDentifier
SSL Secure Socket Layer
STM Synchronous Transfer Mode
STP Shielded Twisted Pair
STT Secure Transaction Technology
STX Start of Text
SUB Substitute
SV Storage Violation
SVA Shared Virtual Area
SVC Supervisor Call
SVC Switched Virtual Circuit
SVGA Super-VGA
SW Switch
SWOP Specifications for Web Offset Printing
SYN Synchronous Idle
SYSOP System Operator
T
T1 1.544 Mbit/s
T3 45 Mbit/s
TARGA Truevision Advanced Raster Graphics Adapter
TB TeraByte (1,099,511,627,776 bytes)
TC Terminal Control
TCA Task Control Area
TCAM Telecommunications Access Method
TCB Task Control Block
TCL Tool Command Language
TCM Thermal Conduction Module
TCO Triple Capacity Option
TCP Terminal Control Program
TCP Transmission Control Protocol
TCP/IP Transmission Control Protocol/Internet Protocol
TCT Terminal Control Table
TCTTE Terminal Control Table Terminal Entry
TCU Transmission Control Unit
TD Transient Data
TDIA Transient Data Input Area
TDM Time-Division Multiplexing
TDOA Transient Data Output Area
TDP Transient Data Program
TEO Technical Electronic Office
TF Trap Flag
TIC Technical Integrity Check
TIFF Tagged Image File Format
TIOA Terminal Input/Output Area
TLB Translation Lookaside Buffer
TLBL Tape Label
TMO Thermo-Magneto-Optic technology
TNEF Transport-Neutral Encapsulation Format
TOC Table Of Contents
TOP Technical Office Protocol
TPDU Transport Protocol Data Unit
TPF Transaction Processing Facility
TPI Tracks Per Inch
TPM Third-Party Maintenance
TPS Transactions Per Second
TRN Transparent
TS Telecommunication System
TS Temporary Storage
TSIOA Temporary Storage Input/Output Area
TSO Time Sharing Option
TSP Temporary Storage Program
TSR Terminate and Stay Resident
TTA Teletex Attachment (Teletexzusatz)
TTL Transistor Transistor Logic
TTR Track Record
TTY TeleTYpe
TWA Transaction Work Area
TWA Two-Way Alternate
TWS Two-Way Simultaneous
TX Telex
TXT Text
U
UA User Agent
UAE Unrecoverable Application error
UART Universal Asynchronous Receiver/Transmitter
UBR Undefined Bit Rate
UBS Unit Backspace
UCB Unit Control Block
UCR Undercolor removal
UCS Universal Character Set
UCSB Universal Character Set Buffer
UCW Unit Control Word
UDP User Datagram Protocol
UI User Interface
UID User ID
UMB Upper Memory Block
UNC Universal Naming Convention
UNC Universal Network Convention
UPC Universal Product Code
UPS Uninterruptible Power Supply
UPSI User Program Switch Indicator
UR Unit Record
URL Uniform Resource Locator
US Unit Separator
USART Universal Synchronous/Asynchronous Receiver/Transmitter
USENET USEr NETwork
USM UnSharp Masking
USRT Universal Synchronous Receiver/Transmitter
USV Unterbrechungsfreie StromVersorgung
UTP Unshielded Twisted Pair
UUCP Unix-to-Unix Copy Program
V
VAD Value Added Dealer
VAN Value Added Network
VAP Value Added Process
VAR Value Added Reseller
VAST Virtual Archive Storage Technology
VB Visual Basic
VBA Visual Basic for Applications
VBR Variable Bit Rate
VBN Vermitteltes Breitbandnetz
VC Virtual Circuit
VC-SDRAM Virtual Channel SDRAM
VCC Virtual Circuit Connection
VCI Virtual Circuit Identifier
VCNA Vtam Communication Network Application
VCPI Virtual Control Program Interface
VDAC Video Digital Analog Converter
VDI Video Display Interface
VDT Video Display Terminal
VDU Visual Display Unit
VERONICA Very Easy Rodent-Oriented Netwide Index to Computerized Archives
VGA Video Graphics Array
VGC Video Graphics Controller
VGM Video Graphics Monitor
VHDSL Very High-bit rate Digital Subscriber Loop
VHLL Very High-Level Language
VHS Video Home System
VIO Video Input/Output
VIO Virtual Input/Output
VIPA Virtual IP Addressing
VLAN Virtual LAN
VLSI Very Large Scale Integration
VM Virtual Machine
VM/SP Virtual Machine / System Product
VMMAP VM Monitor Analysis Program
VMOS Vertical MOS
VMPPF VM Performance Planning Facility
VMPRF VM Performance Reporting Facility
VMS Virtual Management System
VOD Video On Demand
VPD Vital Product Data
VPDN Virtual Private Data Network
VPI Virtual Path Identifier
VPN Virtual Private Network
VR Virtual Reality
VRAM Video RAM
VRML Virtual Reality Modeling Language
VRC Vertical Redundancy Checking
VS Virtual Storage
VSAM Virtual Storage Access Method
VSAT Very Small Aperture Terminal
VSM Virtual Storage Management
VSN Volume Serial Number
VT Vertical Tab
VTAM Virtual Telecommunications Access Method
VTOC Volume Table of Contents
VTP Virtual Terminal Protocol
VTP Virtual Terminal Program
VTX VideoTeXt
VVDS VSAM Volume Data Set
W
W3 World Wide Web
W4WG Windows for Workgroups
WABI Windows Application Binary Interface
WAIS Wide Area Information Service
WAN Wide Area Network
WATM Wireless ATM
WATS Wide Area Telecommunications Service
WHAT Wireless Hybrid Asynchronous Time-bounded
WIMP Windows, Icons, Mice and Pointers
WINS Windows Internet Name Service
WMAC Wireless Media Access Control
WMF Windows metafile
WORM Write Once, Read Many times
WOSA Windows Open Services/Systems Architecture
WRED Wrong Reading Emulsion Down
WREU Wrong Reading Emulsion Up
WS WorkStation
WTO Write To Operator
WUS Word Underscore
WWW World Wide Web
WXTRN Weak External Reference
WYSIWYG What You See Is What You Get
X
XA EXtended Architecture
XIP Execute In Place
XLT Transaction List Table
XMS Extended Memory Specification
XT eXtended Technology
Y
Y2K Year 2000
YIQ (color components in NTSC color space)
YUV (color components in SECAM and PAL color spaces)
Z
ZBR Zero Bug Release
ZD Zero Defects
ZF Zero Flag
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- lunar orbiter digitized film archive
- federal communications commission
- mit massachusetts institute of technology
- computer systemsoftware questions
- under secretary of defense for acquisition and sustainment
- national interagency fire center
- tspi national geospatial intelligence agency
- errata the united states of america
- solar observation using the radio jove system
Related searches
- past questions on computer studies
- computer studies questions and answers
- computer information systems vs computer science
- difference between computer engineering and computer science
- computer trivia questions and answers
- questions about computer science
- computer science questions fun
- best computer tech questions trivia
- computer science questions and answers
- computer test questions and answers
- computer operator questions and answers
- basic computer questions and answers