Showing posts with label GK. Show all posts
Showing posts with label GK. Show all posts

Thursday 27 March 2014

A-Z Computer Abbreviation

March 27, 2014 Posted by Knowledge Bite No comments
  1. Abstraction - the level of technical detail of some representation of software; a cohesive model of data or an algorithmic procedure
  2. Abstract class - A class that can only be used as a base class for some other class. A class is abstract if it has at least one pure virtual function.
  3. Abstract data type: Involves an abstract or logical description of both data required by the software and the operation that can be performed on this data.
  4. Abstract Window Toolkit (AWT): A collection of graphical user interface (GUI) components that were implemented using native-platform versions of the components. These components provide that subset of functionality which is common to all native platforms.
  5. Accuracy: Degree to which data convey what they are supposed to convey.
  6. Address: In networking, address is a data structure or logical convention used to identify a unique entity, such as a particular process or a network device. Important addresses include IP address for network routing and MAC address for a hardware device.
  7. Address Bus: Group of lines that are used to send a memory address or device address from MPU to the memory location or the peripheral.
  8. Aging: The grouping of like transactions by date. Example - sorting invoices by due date.
  9. Algorithm: Description of steps or instructions.
  10. Aliasing: Aliasing means plotting a point other than the true location of pixel in order to fit the point in the raster.
  11. Bandwidth: Bandwidth refers to the maximum capacity of a network channel. Usually bandwidth is measured in bits per second (bps), kilo-bits per second (Kbps), mega bits per second (Mbps) or gigabits per second (Gbps). For example, Ethernet has a bandwidth of 10-, 100-, 1000 Mbps and 1 and 10 Gbps.
  12. Beta testing: Testing that is conducted by the user
  13. Batch processing: In a batch processing system, a job is described by a sequence of control statements stored in a machine read form.
  14. BAUD RATE: The number of signal changes per second.
  15. Binary: Binary system is the numbering system characterized by ones and zeros (1 = on, 0 = off). Binary system is used in the computer and digital storage and communications.
  16. Binary search tree: A binary tree in which each node has a value, left subtree of a node has only value less than or equal to and right side contain only values grater than or equal to node’s value.
  17. Bit: Bit is the binary digit used in the binary numbering system. A bit is the most basic information unit used in computing and information theory. A single bit is a "one" or a "zero", a "true" or a "false", a "on" or "off", or in general, the quantity of information required to distinguish two mutually exclusive states from each other.
  18. Bit Rate: Bit Rate, usually measured in bits per second (bps), refers to the speed at which bits are transmitted in digital communication and data processing.
  19. Boot Strapping: It is used o describe the process of making one entity that create its successor. The method requires keeping only the arrival time of next entity.
  20. Break: C++ keyword used to specify a statement that is used to break out of a for or while loop or out of a switch statement.
  21. BMP: Bitmap file; a common image format on Windows computers. Files of this type usually have the suffix ".bmp" as part of their name.
  22. Call by reference - Passing a pointer to an argument to a function. The function can then change the argument value. See call by value.
  23. Call by value: Passing a copy of an argument to a function. The function cannot then change the argument value. C and C++ use call by value argument passing. But also see pointer and reference, also call by reference.
  24. Case: A C++ keyword used to denote an individual element of a switch statement.
  25. Catch: A Java programming language keyword used to declare a block of statements to be executed in the event that a Java exception, or run time error, occurs in a preceding "try" block.
  26. CGI: Common Gateway Interface. A method used by WWW pages to communicate with programs run on the web server.
  27. Cin : In C++ stream I/O, the standard input stream.
  28. Checksum: Checksum is a method for checking the integrity of transmitted data. A checksum is an integer value computed from a sequence of octets taken through a series of arithmetic operations. The value is recomputed at the receiving end and is compared for verification. Almost every protocol has a checksum field as part of protocol header or trailer.
  29. Class: In the Java programming language, a type that defines the implementation of a particular kind of object. A class definition defines instance and class variables and methods, as well as specifying the interfaces the class implements and the immediate super class of the class. If the super class is not explicitly specified, the superclass will implicitly be Object.
  30. Client: An individual computer on a network that runs its own programs and processes information received from a central server.
  31. CMOS: Complementary metal-oxide semiconductor is in systems requiring low power consumption.
  32. Cohesion: An informal measure of the degree to which a software component implements a single, focused function
  33. Clipping: There may be times when only a portion of total picture is to be displayed. In that case, window is used to clip the part of the image. This process is called clipping.
  34. Compiler: Compiler is used to convert high level language into machine level program.
  35. Complexity: A quantitative measure of a program's complexity
  36. DATA:-Raw facts, figures , symbols , etc , that may or may not be useful for as particular task.
  37. DATA DICTIONARY:-Stores data about data , a central repository of information about the database in a DBMS.
  38. Data structure:A way of storing data in a computer so that it can be used efficiently.
  39. DATA REDUNDANCY: -Simultaneous use and modification of two or more copies of the same data .
  40. DATABASE:-Collection of related files stored in a particular format and accessed through database software
  41. Data Mining: Data mining is a process of extracting patterns from data. Data mining is becoming an increasingly important tool to transform this data into information.
  42. DATABASE MANAGEMENT SYSTEM(DBMS):- Integrated set of programs used to define , update and control databases , backup and recovery.
  43. Decision making: - Decision making is a process to arrive at a decision, the process by which an individual or organization select one position or action from several alternative.
  44. Deadlock:A deadlock is a situation wherein two or more competing actions are waiting for the other to finish, and thus neither ever does. In computing, deadlock refers to a specific condition when two or more processes are each waiting for another to release a resource, or more than two processes are waiting for resources in a circular chain. Deadlocks are a common problem in multiprocessing where many processes share a specific type of mutually exclusive resource known as a software.
  45. EFFICIENCY:- Ration between the output and inputs for a particular task , regardless of whether the task itself is the right task to perform.
  46. Effort - the work-time product (e.g., person-days) associated with a project
  47. Encapsulation :The localization of knowledge within a module. Because objects encapsulate data and implementation, the user of an object can view the object as a black box that provides services. Instance variables and methods can be added, deleted, or changed, but as long as the services provided by the object remain the same, code that uses the object can continue to use it without being rewritten.
  48. Encoder:An encoder is a device that converts information from one format or code to another.
  49. ENCRYPTION:Encryption is the process whereby data is scrambled so that only the sender and the receiver computer are able to unscramble and make use of the information.

  50. Final :A Java programming language keyword. You define an entity once and cannot change it or derive from it later. More specifically: a final class cannot be subclassed, a final method cannot be overridden and a final variable cannot change from its initialized value.
  51. Finally :A Java programming language keyword that executes a block of statements regardless of whether a Java Exception, or run time error, occurred in a block defined previously by the "try" keyword.
  52. FIFO: First-in, first-out:First-in, first-out (FIFO) in computer networking refers to a buffering scheme where the first byte of data entering the buffer is the first byte retrieved by the CPU. In telephony, FIFO refers to a queueing scheme where the first calls received are the first calls processed.
  53. Flood-Fill: The purpose of flood fill algorithm is to color the entire area of connected pixels with the same color.
  54. Float - A C++ keyword used to declare a floating point type.
  55. Flow chart: a graphic picture of the logical steps and sequence involved in a program.
  56. Fragmentation: A relation may be divided into different fragments that are to be distributed to different locations.
  57. FTP :File Transfer Protocol. The Internet protocol that permits you to transfer files between your system and another system.
  58. GIF (Graphics Interchange Format):A compressed format for storing images developed by CompuServe. One of the most common image formats on the Internet.
  59. GUI :Graphical User Interface. Refers to the techniques involved in using graphics, along with a keyboard and a mouse, to provide an easy-to-use interface to some program.
  60. Goto statement: - Goto statement is manly use to transfer the control of the program for some specific place. Label is use with in the goto statement.
  61. Global variable - A variable that is accessible throughout the whole program,whose lifetime is that of the program.
  62. Handshaking: The initial negotiation period immediately after a connection is established between two modems. This is when the modems agree about how the data will be transmitted (e.g., error correction, packet size, etc.). The set of rules they agree on is called the protocol.
  63. HIGH LEVEL LANGUAGE:A medium of communication that is inpendent of given computer. Programs are written in English like word
  64. Header file - A file containing class declarations, preprocessor directives,and so on, and included in a translation unit. It is expanded by the preprocessor.
  65. Host:Host refers to a computer system on a network. Host is similar to node in some sense, except that host usually implies only computer systems, whereas node generally applies to any networked devices, including access devices and routers.
  66. HTTP (Hyper Text Transfer Protocol):The standard set of rules for sending text files across the Internet. It requires an HTTP client program at one end, and an HTTP server program at the other end.
  67. HTTPS (Hyper Text Transfer Protocol Secure):Same as HTTP but provides secure Internet communication using SSL.
  68. Hyperlink:A pointer to another document. Most often a pointer to another web page. A hyperlink is a synonym for a hotlink or a link, and sometimes called a hypertext connection to another document or web page.
  69. Hypertext:Hypertext is text that is cross-linked to other documents in such a way that the reader can read related documents by clicking on a highlighted word or symbol. (see also hyperlink)
  70. IAB (Internet Architecture Board):council that makes decisions about Internet standards.
  71. IEEE: Institute of Electrical and Electronics Engineers
    Institute of Electrical and Electronics Engineers (IEEE) is a professional organization and standards body.
  72. If:A Java programming language keyword used to conduct a conditional test and execute a block of statements if the test evaluates to true.
  73. Identifier: - The name that is given to the various programming element are known as identifier. These variables make include variable name, function name, array name etc.
  74. Implements :A Java programming language keyword optionally included in the class declaration to specify any interfaces that are implemented by the current class
  75. Import :A Java programming language keyword used at the beginning of a source file that can specify classes or entire packages to be referred to later without including their package names in the reference.
  76. Inheritance :The concept of classes automatically containing the variables and methods defined in their super types.
  77. Inline - C++ keyword used to declare an inline function.
  78. Instance :An object of a particular class. In programs written in the Java programming language, an instance of a class is created using the new operator followed by the class name.
  79. Interface :A Java programming language keyword used to define a collection of method definitions and constant values. It can later be implemented by classes that define this interface with the "implements" keyword.
  80. Interrupt I/O: Is a way of controlling input/output activity in which a peripheral or terminal that needs to make or receive a data transfer sends a signal that causes a program interrupt to be set
  81. ISP: Internet Service Provide,An Internet Service Provider (ISP) is a company that provides Internet connectivity services to home and business customers. ISPs support one or more forms of Internet access, including modem dial-up, DSL access, cable modem broadband service, dedicated T1/T3 lines and wireless access.
  82. JPEG (Joint Photographic Expert Group):The organization that promotes the JPG and JPEG graphic formats for storing compressed images.
  83. Just-in-Time: A system where items are produced or received just in time to be used or sold.
  84. Java Development Kit (JDK) :A software development environment for writing applets and applications in the Java programming language. Technically, the JDK is the correct name for all versions of the Java platform from to 1.1.x
  85. Key: The identifying field of a record.
  86. Keyboard: It is an input device that is used to send textual or control information to the processor.
  87. Keyword: - The word that have special meaning and that are already available in c language is known as keyword. In the other words we may say that “the word that has special meaning in c language is known as keyword.
  88. kilobyte (K, KB, or Kb): 1,024 (2 to the 10th power) bytes; often used to represent one thousand bytes. Example: a 720K diskette can hold approximately 720,000 bytes
  89. (or characters).
  90. LAN: Local Area Network:Local Area Network (LAN) is a data communications network connecting terminals, computers and printers within a building or other geographically limited areas. These devices could be connected through wired cables or wireless links. Ethernet, Token Ring and Wireless LAN are examples of standard LAN technologies.
  91. Laser printer: A type of printer that produces exceptionally high quality copies. It works on the same principle as a photocopier, placing a black powder onto paper by using static charge on a rolling drum.
  92. Linked list: an ordered collection of data in which each element contains the location of the next element.
  93. Loader :loader is system software that loads on object program in the main memory and makes it ready for execution
  94. Linear search: Compares the given element against each element until match is found.
  95. Library function:- Library function are those function which is already available in the c compiler. These definitions are stored in their related header file.
  96. Linking :It links the program to the called module of variables that are external to the program
  97. Linker “linker is used to link the various parts of program to make in an executable form.
  98. MACHINE CYCLE:The time required to complete one operation of accessing memory,I/O, or acknowledging an external request.
  99. MACHINE LANGUAGE:The binary medium of communication with a computer through adesigned set of instructions specific to each computer.
  100. Macro expansion :It is the process of replacing a macro call statement by sequence of assembly language statements enclosed in a macro definition.
  101. Macro call:A macro call is a statement written to invoke the expansion of a macro.
  102. Main memory: The amount of memory physically installed in your computer. Also referred to as "RAM".
  103. Member function - A function that is an element of a class and that operates on objects of that class via the this pointer to the object.
  104. Memory address map:A pictorial representation of assigned address space for each chip in the system.
  105. MAN:A metropolitan-area network could link buildings within a city.
  106. Malware:Software programs designed to damage or do other unwanted actions on a computer; common examples of malware include viruses, worms, trojan horses, and spyware.
  107. Mapping: The transformation of the from the instruction code bits to an address in control memory where the routine is located.
  108. MICROPROCESSOR:A semiconductor device manufactured by using the LSI technology. It includes the ALU, register array, and control circuits on a single chip.
  109. Modem: Hardware equipment to connect a computer to a telephone network Typically used to connect to the Internet via a telephone line.
  110. Mouse : It is an input device hat is used to select option from a set of menus. It also controls the cursor position on the screen.
  111. MPEG (Moving Picture Expert Group):An ISO standard codec for computer audio and video.
  112. MSI:Medium scale integration(MSI)-the process of designing more than a hundred gates on a single chip.
  113. Multi tasking:It allows more than one program to run concurrently.
  114. Multi threading:It allows different parts of a single program to run concurrently.
  115. Multi user:It allows two or more users to run programs at the same time
  116. MULTIPLEXING:Number of hardware chips needed for multiple digits display can
  117. be minimized by using the technique called multiplexing.
  118. NETWORK:A network, in simplest term, is a communication path between two or more systems.
  119. Nameserver: A computer that runs a program for converting Internet domain names into the corresponding IP addresses and vice versa.
  120. Namespace - A C++ keyword used to declare a namespace, which is a collection of names such as function declarations, classes, and so on.
  121. NAT: Network Address Translation:Network Address Translation (NAT) is a method by which IP addresses are mapped from one group to another, transparent to end users. NAT allows an Internet Protocol (IP) network to maintain public IP addresses separately from private IP addresses. NAT is a popular technology for Internet connection sharing. It is also sometimes used in server load balancing applications on corporate networks.
  122. Network Topology”Network Topology is the specific physical, logical, or virtual, arrangement of the network components and devices (nodes). Network topology is determined only by the configuration of connections between nodes. Distances between nodes, physical interconnections, transmission rates, and/or signal types are not effects in a network topology.
  123. new :A Java programming language keyword used to create an instance of a class.
  124. NIBBLE:A group of four bits
  125. Normalization: Techniques for eliminating redundancies from the tables in a relational database and pairing them down to their simplest form.
  126. Operands: Instructions specifies the item to be proceeding.
  127. Operating system: It is an integrated set of programs whose main purpose is to make the computer easier to use.
  128. Operation Research : Operation Research is a scientific method of providing executive departments with a quantitative bases for decisions regarding the operations under their controls.
  129. Ordered tree: A tree on which an ordered is imposed.
  130. O.R. Model: A Model is representation of reality. A model is a general term denoting any idealized representation or abstraction of a real life system.
  131. Package: A group of types. Packages are declared with the package keyword.
  132. Packet: A unit of transmission in data communications. The TCP/IP protocol breaks large data files into smaller chunks for sending over a network so that less data will have to be re-transmitted if errors occur.
  133. Paging: It is a memory management scheme that permits the physical address space of a process to be non contiguous.
  134. Parallel Projection: In this projection, centre of projection is located at infinity, because of all the projections are parallel to each other.
  135. Persistence: It is defined as how long a phosphorus can continue to emit light. It can also be defined as a time it takes the emitted light to decay to one-tenth of its original intensity.
  136. PHP : A technology allowing the insertion of server executable scripts in web pages. Mostly for Unix, Linux and Solaris platforms.
  137. Polymorphism: The ability to call a variety of member functions for a given
  138. class object using an identical interface in each case.
  139. POP: Post Office Protocol; a method of handling incoming electronic mail. Example: E-mail programs may use this protocol for storing your incoming messages on a special cluster of servers called pop.service.ohio-state.edu and delivering them when requested.
  140. Pixel: Each screen point is referred to as pixel or pel. it is also referred to as picture element.
  141. Piggybacking: Piggybacking in networking refers to the process of carrying acknowledgments within a data packet to save network bandwidth.
  142. Pointer: Pointer is derived data type in c. pointer contain memory address as their value. Since these memory address are the location in the computer memory where
  143. PNG (Portable Network Graphics): A format for encoding a picture pixel by pixel and sending it over the web. A W3C recommendation for replacing GIF.
  144. program instruction and data type stored, pointer can be use to access and manipulate data stored in memory.
  145. PPP: Point-to-Point Protocol; a type of connection over telephone lines that gives you the functionality of a direct ethernet connection.
  146. Primary key: The key which is uniquely, self sufficient enough to determine the record in a file.
  147. Primary storage: Main storage of the computer used for instructions and data.
  148. Printer: These are the output devices that are used to take output of a particular page or a set of pages on the system.
  149. Private: A C++ keyword used to specify that a class member can only be accessed
  150. from member functions and friends of the class. See access control, protected,
  151. and public.
  152. Program status word: The collection of all status bit conditions in the cpu is sometimes called PSW.
  153. Projection: The projection of 3-D object is defined by straight Projection rays called projection emanating form center of the projection, passing through each point of the object and intersecting a projection plane to form the projection.
  154. Protected: A C++ keyword used to specify that a class member can only be
  155. accessed by member functions and friends of its own class and by member functions
  156. and friends of classes derived from this class. See private, public, and
  157. access control.
  158. Protection: This is any mechanism for controlling the access of processes or users to the resource defined by a computer system.
  159. Protocol: A set of rules that regulate how computers exchange information. Example: error checking for file transfers or POP for handling electronic mail.
  160. Proxy Server: An Internet server dedicated to improve Internet performance.
  161. Public: A C++ keyword used to specify that class members are accessible
  162. from any (non-member) function. See access control, protected, and private.
  163. Queue: Abstract data type in which insertion occurs at one end and deletion occurs at other end.
  164. RAM (Random-Access Memory): This is the memory where the software resides while it is running along with the data it is using. RAM is used by both OS and application software.
  165. Refresh Rate: Refresh rate is defined as the rate at which picture is again drawn on the monitor. It is measured in cycles per second.
  166. Register: C++ keyword used as a hint to the compiler that a particular local variable
  167. should be placed in a machine register.
  168. Register address: A register address is a binary number of k bits that specifies the operands residing in register.
  169. Rear: Part of queue where insertion operation occurs.
  170. Real time system: It is acomputer system that requires not only that the computer results be”corrct”but also that the results be produces within the specified deadline.
  171. Record: A collection of aggregates or related items of data treated as a unit.
  172. Redundancy: A situation in which two or more pieces of information in a file are the same.
  173. Recursion function: When function calls itself repeat until some specific condition is met, and then process is called recursion
  174. Reflection: It is the process of generating a symmetric image of the object in a direction opposite to same object.
  175. Rollback: It defines that all the changes are aborted and the database is rolled back to the previous consistent state if the database.
  176. ROM (Read-Only Memory): A form of data storage. This type of memory keeps the saved data even if the device power is off. The data on the ROM can be loaded into the RAM if needed.
  177. Rotation: Rotation is an important property of graphics system, it causes the viewer to see an object from different directions.
  178. Route: Route in networking refers to a logic path within network in which a packet is travelling through from a sender to a receiver.
  179. Remote login: An interactive connection from your desktop computer over a network or telephone lines to a computer in another location (remote site).
  180. Relocation: Adjusting the values of the address dependent locations like address constant, according to the change in the memory locations
  181. Return: C++ keyword used for returning values from a function.
  182. Scheduler: It is a special DBMS program that establishes the order in which the
  183. operations within concurrent transactions are executed.
  184. Scope: The region of a program where a name has visibility.
  185. Scaling: Scaling transformation allows an object change by expanding or contracting its dimension i.e. it is a process of expanding or compressing the dimensions of the object.
  186. Semaphore: An integer counter and an associated thread-wait queue. When initialized, the semaphore counter receives a user-defined positive or null value.
  187. Sequential access: It is a access method in which information is processed in order, one record after the other.
  188. Serial port: An interface on a computer that supports transmission of a single bit at a time; can be used for connecting almost any type of external device including a mouse, a modem, or a printer.
  189. Source code: A program written either in mnemonics of an assembly language or in English like statements of high level language.
  190. Sorting: Arranging elements in some order.
  191. Sizeof: C++ keyword for taking the size of an object or type.
  192. Spool: A spool is a buffer that holds output for a device, such as printer that cannot accept interleaved data streams.
  193. SLIP : Serial Line Interface Protocol. Along with the PPP, a protocol that can be used with a dialup connection to an ISP to complete a TCP/IP Internet connection.
  194. Stack: A group of memory locations in the R/W memory that is used for temporary storage of binary information during the execution of the program.
  195. Static variable: As the name suggest the value of the static variable persists until the end of the programme. A variable can be use until declaring the keyword static. Static variable internal type or external type depends upon the declaration.
  196. Static: A Java programming language keyword used to define a variable as a class variable. Classes maintain one copy of class variables regardless of how many instances exist of that class. "static" can also be used to define a method as a class method. Class methods are invoked by the class instead of a specific instance, and can only operate on class variables.
  197. Subroutine: A group of instructions that performs a subtask of repeated occurrence.
  198. This - C++ keyword used in a member function to point at the object currently
  199. being operated on.
  200. Thread: The basic unit of program execution. A process can have several threads running concurrently, each performing a different job, such as waiting for events or performing a time-consuming job that the program doesn't need to complete before going on. When a thread has finished its job, the thread is suspended or destroyed.
  201. Telnet: A generic term that refers to the process of opening a remote interactive login session regardless of the type of computer you're connecting to.
  202. URL(Uniform Resource Locator): A web address. The standard way to address web documents (pages) on the Internet (like:
  203. Variable: A measurable quantity that has a definite numerical value at every instant.
  204. View port: Sometimes, we want to display different portions of image in different regions of screen. A rectangular region of display device where contents of windows are displayed is called viewport.
  205. Virtual function: A member function whose interpretation when called depends
  206. on the type of the object for which it is called; a function for an object
  207. of a derived class will override a function of its base class.
  208. Void: A Java programming language keyword used in method declarations to specify that the method does not return any value. "void" can also be used as a non functional statement.
  209. WAN: A wide area network usually links buildings, cities or countries.
  210. Web Server: A server is a computer that delivers services or information to other computers. In web terms: A server that delivers web content to web browsers.
  211. While: A Java programming language keyword used to declare a loop that iterates a block of statements. The loop's exit condition is specified as part of the while statement.
  212. XML: Extensible Markup Language; A markup language for coding web documents that allows designers to create their own customized tags for structuring a page.
  213. zip: A common file compression format for IBM PC or compatibles; the utility WinZip is used for compressing and decompressing files. Zipped files usually end with a ".zip" file extension. A special kind of zipped file is self-extracting and ends with a ".exe" extension.