Computer SystemSoftware Questions



Computer SystemSoftware Questions

[pic]

• Digital computers are computer are classified into four categories what are they?

Micro Computers, Mainframe Computer and Super Computers

• PC/XT stands for:

Personal Computers Extended Technology

• PC/AT stands for:

Personal Computers Advance Technology

• MIPS is

Million Instructions per Second

• Examples of Mini computer

IBM AS/400/B60, VAX 8842, WIPROGENIUS, WIPRO LANDMARK 860, HP9000 etc.

• In the case of micro computer speed of CPU is:

(1-10MPS)

Speed of CPU in case of mini computer

(20-50 MIPS)

• The program change that makes up the operating system along with associated utility program change, as distinct from an application program is:

System software

• 4GL stands for:

Fourth generation language

• The basics of Internet:

TCP/IP

• A standard protocol that that describes communication between computers, synthesizers and musical instrument:

MIDI

• The main memories have three distinct parts, what are they?

RAM, ROM, Cache

 • Language processing means:

Analysis of source program +synthesis phase

• Language processor consists of two phases. What are they?

Analysis phase and synthesis phase

• The process of recognizing the lexical component in a source string is called:

Scanning

• There are two fundamental approaches to parsing. What are they?

Top Down parsing and Bottom Up parsing

• MDT stands for:

Macro Definition Table

• SST stands for:

Sequencing Symbol Table

• ATP stands for:

Actual Parameter Table

• In compiler, which analyzer convert s the source program into a sequence of atomic units called tokens?

Lexical Analyzer

• Identifiers, keywords, constants, operators, and punctuation

Symbols such as commas and parentheses are typical:

Tokens

• The name of device used for user to computer communications, usually the display and keyboard is called:

Consol

• What is CON?

It is the abbreviation for consol

• CAE stands for:

Computer aided engineering

• CADD stands for:

Computer aided drafting and design

• The leading personal computer software company Microsoft Corporation founded in which year?

1975 by Bill Gates & Paul Allen

• What is Microsoft’s first product?

A BASIC Interrupter for the Intel 8080 up

• Windows 3 was released in which year?

March 1990

• POSIX stands for:

Portable Operating System Interface

• PASCAL was developed by:

Niklaus Wirth

COMPUTER GENERAL QUIZ QUESTIONS

[pic]

• COBOL is acronym for:

Common Business Oriented Language

• BASIC is acronym for:

Beginners All Purpose Symbolic Instruction Code

• KB, MB, GB, is respectively:

Kilo Bites Mega Bites Giga Bites

• A set of 8 bits is called:

Bite

• A set of 4 bit is called:

Nibble

• HDD and FDD are respectively:

Hard Disk Drive, Floppy Disk Drive

• Winchester drive is also called:

Hard disk Drive

• The center processing unit of a computer consist 3 units namely:

Arithmetic Logic Unit, Control Unit, Memory Unit

• A program written using binary codes is called:

Machine language

• The computer which has incorporated the characters of analog and digital computers is:

Hybrid computers

• The medium is used by input dives light pen for graphical input is:

CRT screen

• SMPS stands for:

Switch Mode Power Supply

• UPS stands for:

Uninterrupted Power Supply

• The translator program that translates each line of the source program as it run is called:

Interpreter

• The pictorial representation of the procedure proposed to solve a problem by a program:

Flow chart

• ANCII stands for:

American Standard Code for Information Interchange

• ANSI stands for:

American National Standard Institute

• EBCDIC is the acronym for:

Extended Binary Coded Decimal Interchange Code

• ERP packages are:

Enterprise Resource Planning Package

• Example for ERP packages:

SAP, BAN etc..

• Write office automation package of Microsoft:

Ms Office

• The time gap during the failure of a computer system is also called

Down Time

• What is meant by ‘system analyst’?

A person who examine and defines actives, flow and problems to be solved and system and procedures to determine hoe best the necessary operation can accomplished

• Fetch means:

To retrieve data or instructions from storage

• UNIX was developed by:

Bell laboratory s

• What is INTERNET?

Internet is the world's largest computer network, the "network of networks". Scattered all over the world

• When was the INTERNET Created?

It was created thirty six years ago as a project of U.S Department of Defense,

• What Internet service provider (ISP)?

It is the companies that provide INTERNET access.

• What is WWW?

It is the system based hypertext and HTTP for providing organizing and accessing wide verity of resources that are available by the INTERNET.

• What is web page?

It is a unit of information often called a document that is available over the WWW.

• Name the protocol that allows a computer to use the TCP/IP protocol and connected directly to the Net using a standard voice telephone line and high speed modem:

P P P (point-to-point protocol)]

• It is a software program that acts as an interface between the user and WWW what is it?

Web Browser

• Name two different type of Web Browser:

Text-based browser and Graphical Browser

• It collects and organizes resources that are available via the WWW, and designed to provide a starting point for locating information. Name it:

Web Index

• It is an interactive tool that enables to locate information available via Name it:

Search Engine

• It is unique, numeric identifier used to specify a particular host computer on a particular network, and is part of a global , standard’s scheme of identifying machines that are connected with INTERNET Name it:

IP Address (Internet Protocol)

• It is the way of identify and locate computers connected to the INTERNET Name it:

Domain Name

• It provides hierarchical way of identifying and locating INTERNET resources on the WWW Name It:

Uniform Resources Locater (URL)

• A binding document signed by all users that explains the rules of INTERNET use at an institution. Name it:

Acceptable user policy (AUP)

• What is gopher?

It is a protocol designed to search, retrieve and display documents from remote site on the Internet

• It is an Internet search tool that has the capability of searching many databases at one time. Name it:

Wide area information service (WAIS)

• What is FTP (file transfer protocol?)

The medium that allows transferring of files between computers on the net using an FTP program or via Netscape

• What is E-Journal?

It is an electronics publications, typically found in academic circles

• What is NNTP?

Network News Transport Protocol-This is used to distribute network news

• Name the security feature that allows access to information on an individual basis:

Authentication

 MIPS is an acronym for:

Millions of instructions per second

 The duplicate copy of data/program on a separate storage medium is called:

Back up

 A center processor placed on a semi-conductor chip is called as a:

Microprocessor

 Who invented the modem?

AT&T Information System, USA

 Which is standard internet protocol for distributing E-Mail?

SMTP (Simple Mail Transfer Protocol)

 The computer generated environment is called:

Virtual

 Who coined the term hypertext in 1965?

Ted Nelson

 Which protocol provides basis for the net?

Internet Protocol –IP

What is a kernel module?

Answer A kernel module is a set of code that can be dynamically loaded and unloaded into the Operating System kernel at run-time. Typically, a kernel module is used to encode a device driver to allow the operating system to interact with a new piece of hardware (e.g. your mouse, keyboard, robot, camera etc.).

What is CVS and what is it used for?

Answer CVS, stands for Concurrent Versions System. It is a tool (a set of programs) that maintain a central repository that records the full history of changes to the files stored in the repository. Typically, you would store the code you are working on for a project in a CVS repository. By keeping the full history of changes you can keep track of your work, and also restore (or backup) from a recent change e.g. you introduced a bug.

What is SCP and what is it used for?

Answer SCP, (Secure CoPy), is a copying program that allows you to securely copy files between two different computers that are linked via the internet. It essentially runs a copy program using SSH to get the secure connection.

What is dynamically stable walking, explain and give an example?

Answer Dynamically stability for a walking robot (or animal) means that at some time during its walking cycle its center of gravity, when projected onto the ground, is not located within the support hull of its ground contact points. In simpler english, it means that the robot must actively balance itself to prevent falling. If it were to freeze, it would fall over. Most wheeled robots are statically stable. Humans, and most biped robots and humanoids, are dynamically stable meaning they must continuously control their balance to prevent falling over.

What is grep and what is it used for?

Answer Grep is a program for searching through files for lines that match a given regular expression. For example, if I wanted to find the name Noura in a set of text files I could run grep with: grep Noura my_text_file1.txt text_file2.txt etc.

What is GPS? How does it work?

Answer GPS, or Global Positioning System, is a satellite-based navigation system. GPS works via a system of satellites and receiving devices used to compute positions on the Earth. The basis of GPS is "triangulation" from satellites. To "triangulate," a GPS receiver measures distance using the travel time of radio signals. To measure travel time, GPS needs very accurate timing which it achieves with some tricks. Along with distance, you need to know exactly where the satellites are in space. High orbits and careful monitoring are the secret. Finally you must correct for any delays the signal experiences as it travels through the atmosphere.

What is the name of the wheel configuration/drive mechanism on the MARS rovers? Why did NASA pick this mechanism?

Answer The current Mars rovers use a rocker-bogie suspension system which allows a rover to safely navigate steps and obstacles twice the height of its wheels. NASA's Jet Propulsion Laboratory patented this suspension system. The rocker-bogie suspension joins the three wheels on each side with only two swinging joints, and it connects the whole three-wheeled bogie to the chassis at a single point. The structure has no springs, and the freely rotating joints flex to conform to ground contours and climb obstacles. The rover combines independent drive and individual steering (Ackerman steering) for each wheel.

What is an advantage and a disadvantage of using sonar? (in comparison to other sensors)

Answer Sonar as used in robots, typically consists of sending out a pulse of sound and listening for the echo. By calculating the time from the initial pulse to the return echo, and knowing the speed of sound, it becomes possible to calculate the distance to the target object. Variants on sonar include changing the frequency of the sound wave generated, and using psuedo random pulse sequences and looking for the range that gives the maximum likelihood response.

Advantages of sonar:

• Relatively simple sensor, so low cost with easy electronics

• An active sensor that gives range to nearest surface

• Very good underwater, where nearly every other sensor is not good

Disadvantages:

• Distance estimates can vary a lot and be quite noisy for a number of reasons:

o Speed of sound varies as a function of air pressure and temperature. Ability of sound to travel is also a function of air humidity.

o Reflection strength depends upon the properties of the surface and the incidence angle

o Multiple reflections are possible.

• Cross-talk between multiple sensors is sometimes a problem (they hear one another)

• sensor projects in a cone so it is not a fine resolution sensor.

What was the goal of the NASA mission that sent Spirit and Opportunity to Mars? Did it succeed?

Answer NASA's twin robot geologists, the Mars Exploration Rovers, launched toward Mars on June 10 and July 7, 2003, in search of answers about the history of water on Mars. They landed on Mars January 3 and January 24 PST (January 4 and January 25 UTC). The Mars Exploration Rover mission is part of NASA's Mars Exploration Program, a long-term effort of robotic exploration of the red planet. Primary among the mission's scientific goals is to search for and characterize a wide range of rocks and soils that hold clues to past water activity on Mars. The spacecraft are targeted to sites on opposite sides of Mars that appear to have been affected by liquid water in the past. The mission was considered a success when Opportunity found new evidence of water on Mars.

Who is the current director of the Robotics Institute and what is his/her area of expertise?

Answer The current director of the Robotics Institute is Professor Matthew T. Mason. Matt Mason earned his BS, MS, and PhD degrees in Computer Science and Artificial Intelligence at MIT, finishing his PhD in 1982. Since that time he has been on the faculty at Carnegie Mellon University, where he is presently Professor of Computer Science and Robotics, and Director of the Robotics Institute. His research interests are in robotic manipulation, including manufacturing automation, mobile manipulation, and robotic origami. He is co-author of "Robot Hands and the Mechanics of Manipulation" (MIT Press 1985), co-editor of "Robot Motion: Planning and Control" (MIT Press 1982), and author of "Mechanics of Robotic Manipulation" (MIT Press 2001). He is a winner of the System Development Foundation Prize, a Fellow of the AAAI, and a Fellow of the IEEE.

In Robotics, what does SLAM stand for? What is it used for?

Answer SLAM stands for Simultaneous Localization and Mapping. As indicated by the term, it is used for getting a robot to provide a fully autonomous answer to the question ``Where am I?. It demands that the robot derive a map from its perceptions while moving through the environment and simultaneously determine its own position in that map.

Who was the founding director of the Robotics Institute? What is his/her most recent link to Qatar?

Answer The founding director of the Robotics Institute is Professor Raj Reddy who was recently honored with an endowed professorship from Qatar: the Mozah Bint Nasser University Professor of Computer Science and Robotics.

What are particle filters and Kalman filters most commonly used for in Robotics?

Answer Particle filters and Kalman filters are state estimation filtering techniques. Both of these are use d alot in robotics to estimate the state of a system. For example, we could use them to estimate the location of the robot (this is localization), or where objects are around the robot (tracking). These are probabilistic techniques, and are very good for handling noise, uncertainty, and all of the general limitations found in real sensors. Essentially, instead of just keeping track of the state, the two methods estimate the probability distribution over the state space. Kalman filters use a Gaussian noise assumption, so they only keep track of the mean and variance of the state estimate (as that is all you need for a gaussian). Particle filters are non-parametric and can represent any distribution if you have enough particles. These methods are mostly used for localization, tracking of objects, inferring the behavior of say another robot, and to estimate when things may be broken.

What is a genetic algorithm? How does it work?

Answer Genetic algorithms are a part of evolutionary computing; a popular area of artificial intelligence. Genetic algorithms are inspired by Darwin's theory of evolution. Simply said, problems are solved by an evolutionary process resulting in a best (fittest) solution (survivor) - in other words, the solution is evolved. When using a genetic algorithm we represent a solution to a given problem as a genome (or chromosome). The genetic algorithm then creates a population of solutions and applies genetic operators such as mutation and crossover to evolve the solutions in order to find the best one(s).

Name a robot that Carnegie Mellon University sent to the Antarctic and a robot we sent to the Arctic. What were the missions of these robots? Did they succeed?

Answer Carnegie Mellon University sent the Nomad robot to the Antarctic to perform autonomous search of meteroites, and the Hyperion robot to the Arctic to demonstrate sun-synchronous circumnavigation (i.e. can a solar-powered robot plan and execute a circuitious route that takes into account its energy requirements and the position of the sun and shadows). Both robots succeeded in their missions.

The Robotics Institute has had 4 directors to date. You’ve learned about the founding director and the current director so far. Who were the other two directors and what were their areas of expertise?

Answer The second director of the Robotics Institute was Professor Takeo Kanade and the third director was your own Dean Chuck Thorpe. Dr. Kanade received his Ph.D. in Electrical Engineering from Kyoto University, Japan, in 1974. After being on the faculty at Department of Information Science, Kyoto University, he joined Computer Science Department and Robotics Institute in 1980. He became Associate Professor in 1982, a Full Professor in 1985, the U. A. and Helen Whitaker Professor in 1993, and a University Professor in 1998. He became the Director of the Robotics Institute in 1992. He served as the founding Chairman (1989-93) of the Robotics Ph. D. Program at CMU, probably the first of its kind in the world. Dr. Kanade has worked in multiple areas of robotics, ranging from manipulator, sensor, computer vision, multi-media applications and autonomous robots, with more thatn 200 papers on these topics. He has been the founding editor of International Journal of Computer.

Charles E. “Chuck” Thorpe is the first dean of Carnegie Mellon University in Qatar, and a member of its faculty teaching robotics and advising Ph.D. students. Previously he was the director of Carnegie Mellon University’s Robotics Institute, where he had been a principal research scientist and founding head of its robotics master’s program. Thorpe holds a doctor’s degree from the School of Computer Science and is one of the university’s first alumni to pursue a career in robotics. His advisers were Raj Reddy, founding director of the Robotics Institute, and Hans Moravec, one of the world’s first developers of autonomous mobile robots. In 1984, he wrote his doctoral thesis in vision and path planning. Thorpe’s research has focused on the development of outdoor robotic vehicles, concentrating on computer vision, sensing, planning and architectures for these machines.

Explain the following Linux commands: (1) ls –a (2) chmod +x foo (3) find . –name “*.java”

Answer The founding director of the Robotics Institute is Professor Raj Reddy who was recently honored with an endowed professorship from Qatar: the Mozah Bint Nasser University Professor of Computer Science and Robotics.

You learnt about “ruby” when setting up your computers recently. What is ruby and what is it good for?

Answer Ruby is a pure object-oriented scripting language, developed by Yukihiro Matsumoto in Japan. It was primarily designed to handle text processing and systems management tasks. The Ruby syntax will be familiar to anyone who has written in a scripting language such as Perl or PHP. However, unlike Perl or PHP, which require the use of a semi-colon as a line terminator, Ruby requires no line termination. Some developers may at first find themselves a little confused by this, but it can actually speed up development.

What is “SourceForge” and why is it important?

Answer SourceForge is the world's largest Open Source software development web site, hosting more than 100,000 projects and over 1,000,000 registered users with a centralized resource for managing projects, issues, communications, and code. SourceForge has the largest repository of Open Source code and applications available on the Internet, and hosts more Open Source development products than any other site or network worldwide. SourceForge provides a wide variety of services to projects they host, and to the Open Source community.

Name a robot in each of the following categories: 1 leg, 2 legs, 4 legs, 6 legs, 8 legs

Answer A 1-legged robots: Bow-legged hopper. A 2-legged (biped) robot: SONY Qrio. A 4-legged (quadruped) robot: SONY AIBO. A 6-legged (hexapod) robot: RHex. An 8-legged robot: Dante I (or Dante II).

NETWORK DEVICES:

Repeater:

Also called a regenerator, it is an electronic device that operates only at physical layer. It receives the signal in the network before it becomes weak, regenerates the original bit pattern and puts the refreshed copy back in to the link.

Bridges:

These operate both in the physical and data link layers of LANs of same type. They divide a larger network in to smaller segments. They contain logic that allow them to keep the traffic for each segment separate and thus are repeaters that relay a frame only the side of the segment containing the intended recipent and control congestion.

Routers:

They relay packets among multiple interconnected networks (i.e. LANs of different type). They operate in the physical, data link and network layers. They contain software that enable them to determine which of the several possible paths is the best for a particular transmission.

Gateways:

They relay packets among networks that have different protocols (e.g. between a LAN and a WAN). They accept a packet formatted for one protocol and convert it to a packet formatted for another protocol before forwarding it. They operate in all seven layers of the OSI model.

Switches (L2)

--------

It breaks collasion domain.Uses MAC address to communicate. Faster than bridges.

Router- routtes between differnet network.it take routing decision by refering routing table and therefore it is also called as layer 3 device.

switch-switches within same subnet.it refers mac table for forwarding decions so it is called as a layer 2 device.

All of the following are examples of real security and privacy risks EXCEPT:

A. hackers.

B. spam.

C. viruses.

D. identity theft.

Answer: B

2. A process known as ____________ is used by large retailers to study trends.

A. data mining

B. data selection

C. POS

D. data conversion

Answer: A

3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.

A. Data

B. Point-of-sale (POS)

C. Sales

D. Query

Answer: B

4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.

A. PSS

B. POS

C. inventory

D. data mining

Answer: A

5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:

A. robotics.

B. simulation.

C. computer forensics.

D. animation.

Answer: C

6. Which of the following is NOT one of the four major data processing functions of a computer?

A. gathering data

B. processing data into information

C. analyzing the data or information

D. storing the data or information

Answer: C

7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.

A. POS

B. RFID

C. PPS

D. GPS

Answer: B

8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:

A. robotics.

B. computer forensics.

C. simulation.

D. forecasting.

Answer: A

9. Technology no longer protected by copyright, available to everyone, is considered to be:

A. proprietary.

B. open.

C. experimental.

D. in the public domain.

Answer: A

10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.

A. Nanoscience

B. Microelectrodes

C. Computer forensics

D. Artificial intelligence

Answer: A

11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.

A. Nanoscience

B. Nanotechnology

C. Simulation

D. Artificial intelligence (AI)

Answer: D

12. ____________ is data that has been organized or presented in a meaningful fashion.

A. A process

B. Software

C. Storage

D. Information

Answer: D

13. The name for the way that computers manipulate data into information is called:

A. programming.

B. processing.

C. storing.

D. organizing.

Answer: B

14. Computers gather data, which means that they allow users to ____________ data.

A. present

B. input

C. output

D. store

Answer: B

15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:

A. data.

B. output.

C. input.

D. the process.

Answer: B

16. Computers use the ____________ language to process data.

A. processing

B. kilobyte

C. binary

D. representational

Answer: C

17. Computers process data into information by working exclusively with:

A. multimedia.

B. words.

C. characters.

D. numbers.

Answer: D

18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:

A. eight bytes.

B. eight kilobytes.

C. eight characters.

D. eight bits.

Answer: D

19. The term bit is short for:

A. megabyte.

B. binary language.

C. binary digit.

D. binary number.

Answer: C

20. A string of eight 0s and 1s is called a:

A. megabyte.

B. byte.

C. kilobyte.

D. gigabyte.

Answer: B

21. A ____________ is approximately one billion bytes.

A. kilobyte

B. bit

C. gigabyte

D. megabyte

Answer: C

22. A ____________ is approximately a million bytes.

A. gigabyte

B. kilobyte

C. megabyte

D. terabyte

Answer: C

23. ____________ is any part of the computer that you can physically touch.

A. Hardware

B. A device

C. A peripheral

D. An application

Answer: A

24. The components that process data are located in the:

A. input devices.

B. output devices.

C. system unit.

D. storage component.

Answer: C

25. All of the following are examples of input devices EXCEPT a:

A. scanner.

B. mouse.

C. keyboard.

D. printer.

Answer: D

26. Which of the following is an example of an input device?

A. scanner

B. speaker

C. CD

D. printer

Answer: A

27. All of the following are examples of storage devices EXCEPT:

A. hard disk drives.

B. printers.

C. floppy disk drives.

D. CD drives.

Answer: B

28. The ____________, also called the “brains� of the computer, is responsible for processing data.

A. motherboard

B. memory

C. RAM

D. central processing unit (CPU)

Answer: D

29. The CPU and memory are located on the:

A. expansion board.

B. motherboard.

C. storage device.

D. output device.

Answer: B

30. Word processing, spreadsheet, and photo-editing are examples of:

A. application software.

B. system software.

C. operating system software.

D. platform software.

Answer: A

31. ____________ is a set of computer programs used on a computer to help perform tasks.

A. An instruction

B. Software

C. Memory

D. A processor

Answer: B

32. System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together.

A. management

B. processing

C. utility

D. application

Answer: D

33. The PC (personal computer) and the Apple Macintosh are examples of two different:

A. platforms.

B. applications.

C. programs.

D. storage devices.

Answer: A

34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.

A. languages

B. methods

C. CPUs

D. storage devices

Answer: C

35. Servers are computers that provide resources to other computers connected to a:

A. network.

B. mainframe.

C. supercomputer.

D. client.

Answer: A

36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.

A. supercomputers

B. clients

C. laptops

D. mainframes

Answer: D

37. ____________ are specially designed computers that perform complex calculations extremely rapidly.

A. Servers

B. Supercomputers

C. Laptops

D. Mainframes

Answer: B

38. DSL is an example of a(n) ____________ connection.

A. network

B. wireless

C. slow

D. broadband

Answer: D

39. The difference between people with access to computers and the Internet and those without this access is known as the:

A. digital divide.

B. Internet divide.

C. Web divide.

D. broadband divide.

Answer: A

40. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.

A. Nanotechnology

B. Micro-technology

C. Computer forensics

D. Artificial intelligence

Answer: A

41. Which of the following is the correct order of the four major functions of a computer?

A. Process à Output à Input à Storage

B. Input à Outputà Process à Storage

C. Process à Storage à Input à Output

D. Input à Process à Output à Storage

Answer: D

42. ____________ bits equal one byte.

A. Eight

B. Two

C. One thousand

D. One million

Answer: A

43. The binary language consists of ____________ digit(s).

A. 8

B. 2

C. 1,000

D. 1

Answer: B

44. A byte can hold one ____________ of data.

A. bit

B. binary digit

C. character

D. kilobyte

Answer: C

45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.

A. The platform

B. The operating system

C. Application software

D. The motherboard

Answer: B

46. The operating system is the most common type of ____________ software.

A. communication

B. application

C. system

D. word-processing software

Answer: C

47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.

A. Servers

B. Embedded computers

C. Robotic computers

D. Mainframes

Answer: B

48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:

A. instructions.

B. the operating system.

C. application software.

D. the system unit.

Answer: A

49. The two broad categories of software are:

A. word processing and spreadsheet.

B. transaction and application.

C. Windows and Mac OS.

D. system and application.

Answer: D

50. The metal or plastic case that holds all the physical parts of the computer is the:

A. system unit.

B. CPU.

C. mainframe.

D. platform.

Answer: A

Fill in the Blank:

51. Between PCs and Macs, the ____________ is the platform of choice for graphic design and animation.

Answer: Mac

52. The ____________ is the program that manages the hardware of the computer system, including the CPU, memory, storage devices, and input/output devices.

Answer: operating system

53. The type of operating system software you use depends on your computer’s ____________.

Answer: platform

54. ____________software helps you carry out tasks, such as typing a document or creating a spreadsheet.

Answer: Application

55. ____________are the fastest and most expensive computers.

Answer: Supercomputers

56. A ____________ is approximately 1,000 bytes.

Answer: kilobyte

57. Input devices are used to provide the steps and tasks the computer needs to process data, and these steps and tasks are called ____________.

Answer: instructions

58. A computer gathers data, processes it, outputs the data or information, and ____________ the data or information.

Answer: stores

59. The binary language consists of two digits: ____________ and ____________.

Answer: 0 and 1

60. A string of ____________ 0s and 1s is called a byte.

Answer: eight (8)

61. The devices you use to enter data into a computer system are known as ____________ devices.

Answer: input

62. The devices on a computer system that let you see the processed information are known as ____________ devices.

Answer: output

63. ____________ is the set of computer instructions or programs that enables the hardware to perform different tasks.

Answer: Software

64. When you connect to the ____________, your computer is communicating with a server at your Internet service provider (ISP).

Answer: Internet

65. ____________ are computers that excel at executing many different computer programs at the same time.

Answer: Mainframes

66. ____________is the application of computer systems and techniques to gather legal evidence.

Answer: Computer forensics

67. ____________ is the science that attempts to create machines that will emulate the human thought process.

Answer: Artificial intelligence (AI)

68. Macintosh computers use the Macintosh operating system (Mac OS), whereas PCs generally run ____________ as an operating system.

Answer: Microsoft Windows

69. A process known as ____________ tracks trends and allows retailers to respond to consumer buying patterns.

Answer: data mining

70. Hard disk drives and CD drives are examples of ____________ devices.

Answer: storage

71. You would use ____________ software to create spreadsheets, type documents, and edit photos.

Answer: application

72. ____________ are computers that support hundreds or thousands of users simultaneously.

Answer: Mainframes

73. ____________ is the term given to the act of stealing someone’s identity and ruining their credit rating.

Answer: Identity theft

74. Surgeons are using ____________ to guide robots to perform delicate surgery.

Answer: computers

75. Patient ____________ are life-sized mannequins that have a pulse and a heartbeat and respond to procedures just like humans.

Answer: simulators

True and False

76. Currently, the performance of tasks by robots is based on preprogrammed algorithms.

Answer: True

77. Data can be a number, a word, a picture, or a sound.

Answer: True

78. Strictly defined, a computer is a data processing device.

Answer: True

79. The discrepancy between the “haves� and “have-nots� with regard to computer technology is commonly referred to as the digital society.

Answer: False (digital divide)

80. One of the benefits of becoming computer fluent is being a savvy computer user and consumer and knowing how to avoid viruses, the programs that pose threats to computer security.

Answer: True

81. Trend-spotting programs, developed for business, have been used to predict criminal activity.

Answer: True

82. Employers do not have the right to monitor e-mail and network traffic on employee systems used at work.

Answer: False

83. Clicking on an icon with the mouse is a form of giving an instruction to the computer.

Answer: True

84. Output devices store instructions or data that the CPU processes.

Answer: False (memory)

85. The CPU and memory are located on a special circuit board in the system unit called the motherboard.

Answer: True

86. Nanostructures represent the smallest human-made structures that can be built.

Answer: True

87. The main difference between a supercomputer and a mainframe is that supercomputers are designed to execute a few programs as quickly as possible, whereas mainframes are designed to handle many programs running at the same time (but at a slower pace).

Answer: True

88. Being computer fluent means that you should be able to build a computer yourself.

Answer: False

89. Embedded computers are self-contained computer devices that have their own programming and do not receive input.

Answer: True

90. A Web browser is a special device that is installed in your computer that allows it to communicate with other devices on a network.

Answer: False (network adapter)

91. With a wireless network, it is easier to relocate devices.

Answer: True

92. The most common type of memory that the computer uses to process data is ROM.

Answer: False (RAM)

Why the document you created at home displays with a different font at school?

Because you have a different printer at school than at home Because you have a different monitor at school than at home

font you used at home is not installed on your school computer Because the version of Windows is different

 

2. Which keyboard shortcut centers selected text?

Ctrl+C Alt+C There is no keyboard shortcut for this operation Ctrl+E

 

3. What is the default file extension for all Word documents?

TXT WRD FIL DOC

 

4. Which key moves your cursor from one cell to the next in a table?

Tab Shift Enter Ctrl+Enter

 

5. How many different documents can you have open at one time?

No more that three Only one As many as your computer memory will hold No more than your Taskbar can display

 

6. In order to email a Word document from within Word:

Go to File/Send To/Mail Recipient Save the file as an email attachment Start Outlook and attach the file while open in Word. This is an impossible operation

 

7. Which keystroke will take you at the beginning or the end of a long document?

Ctrl+PageUp and Ctrl+PageDown Shift+Home and Shift+End Ctrl+Home and Ctrl+End The only way is by using the right scroll bar

 

8. How many margins are on a page?

Two (header and footer) Four (top, bottom, right, left) Two (landscape and Portrait) Two (top and bottom)

 

9.In order to save a Word document as a web page you need to:

Put the appropriate graphics and links on the document Save the document in simple text format Use your web browser as an editor and save as URL Save as HTML

 

10. A document in portrait prints:

The same characters per line with the same document in landscape More characters per line than the same document in landscape Less characters per line than the same document in landscape Smaller fonts in order to fit the same amount of characters per line with landscape

1. ------- is associated with web services.

a) WSDL     b) WML     c) web sphere     d) web logic

Ans: a

2.any large single block of data stored in a database, such as a picture or sound file, which does not include record fields, and cannot be directly searched by the database’s search engine.

a) TABLE    

b) BLOB    

c) VIEW    

d) SCHEME

Ans: b

3.A reserved area of the immediate access memory used to increase the running speed of the computer program.

a) session memory

b) bubble memory

c) cache memory

d) shared memory

Ans: c

4.a small subnet that sit between a trusted internal network and an untruster external network, such as the public internet.

a) LAN

b) MAN

c) WAN

d) DMZ

Ans: d

5.technologies that use radio waves to automatically identify people or objects,which is very similar to the barcode identification systems,seen in retail stores everyday.

a) BLUETOOTH

b) RADAR

c) RSA SECURE ID

d) RFID

Ans: d

6.main(){

float fl = 10.5;

double dbl = 10.5

if(fl ==dbl)

printf(“UNITED WE STAND”);

else

printf(“DIVIDE AND RULE”)

}

What is the output?

a) compilation error

b) UNITED WE STAND

c) DIVIDE AND RULE

d) Linkage error.

Ans: c

7.main(){

static int ivar = 5;

printf(“%d”,ivar--);

if(ivar)

main();

}

What is the output?

a)1 2 3 4 5

b) 5 4 3 2 1

c)5

d) Compiler error:main cannot be recursive function.

Ans: b

8.main()

{

extern int iExtern;

iExtern = 20;

printf(“%d”,iExtern);

}

What is the output?

a)2

b) 20

c) compile error

d) linker error

Ans: d

9..#define clrscr() 100

main(){

clrscr();

printf(“%d\n\t”, clrscr());

}

What is the output?

a)100 b)10 c)compiler errord)linkage error

Ans: a

10.main()

{

void vpointer;

char cHar = ‘g’, *cHarpointer = “GOOGLE”;

int j = 40;

vpointer = &cHar;

printf(“%c”,*(char*)vpointer);

vpointer = &j;

printf(“%d”,*(int *)vpointer);

vpointer = cHarpointer;

printf(“%s”,(char*)vpointer +3);

}

What is the output?

a) g40GLE

b) g40GOOGLE

c) g0GLE

d) g4GOO

Ans: a

11.#define FALSE -1

#define TRUE 1

#define NULL 0

main() {

if(NULL)

puts(“NULL”);

else if(FALSE)

puts(“TRUE”);

else

puts(“FALSE”);

}

What is the output?

a) NULL

b) TRUE

c) FALSE

d)0

Ans: b

12.main() {

int i =5,j= 6, z;

printf(“%d”,i+++j);

}

What is the output?

a)13

b)12

c)11

d) Compiler error

Ans: c

13.main() {

int i ;

i = accumulator();

printf(“%d”,i);

}

accumulator(){

_AX =1000

}

What is output?

a)1

b)10

c)100

d)1000

Ans: d

14.main() {

int i =0;

while(+(+i--)!= 0)

i- = i++;

printf(“%d”,i);

}

What is the output?

a) -1

b) 0

c) 1

d) Will go in an infinite loop

Ans: a

15.main(){

int i =3;

for(; i++=0;)

printf((“%d”,i);

}

What is the output?

a) 1

b) 2

c) 1 2 3

d) Compiler error : L value required.

Ans: d

16. main(){

int i = 10, j =20;

j = i ,j?(i,j)?i :j:j;

printf(“%d%d”,i,j);

}

What is the output?

a) 20 20

b) 20 10

c) 10 20

d) 10 10

Ans: d

17.main(){

extern i;

printf(“%d\t”,i);{

int i =20;

printf(“%d\t”,i);

}

}

What is the output?

a) “Extern valueof i “ 20

b) Externvalue of i”

c) 20

d) linker Error: unresolved external symbol i

Ans: d

18.int DIMension(int array[]){

return sizeof(array/sizeof(int);}

main(){

int arr[10];

printf(“Array dimension is %d”,DIMension(arr));

}

What is output?

a) array dimension is 10

b) array dimension is 1

c) array dimension is 2

d) array dimension is 5

Ans: b

19. main(){

void swap();

int x = 45, y = 15;

swap(&x,&y);

printf(“x = %d y=%d”x,y);

}

void swap(int *a, int *b){

*a^=*b, *b^=*a, *a^ = *b;

What is the output?

a) x = 15, y =45

b) x =15, y =15

c) x =45 ,y =15

d) x =45 y = 45

Ans: a

20.main(){

int i =257;

int *iptr =&i;

printf(“%d%d”,*((char*)iptr),*((char *)iptr+1));

}

What is output?

a)1, 257

b)257 1c)0 0d)1 1

Ans: d

21.main(){

int i =300;

char *ptr = &i;

*++ptr=2;

printf(“%d”,i);

}

What is output?

a) 556

b) 300

c) 2

d) 302

Ans: a

22.#include

main(){

char *str =”yahoo”;

char *ptr =str;

char least =127;

while(*ptr++)

least = (*ptr

printf(“%d”,least);

}

What is the output?

a) 0

b)127

c) yahoo

d) y

Ans: a

23.Declare an array of M pointers to functions returing pointers to functions returing pointers to characters.

a) (*ptr[M]()(char*(*)());

b) (char*(*)())(*ptr[M])()

c) (char*(*)(*ptr[M]())(*ptr[M]()

d) (char*(*)(char*()))(*ptr[M])();

24.void main(){

int I =10, j=2;

int *ip = &I ,*jp =&j;

int k = *ip/*jp;

printf(“%d”,k);

}

What is the output?

a) 2

b) 5

c) 10

d) compile error:unexpected end of file in comment started in line 4

Ans: d

25.main(){

char a[4] =”GOOGLE”;

printf(“%s”,a);

}

What is the output?

a) 2

b) GOOGLE

c) compile error: yoo mant initializers

d) linkage error.

Ans: c

26.For 1MB memory, the number of address lines required

a) 12

b) 16

c) 20

d) 32

Ans: 16

27.There is a circuit using 3 nand gates with 2 inputes and 1 output,f ind the output.

a) AND

b) OR

c) XOR

d) NAND

Ans: b (not sure)

28. What is done for push operation

a) SP is incremented and then the value is stored.

b) PC is incremented and then the value is stored.

c) PC is decremented and then the value is stored.

d) SP is decremented and then the value is stored.

Ans: d

29.Memory allocation of variables declared in a program is:

a) Allocated in RAM

b) Allocated in ROM

c) Allocated in stack

d) Assigned in registers.

Ans: c

30.What action is taken when the processer under execution is interrupted by TRAP in 8085MPU?

a) Processor serves the interrupt request after completing the execution of the current instruction.

b) processer serves the interrupt request after completing the current task.

c) processor serves the interrupt immediately.

d) processor serving the interrupt request depent deprnds upon the priority of the current task under execution.

Ans: a

31.purpose of PC (program counter)in a microprocessor is:

a) To store address of TOS(top of stack)

b) To store address of next instructions to be executed

c) count the number of instructions

d) to store the base address of the stack.

Ans: b

32.conditional results after execution of an instruction in a microprocess is stored in

a) register

b) accumulator

c) flag register

d) flag register part of PSW (program status word)

Ans: c

33.The OR gate can be converted to the NAND function by adding----gate(s)to the input of the OR gate.

a) NOT

b) AND

c) NOR

d) XOR

Ans: a

34. In 8051 microcontroller , has a dual function.

a) port 3

b) port 2

c) port 1

d) port 0

Ans: b

35.An 8085 based microprocessor with 2MHz clock frequency,will execute the following chunk of code with how much delay?

MVI B,38H

HAPPY: MVI C, FFH

SADDY: DCR C

JNZ SADDY

DCR B

JNC HAPPY

a) 102.3

b)114.5

c)100.5

d)120

36.In 8085 MPU what will be the status of the flag after the execution of the following chunk of code.

MVI B,FFH

MOV A,B

CMA

HLT

a) S = 1, Z = 0, CY = 1

b) S = 0, Z = 1, CY = 0

c) S = 1, Z = 0, CY = 0

d) S = 1, Z = 1 ,CY = 1

37.A positive going pulse which is always generated when 8085 MPU begins the machine cycle.

a) RD

b) ALE address latch enable…

c) WR

d) HOLD

Ans: b

38.when a ----- instruction of 8085 MPU is fetched , its second and third bytes are placed in the W and Z registers.

a) JMP

b) STA

c) CALL

d) XCHG

Ans: c

39.what is defined as one subdivision of the operation performed in one clock period.

a) T- State

b) Instruction Cycle

c) Machine Cycle

d) All of the above

Ans: a

40.At the end of the following code, what is the status of the flags.

LXI B, AEC4H

MOV A,C

ADD HLT

a) S = 1, CY = 0, P = 0 , AC = 1

b) S =0 , CY = 1, P = 0,AC = 1

c) S = 0, CY = 1, P = 0 , AC = 1

d) S = 0, CY = 1, P = 1 , AC = 1

41.In 8051 micro controller what is the HEX number in the accumulator after the execution of the following code.

MOV A,#0A5H

CLR C

RRC A

RRC A

RL A

RL A

SWAP A

a)A6

b)6A

c)95

d)A5.

Ans: a

42.The Pentium processor requires ------------ volts.

a)9 b)12 c)5 d)24

ans; c

43. The data bus on the Celeron processor is-------bits wide.

a)64 b)32 c)16 d)128. Ans: a

44.K6 processor

a) Hitachi b) toshiba c) zilog d) AMD. Ans: d

45. What is the control word for 8255 PPI,in BSR mode to set bit PC3.

a)0EH b)0FH c)07H d)06H. ans:c

46.The repeated execution of a loop of code while waiting for an event to occur is called ---------.The cpu is not engaged in any real productive activity during this period,and the process doesn’t progress towards completion.

a) dead lock b) busy waiting c) trap door d) none.

Ans: b

47. Transparent DBMS is defined as

a) A DBMS in which there are no program or user access languages. b) A DBMS which has no cross file capabilities but is user friendly and provides user interface management. c) A DBMS which keeps its physical structure hidden from user d) none.

Ans: c

48.Either all actions are carried out or none are. users should not have to worry about the effect of incomplete transctions.DBMS ensures this by undoing the actions of incomplete transctions.this property is known as

a) Aggregation b) atomicity c) association d) data integrity.

ans : B…

49.------ algorithms determines where in available to load a program. common methods are first fit,next fit,best fit.--------- algorithm are used when memory is full , and one process (or part of a process) needs to be swaped out to accommodate a new program.The ------------- algorithm determines which are the partions to be swaped out.

a) placement, placement, replacement

b) replacement, placement, placement

c) replacement, placement, replacement

d) placement, replacement, replacement Ans: D

50.Trap door is a secret undocumented entry point into a program used to grant access without normal methods of access authentication. A trap is a software interrupt,usually the result of an error condition.

a)true b)false.

Ans: A

51. Given a binary search tree,print out the nodes of the tree according t5o post order traversal.

4

/ \

2 5

/ \

1 3

a)3,2,1,5,4. b)1,2,3,4,5. c)1,3,2,5,4. d)5,3,1,2,4. Ans: C

52.which one of the following is the recursive travel technique.

a)depth first search b)preorder c)breadth first search d)none.

53.which of the following needs the requirement to be a binary search tree.

a) 5

/ \

2 7

/

1

b) 5

/ \

6 7

c) 5

/ \

2 7

/\

1 6

d) none.

54.in recursive implementations which of the following is true for saving the state of the steps

a) as full state on the stack

b) as reversible action on the stack

c) both a and b

d) none

55.which of the following involves context switch

a)previliged instruction

b)floating point exception

c)system calls

d)all

e)none

ans : c

56.piggy backing is a technique for

a)acknowledge

b)sequence

c)flow control

d)retransmission

ans:A

57. a functional dependency XY is ___________dependency if removal of any attribute A from X means that the dependency does not hold any more

a)full functional

b) multi valued

c)single valued

d)none

ans : a

58)a relation schema R is in BCNF if it is in ___________and satisfies an additional constraints that for every functional dependency XY,X must be a candidate key

a)1 NF

b)2 NF

c)3 NF

d)5 NF

59) a _________sub query can be easily identified if it contains any references to the parent sub query columns in the _________ clause

A) correlated ,WHERE

b) nested ,SELECT

c) correlated,SELECT

d) none

60) hybrid devise that combines the features of both bridge and router is known as

a)router b)bridge c)hub d)brouter

61) which of the following is the most crucial phase of SDLC

a)testing b)code generation c) analysys and design d)implementation

Ans: c

62)to send a data packet using datagram ,connection will be established

a)no connection is required

b) connection is not established before data transmission

c)before data transmission

d)none

Ans: c

63)a software that allows a personal computer to pretend as as computer terminal is

a) terminal adapter

b)terminal emulation

c)modem

d)none

Ans: b

64) super key is

a) same as primary key

b) primary key and attribute

c) same as foreign key

d) foreign key and attribute

Ans: b

65.In binary search tree which traversal is used for ascending order values

a) Inorder b)preorder c)post order d)none

Ans: a

66.You are creating an index on ROLLNO colume in the STUDENT table.which statement will you use?

a) CREATE INDEX roll_idx ON student, rollno;

b) CREATE INDEX roll_idx FOR student, rollno;

c) CREATE INDEX roll_idx ON student( rollno);

d) CREATE INDEX roll_idx INDEX ON student (rollno);

Ans: c

67.A________class is a class that represents a data structure that stores a number of data objects

a. container ponent c.base d.derived

Ans: a

68.Which one of the following phases belongs to the compiler Back-end.

a. Lexical Analysis b.Syntax Analysis c. Optimization d.Intermediate Representation.

Ans: c

69.Every context _sensitive language is context_free

a. true b.false

Ans: b

70.Input:A is non-empty list of numbers L

Xß-infinity

For each item in the list L,do

If the item>x,then

Xß the item

Return X

X represents:-

a)largest number

b)smallest number

c)smallest negative number

d) none

71.Let A and B be nodes of a heap,such that B is a child of A. the heap must then satisfy the following conditions

a)key(A)>=key(B)

b)key(A)

c)key(A)=key(B)

d)none

72.String ,List,Stack,queue are examples of___________

a)primitive data type

b)simple data type

c)Abstract data type

d)none

Ans: c

73.which of the following is not true for LinkedLists?

a)The simplest kind of linked list is a single linked list ,which has one link per node .this link points to the next node in the list,or to a null value or emptylist if it is the last node.

b)a more sophisticated kind of linked list is a double linkedlist or two way linkedlist .Each node has two links ,one to the previous node and one to the next node.

c) in a circleLinkedList ,the first and last nodes are linked together.this can be done only for double linked list.

d) to traverse a circular linkedlist ,u begin at any node and follow the list in either direction until u return to the original node.

Ans: c

74.sentinel node at the beginning and /or at the end of the linkedlist is not used to store the data

a) true

b) false

Ans:a

1. Do u know abt Recursive functions?? YES. Then write a recursive function to display Fibonacci series.

2. Fibonacci using normal loops and conditional statements.

3. Wat do u mean by scope of variables??  

4. Then He gave me a program where one was a global, one was extern and so on and he asked me the o/p.

5. Write an algorithm to add a node to a linked list using pointers:

i) at the start,

ii) at the end,

iii) in the middle.

6. Wat do u mean by Dynamic memory allocation?

7. Wat is the difference between Malloc and Calloc??

8. Syntax for malloc while initializing a node in linked list

9. How do u use malloc to initialize an array?

10.Wat is the difference between C and C++?

11. An array of numbers from 1 to 100. random selection of 99 numbers. write an efficient algorithm to find the unselected number.

12.These and some basic questions based on strings lik strlen, strcmp, concatenating of strings.

13. He gave me a program where an array of size  10 was initialized, a string of size 6 was input and after concatenating another string of size6 wats the o/p?

Computers General knowledge Questions and answers

Where are files and websites on the internet stored?

Ans:The internet is a collection of a large number of client-server based systems. So all files and other resources on it are stored on secondary storage devices of the respective servers. Servers of websites are termed as web servers. So when you type in a URL of a website in the address bar of your browser, it makes a connection to that web server which in turn fetches the data from the secondary storage device (such as the hard disk) that they must be using and returns it to the respective browser. The same holds true for any other resource (image, MP3 file, zipped file, etc.) that you access on the internet.

2 Who invented the QWERTY keyboard?

Ans: QWERTY keyboard (also known as universal keyboard) is used in modern computers. The name QWERTY comes from the first six letters in the top row. It was invented by C L Sholes in 1872.

3 What is the full form of TFT in computer and mobile screens?

Ans: Thin Film Transistor (TFT) is a type of LCD flat-panel display screen. It’s called so because each pixel is controlled by transistors. TFT technology provides the best resolution of all the flat-panel technologies, but it is also the most expensive. TFT displays are usually designed to run at a specific resolution.

4 What does the term ‘screen slave’ mean?

Ans: Screen slaves refers to people who are abnormally addicted to the computer. For example, screen slaves would communicate via e-mail with people sitting right next to them. The screen slave culture, which is particularly rampant in offices the world over, is adding to the sedentary lifestyle of white collar workers, thereby increasing related disorders such as obesity, heart disease and Repetitive Stress Injury.

5 What is a TFT monitor?

Ans: Thin Film Transistor (TFT) Liquid Crystal Display technology does away with the traditional bulky Cathode Ray Tube (CRT). LCDs use a strong backlight as the light source and control how much of this light is allowed to reach the dots (pixels) by selectively allowing the light to reach each pixel. LCDs achieve this by taking advantage of a key property of ‘twisted’ liquid crystal molecules; their ability to naturally block polarised light but then let it through by degrees when a small electric field is applied. LCD cells are accurately controlled and arranged in a flat matrix of rows and columns.

6 What is a ‘firewall’ in computer terminology?

Ans: In computer security, a firewall is a device that blocks unauthorised access to an organisation’s local area network. A firewall can reside on the administrative computer, the server that acts as the LAN’s gateway to the Internet. The firewall keeps track of every file entering or leaving the local area network in order to detect the source of viruses and other problems that might enter the network.

7 What is a handshake in computers?

Ans: Handshake is the process by which two computers initiate communication. A handshake begins when one sends a message to another indicating that it nature of quantum mechanics and space and time. In String Theory, all forces and particles emerge in an elegant geometrical way, realising Einstein’s dream of building everything from the geometry of space-time.

8 What is utility computing?

Ans: Utility computing is a service provisioning model in which a service provider makes computing resources and infrastructure management available to the customer as needed, and charges them for specific usage rather than a flat rate. Like other types of on-demand computing (such as grid computing), the utility model seeks to maximise the efficient use of resources and/ or minimise associated costs.

9 What is the difference between an inverter and a UPS?

Ans: Practically, both are same. An inverter converts DC power supply into AC supply. A UPS (Uninterupted Power Supply) is an electronic device which uses inverter technology in it. UPS uses AC supply when power is there, converts into DC power and stores it. This DC power is converted back to AC supply and provides stand by power when electricity goes off.

10 What is e-waste?

Ans: All obsolete electronic devices such as computers, servers, printers, monitors, TVs, cellphones, calculators, CDs, floppies, chips, processors, motherboard, PCB etc. end up as e-waste. E-waste contains many hazardous substances like PVC, plastics, heavy metals, Brominated Flame Retardants etc.

Computer-Related Abbreviations and Acronyms.

A

A-D Analog to Digital

AA Author's Alteration

AA Auto Answer

AAL5 ATM Adaption Layer 5

ABEND Abnormal End

ABI Application Binary Interface

ABR Available Bit Rate

AC97 Audio Codec 97

ACB Access method Control Block

ACDS Active Control Data Set

ACE Asynchronous Communications Element

ACF Advanced Communication Facility

ACIA Asynchronous Communications Interface Adapter

ACK Acknowledge

ACS Asynchronous Connection Server

ACS Automatic Class Selection

ACSE Application Control Service Element

ACT Application Control Table

ACU Automatic Calling Unit

ADC Analog Digital Converter

ADDMD Administrative Directory Management Domain

ADMD Administrative Management Domain

ADO ActiveX Data Object

ADSL Asymetric Digital Subscriber Line

AEA Activity End Acknowledge

AEI Application Entity Invocation

AF Application Framework

AFP Advanced Function Printing

AGP Accellerated Graphics Port

AGS Advanced Graphics System

AI Artificial Intelligence

AIU Application Interface Unit

AIX Advanced Interactive eXecutive

AIX Alternate IndeX

ALGOL ALGOrithmic Language

ALS Application Layer Structure

ALS Automatic Line Switching

ALT Application Load Table

ALU Arithmetic and Logic Unit

AM Access Method

AMH Automated Material Handling

AMI Alternate Mark Inversion

AMIS Audio Messaging Interchange Specification

AMR Audio Modem Riser

AMS Access Method Services

ANR Automatic Network Routing

ANS Advanced Network Services

ANSI American National Standards Institute

AOCE Apple Open Collaboration Environment

AOW Asian and Oceanic Workshop for open systems

AP Access Point

AP Automation Protocol

APA All Points Addressable

APDU Application Protocol Data Unit

API Application Programming Interface

APIA API Association

APL A Programming Language

APPC Advanced Program-to-Program Communication

APPI Advanced Peer-to-Peer Internetwork(ing)

APPN Advanced Peer-to-Peer Network(ing)

APS Advanced Production System

AR Attention Routine

ARP Address Resolution Protocol

ARPA Advanced Research Projects Agency

ARPANET Advanced Research Projects Agency Network

ARU Audio Response Unit

AS Activity Start

AS Autonomous System

ASC Accredited Standards Committee

ASCII American Standard Code for Information Interchange

ASE Application Service Element

ASIC Application-Specific Integrated Circuit

ASN Abstract Syntax Notation

ASN.1 Abstract Syntax Notation One

ASO Application Service Object

ASP Active Server Pages

ASR Automatic Speech Recognition

ASTs Asynchronous System Traps

AT Advanced Technology

ATM Adobe Type Manager

ATM Asynchronous Transfer Mode

ATM Automatic Teller Machine

ATMP Ascend Tunnel Management Protocol

ATSF Alert Transport Service Facility

AU Access Unit

AVR Automatic Volume Recognition

AWG American Wire Gauge

B

B8ZS Binary Eight Zero Substitution

BABT British Approvals Board for Telecommunications

BAL Business Application Language

BAM Basic Access Methods

BAS Basic Activity Subset

BASH Bourne-Again SHell

BASIC Beginners All-Purpose Symbolic Instruktion Code

BBS Bulletin Board System

BCC Block Check Character

BCD Binary Coded Decimal

BCF Bridge Control Facility

BCPL Basic Combined Programming Language

BCS Basic Catalog Structure

BCS Basic Combined Subset

BDAM Basic Direct Access Method

BDR Basic Density Range

BEL Bell

BER Bit Error Rate

BES Bursty Errored Seconds

BG BackGround

BHT Branch History Table

BIOS Basic Input/Output System

BIS Business Information System

BISYNC Binary Synchronous Communication

BIT Binary Digit

BITNIC Bitnet Network Information Center

BLOB Binary Large Object

BMIC Bus Master Interface Controller

BMP BitMaP

BMS Basic Mapping Support

BNN Boundary Network Node

BOC Bell Operating Companies

BOT Begin Of Tape

BP Base Pointer

BPAM Basic Partitioned Access Method

BPI Bytes Per Inch

BPS Bites Per Second

BRA Basic Rate Access

BRI Basic Rate Interface

BS Backspace / British Standard

BSA Basic Service Area

BSAM Basic Sequential Access Method

BSC Binary Synchronous Communication

BSD Berkeley Software Distribution

BSDS BootStrap Data Set

BSI British Standards Institute

BSS Basic Synchronous Subset

BTAC Branch Target Address Cache

BTAM Basic Teleprocessing Access Method

BTA-ES Basic Teleprocessing Access Method - Extended Storage

BYP Bypass

C

CA Collision Avoidance

CA... Computer Aided ...

CAA Computer Aided Architecture

CAD Computer Aided Design

CADD Computer Aided Design and Drafting

CADIS Computer Aided Design Interactive System

CAE Common Application Environment

CAE Computer Assisted Education, Computer Aided Engineering = CAD +

CAP + CAQ

CAH Computer Aided Handling

CAI Computer Aided Instruction = CIM + CAO

CAISE Computer Aided Integrated Software Engineering

CALS Computer Aided Acquisition and Logistic Support

CAM Computer Aided Manufacturing / Content Adressable Memory

CAMAC Computer Automated MeAsurement Control

CAN Cancel

CAO Computer Aided Office

CAP Computer Aided Planning / Computer Aided Publishing

CAPP Computer Aided Production Planning

CAPPC Computer Aided Production Planning and Control

CAPSC Computer Aided Production Scheduling and Control

CAQ Computer Aided Quality Assurance

CAR Computer Aided Roboting

CAR Computer Assisted Radiology

CAS Computer Aided Selling

CASE Common Application Service Elements

CASE Computer Aided Software-Engineering

CAT Computer Aided Testing

CATV CAble TeleVision

CBDS Connectionless Broadband Data Service

CBEMA Computer and Business Equipment Manufacturers' Association

CBR Constant Bit Rate

CBT Computer Based Training

CCD Charge-Coupled Device

CCETT Centre Commun d'Etudes de Telediffusion et Telecommunications

CCIR International Radio Consultative Committee

CCITT Comite Consultatif International Telegraphique et Telephonique

CCR Committment, Concurrency and Recovery

CCS Common Communication Support

CCTA Central Computer and Telecommunications Agency

CCU Communication Control Unit

CCW Channel Command Word

CD Collision Detection

CD Compact Disk

CDB Command Descriptor Block

CDC Century Date Change

CDDA Compact Disk - Digital Audio

CDDI Copper Data Distribution Interface

CDE Common Desktop Environment

CDG Compact Disk - Graphic

CDI Compact Disk Interactive

CDMA Code Division Multiple Access

CDPD Cellular Digital Packet Data

CDR Copy Density Range

CDROM Compact Disk ROM

CDTV Commodore Total Vision

CDXA Copmact Disk eXtended Architecture

CEC Commission of European Communities

CEFIC Conseil Européen des Federations de l'Industrie Chimique

CELP Code Excited Linear Prediction

CEN Comité Européen de Normalisation

CENELEC Comité Européen de Normalisation Electrotechnique

CEO Comprehensive Electronic Office

CEPT Conference Européenne des Administrations des Postes et

des Telecommunications

CERN Conseil Européen pour la Recherche Nucléaire

CF Call Forwarding

CF Carry Flag

CF Control Function

CFV Call For Votes

CGA Colour Graphics Adapter

CGI Common Gateway Interface

CGI Computer Graphics Interface

CGM Computer Graphics Metafile

CHAP Challenge-Handshake Authentication Protocol

CHL-I CHanneL Interface

CHPID CHannel Path IDentifier

CI Computer Interconnect

CI Control Interval

CIAM Computer Integrated and Automated Manufacturing

CIB Computer Integrated Business

CICS Customer Information Control System

CID Configuration, Installation and Distribution

CIF Cells In Frames

CIF Common Intermediate Format

CIF Computer Integrated Factory = CIO + CIM

CIM Computer Input by Microfilm

CIM Computer Integrated Manufacturing = PPS + CAE + CAM

CIO Computer Integrated Office

CIR Committed Information Rate

CIS Card Information Structure

CISC Complex (Complete) Instruction Set Computer

CIT Computer Integrated Telephony

CIV Conversation Verb Interface

CKD Count Key Data

CL Core Image Library

CL Connectionless

CLI Call Level Interface

CLIM Compaq/Lotus/Intel/Microsoft

CLNS Connectionless Network Service

CM/2 Communication Manager / 2

CMC Communication Management Configuration

CMEA Council for Mutual Economic Assistance

CMIP Common Management Information Protocol

CMIS Common Management Information Service

CMOS Cellular Management Operation System

CMOS Complimentary Metal Oxide Semiconductor

CMOT Common Management Information Protocol (CMOT) Over TCP/IP

CMR Communications Resource Manager

CMS Conversational Monitor System

CMYK Cyan, Magenta, Yellow, Black

CN Corporate Network

CNC Computerized Numerical Control

CNLP Connectionless Network Protocol

CNM Communication Network Management

CNMA Communication Network for Manufacturing Applications

CNR Carrier-to-Noise-Ratio

COBOL COmmon Business Oriented Language

COCOM Coordinating Comittee on Multilateral Export Controls

CODASYL COnference on DAta SYstems Languages

Codec Coder/Decoder

COFF Common Object File Format

COM Common Object Model

COM Computer Output on Microfilm

COMAL COMmon Algorithmic Language

COMREG Communication Region

CONS Connection-Oriented Network Service

CORBA Common Object Request Broker Architecture

COS Corporation for Open Systems

COSE Common Open Software Environment

COSINE Cooperation for OSI Networking in Europe

COSS Cross Operating System Service

CP Control Program

CP-SVR Control Point to Server

CP/M Control Program/Monitor (for Microcomputer)

CPE Customer Premises Equipment

CPI Characters Per Inch

CPI Common Programming Interface

CPI Computer to PABX Interface

CPIC Common Programming Interface for Communications

CPL Current Privilege Level

CPR Computerized Patient Record

CPS Characters Per Second

CPU Central Processing Unit

CR Carriage Return

CR Communication Region

CRC Cyclic Redundancy Check

CRJE Conversational Remote Job Entry

CRS Computer Reservation System

CRS Configuration Report Server

CRT Cathode Ray Tube

CS Communications Server

CSA Common System Area

CSC Cross System Consistency

CSDN Circuit Switched Data Network

CSECT Control Section

CSI Consolidated Software Inventory

CSLIP Compressed SLIP

CSMA/CA Carrier Sense Multiple Access with Collision Avoidance

CSMA/CD Carrier Sense Multiple Access with Collision Detection

CSP Control Sequence Prefix

CSP Cross System Product

CSPDN Circuit Switched Public Data Network

CSS Cascading Style Sheet

CST Computer Supported Telephony

CSU Channel Service Unit

CSU/DSU Channel Service Unit / Data Service Unit

CT Continuous Tone

CT2T Continuous Tone To Tape

CTC Channel To Channel

CTC CICS To CICS

CTS Clear To Send

CTS Conformance Test System

CTS-WAN Conformance Testing Services for WAN

CU Control Unit

CUA Common User Access

CUT Control Unit Terminal

CVOL Control VOLume

CWS Coalition for Working Systems

D

D/A Digital/Analog

DA Desk Accessory

DAC Digital Analog Converter

DAC Dual Attachment Concentrator

DAI Distributed Artificial Intelligence

DAM Direct Access Method

DAP Directory Access Protocol

DAP Document Application Profile

DARPA Defense Advanced Research Projects Agency

DAS Dual Attachment Station

DASD Direct Access Storage Device

DAT Digital Audio Tape

DAT Dynamic Address Translation

DB Database

DBCS Double Byte Character Set

DBMS DataBase Management System

DBRT Directed Beam Refresh Terminal

DC Data Cartridge

DC Data Communication

DCA Document Content Architecture

DCAF Distributed Console Access Facility

DCB Data Control Block

DCB Disk Coprocessor Board

DCC Diskette Controller Chip

DCE Data Circuit terminating Equipment

DCE Data Communications Equipment

DCE Distributed Computing Environment

DCI Display Control Interface

DCL Digital Command Language

DCS Desktop Color Separation

DCT Destination Control Table

DCT Discrete Cosine Transform

DD Data Definition

DDCMP Digital Data Communications Message Protocol

DDCS Distributed Database Connecion Services/2

DDE Dynamic Data Exchange

DDES Digital Data Exchange Specifications

DDI Device Driver Interface

DDK Driver Development Kit

DDL Data Definition Language

DDL Document Description Language

DDM Distributed Data Management

DDN Defense Data Network

DDP Distributed Data Processing

DDRM Device driver interface/Driver kernel interface

Reference Manual

DDS Dataphone Digital Service

DDS Decision Support System

DECT Digital European Cordless Telephone

DECUS Digital Equipment Computer Users Society

DEL Delete

DES Data Encryption Standard

DF Direction Flag

DFC Distributed Coordination Function

DFDSS Data Facility Data Set Services

DFHSM Data Facility Hierarchical Storage Manager

DFP Data Facility Product

DFR Document Filing and Retrival

DFS Distributed File System

DFSMS Data Facility Storage Management Subsystem

DFSORT Data Facility Sort

DFT Distributed Function Terminal

DFWMAC Distributed Foundation Wireless Media Access Control

DHCP Dynamic Host Configuration Protocol

DHTML Dynamic HTML

DIA Document Interchange Architecture

DIB Data Input Bus

DIB Device Independent Bitmap

DIFS Distributed coordination function InterFrame Space

DIMM Dual Inline Memory Module

DIP Dual Inline Package

DIS Draft International Standard

DISSOS Distributed Office Support System

DIT Directory Information Tree

DKI Driver Kernel Interface

DL Data Length

DL Directory Listing

DL/1 Data Language 1

DLBL Disk Label

DLCI Data Linc Connection Identifier

DLE Data Link Escape

DLL Dynamic Link Library

DLS Device Level Selection

DLSE Device Level Selection Enhanced

DLSw Data Link Switching

DLUR Dependent LU Requester

DLUR/S Dependent LU Requester / Server

DLUS Dependent LU Server

DMA Direct Memory Access

DMCI Direct Memory Communications Interface

DMD Directory Management Domain

DMI Digital Multiplexed Interface

DML Data(base) Manipulation Language

DMNL Direct Multi Network Link

DMP Dot Matrix Printer

DN Distinguished Name

DNA Digital Network Architecture

DNS Domain Name Service

DOC Display Operator Console

DOE Distributed Objects Everywhere

DOMF Distributed Object Management Facility

DOS Declaration Of Support

DOS Disk Operating System

DOS/VS Disk Operating System / Virtual Storage

DOS/VSE Disk Operating System / Virtual Storage Extended

DP Data Processing

DP Draft Proposal

DPA Document Printing Application

DPF Data Private Facility

DPI Dots Per Inch

DPL Descriptor Privilege Level

DPMS Display Power Management Signaling

DPS Dynamic Path Selection

DQDB Distributed Queue Dual Bus

DRAM Dynamic Random Access Memory

DRQ Data ReQuest

DS Digit Select

DS Directory System

DSA Directory System Agent

DSA Distributed Systems Architecture

DSA Dynamic Storage Area

DSF Device Support Facility

DSL Direct Swift Link

DSN DataSetName

DSN Distributed Systems Network

DSNL Direct Swift Network Link

DSOM Distributed System Object Model

DSP Digital Signal Processor

DSP Directory System Protocol

DSR Data Set Ready

DSSI Digital Storage Systems Interconnect

DSU Data Service Unit

DTAM Document Transfer, Access and Manipulation

DTD Document Type Definition

DTE Data Terminal Equipment

DTI Department of Trade and Industry (UK)

DTP DeskTop Publishing

DTR Data Terminal Ready

DU Data Unit

DUA Directory User Agent

DUN Dispatch Unit Number

DVI Digital Video Interface

DVST Direct View Bistable Storage

DXI Data eXchange Interface

E

E1 2,048 Mbps

E3 34 Mbps

EARN European Academic and Research Network

EB Error Bell

EB ExaByte (1,152,921,504,606846,976 bytes)

EBAM Electronic Beam-Addressable Memory

EBCD Extended Binary Coded Decimal

EBCDIC Extended Binary Coded Decimal Interchange Code

ECC Error Checking and Correction

ECC Error Correction Code

ECE Economic Commission for Europe

ECF Enhanced Connectivity Facility

ECITC European Committee fo IT Testing and Certification

ECKD Extended Count-Key Data

ECMA European Computer Manufacturers Association

ECTUA European Counsil for Telecommunications Users Association

EDC Enterprise Database Connectivity

EDF Execution Diagnostic Facility

EDG Electronic Dot Generation

EDI Electronic Data Interchange

EDICON EDI Community for the Construction Industry (UK)

EDIF Electronic Design Interchange Format

EDIFACT Electronic Data Interchange For Administration, Commerce and

Transport

EDIM Electronic Data Interchange Message

EDIMS EDI Messaging System

EDM Engineering Data Management

EDP Electronic Data Processing

EDR Early Device Release

EEMA European Electronic Mail Association

EFT Electronic Funds Transfer

EGA Enhanced Graphics Adapter

EGP Exterior Gateway Protocol

EHLLAPI Emulator High Level Language Applications Programming Interface

EIB Execute Interface Block

EIP Execute Interface Program

EISA Extended Industry Standard Architecture

EIT Encoding Information Type

EIUF European ISDN User Forum

ELAN European LAN

ELAN Extended LAN

ELAN Emulated LAN

EM End of Medium

EMA Enterprise Management Architecture

EMS Expanded Memory Specification

EMUG European MAP Users Group

EN European Norme

ENE Enterprise Network Event

ENP Enable Presentation

ENQ Enquiry

EO Eight Ones

EOB End of Block

EOC End of Cylinder

EOF End of File

EOJ End of Job

EOP End of Procedure

EOT End of Transmission

EOV End of Volume

EP Emulation Program

EPDE Electronic Product Data Exchange

EPOW Emergency Power Off Warning

EPROM Eraseable Programable Read Only Memory

EPS Encapsulated PostScript

EPSF Encapsulated PostScript Format

ER Entity Relationship

ERDS Error Recording Data Set

EREP Environmental Record Editing and Printing program

ES Errored Second

ESA Extended Service Area

ESC Escape

ESCON Enterprise System Connection Architecture

ESD Electronic Software Distribution

ESD External Symbol Dictionary

ESDI Enhanced Small Device Interface

ESDS Entry Sequenced Data Set

ESF Extended SuperFrame

ESPRIT European Strategic Programme for Research and development in

Information Technology

ESQA Extended System Queue Area

ETB End of Transmission Block

ETCOM European Testing and Certification for Office and

Manufacturing protocols

ETS European Telecommunication Standard

ETSI European Telecommunication Standards Institute

ETX End of Text

EUnet European Unix Network

EUUG European Unix User Group

EVI EVent Information

EWOS European Workshop for Open Systems

EXCP EXecute Channel Program

EZ Excessive Zeros

F

F/STP Foil STP

FA Foreign Agent

FAQ Frequently Asked Questions

FAST Federation Against Software Theft

FAT File Allocation Table

FBA Fix Block Architecture

FBA Fixed Blocked ANSI-defined printer control characters

FBM Fix Block Modus

FC File Control

FCB Format Control Buffer

FCP File Control Program

FCS Frame-Check Sequence

FCT File Control Table

FDD Fixed Disk Drive

FDDI Fiber Distributed Data Interface

FEAL Fast Data Encipherment Algorithm

FEP Front-End Processor

FF Formfeed

FH Frame Handler

FIFO First In, First Out

FIPS Federal Information Processing Standard

FLOPS Floating-point operations per second

FMLI Forms and Menu Language Interpreter

FOB Form Overlay Buffer

FOND Font family descriptor

FORTRAN FORmula TRANslator

FPU Floating Point Unit

FRAD Frame Relay Access Device

FROM Factory ROM

FRU Field Replaceable Unit

FS Field Separator

FS File Separator

FSB Front Side Bus

FSF Free Software Foundation

FSK Frequency Shift Keying

FT Fault Tolerant

FTAM File Transfer and Access Method

FTP File Transfer Protocol

FTP Foil Twisted Pair

FTTC Fibre To The Curb

FTTH Fibre To The Home

FTTP Fibre To The Building

FUP Funktionsplan

G

GAL Global Address List

GATF Graphic Arts Technical Foundation

GB GigaByte (1,073,741,824 bytes)

GCR Group Coded Recording

GDG Generation Data Group

GDS Global Directory Service

GDT Global Descriptor Table

GDTR Global Descriptor Table Register

GE Graphic Escape

GETVIS GET VIrtual Storage

GID Group ID

GIF Graphics Interchange Format

GIS Generalized Information System

GIX Global Internet Exchange

GKS Graphical Kernel System

GML Generalized Markup Language

GOSIP Government OSI Profile

GP General Protection

GPIB General-Purpose Interface Bus

GRS Global Resource Serialization

GS Group Separator

GTF Generalized Trace Facility

GUI Graphical User Interface

GUIP Graphical User Interface for Blind people

GUUG German Unix User Group

H

H&J Hyphenation and Justification

HA Home Address

HA Host Agent

HADA High Availability Disk Array

HCL Hue, Chroma, and Luminance

HDA Head-Disk Assembl

HDBV Host Data Base View

HDLC High Level Data Link Communications

HDSL High-bit rate Digital Subscriber Loop

HDTV High Definition TV

HE High End (system)

HGC Hercules Graphics Card

HIC Host Interface Computer

HLL High Level Language

HLS Hue-Lightness-Saturation

HMD Head-Mounted Display

HMMP HyperMedia Management Protocol

HMMS HyperMedia Management Schema

HPCL Hewlett-Packard Control Language

HPFS High Performance File System

HPGL Hewlett-Packard Graphical Language

HPR High Performance Routing

HR Horizontal Rule

HSB Hue-saturation-brightness

HSELAN High Speed ELAN

HSI Hue-Saturation-Intensity

HSLAN High Speed LAN

HSSI High Speed Serial Interface

HSV Hue-Saturation-Value

HT Horizontal Tab

HTML Hypertext Markup Language

HTTP Hypertext Transfer Protocol

Hz Hertz

I

I-Net Intranet

I/O Input/Output

I/O Input/Output

IA5 International Alphabet Five

IAB Internet Activities Board

IC Integrated Circuit

ICEM Integrated Computer Engineering and Manufacturing

ICMP Internet Control Message Protocol

ID Identifier

IDA Indirect Data Addressing

IDA Intelligent Drive Array

IDE Integrated Drive Electronics

IDEA International Data Encryption Algorithm

IDL Interfacce Definition Language

IDT Interrupt Descriptor Table

IEC InterExchange Carrier

IEEE Institute of Electrical and Electronic Engineers

IETF Internet Engineering Task Force

IF Interrupt Flag

IFF Interchange File Format

IFIP International Federation of Information Processing

IFS Interchange File Separator

IFS InterFrame Space

IGES Initial Graphics Exchange Specification

IGMP Internet Group Membership Protocol

IGS Interchange Group Separator

II Interactive Interface

IISP Interim Interswitch Signaling Protocol

IKT Informatione- und Kommunikationstechnik

ILC InterLanguage Communication

IML Initial Microcode Load

IMPL Initial Microprogram Load

IMR Interrupt Mask Registers

IMS Information Management System

IMS/VS Information Management System / Virtual Storage

INP Inhibit Presentation

INT INTerrupt

IOC ISDN Ordering Code

IOCP Input/Output Configuration Program

IOCS Input/Output Control System

IOGEN Input/Output device GENeration

IOPL Input/Output Privilege Level

IOS Input/Output Supervisor

IP Internet Protocol

IPL Initial Program Load

IPM InterPersonal Message

IPSE Integrated Project Support Environment

IPX Internet Packet Exchange

IR Index Return

IRC Internet Relay Chat

IRDS Information Resource Dictionary System

IRQ Interrupt ReQuest

IRS Interchange Recors Separator

IS Information System

IS Intermediate System

IS International Standard

ISA Industry Standard Architecture

ISAM Indexed Sequential Access Method

ISDN Integrated Services Digital Network

ISFMS Indexed Sequential File Management System

ISMF Interactive Storage Management Facility

ISO International Standardization Organisation

ISO IEC ISO International Electrotechnical Commitee

ISODE ISO Development Environment

ISP Internet Service Provider

ISPF Interactive System Produvtivity Facility

ISPF/PDF ISPF Program Development Facility

ISR Information Storage and Retrieval

ISR Intermediate Session Routing

ISSE Intel SIMD Sreaming Extension

ISV Independent Software Vendor

IT Indent Tab

ITB Intermediate Transmission Block

ITLD International Top-Level Domain

ITRC Information Technology Requirements Council

ITU International Comunication Union (ehem. CCITT)

ITV Interactive TeleVision

IUS Interchange Unit Separator

IWS Intelligent WorkStation

J

JCC Job Control Command

JCL Job Control Language

JCS Job Control Statement

JCT JES Control Table

JCT Journal Control Table

JECL Job Entry Control Language

JEIDA Japan Electronics Industry Development Association

JES Job Entry Subsystem

JPEG Joint Photographic Experts Group

K

K Kilobyte

KB KiloByte (1,024 Bytes)

KBPS KiloBits Per Second

kHz KiloHertz

KIP Kinetics Internet Protocol

KIPS Kilo Instructions per second

KL Key Length

KOPS Kilo Operations per second

KSDS Key Sequenced Data Set

KVA KiloVolt Ampere

L

L2F Layer 2 Forwarding

L2TP Layer 2 Tunneling Protocol

LAN Local Area Network

LAPS LAN Adapter Protocol Support Program

LBL Label

LCD Liquid Crystal Display

LCS Lotus Communication Server

LDAP Lightweight Directory Access Protocol

LDMF Librarian Disc Master File

LDS Linear Data Set

LDT Local Descriptor Table

LE Low End (system)

LEC LAN Emulation Client

LEC Local Exchange Carrier

LED Light Emitting Diode

LF Linefeed

LIC Line Interface Computer

LIFO Last In, First Out

LILO Last In, Last Out

LILO Linux Loader

LIM-EMS Lotus Intel Microsoft EMS

LIOCS Logical Input/Output Control System

LISP List Programming

LLC2 Logical Link Control Layer 2

LOC Lines Of Code

LOS Local Operator System

LPI Lines Per Inch

LRC Longitudinal Redundancy Checking

LRU Least Recently Used

LSD Least Significant Digit

LSI Large Scale Integration -> VLSI

LU Logical Unit

LUB Logical Unit Block

LUT Look Up Table

LVT Light Valve Technology

LW Line Work

LZ Lempel-Ziv

LZW Lempel-Ziv-Welch

M

MAC Media Access Control

MAN Metropolitan Area Network

MAP Maintenance Analysis Procedure

MAP Manufacturing Automation Protocol

MAPI Messaging Applications Programming Interface

MB MegaByte (1,048,576 bytes)

MBCS Multiple Byte Character Set

MBONE Multicast Backbone

MBPS MegaBits Per Second

MCA Micro Channel Architecture

MCBF Mean Cycles Between Failures

MCCOI Multimedia Communications Community of Interest

MCGA MultiColour Graphics Array

MCI Media Control Interface

MD Management Domain

MD5 Message Digest 5

MDA Monochrome Display Adapter

MEB Memory Expansion Board

MFA Modify Field Attribute

MFC Microsoft Foundation Classes

MFKS Multifunktionales Konferenzsystem

MFLOPS Million Floating-Point Operations Per Second

MFM Modified Frequency Modulation

MFV Multi File Volume

MFWS MultiFunction WorkStation

MGA Monochrome Graphic Adapter

MH Mobile Host

MHS Message Handling System

MI Multiple Inheritance

MIB Management Information Database

MICR Magnetic Ink Character Reader

MIDI Musical Instrument Digital Interface

MIME Multipurpose Internet Mail Extensions

MIPS Millions of Instructions Per Second

MISC Minimum Instruction Set Computer -> CISC, RISC

MLPPP MultiLink PPP

MMDF Multi-Channel Memorandum Distribution Facility

MMDS Multi-Megabit Data Services

MMFS Manufacturing Manage Format Standard

MMX Multi Media eXtensions

MNP Microcom Network Protocol

MODEM MOdulator/DEModulator

MOPS Mega Operations per second

MOTIS Message-Oriented Text Interchange Systems

MP Multiprocessing

MPC Multimedia PC

MPEG Motion Picture Experts Group

MPOA MultiProtocol Over Asynchronous transfer mode

MPSD MultiPath Storage Director

MPX multiplex

MS Message Store

MS-DOS Microsoft Disk Operating System

MSA Metropolitan Statistical Area

MSD Most Significant Digit

MSG Message

MSM MultiSession Monitor

MSW Machine Status Word

MTA Message Transfer Agent

MTBF MeanTime Between Failures

MTDA Mean Time Data Availability

MTS Message Transfer System

MUD Multi-User Dungeon

MULTICS MULTiplexed Information and Computing Service

MUMPS Massachusetts General Hospital Utility Multi-Programmings System

MUMPS Multi-User Multi-ProgrammingSystem

MVS Multiple Virtual System

MVS/ESA Multiple Virtual System / Extended System Architecture

MVS/XA Multiple Virtual System / Extended Architecture

MVSCP MVS Configuration Program

N

NAC Network Adapter Card

NAK Negative Acknowledgement

NAP Network Access Point

NAS Network Access Server

NAT Network Address Translation

NAU Network Addressable Unit

NBS National Bureau of Standards

NBS Numeric BackSpace

NC Numeric Control

NCCF Network Communication Control Facility

NCP Network Control Processor

NCP Network Control Program

NCP/VS Network Control Program/Virtual Storage

NDIS Network Driver Interface Specification

NetSP Network Security Program

NFNT New font numbering table

NFS Network File System

NHRP Next Hop Routing Protocol

NIC Network Interface Card

NIC Network Information Center

NIS Network Information Service

NIST National Institute for Standards and Technology

NJE Network Job Entry

NL New Line

NLQ Near Letter Quality

NLT Nucleus Load Table

NMI NonMaskable Interrupt

NNTP Network News Transport Protocol

NSA National Security Agency

NSC1 Network Systems Cypher One

NSP Numeric Space

NSS NATURAL Security-System

NT Network Termination

NTS/2 Network Transport Services/2

NTSC National Television System Committee

NUI Network User Identification

NUL Null

NUMA Non-Uniform Memory Access

NVOD Near Video On Demand

NVRAM NonVolatile Random Access Memory

NVS NonVolatile Storage

O

O/R Originator / Recipient

OC3 155 Mbit/s

OCR Optical Character Recognition

OCX OLE Control Extension

ODA Open Document Architecture

ODSI Open Directory Service Interfaces

OEM Original Equipment Manufacturer

OI Object Interface

OLE Object Linking and Embedding

OLTEP On-Line Test Executive Program

OLTP On-Line Transaction Processing

OMG Object Management Group

OMR Optical Mark Recognition

OO Objektorientierung

OOA Objektorientierte Analyse

OODBMS Object Oriented DBMS

OOP Objektorientierte Programmierung

OOPL Object Oriented Programming Language

OOPS Object Oriented Programming System

OP Operator Panel

OPI Open Prepress Interface

ORB Object Request Broker

OS Operating System

OS/2 Operating System/2

OSA Office Systems Architecture

OSA Open System Architecture

OSF Open Software Foundation

OSI Open Systems Interconnection

OSI/RM OSI Reference Model

OSNS Open Systems Network Support

OSPF Open Shortest Path First

OSTC Open System Testing Consortium

OTPROM One Time Programable ROM

OWL Object Windows Library

P

PABX Private Automatic Branch Exchange

PAD Packet Assembly Disassembly

PAL Phase Alternating Line

PAL Programmable Array Logic

PAM Partitioned Access Method

PAP Password Authentication Protocol

PB PetaByte (1,125,899,906,842,624 bytes)

PBX Private Branch Exchange

PC Personal Computer

PC Personal Computing

PC Program Control

PCB Printed Circuit Board

PCB Program Control Block

PCI Peripheral Component Interface

PCI Program Controlled Interuption

PCIL Private Core Image Library

PCL Printer Control Language

PCM Plug Compatible Manufacturers

PCMCIA Personal Computer Memory Card International Association

PCN Personal Communication Network

PCP Program Control Program

PCS Personal Communication Services

PCT Private Communication Technology

PCT Program Control Table

PD Public Domain

PDA Personal Digital Assistant

PDAD Proposed Draft Addendum

PDAU Physical Data Access Unit

PDF Program Development Facility

PDL Page Description Language

PDO Portable Distributed Objects

PDS Partitioned Data Set

PDS Premise Distribution System

PDS Processor Direct Slot

PDU Protocol Data Unit

PDX Printer Description Extension

PE Printer's error

PE Protection Enabled

PEARL Processor and Experiment Automation Realtime Language

PEM Privacy Enhanced Mail

PEP Partitioned Emulation Program

PER Program Event Recording

PERL Practical Extraction and Report language

PF Parity Flag

PFK Program Function Key(board)

PFM Printer Font Metric

PGA Professional graphics adapter

PGP Pretty Good Privacy

PIB Program Information Block

PID Process ID

PIFS Point InterFrame Space

PIM Personal Information Management

PIN Personal Identification Number

PIOCS Physical Input/Output Control System

PL Procedure Library

PL/1 Programming Language 1

PLI Programming Language 1

PLPA Pageable Link Pack Area

PLT Program List Table

PLU Primary Logical Unit

PMMU Paged memory management unit

PMS Pantone Matching System

PMS Project Management System

PMT Photomechanical Transfer (photostat)

PMT Photomultiplier Tube

PNNI Private Network-to-Network Interface

POC Program-Operator Communication

POP Point Of Presence

POP Post Office Protocol

POSIX Portable Operating System Interface for UNIX

POTS Plain Old Telephone System

POWER Priority Output Writer, Execution processors and input Readers

PP Presentation Position

PPD PostScript Printer Description

PPGA Plastic Pin Grid Array

PPM Pages Per Minute

PPP Point-to-Point Protocol

PPT Processing Program Table

PPTP Point-to-Point Tunneling Protocol

PPV Pay Per View

PRDMD Private Directory Management Domain

PRL Private Relocatable Library

PRMD Private Management Domain

PROM Programable Read Only Memory

PSB Program Specification Block

PSDN Packet Swiched Data Network

PSRAM Pseudo SRAM

PSSL Private Source Statement Library

PSTN Public Swiched Telephone Network

PSW Program Status Word

PTF Program Temporary Fix

PTR PoinTeR

PU Physical Unit

PUB Physical Unit Block

PVC Permanent Virtual Circuit

PVP Packet Video Processor

PWB Printed Wire Board

PWS Programmable WorkStation

Q

QAM Quadrature Amplitude Modulation

QBE Query By Example

QCIF Quater Common Intermediate Format

QIC Quarter-Inch Cartridge

QSAM Queued Sequential Access Method

QTAM Queued Teleprocessing Access Method

R

R0 Record zero

RACF Resource Access Control Facility

RAID Redundant Array of Inexpensive Disks

RAID Redundant Array of Independent Disks

RAM Random Access Memory

RARP Reverse Address Resolution Protocol

RBA Relative Byte Adresse

RC Robot Control

RCP Remote Communication Processor

RCS Revision Control System

RDA Remote Data Access

RDBMS Relational DataBase Management System

RDN Relative Distinguished Name

RES Restore

RF Resume Flag

RFC Request For Comments

RFF Required Form Feed

RFS Remote File System

RGB Red, Green, Blue

RGM Red, Green, Blue (Monitor)

RIFF Resource Interchange File Format

RIP Raster Image Processor

RIP Router Information Protocol

RISC Reduced Instruction Set Computer

RJE Remote Job Entry

RL Relocatable Library

RLD Relocation Dictionary

RLE Run Length Encoded file

RLL Run Length Limited

RMF Resource Management Facility

RNL Required New Line

ROM Read Only Memory

RPC Remote Procedure Call

RPG Report Program Generator

RPL Requestor's Privilege Level

RPL Research Programming Language

RPM Revolutions Per Minute

RPS Rotational Position Sensing

RPT Repeat

RRDS Relative Record Data Set

RRED Right Reading Emulsion Down

RREU Right Reading Emulsion Up

RS Record Separator

RSP Required Space

RSVP Resource Reservation Protocol

RTC Real Time Clock

RTCP Realtime Transport Control Protocol

RTF Rich Text Format

RTM/SF Realtime Monitor / Systems Facility

RTP Realtime Transport Protocol

RTSE Reliable Transfer Service Element

RWSI Remote Workstation Interface

S

S.W.I.F.T. Society for Worldwide Interbank Financial Telecommunication

S/STP Shielded STP

SA Set Attribute

SAA Storage Accounting Area

SAA System Application Architecture

SAM Sequential Access Method

SAP Service Access Point

SAP Service Advertising Protocol

SAR Segmentation And Reassembly

SBCS Single Byte Character Set

SBS Subscript

SC Storage Control

SCA Shared Control Array

SCCS Source Code Control System

SCDS Source Control Data Set

SCI Scalable Coherent Interconnect

SCODL Scanned Conversion Object Description Language

SCP Storage Control Program

SCP System Control Program

SCRAM Static Column Random Access Memory

SCSI Small Computer Systems Interface

SDH Synchronous Digital Hierarchy

SDK Software Development Kit

SDL System Directory List

SDLC Synchronous Data Link Control

SDRAM Synchronous DRAM

SDSF System Display and Search Facility

SE Software Entwicklung

SE System Engineer

SECC Single Edge Contact Connector

SECAM Sequential Couleur a'Memorie

SEL Select

SEPP Single Edge Processor Package

SET Software-Engineering-Technology

SF Sign Flag

SF Support Facility

SFA Salesforce Automation

SFBI Shared Frame Buffer Interconnect

SFE Start Field Extended

SFT System Fault Tolerance

SFTP Shielded Foil Twisted Pair

SGML Standard Generalized Markup Language

SHTTP Secure HTTP

SHY Syllable Hyphen

SI Shift In

SI Single Inheritance

SI Standard Interface

SIFS Short InterFrame Space

SIFT Stanford Information Filtering Tool

SIG Special Interest Group

SIM Service Information Message

SIMD Single Instruction Multiple Data

SIMM Single In-line Memory Module

SIRDS Single Image Random Dot Stereogram

SIT System Initialization Table

SL Source Statement Library

SLD Structured Logic Design

SLED Single Large Expensive Disk

SLIP Serial Line Internet Protocol

SLR Service Level Reporter

SLU Secondary Logical Unit

SM Set Mode

SMDS Switched Multimegabit Data Service

SMF System Management Facility

SML MVS Storage Management Library

SMLI Stateful MultiLayer Inspection

SMP Symetric MultiProcessing

SMP System Modification Program

SMS Storage Management Subsystem

SMTP Simple Mail Transfer Protocol

SNA System Network Architecture

SNADS SNA Distribution Services

SNMP Simple Network Management Protocol

SNOBOL String Oriented Symbolic Language

SNT Sign-On Table

SO Shift Out

SOD Service On Demand

SOH Start Of Heading

SOM System Object Model

SOS Start Of Significance

SP Space

SPA Software Publishers Association

SPARC Scalar Processor ARChitecture

SPDU Session Protocol Data Unit

SPM System Performance Monitor/2

SPOOL Simultaneous Peripheral Operations On Line

SPP Scalable Parallel Processing

SPS Superscript

SPX Sequenced Packet eXchange

SQL Structured Query Language

SQL/DS Structured Query Language / Data System

SRAM Static Random Access Memory

SRT System Recovery Table

SRU Shared Resource Unit

SS Single Sided

SS Stack Segment

SSCP System Service Control Point

SSID SubSystem IDentifier

SSL Secure Socket Layer

STM Synchronous Transfer Mode

STP Shielded Twisted Pair

STT Secure Transaction Technology

STX Start of Text

SUB Substitute

SV Storage Violation

SVA Shared Virtual Area

SVC Supervisor Call

SVC Switched Virtual Circuit

SVGA Super-VGA

SW Switch

SWOP Specifications for Web Offset Printing

SYN Synchronous Idle

SYSOP System Operator

T

T1 1.544 Mbit/s

T3 45 Mbit/s

TARGA Truevision Advanced Raster Graphics Adapter

TB TeraByte (1,099,511,627,776 bytes)

TC Terminal Control

TCA Task Control Area

TCAM Telecommunications Access Method

TCB Task Control Block

TCL Tool Command Language

TCM Thermal Conduction Module

TCO Triple Capacity Option

TCP Terminal Control Program

TCP Transmission Control Protocol

TCP/IP Transmission Control Protocol/Internet Protocol

TCT Terminal Control Table

TCTTE Terminal Control Table Terminal Entry

TCU Transmission Control Unit

TD Transient Data

TDIA Transient Data Input Area

TDM Time-Division Multiplexing

TDOA Transient Data Output Area

TDP Transient Data Program

TEO Technical Electronic Office

TF Trap Flag

TIC Technical Integrity Check

TIFF Tagged Image File Format

TIOA Terminal Input/Output Area

TLB Translation Lookaside Buffer

TLBL Tape Label

TMO Thermo-Magneto-Optic technology

TNEF Transport-Neutral Encapsulation Format

TOC Table Of Contents

TOP Technical Office Protocol

TPDU Transport Protocol Data Unit

TPF Transaction Processing Facility

TPI Tracks Per Inch

TPM Third-Party Maintenance

TPS Transactions Per Second

TRN Transparent

TS Telecommunication System

TS Temporary Storage

TSIOA Temporary Storage Input/Output Area

TSO Time Sharing Option

TSP Temporary Storage Program

TSR Terminate and Stay Resident

TTA Teletex Attachment (Teletexzusatz)

TTL Transistor Transistor Logic

TTR Track Record

TTY TeleTYpe

TWA Transaction Work Area

TWA Two-Way Alternate

TWS Two-Way Simultaneous

TX Telex

TXT Text

U

UA User Agent

UAE Unrecoverable Application error

UART Universal Asynchronous Receiver/Transmitter

UBR Undefined Bit Rate

UBS Unit Backspace

UCB Unit Control Block

UCR Undercolor removal

UCS Universal Character Set

UCSB Universal Character Set Buffer

UCW Unit Control Word

UDP User Datagram Protocol

UI User Interface

UID User ID

UMB Upper Memory Block

UNC Universal Naming Convention

UNC Universal Network Convention

UPC Universal Product Code

UPS Uninterruptible Power Supply

UPSI User Program Switch Indicator

UR Unit Record

URL Uniform Resource Locator

US Unit Separator

USART Universal Synchronous/Asynchronous Receiver/Transmitter

USENET USEr NETwork

USM UnSharp Masking

USRT Universal Synchronous Receiver/Transmitter

USV Unterbrechungsfreie StromVersorgung

UTP Unshielded Twisted Pair

UUCP Unix-to-Unix Copy Program

V

VAD Value Added Dealer

VAN Value Added Network

VAP Value Added Process

VAR Value Added Reseller

VAST Virtual Archive Storage Technology

VB Visual Basic

VBA Visual Basic for Applications

VBR Variable Bit Rate

VBN Vermitteltes Breitbandnetz

VC Virtual Circuit

VC-SDRAM Virtual Channel SDRAM

VCC Virtual Circuit Connection

VCI Virtual Circuit Identifier

VCNA Vtam Communication Network Application

VCPI Virtual Control Program Interface

VDAC Video Digital Analog Converter

VDI Video Display Interface

VDT Video Display Terminal

VDU Visual Display Unit

VERONICA Very Easy Rodent-Oriented Netwide Index to Computerized Archives

VGA Video Graphics Array

VGC Video Graphics Controller

VGM Video Graphics Monitor

VHDSL Very High-bit rate Digital Subscriber Loop

VHLL Very High-Level Language

VHS Video Home System

VIO Video Input/Output

VIO Virtual Input/Output

VIPA Virtual IP Addressing

VLAN Virtual LAN

VLSI Very Large Scale Integration

VM Virtual Machine

VM/SP Virtual Machine / System Product

VMMAP VM Monitor Analysis Program

VMOS Vertical MOS

VMPPF VM Performance Planning Facility

VMPRF VM Performance Reporting Facility

VMS Virtual Management System

VOD Video On Demand

VPD Vital Product Data

VPDN Virtual Private Data Network

VPI Virtual Path Identifier

VPN Virtual Private Network

VR Virtual Reality

VRAM Video RAM

VRML Virtual Reality Modeling Language

VRC Vertical Redundancy Checking

VS Virtual Storage

VSAM Virtual Storage Access Method

VSAT Very Small Aperture Terminal

VSM Virtual Storage Management

VSN Volume Serial Number

VT Vertical Tab

VTAM Virtual Telecommunications Access Method

VTOC Volume Table of Contents

VTP Virtual Terminal Protocol

VTP Virtual Terminal Program

VTX VideoTeXt

VVDS VSAM Volume Data Set

W

W3 World Wide Web

W4WG Windows for Workgroups

WABI Windows Application Binary Interface

WAIS Wide Area Information Service

WAN Wide Area Network

WATM Wireless ATM

WATS Wide Area Telecommunications Service

WHAT Wireless Hybrid Asynchronous Time-bounded

WIMP Windows, Icons, Mice and Pointers

WINS Windows Internet Name Service

WMAC Wireless Media Access Control

WMF Windows metafile

WORM Write Once, Read Many times

WOSA Windows Open Services/Systems Architecture

WRED Wrong Reading Emulsion Down

WREU Wrong Reading Emulsion Up

WS WorkStation

WTO Write To Operator

WUS Word Underscore

WWW World Wide Web

WXTRN Weak External Reference

WYSIWYG What You See Is What You Get

X

XA EXtended Architecture

XIP Execute In Place

XLT Transaction List Table

XMS Extended Memory Specification

XT eXtended Technology

Y

Y2K Year 2000

YIQ (color components in NTSC color space)

YUV (color components in SECAM and PAL color spaces)

Z

ZBR Zero Bug Release

ZD Zero Defects

ZF Zero Flag

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download