Type in the Search box 



Short Note On ANSWER
Application Software Application software is a software aimed at performing a specific task that makes our computer truly useful. These programs come in the form of files that you install on your hard disk. It can be customize and developed according to a user’s needs. Example payroll programs are used for accounting and payment system in organization.
Abacus The earliest known device to record computation was abacus. It dated back to ancient time and was invented by Chinese. Ten beads were strung onto wires attached to a frame. Addition and subtraction were read from the final position of the beads. It was the first manual tool used in calculating answer problems that provided information and in a primitive way storing the result.
Jacquard’s Loom: The Jacquard’s loom was invented by Joseph Jacquard in 1801. Jacquard built his loom to automate the process of weaving rugs and clothing. It did this using punch cards that told the machine what pattern to weave. Where there was a hole in the card the machine would weave and where there was no hole the machine would not weave. The process can also be used for patterned knitwear and machine knitted textiles.
Napier’s Bones Napier’s bones is manually – operated calculating device created by John Napier of Merchiston for calculation of products and quotients of numbers. The complete device usually includes a base board with rim, the user place Napier’s rods inside the rim to conduct multiplication or division.
High Level Language A High-Level Language is a programming language designed to simplify computer programing. It enables development of a program in a much more user- friendly programing content using the language structure. In order to execute a high level language program, it should be translated into machine language either by using Compiler or an Interpreter. 
Compiler

A Compiler is a translator program which translates a high level languages in to machine language. Every program must be compiled before it is executed. It scans the entire program first and then translates into machine code. This process is called compilation.

Interpreter

An Interpreter is another type of translator program, which is used for translating programs written in High level language into machine language programs. In contrast to a compiler, an interpreter does not translate the whole program prior to its execution. Interpreter executes a source code line by line.

Power-On Self Test

POST is a routines stored in computer’s ROM. It is the initial set of diagnostic test performed by the computer right after it’s power on, with the intent to check for any hardware related issue.

Cache

Cache Memory: This is very special type of high-speed memory. This memory cannot be accessed by the user. The main function of the cache memory is to make the program and data available to the CPU very fast. Cache is a high speed, high performance memory to which read/write operation can be done faster than RAM. It acts as a buffer between the CPU and the primary memory. The size of cache memory can vary from 512 KB to 2MB.

High Level Language

High level language is developed to create application programs which are not dependent upon machines. It permits the user to understandable codes, using the language structure. In order to execute a high-level language program, it should be translated into machine language either using a compiler or an interpreter.

Low Level Language

It is a machine dependent language which offers few control instructions and data types. Each statement in a program written in a low-level language usually corresponds to one machine instruction. 

Assembly Language

Assembly language is designed mainly to replace each machine code with an understandable mnemonic code. To execute an assembly language program, it should be first converted into an equivalent machine language program.

Operating System

An operating system is a software program that enables the computer hardware to communicate and operates with the computer software. It controls the flow of signals from the CPU to various parts of the computer. Examples: Windows, LINUX, MACOS, UNIX etc.

Assembler

An assembler is a program that converts an assembly language program into machine language program. Each language is usually converted into one machine instruction.

Compiler

A compiler is a software program that compiles machine language instructions for every program’s instruction of high-level language. It is a program translator and scans the entire program first and then translate it into machine code. The translation process is called compilation.

Interpreter

An interpreter is a program that translate one statement of high-level language program into machine code and then execute it.

Magnetic Media

Any storage medium that utilizes magnetic patterns to represent information is considered magnetic media. Good examples of a magnetic media and magnetic storage is a tape drive, floppy diskette, and hard drive.

Optical MediaOptical media refers to any data storage device or equipment that uses optical data storage and retrieval techniques to read and write data. It stores data digitally on a media device and uses a laser to read data from it. Optical media is also known as optical storage. Example- CD, DVD and Blu-Ray disc etc.
Control Panel 

The control panel is normally part of the system's graphical user interface (GUI), which provides easy management and access to panel components. Control panel can be used to change virtually all setting in your computer.

Screen Saver

Screen saver is a utility program that displays a moving image on the screen after a set time interval. The original purpose of a screensaver is to prevent screen from burning out due to continuous radiations but it can be used for entertainment.

TaskbarThe taskbar is an element of an operating system located at the bottom of the screen. It allows you to locate and launch programs through Start and the Start menu, or view any program that's currently open. On the right side of the taskbar is the Notification Area that allows you to check the date and time, items running in the background.
Changing the Clock settings

The computer’s internal clock and calendar provides correct date and time. Sometime you have to change and adjust the date and time to keep them accurate. To change the time and date, Right click clock in taskbar, go adjust date/time, then change date time, then change calendar settings.

Hacking

Hacking is unauthorized use of computer system or a network to exploit the security to gain access to personal data or business data. An example of computer hacking can be: using a password cracking algorithm to gain access to a computer system. Computers have become mandatory to run a successful business.

Copy Protection

It is a technique to prevent the illegal or unauthorized copying of a software product. Here a software lock is placed on a computer program on the distribution medial like CDs, DVDs, by a software developer.

Software Piracy

Software piracy is the unauthorized duplication of computer software. it is a term used to describe the act of illegally using, copying or distributing software without ownership or legal rights. Under copyright law, software piracy occurs when copyright protected software is copied, distributed, modified or sold. Software piracy is considered direct copyright infringement when it denies copyright holders due compensation for use of their creative works.

Spamming

Spamming is the activity of sending unsolicited e-mail or unsolicited messages to large numbers of recipients for the purpose of commercial advertising, for the purpose of non-commercial proselytizing, for any prohibited purpose, allure people to join inline communities or compare for some irrelevant issues which cost the sender very little and more is borne by recipients.

Phishing 

Phishing is an e-mail fraud method in which the perpetrator sends out legitimate- looking in an attempt to gather personal and financial information from the recipients.

Encryption

Encryption is an important security feature that can protect your computer data from being read by unscrupulous eyes. Encryption reorganizes the data of a computer file to make it unreadable, so it serves as one of the most effective ways to protect your data.

OR

Encryption is the process of translating plain text data (plaintext) into something that appears to be random and meaningless (ciphertext). 

Decryption

Decryption is a process of converting encoded/encrypted data in a form that is readable and understood by a human or a computer. This method is performed by un-encrypting the text manually or by using keys used to encrypt the original data.

OR

Decryption is the process of converting ciphertext back to plaintext. 

Boot Sector VirusA Boot sector virus is a type of virus that infects the boot sector of floppy disks or the hard disks. It replaces the boot record program, which is responsible for loading the OS in memory, copying elsewhere on the disk or overwrite it.
Polymorphic virus

Polymorphic viruses are very difficult to detect or remove. It is because these viruses change their code each time an infected file is executed. However, the anti-virus programs usually detect the presence of any virus by detecting its code. These types of viruses are also capable of replicating easily.

OR

 A Polymorphic virus is a type of virus that changes its signature (binary pattern) every time it replicates and infects a new file in order to keep from being detected by an anti-virus.

Macro Virus

A macro virus is a computer virus that infects data files which are accessed more frequently by the computer uses. When an infected file is opened, the macro virus releases a sequence of actions that begin automatically. These actions cause damage to the computer and its applications.

Program Virus

A program virus is a virus that infects executable program files. When the infected file is executed, the virus becomes active in the memory, making copies of itself and infecting file on disk.

Malware

Malware is a program designed to gain access to computer systems, normally for the benefit of some third party, without the user's permission. Malware can be Spyware or Adware:

Spyware

Spyware is infiltration software that secretly monitors unsuspecting users. It can enable a hacker to obtain sensitive information, such as passwords, from the user's computer.

 Adware

Adware is a type of malware software, that quietly collects information about you, such as browsing history and search results, while at the same time feeding you ads, and it does all of this without asking for your consent that can reduce your computer’s productivity and efficiency.