12/16/17

Database Q/Ans

What id data?

Data consists or raw facts and figures, Data consists of letter, sound, image or video within the computer.

 What is information?

Processed data is known as information. Using a data base program or software, they are converted into the meaningful result called information.

 What is database?

A database is a collection of interrelated data. It refers to an organized collection of data stored on a computer in such a way that its content can easily be accessed, updated and queried upon with the help of a software program.
Example = Banks must have systems for keeping track of customers and their accounts.

What is rdbms (Relational Database Management System)?

Relational Database Management System (RDBMS) is method of viewing information from several, separate database that relate to one another through the keyword or values. The main advantage of RDBMS is that we can simultaneously use more than one database to see information stored in them.
List importance of database
Database stores the data.
Computerized database saves data from being lost.
Computerized database protects from unauthorized access and use of the data.
Data can be stored in a small area or space in computerized database.

What is dbms? Write its types.

A database management system is a collection of programs that enables you to store, modify, and extract information from database.

Any four database management systems are as follows:

  • Relational Database Management System
  • Hierarchical Database Management System
  • Network Database Management System
  • Object Oriented Database Management System

Write advantage of database.

  • The advantages of database are as follows:
  • Database saves the data.
  • Data can be stored in a small area or space in computerized database.
  • Database protects from unauthorized access and use of data.
  • It saves data from being lost.


List feature of dbms

  • Easy to access data
  • Ease to modify data
  • Delete existing data.
  • Organize the data in proper sequence.
  • Sorting and indexing of data.
  • Easy queries in data.
  • Retrieve the data easily.
  • Print the formatted reports, labels etc.
  • Linking between two or more databases.
  • It can be used as SQl (Structured Query Language)

What is ms-access?

 Microsoft Access is a Relational Database Management System which comes as an integral part of the MS Office Suite of applications.

 What is data shorting?

The process of arranging the data smallest to largest and largest to smallest in table or in ascending or descending order is known as data sorting.

 What is query?

Query is a way of extracting information from a database, usually by using certain criteria or requesting certain data. It is request for database records that fit specified criteria.

 
What is the use of query?

The uses of query are as follows:
i. A query can count the amount of records that meet the certain criteria.
ii. It can also be used to extract data to a separate table or delete data, change data and many other things.

What is select query?

Select query is a query in which the relevant data from a table is selected and displayed. It allows the user to retrieve data from one or more tables and displays the results in a datasheet where the user can update the record.

 
What is parameter query?

Parameter query is a query that when run displays its own dialog box prompting the user for information, such as criteria for retrieving records or value the user want to insert in a field. For example: the following criterion selects records for which the records for which the value for the Obtain_mark field is greater than 70: Obtain_mark>70

What is a dynast?

A dynast is a set of data that is dynamically linked back to the database. Instead of having the query result stored in a temporary table, where the data cannot be updated directly by the user, the dynast allows the user to view and update the data contained in the dynast

What is attributes?

Attributes refer to a single data item related to a database object. The database schema associates one or more attributes with each database entity.

Explain different type of query

The different types of queries are as follows:

a. Select query = It is a query in which the relevant data from a table is selected and displayed. It allows the user to retrieve data from one or more tables and displays the results in a datasheet where the user can update the record.
b. Parameter queries = It is a query that when run displays its own dialog box prompting the user for information, such as criteria for retrieving records or value the user want to insert in a field.
c. Crosstab queries = A query that calculates a sum, average, count, or other type of total for data that is grouped by the two types of information is known as crosstab queries.

d. Action queries = A query which performs an action with the records /fields selected by the query. Action queries includes delete, Append, update and make table queries.

Explain different object of MS-access.


a. Table = Table are the core database object, used to store information. The tables are the containers for all the data in a database. In a table, data are arranged in a columns and rows.
b. Queries = Queries means to ask question about the data presented in the table. BY using queries, we can view records or data, modify the content of table and a lot more. It is a way of retrieving and editing information according to the condition asked. It is a strong tool using in searching of desired data from database.
c. Forms = A form is a database object used to enter and edit data in a table. Form can be used to edit the records of underlying tables or to enter new records.
d. Reports = A report is especially formatted collections of data organized according to our specification for summarizing and printing. They are the means to present the information as a printed document.
e. Macros = When macro is executed, it executes one or more database commands automatically. They are meant for automating the task that is done over and over again.
f. Modules = Modules are pieces of code used to impose particular behaviours to your application programmatically. They are more flexible and extensive than macros, although they are usually written for various and particular circumstances.

  Explain different data types of Ms Access


The different data types are as follows

Text = A text field contains up to 255 characters or it can set the length in the field size, text data type can include numbers letters and symbols.
Memo = This type of field holds an unlimited amount of text. It can accommodate 65, 535 characters.
Number = This type of field allows only the numbers to be entered.
Date/Time = This field type only allows date and time to be entered. It occupies 8 bytes.
Currency = This field allows to enter currency.
AutoNumber = This type automatically generates and insert the unique number in the new row.
Yes/No = It allows the user to select Yes or No when completing the field.
OLE object = It allows to link to binary data or files.
Hyperlink = It allows to create a hyperlink. It stores up to 64,000 characters.
Lookup Wizard = The lookup wizard creates a field that allows the user to choose a value from a list of values by using a list box or combo box.


Write difference between filter & query.

Filter
  • A filter cannot be saved as separate object.
  • A filter cannot be used for displaying the records of more than related table at once.
  • A filter cannot be used for performing calculation on values of numeric fields.

Query


  • A query can be saved as separate object.
  • A query can be used for displaying the records of more than related table at once.
  • A query can be used for performing calculation on values of numeric fields.

Write differences between primary key and foreign key 


Primary Key


  • It is a column or a set of column that can be used to uniquely identify a row in a table.
  • A table can have a single primary key that can reference different tables.

Foreign Key


  • It is a column or a set of column that refer to a primary key or a candidate key of another table.
  • A table can have multiple foreign key that can reference different tables.

Programming Q/Ans

What is control structure?

A control structure is a block of programming that analyzes variables and chooses a direction in which to go based on given parameters.

What is loop ?

A loop is a sequence of statement that is executed repeatedly until the given condition is satisfied.

What is section structure?

The structure in which the execution of next statement of a program depends upon the result of a condition is known as Decision or Selection structure. The statements used in this structure are: IF .. THEN, IF .. THEN .. ELSE, IF .. THEN ELSEIF … ELSE, SELECT .. CASE statement.

What is loop structure?

The structure which is used to execute a group of statements a certain number of times depending upon the condition is called loop structure. The statement used in this structure are; FOR..NEXT, DO..LOOP, WHILE..WEND etc.

What is c language?

C is the high level programming language that was developed by Dennis Ritchie at Bell Telephone Laboratories in 1972.

What is file handling?

The way of handling file is known as File Processing. In QBASIC you can save the data into a separate file called a data file. So there are two types of files in QBASIC. They are Program file and Data file

What is modular programming?

The programming technique, in which a program is divided into small logical and manageable part, is known as modular programming. The small, logical and manageable part of the program is called procedure (module). Since the modular programming uses small block of functional codes, it is also called structured program.

What is library function in QBSIC?


A function in QBASIC is a readymade program or user made small program which helps us to perform a specific task. The function manipulates the data passes to it and returns either a string value or a numeric value.  QBASIC supports two different kinds of functions are User 


What is difference between entry control loop & exit control loop ?The difference between Entry control loop and Exit control loop are as follows:

Entry Control Loop
  • In Entry controlled loop the test condition is checked first then executes the body loop
  • It checks the conditions first.

Exit control loop

  • In exit control loop the body of the loop will be executed first then checks the test condition.
  • It checks the condition at last.

Multimedia Q/Ans

What is multimedia? Write four use of multimedia .

Multimedia is a computer delivered electronic system which allows the user to control, combine, and manipulate different types of media, such as text, sound, graphics, animation etc.

Any four uses of multimedia are as follows:

i. It is used in television, film industries and for personal entertainments.
ii. It is highly used to realize the concept of Open University, Distance Education System, and Video Conferencing.
iii. It is also used in Internet to make up the interactive web page contents.
iv. It can be used to teach a subject in a class in an interesting way.


What is advantage of multimedia ?

i. It increases learning effectiveness.
ii. It is portable.
iii. It cab store data and information for a long period of time.
iv. It makes presentation of the related subject matter attractive.
v. It makes teaching learning easier in the classroom.

How multimedia used in education?

Multimedia is used for education and training in schools. It is used for education to produce computer based training and reference books like encyclopedia. It allows the students to learn different subjects at their own pace.
It also brings presentations alive with sounds, movies, animations and interactivity and motivates students to become active participants in the learning process.

How multimedia plays role in business?

Multimedia plays an important role in today's business. The role of multimedia in business can include:
i. Promoting sales though external clients through a multimedia based presentations.
ii. Staff training through a multimedia based training learning media.
iii. Internal meetings on various subject matters.

Write any 4 software used in multimedia

i. Windows Media Player
ii. Flash Player
iii. Adobe Photoshop
iv. Total Video Converter

Cyber Law & Ethics Q/Ans

What is cyber law?

Cyber law is a generic term which refers to all the legal and regulatory aspects of internet and World Wide Web. Cyber law is required to overcome the cybercrime in the internet. It is needed in order to stop the illegal activities done in the internet.

What is computer ethics?

Computer ethics is the branch of practical principles that deals with how the computer experts should make decisions in regard to the social and professional behavior. It is a set of moral principles that regulates the use of computers.

 
HAT IS COMPUTER HACKING?

Computer hacking is the transferring illegal items through the internet (such as encryption technology) that is banned in some locations. It is the activity of breaking into a computer system to gain an unauthorized access.
Any person who is found in hacking is fined with Rs. 2 lakhs along with the imprisonment of 3 years.

Define cyber low about Nepal.

Cyber Law of  Nepal was introduced on  30th Bhadra, 2061 (15 September, 2004) in order to legalize the electronic transaction and to control cybercrimes


List any 4 computer ethics

  1. We should not use a computer to harm other people.
  2. We should not use or destroy other’s files or database.
  3. We should not use computer to publish fake information.
  4. We should not copy or make duplicate copy and distribute illegally.
  5. We should not steal computer password of others or use it.
  6. We should not use other people’s computer resources without permission.
  7. We should not steal or use digital signature and pin of ATM card of others.
  8. We should not create a virus and use it.
  9. We should not publics an illegal pictures or videos in electronic form.





Computer Security Q/Ans

What is computer security?

Computer security refers to the protection of computer system and its valuable information against unwanted access, damage, modification or destruction.

Why we need to apply computer security?

We need to apply computer security measures because these measures help in the protection of information and property from theft, corruption or natural disaster, while the information and property to remain accessible and productive to its intended users.

What is computer hardware security?

Hardware security refers to the securing of computer hardware from damage from physical harm or loss due to theft.

What is Computer data (software) security?

Data and software security is the way of ensuring the data and software free from corruption. It is the protection of data and software from the unauthorized persons or by physical means.


What is defragmentation?

Defragmentation is the process of locating the noncontiguous fragments of data, rearranging the fragments and restoring the, into fewer fragments or into the whole file.

Write 4 importances of ups?

  • It absorbs relatively small power surges.
  • It provides power for some time even after a blackout.
  • It smoothes out noisy power sources
  • It continues to provide power to equipment during line sags.

List any 4 measure of hardware and software security measureHardware Security Measures

  • Regular Maintenance
  • Insurance
  • Free from dust environment
  • Protection from fire
  • Protection from theft
  • Using Air condition system
  • Using Power Protection devices (UPS, Spike guard, CVT, Voltage Stabilizer)


Software Security Measures

  • Using Password Policy
  • Using Antivirus Software
  • Using Backup
  • Scandisk utility
  • Defragmentation

Computer Virus Q/Ans

What is compute virus?
Computer virus is a computer program that is designed to copy itself and infects or damages a computer without permission or knowledge of a user.
or
Viruses are developed intentionally to damage, infect or even destroy the computer for a designed purpose. A destructive minded person intentionally writes parasitic programs to affect, bother, harm other persons, organization and even nation.
Some of them are: Trojan Horse, Macro Virus, Boot Sector virus etc

Write common characteristics of Computer viruses.

  • Viruses slow down the system performance.
  • Viruses destroy data and programs from the system.
  • Viruses increase the size of executable files.
  • Viruses decrease the space on hard disk by duplicating files.
  • Viruses cause system to hang or freeze frequently.


Write four symptoms of computer viruses are as follows

  • Programs take long time to load.
  • Renaming all the files with different names
  • Shows unusual error messages on the screen frequently
  • Corrupt or deletes system data and programs


How Viruses spread from one computer to another?

  • Opening the infected email attachment
  • By downloading infected programs from the internet
  • By using infected floppy disk, pen drives and CDs
  • By transferring an infected program over a network and executing it.


What is Boot Sector Virus?

Boot Sector virus is regarded as one of the most hostile types of virus, a boot sector virus infects the boot record of a hard or a floppy disk. The virus moves the boot sector data to a different part of a disk. This virus allows the actual boot sector data to be read as though a normal start up were occurring.

What is File Infecting Virus?

This type of virus infects program files on a disk. When infected program is launched, the virus code is also launched. After the virus code has been launched, it will normal load and execute the program that has been infected.

What is Multi partite Virus?

This virus is the combination of parasitic and boot sector virus and due to this, it is able to infect both the files or boot sector of a disk. They infect program files and when it is executed, these viruses affect the boot record.

What is Macro Virus?

These viruses infect the Microsoft Office programs such as Excel, Word, Access and PowerPoint. When we open the Microsoft program then the virus is loaded and it affects the normal template or document. Since it is attached in the document, if the infected document is opened on other computer, it affects the computer too.

What is Script Virus?

Script Virus is written in script programming languages, such as VBScript and JavaScript. It can infect a computer through various scripting environments, such as Windows Help, Windows installation files and Windows registry files.

What is Worm?

Worm is a program whose purpose is to duplicate itself. An effective worm will fill entire disk with the copies of itself and it can spread to multiple computer on network essentially clogging the entire system with copies.

Explain Trojan horse Virus. 


Trojan horse is a destructive program that comes as an application. The software initially appears to perform a desirable function for the user prior to installation but steals and harms the system. Unlike viruses and worms, it does not replicate themselves.

HOW TO PROTECT COMPUTER FORM VIRUS?


  • We can protect the computer from computer viruses by following ways:
  • Scanning the email attachment before executing them.
  • Use of a good anti-virus program to scan for viruses.
  • Scanning the disk frequently for viruses.
  • Not installing the pirated software, especially computer games.


WHAT IS ANTI VIRUS SOFTWARE WRITE 2 EXAMPLE OF IT

Anti-virus software is a computer program designed to detect and remove viruses from the computer system. Any three anti-virus programs are as follows:
  • McAfee Antivirus
  • Kaspersky Antivirus
  • Avira Antivirus




10/31/17

Computer FullForms

COMPUTER RELATED FULL FORMS 

(SCHOOL AND COLLAGE LEVEL)


A
ADSL – Asymmetric Digital Subscriber Line

ABC- Attansoft Berry Computer
AGP –   Accelerated Graphics Port
ALI –     Acer Labs, Incorporated
ALU –   Arithmetic Logic Unit
AMD –  Advanced Micro Devices
APC –  American Power Conversion
ASCII –American Standard Code for Information Interchange
ASIC – Application Specific Integrated Circuit
ASPI – Advanced SCSI Programming Interface
AT –     Advanced Technology

AI- Artificial Intelligence
ALGOL- Algorithmic Oriented Language
ANSI- American National Standard Institute
ARCNet- Attached Resource Computer Network
AT & T- American Telephone and Telegraph System
ATM- Automated Teller machine
ALR- Advanced Logic Research
AM- Amplitude Modulation
ATX –  Advanced Technology Extended
AAC-   Advance Audio Codec
AIFF-  Audio Interchange File Format
AM/FM-Amplitude Modulation / Frequency Modulation 
AMR-   Adoptive Multi Rate
ARPANetAdvanced Research Project Agency Network.
ASIC-  Application Specific Integrated Circuit.
AVI-    Audio Video Interleaved.
B
Bios – Basic Input Output System
Bnc – Barrel Nut Connector
Bmp – Bitmap
BASIC- Beginner’s All Purpose Symbolic Instruction Code
BCD- Binary Coded Decimal
BCPL- Beginners Cambridge Programming Language
BCR- Bar Code Reader
Bits-Binary Digits
BPI- Bytes Per Inch

BPS- Bit Per Sector
C
Computer – Common Operating Machine Particularly Used For Tade, Education And Research.
Cas – Column Address Signal
Cd – Compact Disk
Cdr – Compact Disk Recorder
Cdrw – Compact Disk Re-writer
Cd-Rom – Compact Disk - Read Only Memory
Cfm – Cubic Feet Per Minute
Cmos – Complementary Metal Oxide Semiconductor
Cpu – Central Processing Unit
Cda – Compact Disk Audio
Cdma – Code Division Multiple Access.
Crt – Cathode Ray Tube.
CAD- Computer Aided Designing
CAI- Computer Aided Instruction
CAL- Computer Aided/Assisted Learning
CAM- Computer Aided/Assisted Manufacturing
CAN- Computer Association of Nepal
CAT- Computer Aided/Assisted Training
CAVE- Cave Automatic Virtual Environment
CBE- Computer Based Education
CBT- Computer Based Training

CC- Computer Consultancy
CUI- Character User Interface
CGA- Color Display Adaptor
CIS- Computer Information System
CISC- Complex Instruction Set Computer
COBOL- Common Business Oriented Language
CESIL- Computer Education in School Instruction Language
CODASYL- Conference Of Data Systems Language
COM- Computer Output to Microfilm
CP/M- Control Program For Microprocessor
CPAV- Central Point Anti Virus
CPS- Character Per Second
CSMA/CD- Carrier Sense Multiple Access with Collision Detection
CSU/DSU- Channel Service Unit / Digital Service Unit

D
Ddr – Double Data Rate
Ddr-Sdram – Double Data Rate - Synchronous Dynamic Random Access Memory
Dfi –Design For Innovation
Dimm – Dual Inline Memory Module
Dram – Dynamic Random Access Memory

DARPA = Defence Advanced Research Projects Agency
Dpi Dots Per Inch
Dvd – Digital Versatile Disc
Dvd-Ram – Digital Versatile Disk - Random Access Memory
Dat – Digital Audio Tape.
Dll – Dynamik Link Library
Dos – Disk Operating System.
Dvd – Digital Versatile Disk.
DBMS- Database Management System
DCU- Device Control Unit
DDE- Dynamic Data Exchange
DIMM- Dual In Line Memory Module
DIX- Digital Intel and Xerox
DNA- Digital Network Architecture
DNS- Domain Name Server
DRAM- Dynamic Random Access Memory
DSDD- Double Sided Double Density
DSHD- Double Sided High Density
DSI- Data System International

DSSD- Double Sided Single Density

E
Edge – Enhanced Data Rate For Gsm Evolution.
Eprom – Erasable Programmable Read Only Memory.
Exe – Executable Format
Ecc – Error Correction Code
Ecs – Elitegroup Computer Systems
Edo – Extended Data Out
Eeprom – Electrically Erasable Programmable Read Only Memory
Evga – Evga Corporation

EBCDIC- Extended Binary Coded Decimal information Interchange.
EDO-RAM- Extended Data Out Random Access Memory
EDS- Electronic Data Storage / Exchangeable Disk System
EDSAC- Electronic Delay Storage Automatic Computer
EDVAC- Electronic Discrete Variable Automatic Computer
EGA- Enhanced Graphic Adaptor
EGMP- Electronic Government Master Plan
EICA- Engine Indicator and Crew Alert System.
EISA- Extended Industry Standard Architecture
E-mail- Electronic mail
EMI- Electro Magnetic Interference
EMS- Expanded Memory
ENIAC- Electronic Numerical Integrator And Calculator

EOF- End of File

F
Fc-Pga Flip Chip Pin Grid Array
Fdc – Floppy Disk Controller

FTP = File Transfer Protocol
Fdd – Floppy Disk Drive
Fps – Frame Per Second
Fpu – Floating Point Unit
Fsaa – Full Screen Anti Aliasing
Flac – Free Lossless Audio Codec
Flv – Flash Live Video
FAQ- Frequently Asked Questions
FAT- File Allocation Table
FAX- Facsimile
FDDI- Fiber Distributed Data Interface
FDS- Fixed Disk System
FM- Frequency Modulation
FMC- Flight Management Comptuer
FORTRAN- FORmula TRANslation

FPM RAM- Fast Data Page Random Access Memory

G
Gif – Graphics Interchange Format
Gprs – General Packet Radio Service.
Gsm – Global System For Mobile Communication.
Gui – Graphical User Interface.
Gb – Gigabytes
Gbps – Gigabytes Per Second Or Gigabits Per Second
Gdi – Graphical Device Interface
Ghz – Gigahertz

GIGO- Garbage in Garbage Out
GIS- Geographical Information System
GPL- General Public License

H
Hdd – Hard Disk Drive
His – Hightech Information System Limited
Hp – Hewlett-Packard Development Company
Hsf – Heatsink Fan
Hsdpa – High Speed Downlink Packet Access.
Http – Hyper Text Transfer Protocol.
Https – Hyper Text Transfer Protocol Secure.
HLCIT- High Level Commission for Information & Technology
HMD- Head Mounted Display

HTML- Hypertext Markup Language

I
Imap–Internet Message Access Protocol
Ip Internet Protocol.
Isp – Internet Service Provider
Ibm – International Business Machines Corporation
Ic – Integrated Circuit
Ide – Integrated Drive Electronics
Irq – Interrupt Request
Isa – Industry Standard Architecture

I/O- Input Output
IBM- International Business Machine
ICL- International Computers Limited
ICT- Information and Communication Technology.
IMS- Information Management System
IPX- Internetwork Packet eXchange.
IRC- Internet Relay Chat
IRTB- Industrial Real Time Basic
IRTB- Industry Real Time Basic
ISA- Industry Standard Architecture
IT- Information Technology
ITPDC- Information Technology Park Development
Iso International Standards Organization

J
J2ee- Java 2 Platform Enterprise Edition
Jad Java Application Development
Jar – Java Archive
Jpeg – Joint Photographic Expert Group
Js Java Script
Jsp- Java Server Page
K
Kbps – Kilobits Per Second

KB- Kilo Bytes

L
Lan – Local Area Network
Lcd – Liquid Crystal Display
Ldt – Lightning Data Transport
Led – Light Emitting Diode

LISP- List Processing

LSI- Large Scale Integrator

M
Mac – Media Access Control
Mb  – Motherboard Or Megabyte
Mbps – Megabits Per Second Or Megabits Per Second
Mhz – Megahertz
Mips – Million Instructions Per Second
Mmx – Multi Media Extensions
Msi Micro Star International

MAN- Metropolitan Area Network
MB- Mega Bytes
MBR- Master Boot Record
MCGA- Monochrome Display Adaptor
MD2D- Mini Disk Double Sided Double Density
MD2HD- Mini Disk Double Sided High Density
MD2HD- Mini Disk Double Sided High Density
MDA- Monochrome Display Adaptor
MF2D- Micro Floppy Double Sided Double Density
MICR- Magnetic Ink Character Reader
MILNET- Military Network
MIPS- Millionth of Instruction Per Second
MIS- Management Information System
MODEM- MODulator and DEModulator
MOEST- Ministry of Environment Science and Technology
MOS- Metal Oxide Semiconductor
MSAU- Multi Station Access Unit
MS-DOS- Microsoft Disk Operating System
MSI- Medium Scale Integration
Midi – Musical Instrument Digital Interface
MimeMultipurpose Internet Mail Extensions
Mmf – Music Mobile Format
Mpeg – Motion Picture Experts Group
N
Nas – Network Attached Storage
Nat – Network Address Translation
Nec – Nec Corporation

NAV- Norton Anti Virus
NCC- National Computer Centre
NDD- Norton Disk Doctor
NEC- Nippon Electronics Company
NFS- Network File System
NITC- National Information Technology Centre
NITCC- National Information Technology Co-ordination Committee
NITDC- National Information Technology Development Committee
NPC- National Planning Commission
NT- New Technology
NTFS-New Technology File System
Nic – Network Interface Card
NetBEUI = Net Bios Enhancer User Interface
O
OcOver Clock
OAS- Office Automation System
OCP- Order Code Processor
OCR- Optical Character Reader
OLE- Object Linking and Embedding
OMR- Optical Mark Reader (Recognition)
OS- Operating System
Oem – Original Equipment Manufacturer
P
Pc Personal Computer
POP = Post Office Protocol
Pcb – Printed Circuit Board
Pci – Peripheral Component Interconnect
Pda – Personal Digital Assistant

PCB- Printed Circuit Board
PDF- Platform Independent Document Format
Pixel- Picture Element
PL/1- Programming Language -1
PM- Phase Modulation
PNG- Portable Network Graphics
POS- Point of Sales
POST- Power On Self Test
PROGLOG- Programming Logic
PROM- Programmable Read Only Memory
PS/2- Personal System-2
PSTN- Public Switched Telephone Network
Pcmcia – Peripheral Component Microchannel Interconnect Architecture
Pga – Professional Graphics Array
Pld – Programmable Logic Device
Pnp – Plug ‘N Play
Pny – Pny Technology
Post – Power On Self Test
Pppoa – Point To Point Protocol Over Atm
Pppoe – Point To Point Protocol Over Ethernet
Pqi – Pqi Corporation
Psu – Power Supply Unit
Pdf – Portable Document Format
Png – Portable Network/New Graphics
R
Raid – Redundant Array Of Inexpensive Disks
Ram – Random Access Memory
Ramdac – Random Access Memory Digital Analog Convertor
Rdram – Rambus Dynamic Random Access Memory
Rom – Read Only Memory
Rpm – Revolutions Per Minute\

RDBMS- Relational Database Management System.
RISC- Reduced Instruction Set Computer
RMM- Read Mostly Memory
RONAST- Royal Nepal Academy Of Science and Technology
Rm Real Media
RPG- Report Program Generator

RPM- Rotation Per Minute / Revolution Per Minute

S
Sis Symbian Installation Source
SCP- System Control Processor
SCSI- Small Computer System Interface
SDRAM- Synchronous Dynamic Random Access Memory
SIMM- Single In Line Memory Module
SMPS- Switch Mode Power Supply
SMTP- Simple Mail Transfer Protocol
SNOBOL- StriNg Oriented symBOlic Language
SPX- Sequenced Packet eXchange.
SQL- Structured Query Language
SRAM- Static Random Access Memory
SSSD- Single Sided Single Density
STP- Shielded Twisted Pair

SVGA- Super Video Graphics Array

Smtp–Simple Mail Transfer Protocol

STP = Shielded Twisted Pair
Swf- Shock Wave Flash
Sasid – Self Scanned Amorphous Silicon Integrated Display
Sca Scsi Configured Automatically
Scsi – Small Computer System Interface
Sdram – Synchronous Dynamic Random Access Memory
Secc – Single Edge Contact Connector
Sodimm – Small Outline Dual Inline Memory Module
Sparc – Scalable Processor Architecture
Soho – Small Office Home Office
Sram – Static Random Access Memory
Sse – Streaming Simd Extensions
Svga – Super Video Graphics Array
S/Pdif – Sony Or Philips Digital Interface


T
Tb – Terabytes
Tbps – Terabytes Per Second
TbpsTerabits Per Second
Tdk – Tdk Electronics
Tec – Thermoelectric Cooler


TPS- Transaction Processing System
Twain – Technology Without An Important Name
Tcp – Transmission Control Protocol
TCP/IP = Transmission Control Protocol/ Internet Protocol
U
Uhf – Ultra High Frequency.
Umts – Universal Mobile Telecommunication System.
Ups – Uninterruptible Power Supply.
Url – Uniform Resource Locator.
Usb – Universal Serial Bus.
Utp – Unshieled Twisted Pair

UNIVAC- Universal Automatic Computer
Uart – Universal Asynchronous Receiver Or Transmitter

VSAT- Very Small Aperture Terminal

V
Vbs – Visual Basic Scripting Language
Vcd – Video Compact Disk
Vhf – Very High Frequency.
Virus – Vital Information Resource Under Seized.
Vob Video Object
Vpn – Virtual Private Network
VDT- Video Display Terminal
VDU- Visual Display Unit
VGA- Video Display Array
VLSI- Very Large Scale Integration
VoIP- Voice Over Internet Protocol
VR- Virtual Reality


VRML- Virtual Reality Modeling Language
W
Wav – Waveform Pcm Audio
Wbmp – Wireless Bitmap Image
Windows – Wide Interactive Network For Development Of Office Work Solution
Wan – Wireless Area Network
Wma – Windows Media Audio
W3C- World Wide Web Consortium
WAIS- Wide Area Information Server
WORM- Write Once Read Only Memory

WWW- World Wide Web
Wml – Wireless Markup Language
X 
Xga – Extended Graphics Array
Xfx – Xfx Graphics, A Division Of Pine
Xms – Extended Memory Specification
Xt – Extended Technology
Xmf – Extensible Music File
Xsl- Extensible Style Sheet Language
Z
Zip – Zone Improvement Plan


3D- Three Dimension

4GL- Fourth Generation Language