50 Terms of Computer Science

computer science,introduction to computer science,computer science for beginners,science,computer,what is computer science,computer science terms,the

Hello dear guest - Welcome to MR Laboratory . You have come to MR Laboratory for information about 50 Terms of Computer Science Today I will conclude this article by discussing 50 Terms of Computer Science in detail. Search Google to know more about 50 Terms of Computer Science write 50 Terms of Computer Science or click here mrlaboratory.com for visit. See the page Table of content for know the main topic of this article.

 

50 Terms of Computer Science


1. Alphanumeric Code:

The coding method in which both numbers and letters are used together is called Alphanumeric Code. For example, in a corner, a student's class goes to class IX, section B, rail number-15 to 9B15. In this case, using numbers and letters at the same time, a lot of big information can be expressed through short codes.


2. Voltage Stabilizer:

 It is an electronic device that keeps the electrical voltage supply constant. If for some reason the value of voltage in the main supply line fluctuates, it also changes the internal electrical system of the device (Voltage Stabilizer) to keep the output voltage constant or unchanged. So Voltage Stabilizer is used for constant power supply. However, if for some reason the voltage of the main supply line rises too much, the internal fuse of the stabilizer blows and the power supply is cut off. Using it it is possible to protect electrical equipment from damage.


3. HTML:

 HTML is an acronym for Hyper Text Markup Language. HTML is used to create World Wide Web (WWW) files. These files are commonly known as web pages.


4. Database Administrator (DBA):

Database Administrator is one or more people who create, modify, enhance and control the database. The overall success of database management depends on the administrative and technical skills of the database administrator.


5. Append:

Adding a new record to a database is called an append. Again, bringing data from the database and moving it elsewhere is also called append.


. Linear Data Structure:

Data structures that have a specific linear format are called linear or linear data structures. For example: Array, Stack, Queue, Linked list, etc. Structures.


. Function:

 Functions are short for formulas. Calculations can be done very easily using functions without using formulas in mathematical calculations. However not all calculations can be done by function.


. Attribute:

 Attribute word means feature. The attribute of konae ntt is expressed by the word attribute in the computer database. In many cases attributes are also referred to as data items, data fields, elementary items, etc.


9. IP Address:

Every computer connected to the Internet has an address. This address is called IP Address.


10. Intranet:

Intranet is a website used for internal communication of an organization which can only be used by the employees of the organization concerned.

11. Artificial Intelligence:

Artificial intelligence is the ability to think (in human terms) based on the information of a device. Currently there is a lot of research going on on Artificial Intelligence and in some cases success has been found.


12. Virus:

 Vital Information Resources Under Seize. Computer viruses are a type of program that can damage software, data, and even hard disks used on a computer; May delete files or disable the computer.


13. Transient:

 A relatively large spike of voltage or current generated in a power supply line is called a transient.


14. Animation:

 Animation is the technique of moving or moving static objects in different dimensions like text, drawing images, paintings etc. through computer. There are two types of animation:

i. 2D - Two Dimentional animation, o

ii. 3D - Three Dimetional animation.


15. SOL-Structured Query Language:

1974 - IBM's San Jose Research Center develops SQL. SQL is currently widely used as a query language. SQL is used in databases like ORACLE, FOXPRO etc. as data definition and data manipulation languages.


16. Brown Out:

Brown out is a decrease in supply voltage due to a planned or unplanned angle.


16. Expert System:

Expert System is a software that allows you to make decisions on complex issues with the help of artificial intelligence.


16. Logical Operator:

Logical operators are used to create relatively complex expressions. It combines the two expressions and evaluates whether the expression is true or false. E.g.

AND Operator - Can meet both conditions.

OR OPERATOR - At least one of the two conditions will be true. In addition to these two, there are a few other operators


19. Binary tree:

 A data-structure called a tree has a core node. Different branches come out from this main node. Branches coming out of the main node can act as nodes again and they can have branches again. However, when a maximum of only two branches emerge from a node, it is called a binary tree.


20. Modem:

 Modulator-Demodulator The modem device consists of these two parts. The modulator converts digital signals into analog signals and the demodulator converts analog signals into digital signals. A modem device is used to connect two computers via a telephone line.

21. Relational Database Management System (RDBMS):

Relational databases are the basis of modern database technology. In 1960, Edgar Codd introduced the first relational database system. Relational Database Mowel consists of three parts of data:

i. Dara structure,

ii. Data Integrity and

iii. Data Manipulation.


22. Composit Primary Key:

 In many cases the primary key is formed by combining two fields. This type of primary key is known as Composit Primary Key. In this case the two fields must be interrelated.


23. Stack:

Stack is a linear method of storing data where the last stored data has to be used first. This method is called Last in first out or LIFO for short. Stack is a well-organized one-dimensional set of data items that can only add new data items to one end or delete data items from just one end. This end of the stack is called TOP.


24. Computer Network:

When different computers are connected together by a communication system, it is called a computer network. These networks can be of different types. E.g.

i. Star Network,

ii. Ring Network

iii. Bus Network etc.


25. Simplex:

The method of sending one-way data is called simplex method. In this case if two systems are connected then data can be received from one system only and the other system can only accept data. For example, on the radio, the listener can only listen to the words or songs sent from the radio station, but cannot send the words or songs to any corner.


26. Concatenation:

 Concatenation is the process of joining two strings together. Such as -

Shows string connections in Quick Basic / Q basic -

First Name $ = “Md.Shimul”

Result $ = First Name $ + “Hossain”

Print Result

The output will be Md. In this case Shimul Hossain Md. Shimul and Hossain have been added to the Concatenation method.


26. Rendering:

Rendering is a process that creates a realistic 3D image based on all the parameters of 3D.


26. CD-ROM:

Compact Disc Read Only Memory in full CD-ROM. CDs are widely used in multimedia. When data is recorded in a corner on a CD, many tiny holes are created that cannot be seen with the naked eye. These holes actually contain a single bit or electrical signal.


29. Half-Duplex:

 The Half-Duplex system has data transmission from both sides. However, when one sends data, the other cannot send data, only receive data. For example, the walkie-talkie used by the traffic police.


30. Image Capture:

 Image capture is the process of converting an image into an array like a rectangle of points or dots called picture elements or pixels. The captured image is stored in the computer's auxiliary memory.

31. Macro:

A macro hall contains some instructions that can be stored as a single instruction, and many of the instructions can be done automatically with a single instruction. Macros are widely used in machine language programs. Macros are also used in semprodsheet programs.


32. Data Flow Diagram:

The diagram through which the essential components of the system and their modifications are presented is called a data flow diagram. This is the first step in system analysis.


33. MIDI:

Musical Instrument Digital Interface - MIDI is a type of communication protocol that controls electronic musical instruments or music synthesizers.


34. IPS:

 IPS stands for Instant Power Supply. IPS acts as Power Storage and when the power supply to the main line is cut off, it supplies power and keeps all electrical equipment running.


35. Double Link List:

Each record in this link list has two pointers. This makes it possible to read the list from either bottom to top or top to bottom.


36. 4GL:

The fourth generation programming language is called 4GL. This is because of the features of this language

i. Natural language.

ii. Very High Level Language (VHLL)

iii. The user can give commands at will.


36. Spike:

A sudden increase in electrical energy for a very short period of time is called a spike.


36. Distributed Database:

A distributed database is a network of multiple workstations or computer systems connected to a centrally controlled server through a network. In this method, databases are created, modified, edited, etc. in each workstation individually and the central database stored on the server is updated according to the latest status of the databases of the workstations. The server's central database can then modify or modify the data text, data description language, etc. of the workstation database.


39. Full-Duplex:

This method allows data to be transmitted from both directions at this time. Such as telephone.


40. Video Compression:

 The storage capacity of modern computers has increased a lot. Even so, owning one is still beyond the reach of the average person. So the video compression method has been created to solve this problem. It is necessary to compress the video in order to hold the video in the corner computer. In this case space related compression as well as time related compression is also done.

41. Data Security:

Confidential data should not be used by unauthorized persons. Therefore, necessary steps have to be taken to maintain the confidentiality of the data. The database administrator is responsible for protecting the confidentiality of the data. Depending on the geographical distance, the data security system should be improved so that no one can enter the computer through the internet and know the data or information in a secret corner.


42. Hierarchy:

 Hierarchy is the sort of functionality of a subject in the corner. For example, if you consider the speed of the computer's memory, then first comes the register memory, then the cache, then the primary memory or RAM, ROM and so on up to the CD. In this way it is possible to create hierarchies of different subjects.


43. Index:

 Indexing is the process of compiling an index of information neatly or neatly. The data is arranged in a special way so that the user can easily find the data in the corner from the database. Indexing is the process of arranging the records of a database table in such a logical order.


44. Protocol:

 Different network systems operate under different operating systems, depending on the field, especially the hardware (such as IBM and Mac). The system of communication between the computer and the various devices or computers in the communication system is controlled by the software. This control process is known as protocol.


45. Replacement:

Replacement is the placement of words or letters in a corner of a string instead of words or letters.


46. Interface:

 Different input / output devices are used with the computer. Such as- keyboard, mouse, monitor, scanner, printer etc. All these devices are connected to the computer through the interface circuit. These two types of interfaces are used, serial and parallel.


46. System Development Life Cycle:

There are many steps to follow to build a large system. In these steps everyone is involved with everyone again. The orderly arrangement of these steps is called the Systern Development Life Cycle.


46. Information Technology:

 The process and system related to the collection, storage, processing and distribution of information is called Information Technology.


49. Linear Searching:

 The method of periodically comparing the assigned data item with each component of the array is called linear searching.


50. Pointer:

Pointer is a variable and this variable indicates the address of any data. The pointer does not have a value in its own corner but may or may not have the ability to observe a continuum, but it must indicate the location of a data.

51. Sound Card:

 Sound Card is a type of chip used to take audio input or output to a computer. These chips are available to buy separately. However, many motherboards have a built-in Solurid Card.


52. Record:

A record is a subject that contains a variety of interrelated data items or fields. The elements of the record are usually different. For example, a student's record can be created by combining class, name, roll number, registration number, baird, etc.


53. Resolution:

 Resolution is the number of discrete digital labels or the number of bits that represent the word analog.


54. Sampling Rate:

The amount of data taken per second to express the word is called Sampling Rate.


55. Surge:

 Going to the transient bed of electric current is called Surge.




Note: Some images of this post have been collected from Google, Facebook and various sites. If anyone has any objections please comment - the image will be removed.

You are indeed a valued reader of MR Laboratory. Thank you so much for reading 50 Terms of Computer Science article. Please let us know how you feel after reading this article.

Next post Previous post
There are no comments
Leave your comments about this post

Please comment in accordance with the policy - otherwise your comments will not be accepted.

comment url