Skip to main content

Computer Full Forms

COMPUTER - full form or meaning is : 

Common Operating Machine Purposely Used for Technological and Educational Research.


COMPUTER ABBREVIATIONS


CPU - Central Processing Unit

RAM - Random Access Memory

ROM - Read Only Memory

PROM - Programmable Read Only Memory

EPROM - Erasable PROM

EEPROM - Electrically EPROM

HDD - Hard Disk Drive

FDD - Floppy Disk Drive

KBD - KeyBoard

I/O - Input & Output

CD - Compact Disk

DVD - Digital Video Disk

SMPS - Switch Mode Power Supply

POST - Power ON Self Test

BIOS - Basic Input Output System

VDU - Visible Display Unit

LED - Light Embedded Diode

LCD - Liquid Crystal Display

USB - Universal Serial Bus

VGA - Video/Visual Graphic Adapter

LAN - Local Area Network

WAN - Wide Area Network

MAN - Metropolitan Area Network

HLL - High-Level Language

LLL - Low-Level Language

MIPS - Million of Instruction Per Second

Mbps - Mega Bytes Per second

Kbps - Kilo Bytes per second

HTTP - Hyper Text Templates

WWW - World Wide Web

IP - Internet Protocol

ISP - Internet Service Provider

HTTP - Hyper Text Transfer Protocol.

HTTPS - Hyper Text Transfer Protocol Secure.

IP - Internet Protocol.

URL - Uniform Resource Locator.

USB - Universal Serial Bus.

VIRUS - Vital Information Resource Under Seized.

3G - 3rd Generation.

GSM - Global System for Mobile Communication.

CDMA - Code Division Multiple Access.

UMTS - Universal Mobile Telecommunication System.

SIM - Subscriber Identity Module.

AVI - Audio Video Interleave

RTS - Real-Time Streaming

SIS - Symbian OS Installer File

AMR - Adaptive Multi-Rate Codec

JAD - Java Application Descriptor

JAR - Java Archive

JAD - Java Application Descriptor

3GPP - 3rd Generation Partnership Project

3GP - 3rd Generation Project

MP3 - MPEG player lll

MP4 - MPEG-4 video file

AAC - Advanced Audio Coding

GIF - Graphic Interchangeable Format


4 Bits = 1 Nibble

8 Bits = 1 Byte

1024 Bytes = 1 Kilo Byte ( KB )

1024 KB = 1 Mega Byte ( MB )

1024 MB = 1 Gyga Byte ( GB )

1024 GB = 1 Tera Byte ( TB )

1024 TB = 1 Peta Byte ( PB )

1024 PB = 1 Exa Byte ( EB )

1024 EB = 1 Zetta Byte ( ZB )

1024 ZB = 1 Yotta Byte ( YB )

Comments

Popular posts from this blog

How To Make Symbols With Keyboard

HOW TO MAKE SYMBOLS WITH A KEYBOARD (Image By - Sharma Guides | Subham232330) Alt + 0153 :   ™  (trademark symbol) Alt + 0169 :   ©  (copyright symbol) Alt + 0174 :   ®  (registered trademark symbol) Alt + 0176 :   °  (degree symbol) Alt + 0177 :  ±  (plus-or-minus sign) Alt + 0182 :   ¶  (paragraph mark) Alt + 0190 :   ¾  (fraction, three-fourths) Alt + 0215 :   × (multiplication sign) Alt + 0162 :   ¢  (thecent sign) Alt + 0161 :   ¡  (upside down exclamation point) Alt + 0191 :   ¿  (upside down question mark) Alt + 1 : ☺ (smiley face) Alt + 2 :   ☻ (black smiley face) Alt + 15 :   ☼  (Sun) Alt + 12 :   ♀  (female sign) Alt + 11 :   ♂  (male sign) Alt + 6 :   ♠  (spade) Alt + 5 :   ♣  (Club) Alt + 3 :   ♥  (Heart) Alt + 4 :   ♦  (Diamond) Alt + 13 :   ♪  (eighth note...

Natural Language Processing (NLP)

What is Natural Language Processing (NLP) ? Natural Language Processing (NLP)* is a field of artificial intelligence (AI) that focuses on the interaction between computers and humans using natural language. It involves the development of algorithms and models that enable computers to understand, interpret, and generate human language. Here are key aspects of NLP: 1. *Text Understanding:* NLP systems aim to comprehend the meaning of written or spoken language. This involves tasks such as text classification, sentiment analysis, and named entity recognition. 2. *Speech Recognition:* NLP extends to processing spoken language, converting audio signals into text. This technology is used in voice assistants, transcription services, and more. 3. *Language Generation:* NLP systems can generate human-like text. This is employed in chatbots, language translation services, and content generation. 4. *Machine Translation:* NLP is fundamental to machine translation systems that enable the automatic...

Access Control Methods in DBMS

Access control in DBMS Database access control is a method of allowing access to a company’s sensitive data only to those people (database users) who are allowed to access such data and to restrict access to unauthorized persons. It includes two main components: authentication and authorization. Authentication is a method of verifying the identity of a person who is accessing your database. Note that authentication isn’t enough to protect data. An additional layer of security is required, authorization, which determines whether a user should be allowed to access the data or make the transaction he’s attempting. Without authentication and authorization, there is no data security. Any company whose employees connect to the Internet, thus, every company today, needs some level of access control implemented. Types of Access Control Obsolete access models include Discretionary Access Control (DAC) and Mandatory Access Control (MAC). Role Based Access Control (RBAC) is the most common method...