Computer Terminology 3 - āĻ•āĻŽā§āĻĒāĻŋāωāϟāĻžā§° āϟāĻžā§°ā§āĻŽāĻŋāύ'āϞāϜāĻŋ 3


1. Router (ā§°āĻžāωāϟāĻžā§°)


A router is a networking device that sends data packets to the correct destination through the internet in a short time. It works using both hardware and software. ā§°āĻžāωāϟāĻžā§° āĻšā§ˆāϛ⧇ āĻāϟāĻž āύ⧇āĻŸā§ąā§°ā§āĻ• āĻĄāĻŋāĻ­āĻžāχāϚ, āϝāĻŋ āχāĻŖā§āϟāĻžā§°āύ⧇āϟ⧰ āĻŽāĻžāĻ§ā§āϝāĻŽā§‡ āĻĄāĻžāϟāĻž āĻĒ⧇āϕ⧇āϟ āϏāĻ āĻŋāĻ• āĻ āĻŋāĻ•āύāĻžāϞ⧈ āĻ•āĻŽ āϏāĻŽāϝāĻŧāϤ āĻĒā§ā§°ā§‡ā§°āĻŖ āϕ⧰⧇āĨ¤ āχ āĻšāĻžā§°ā§āĻĄā§ąā§‡ā§° āφ⧰⧁ āϚāĻĢā§āĻŸā§ąā§‡ā§°ā§° āϏāĻšāĻžāϝāĻŧāϤ āĻ•āĻžāĻŽ āϕ⧰⧇āĨ¤


2. Modem (āĻŽāĻĄā§‡āĻŽ)


A modem is used to connect a computer to a network. It converts digital data into analog signals and analog signals into digital data. āĻŽāĻĄā§‡āĻŽ āĻ•āĻŽā§āĻĒāĻŋāωāϟāĻžā§°āĻ• āύ⧇āĻŸā§ąā§°ā§āϕ⧰ āϏ⧈āϤ⧇ āϏāĻ‚āϝ⧋āĻ— āϕ⧰āĻŋāĻŦāϞ⧈ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āϕ⧰āĻž āĻšāϝāĻŧāĨ¤ āχ āĻĄāĻŋāϜāĻŋāĻŸā§‡āϞ āĻĄāĻžāϟāĻžāĻ• āĻāύāĻžāϞāĻ— āϏāĻ‚āϕ⧇āϤāϤ āφ⧰⧁ āĻāύāĻžāϞāĻ— āϏāĻ‚āϕ⧇āϤāĻ• āĻĄāĻŋāϜāĻŋāĻŸā§‡āϞ āĻĄāĻžāϟāĻžāϤ āĻĒā§°āĻŋāĻŖāϤ āϕ⧰⧇āĨ¤


3. Gopher (āĻ—ā§‹āĻĢāĻžā§°)


Gopher is a service that helps users search and retrieve documents from remote computers through the internet. āĻ—ā§‹āĻĢāĻžā§° āĻšā§ˆāϛ⧇ āĻāύ⧇ āĻāϟāĻž āĻ¸ā§‡ā§ąāĻž āϝāĻžā§° āϏāĻšāĻžāϝāĻŧāϤ āχāĻŖā§āϟāĻžā§°āύ⧇āϟ⧰ āĻŽāĻžāĻ§ā§āϝāĻŽā§‡ āĻĻā§‚ā§°ā§ąā§°ā§āϤ⧀ āĻ•āĻŽā§āĻĒāĻŋāωāϟāĻžā§°ā§° āĻĒā§°āĻž āĻĄāϕ⧁āĻŽā§‡āĻ¨ā§āϟ āĻŦāĻŋāϚāĻžā§°āĻŋ āωāϞāĻŋāϝāĻŧāĻžāĻŦ āφ⧰⧁ āĻĒā§ā§°āĻžāĻĒā§āϤ āϕ⧰āĻŋāĻŦ āĻĒāĻžā§°āĻŋāĨ¤


4. Ping (āĻĒāĻŋāĻ‚)


Ping is a utility used to check whether a particular computer or IP address is reachable over a network. āĻĒāĻŋāĻ‚ āĻšā§ˆāϛ⧇ āĻāύ⧇ āĻāϟāĻž āĻŦā§āĻ¯ā§ąāĻ¸ā§āĻĨāĻž āϝāĻžā§° āϏāĻšāĻžāϝāĻŧāϤ āϕ⧋āύ⧋ āύāĻŋā§°ā§āĻĻāĻŋāĻˇā§āϟ āĻ•āĻŽā§āĻĒāĻŋāωāϟāĻžā§° āĻŦāĻž IP Address āύ⧇āĻŸā§ąā§°ā§āĻ•āϤ āϏāĻ•ā§ā§°āĻŋāϝāĻŧ āφāϛ⧇ āύ⧇ āύāĻžāχ āĻĒā§°ā§€āĻ•ā§āώāĻž āϕ⧰āĻž āĻšāϝāĻŧāĨ¤


5. Anonymous Server (āĻāύ⧋āύāĻŋāĻŽāĻžāĻ› āĻ›āĻžā§°ā§āĻ­āĻžā§°)


An anonymous server is a server that allows users to connect without requiring a special identity or password. āĻāύ⧋āύāĻŋāĻŽāĻžāĻ› āĻ›āĻžā§°ā§āĻ­āĻžā§° āĻšā§ˆāϛ⧇ āĻāύ⧇ āĻāϟāĻž āĻ›āĻžā§°ā§āĻ­āĻžā§°, āϝāĻžā§° āϏ⧈āϤ⧇ āϏāĻ‚āϝ⧋āĻ— āĻ¸ā§āĻĨāĻžāĻĒāύ āϕ⧰āĻŋāĻŦāϞ⧈ āĻŦāĻŋāĻļ⧇āώ āĻĒā§°āĻŋāϚāϝāĻŧ āĻŦāĻž āĻĒāĻžāĻ›ā§ąā§°ā§āĻĄā§° āĻĒā§ā§°āϝāĻŧā§‹āϜāύ āύāĻšāϝāĻŧāĨ¤


6. Pop-up (āĻĒāĻĒ-āφāĻĒ)


A pop-up is an unwanted window that automatically opens while viewing a web page. āĻĒāĻĒ-āφāĻĒ āĻšā§ˆāϛ⧇ āĻāύ⧇ āĻāϟāĻž āĻ…āĻŦāĻžāĻžā§āĻ›āĻŋāϤ āωāχāĻŖā§āĻĄā§‹, āϝāĻŋ ā§ąā§‡āĻŦ āĻĒ⧇āϜ āϚāĻžāĻ“āρāϤ⧇ āĻ¸ā§āĻŦāϝāĻŧāĻ‚āĻ•ā§āϰāĻŋāϝāĻŧāĻ­āĻžā§ąā§‡ āϖ⧁āϞ⧇ āϝāĻžāϝāĻŧāĨ¤


7. Search Engine (āϚāĻžā§°ā§āϚ āχāĻžā§āϜāĻŋāύ)


A search engine helps users find required information from the huge collection of data on the World Wide Web. It keeps a list of web pages for searching. āϚāĻžā§°ā§āϚ āχāĻžā§āϜāĻŋāύ āĻšā§ˆāϛ⧇ āĻāύ⧇ āĻāϟāĻž āĻŦā§āĻ¯ā§ąāĻ¸ā§āĻĨāĻž āϝāĻŋ World Wide Web ā§° āĻŦāĻŋāĻļāĻžāϞ āϤāĻĨā§āϝ āĻ­āĻžāĻŖā§āĻĄāĻžā§°ā§° āĻĒā§°āĻž āĻĒā§ā§°āϝāĻŧā§‹āϜāύ⧀āϝāĻŧ āϤāĻĨā§āϝ āĻŦāĻŋāϚāĻžā§°āĻŋ āωāϞāĻŋāϝāĻŧāĻžāĻŦāϞ⧈ āϏāĻšāĻžāϝāĻŧ āϕ⧰⧇āĨ¤ āχ āĻŦāĻŋāĻ­āĻŋāĻ¨ā§āύ ā§ąā§‡āĻŦ āĻĒ⧇āϜ⧰ āϤāĻžāϞāĻŋāĻ•āĻž āϏāς⧰āĻ•ā§āώāĻŖ āϕ⧰āĻŋ ā§°āĻžāϖ⧇āĨ¤


Examples: Google, Yahoo, AltaVista etc. āωāĻĻāĻžāĻšā§°āĻŖ: Google, Yahoo, AltaVista āφāĻĻāĻŋāĨ¤


8. Surfing (āϚāĻžā§°ā§āĻĢāĻŋāĻ‚)


Surfing means searching and browsing information through the internet using hyperlinks on web pages. āϚāĻžā§°ā§āĻĢāĻŋāĻ‚ āĻšā§ˆāϛ⧇ āχāĻŖā§āϟāĻžā§°āύ⧇āϟ⧰ āĻŽāĻžāĻ§ā§āϝāĻŽā§‡ ā§ąā§‡āĻŦ āĻĒ⧇āϜ⧰ hyperlink āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āϕ⧰āĻŋ āϤāĻĨā§āϝ āĻŦāĻŋāϚāĻžā§°āĻŋ āĻšā§‹ā§ąāĻž āĻĒā§ā§°āĻ•ā§ā§°āĻŋāϝāĻŧāĻžāĨ¤


9. Thumbnail (āĻĨāĻžāĻŽā§āĻŦāύ⧇āχāϞ)


A thumbnail is a very small preview image used to display pictures or maps. āĻĨāĻžāĻŽā§āĻŦāύ⧇āχāϞ āĻšā§ˆāϛ⧇ āύāĻ–ā§° āφāĻ•āĻžā§°ā§° āϏ⧰⧁ āĻ›āĻŦāĻŋ, āϝāĻžā§° āϏāĻšāĻžāϝāĻŧāϤ āĻĄāĻžāϙ⧰ āĻ›āĻŦāĻŋ āĻŦāĻž āĻŽāĻžāύāϚāĻŋāĻ¤ā§ā§°ā§° āĻĒā§‚ā§°ā§āĻŦāĻĻā§°ā§āĻļāύ āĻĻ⧇āĻ–ā§ā§ąāĻž āĻšāϝāĻŧāĨ¤


10. Cloud Computing (āĻ•ā§āϞāĻžāωāĻĄ āĻ•āĻŽā§āĻĒāĻŋāωāϟāĻŋāĻ‚)


Cloud computing means using internet-based services and applications through a computer, such as email, web browsers, YouTube, Facebook, and Twitter. āĻ•ā§āϞāĻžāωāĻĄ āĻ•āĻŽā§āĻĒāĻŋāωāϟāĻŋāĻ‚ āĻšā§ˆāϛ⧇ āχāĻŖā§āϟāĻžā§°āύ⧇āϟ⧰ āĻŽāĻžāĻ§ā§āϝāĻŽā§‡ āĻŦāĻŋāĻ­āĻŋāĻ¨ā§āύ āĻ¸ā§‡ā§ąāĻž āφ⧰⧁ āĻāĻĒā§āϞāĻŋāϕ⧇āϚāύ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āϕ⧰āĻž, āϝ⧇āύ⧇ āχ-āĻŽā§‡āχāϞ, ā§ąā§‡āĻŦ āĻŦā§ā§°āĻžāωāϜāĻžā§°, YouTube, Facebook, Twitter āφāĻĻāĻŋāĨ¤


===================================================================================


11. Firewall (āĻĢāĻžāϝāĻŧāĻžā§°ā§ąāϞ)


A firewall provides security to a computer, data, or network from unauthorized users. It can be hardware, software, or both. It helps maintain the privacy and security of LAN networks connected to the internet.


āĻĢāĻžāϝāĻŧāĻžā§°ā§ąāϞ āĻšā§ˆāϛ⧇ āĻāύ⧇ āĻāϟāĻž āϏ⧁⧰āĻ•ā§āώāĻž āĻŦā§āĻ¯ā§ąāĻ¸ā§āĻĨāĻž āϝāĻŋ āĻ•āĻŽā§āĻĒāĻŋāωāϟāĻžā§°, āĻĄāĻžāϟāĻž āĻŦāĻž āύ⧇āĻŸā§ąā§°ā§āĻ•āĻ• āĻ…āύāϧāĻŋāĻ•ā§ƒāϤ āĻŦā§āĻ¯ā§ąāĻšāĻžā§°āĻ•āĻžā§°ā§€ā§° āĻĒā§°āĻž āϏ⧁⧰āĻ•ā§āώāĻž āĻĻāĻŋāϝāĻŧ⧇āĨ¤ āχ āĻšāĻžā§°ā§āĻĄā§ąā§‡ā§°, āϚāĻĢā§āĻŸā§ąā§‡ā§° āĻŦāĻž āĻĻ⧁āϝāĻŧā§‹āϟāĻžāχ āĻš’āĻŦ āĻĒāĻžā§°ā§‡āĨ¤ āχ āχāĻŖā§āϟāĻžā§°āύ⧇āϟāϤ LAN āύ⧇āĻŸā§ąā§°ā§āϕ⧰ āĻ—ā§‹āĻĒāύ⧀āϝāĻŧāϤāĻž āĻŦāϜāĻžāχ ā§°āĻžāϖ⧇āĨ¤


12. Digital Signature (āĻĄāĻŋāϜāĻŋāĻŸā§‡āϞ āĻ¸ā§āĻŦāĻžāĻ•ā§āώ⧰)


Digital signature is a technology used to maintain the authenticity and security of electronic documents and messages. The signature is attached to the document in coded form and widely used in e-governance and e-commerce.


āĻĄāĻŋāϜāĻŋāĻŸā§‡āϞ āĻ¸ā§āĻŦāĻžāĻ•ā§āώ⧰ āĻšā§ˆāϛ⧇ āĻāύ⧇ āĻāϟāĻž āĻĒā§ā§°āϝ⧁āĻ•ā§āϤāĻŋ āϝāĻŋ āĻ•āĻŽā§āĻĒāĻŋāωāϟāĻžā§°āϤ āĻĨāĻ•āĻž āĻĄāϕ⧁āĻŽā§‡āĻ¨ā§āϟ āĻŦāĻž āĻŦāĻžā§°ā§āϤāĻžā§° āϏāĻ¤ā§āϝāϤāĻž āφ⧰⧁ āϏ⧁⧰āĻ•ā§āώāĻž āĻŦāϜāĻžāχ ā§°āĻžāϖ⧇āĨ¤ āĻāχ āĻ¸ā§āĻŦāĻžāĻ•ā§āώ⧰ coded form āϤ āĻĄāϕ⧁āĻŽā§‡āĻ¨ā§āϟ⧰ āϏ⧈āϤ⧇ āϏāĻ‚āϝ⧁āĻ•ā§āϤ āĻĨāĻžāϕ⧇ āφ⧰⧁ āχ-āĻļāĻžāϏāύ (e-governance) āφ⧰⧁ e-commerce āϤ āĻŦāĻšā§āϞāĻ­āĻžā§ąā§‡ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āϕ⧰āĻž āĻšāϝāĻŧāĨ¤


13. Biometric Techniques (āĻŦāĻžāϝāĻŧā§‹āĻŽā§‡āĻŸā§ā§°āĻŋāĻ• āĻĒā§ā§°āϝ⧁āĻ•ā§āϤāĻŋ)


Biometric technology is used to identify a person through fingerprints, face shape, iris, voice, etc. The computer stores the samples of authorized users for identification.


āĻŦāĻžāϝāĻŧā§‹āĻŽā§‡āĻŸā§ā§°āĻŋāĻ• āĻĒā§ā§°āϝ⧁āĻ•ā§āϤāĻŋ āĻšā§ˆāϛ⧇ āĻāύ⧇ āĻāϟāĻž āĻĒāĻĻā§āϧāϤāĻŋ āϝāĻžā§° āϏāĻšāĻžāϝāĻŧāϤ āφāϙ⧁āϞāĻŋā§° āĻ›āĻžāĻĒ, āĻŽā§āĻ–ā§° āφāĻ•ā§ƒāϤāĻŋ, āϚāϕ⧁⧰ āĻĒ⧁āϤāϞāĻŋ, āĻ•āĻŖā§āĻ āĻ¸ā§āĻŦā§° āφāĻĻāĻŋ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āϕ⧰āĻŋ āĻŦā§āϝāĻ•ā§āϤāĻŋā§° āĻĒā§°āĻŋāϚāϝāĻŧ āϚāĻŋāύāĻžāĻ•ā§āϤ āϕ⧰āĻž āĻšāϝāĻŧāĨ¤ āχāϝāĻŧāĻžā§° āĻŦāĻžāĻŦ⧇ āĻ•āĻŽā§āĻĒāĻŋāωāϟāĻžā§°āϤ āφāĻ—āϤ⧇āχ āĻ…āύ⧁āĻŽā§‹āĻĻāĻŋāϤ āĻŦā§āϝāĻ•ā§āϤāĻŋā§° āϤāĻĨā§āϝ āϏāς⧰āĻ•ā§āώāĻŖ āϕ⧰āĻŋ ā§°āĻ–āĻž āĻšāϝāĻŧāĨ¤


14. Speaker (āĻ¸ā§āĻĒā§€āĻ•āĻžā§°)


A speaker converts electrical signals received from the sound card into sound waves. It is connected to the sound card through a 3.5 mm stereo connector. Multimedia speakers also contain an amplifier and volume control knob.


āĻ¸ā§āĻĒā§€āĻ•āĻžā§°ā§‡ āĻ›āĻžāωāĻŖā§āĻĄ āĻ•āĻžā§°ā§āĻĄā§° āĻĒā§°āĻž āĻĒā§‹ā§ąāĻž āĻŦ⧈āĻĻā§āϝ⧁āϤāĻŋāĻ• āϏāĻ‚āϕ⧇āϤāĻ• āĻļāĻŦā§āĻĻ āϤ⧰āĻ‚āĻ—āϤ āĻĒā§°āĻŋāĻŖāϤ āϕ⧰⧇āĨ¤ āχāϝāĻŧāĻžāĻ• 3.5 mm stereo connector ā§° āϏāĻšāĻžāϝāĻŧāϤ sound card ā§° āϏ⧈āϤ⧇ āϏāĻ‚āϝ⧋āĻ— āϕ⧰āĻž āĻšāϝāĻŧāĨ¤ Multimedia speaker āϤ amplifier āφ⧰⧁ volume control knob āĻĨāĻžāϕ⧇āĨ¤


15. Screen Projector (āĻ¸ā§āĻ•ā§ā§°āĻŋāύ āĻĒā§ā§°āĻœā§‡āĻ•ā§āϟ⧰)


A screen projector displays computer screen images and videos on a large screen. It is used for movies, multimedia presentations, and group viewing.


āĻ¸ā§āĻ•ā§ā§°āĻŋāύ āĻĒā§ā§°āĻœā§‡āĻ•ā§āϟ⧰ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āϕ⧰āĻŋ āĻ•āĻŽā§āĻĒāĻŋāωāϟāĻžā§°ā§° āĻ¸ā§āĻ•ā§ā§°āĻŋāύāϤ āĻĨāĻ•āĻž āĻ›āĻŦāĻŋ, āĻ­āĻŋāĻĄāĻŋāĻ…’ āφ⧰⧁ āϘāϟāύāĻžāĻŦā§‹ā§° āĻĄāĻžāϙ⧰ āĻ¸ā§āĻ•ā§ā§°āĻŋāύāϤ āĻĻ⧇āĻ–ā§ā§ąāĻž āĻšāϝāĻŧāĨ¤ āχāϝāĻŧāĻžāĻ• multimedia presentation āφ⧰⧁ āĻĻāϞ⧀āϝāĻŧ āĻĒā§ā§°āĻĻā§°ā§āĻļāύ⧰ āĻŦāĻžāĻŦ⧇ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āϕ⧰āĻž āĻšāϝāĻŧāĨ¤


16. Parallel Port (āĻĒ⧇⧰⧇āϞ⧇āϞ āĻĒ’ā§°ā§āϟ)


A parallel port is used to connect devices and transfer 8 bits or more data simultaneously at high speed. It generally has a 25-pin connector and is commonly used for printers, so it is also called a printer port.


āĻĒ⧇⧰⧇āϞ⧇āϞ āĻĒ’ā§°ā§āϟ āĻĄāĻŋāĻ­āĻžāχāϚ āϏāĻ‚āϝ⧋āĻ— āφ⧰⧁ āĻāϕ⧇ āϏāĻŽāϝāĻŧāϤ⧇ 8 āĻŦāĻŋāϟ āĻŦāĻž āϤāĻžāϤ⧋āϧāĻŋāĻ• āĻĄāĻžāϟāĻž āĻĻā§āϰ⧁āϤāĻ—āϤāĻŋāϤ āĻ¸ā§āĻĨāĻžāύāĻžāĻ¨ā§āϤ⧰ āϕ⧰āĻŋāĻŦāϞ⧈ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āϕ⧰āĻž āĻšāϝāĻŧāĨ¤ āχāϝāĻŧāĻžāϤ āϏāĻžāϧāĻžā§°āĻŖāϤ⧇ 25-pin connector āĻĨāĻžāϕ⧇ āφ⧰⧁ āĻĒā§ā§°āĻŋāĻŖā§āϟāĻžā§°ā§° āϏ⧈āϤ⧇ āϏāĻ‚āϝ⧋āĻ— āϕ⧰āĻžā§° āĻŦāĻžāĻŦ⧇ āχāϝāĻŧāĻžāĻ• printer port āĻŦ⧁āϞāĻŋāĻ“ āĻ•ā§‹ā§ąāĻž āĻšāϝāĻŧāĨ¤


17. Winchester Disk (āωāχāĻžā§āĻšā§‡āĻˇā§āϟāĻžā§° āĻĄāĻŋāĻ¸ā§āĻ•)


A Winchester disk consists of two or more hard disk platters mounted one above another on a central shaft. A motor rotates the disks inside a sealed box to protect them from dust, scratches, and moisture. Hard disks used in personal computers are examples of Winchester disks.


āωāχāĻžā§āĻšā§‡āĻˇā§āϟāĻžā§° āĻĄāĻŋāĻ¸ā§āĻ•āϤ āĻĻ⧁āϟāĻž āĻŦāĻž āϤāĻžāϤ⧋āϧāĻŋāĻ• hard disk platter āĻāϟāĻž āϕ⧇āĻ¨ā§āĻĻā§ā§°ā§€āϝāĻŧ shaft ā§° āĻ“āĻĒā§°āϤ āĻāϟāĻžā§° āĻ“āĻĒā§°āϤ āφāύāĻŸā§‹ āĻ¸ā§āĻĨāĻžāĻĒāύ āϕ⧰āĻž āĻšāϝāĻŧāĨ¤ āχāϝāĻŧāĻžāϤ āĻĨāĻ•āĻž motor āĻ āĻĄāĻŋāĻ¸ā§āĻ•āĻŦā§‹ā§° āĻ˜ā§‚ā§°āĻžāϝāĻŧāĨ¤ āϧ⧂āϞāĻŋ, āφāρāĻšā§‹ā§° āφ⧰⧁ āĻ†ā§°ā§āĻĻā§ā§°āϤāĻžā§° āĻĒā§°āĻž ā§°āĻ•ā§āώāĻž āϕ⧰āĻŋāĻŦāϞ⧈ āχāϝāĻŧāĻžāĻ• sealed box āϤ ā§°āĻ–āĻž āĻšāϝāĻŧāĨ¤ Personal computer āϤ āĻŦā§āĻ¯ā§ąāĻšā§ƒāϤ hard disk āχāϝāĻŧāĻžā§° āωāĻĻāĻžāĻšā§°āĻŖāĨ¤


18. Smart Card (āĻ¸ā§āĻŽāĻžā§°ā§āϟ āĻ•āĻžā§°ā§āĻĄ)


A smart card is a small plastic card made of PVC. It is read using a smart card reader and is used in ATM cards, credit cards, security cards, and identity cards. Many smart cards contain a microprocessor and EEPROM.


āĻ¸ā§āĻŽāĻžā§°ā§āϟ āĻ•āĻžā§°ā§āĻĄ āĻšā§ˆāϛ⧇ PVC āĻĒā§āϞāĻžāĻˇā§āϟāĻŋāϕ⧰⧇ āύāĻŋā§°ā§āĻŽāĻŋāϤ āĻāϟāĻž āϏ⧰⧁ āĻ•āĻžā§°ā§āĻĄāĨ¤ āχāϝāĻŧāĻžāĻ• smart card reader ā§° āϏāĻšāĻžāϝāĻŧāϤ āĻĒāĻĸāĻŧāĻž āĻšāϝāĻŧāĨ¤ āχāϝāĻŧāĻžāĻ• ATM card, credit card, security card āφ⧰⧁ identity card āĻšāĻŋāϚāĻžāĻĒ⧇ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āϕ⧰āĻž āĻšāϝāĻŧāĨ¤ āĻŦāĻšā§ āĻ¸ā§āĻŽāĻžā§°ā§āϟ āĻ•āĻžā§°ā§āĻĄāϤ microprocessor āφ⧰⧁ EEPROM āĻĨāĻžāϕ⧇āĨ¤


19. MS-DOS (Microsoft Disk Operating System) (āĻāĻŽ.āĻāĻ›.-āĻĄāĻ›)


MS-DOS is a 16-bit operating system developed jointly by Microsoft and IBM in 1981. It is command-prompt based and has limited graphical features, so its use has decreased today.


MS-DOS āĻšā§ˆāϛ⧇ āĻāϟāĻž 16-bit operating system, āϝāĻŋ Microsoft āφ⧰⧁ IBM āĻ āϝ⧌āĻĨāĻ­āĻžā§ąā§‡ 1981 āϚāύāϤ āϤ⧈āϝāĻŧāĻžā§° āϕ⧰āĻŋāĻ›āĻŋāϞāĨ¤ āχ command prompt āĻ­āĻŋāĻ¤ā§āϤāĻŋāĻ• operating system āφ⧰⧁ āχāϝāĻŧāĻžāϤ graphical āϏ⧁āĻŦāĻŋāϧāĻž āĻ•āĻŽ āĻĨāĻžāĻ•āĻžāϤ āĻŦā§°ā§āϤāĻŽāĻžāύ āχāϝāĻŧāĻžā§° āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āĻ•āĻŽāĻŋ āĻ—ā§ˆāϛ⧇āĨ¤


20. Unix (āχāωāύāĻŋāĻ•ā§āϏ)


Unix is an operating system developed by Ken Thompson and Dennis Ritchie at Bell Laboratories in 1970. It was the first operating system written in a high-level language and was designed for networking and communication. It also provides data security and is mainly used for web servers.


Unix āĻšā§ˆāϛ⧇ āĻāϟāĻž operating system āϝāĻŋ Ken Thompson āφ⧰⧁ Dennis Ritchie āĻ 1970 āϚāύāϤ Bell Laboratories āϤ āωāĻ¨ā§āύāϝāĻŧāύ āϕ⧰āĻŋāĻ›āĻŋāϞāĨ¤ āχ high-level language āϤ āϞāĻŋāĻ–āĻž āĻĒā§ā§°āĻĨāĻŽ operating system āφāĻ›āĻŋāϞāĨ¤ āχāϝāĻŧāĻžāĻ• networking āφ⧰⧁ communication ā§° āĻŦāĻžāĻŦ⧇ āϤ⧈āϝāĻŧāĻžā§° āϕ⧰āĻž āĻšā§ˆāĻ›āĻŋāϞ āφ⧰⧁ āχ data security āĻ“ āĻĒā§ā§°āĻĻāĻžāύ āϕ⧰⧇āĨ¤ āĻŽā§‚āϞāϤāσ web server āϤ āχāϝāĻŧāĻžā§° āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āĻšāϝāĻŧāĨ¤


================================================================================


21. Retail Software (ā§°āĻŋāĻŸā§‡āχāϞ āϚāĻĢā§āĻŸā§ąā§‡ā§°)


Retail software is software available in the market for public purchase. Anyone can buy it by paying the required cost. Examples include Microsoft Office, Microsoft Windows, and Tally. User manuals and instructions are usually provided with it.


ā§°āĻŋāĻŸā§‡āχāϞ āϚāĻĢā§āĻŸā§ąā§‡ā§° āĻšā§ˆāϛ⧇ āĻāύ⧇ āϚāĻĢā§āĻŸā§ąā§‡ā§° āϝāĻŋ āĻŦāϜāĻžā§°āϤ āĻŦāĻŋāĻ•ā§ā§°ā§€ā§° āĻŦāĻžāĻŦ⧇ āωāĻĒāϞāĻŦā§āϧ āĻĨāĻžāϕ⧇āĨ¤ āϝāĻŋāϕ⧋āύ⧋ āĻŦā§āϝāĻ•ā§āϤāĻŋāϝāĻŧ⧇ āĻŽā§‚āĻ˛ā§āϝ āĻĒā§°āĻŋāĻļā§‹āϧ āϕ⧰āĻŋ āχāϝāĻŧāĻžāĻ• āĻ•āĻŋāύāĻŋāĻŦ āĻĒāĻžā§°ā§‡āĨ¤ āωāĻĻāĻžāĻšā§°āĻŖāĻ¸ā§āĻŦā§°ā§‚āĻĒ⧇ Microsoft Office, Microsoft Windows āφ⧰⧁ TallyāĨ¤ āϏāĻžāϧāĻžā§°āĻŖāϤ⧇ āχāϝāĻŧāĻžā§° āϏ⧈āϤ⧇ user manual āφ⧰⧁ āύāĻŋāĻ°ā§āĻĻ⧇āĻļāύāĻž āĻĻāĻŋāϝāĻŧāĻž āĻšāϝāĻŧāĨ¤


22. Syntax Rule (āϏāĻŋāύāĻŸā§‡āĻ•ā§āϏ āύāĻŋāϝāĻŧāĻŽ)


Syntax rules are the grammatical rules used in computer programming languages for proper use of words and symbols. āϏāĻŋāύāĻŸā§‡āĻ•ā§āϏ āύāĻŋāϝāĻŧāĻŽ āĻšā§ˆāϛ⧇ āĻ•āĻŽā§āĻĒāĻŋāωāϟāĻžā§° programming language āϤ āĻļāĻŦā§āĻĻ āφ⧰⧁ āϚāĻŋāĻšā§āύ āϏāĻ āĻŋāĻ•āĻ­āĻžā§ąā§‡ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āϕ⧰āĻžā§° āύāĻŋāϝāĻŧāĻŽāϏāĻŽā§‚āĻšāĨ¤


23. C Sharp (C#) (āϚāĻŋ āĻļāĻžā§°ā§āĻĒ)


C# is a programming language developed by Microsoft mainly for internet and software development. It is recognized by ISO and ECMA standards organizations. C# āĻšā§ˆāϛ⧇ Microsoft āĻĻā§āĻŦāĻžā§°āĻž āωāĻ¨ā§āύāϝāĻŧāύ āϕ⧰āĻž āĻāϟāĻž programming language, āϝāĻŋ āĻŽā§‚āϞāϤāσ internet āφ⧰⧁ software development ā§° āĻŦāĻžāĻŦ⧇ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āϕ⧰āĻž āĻšāϝāĻŧāĨ¤ āχāϝāĻŧāĻžāĻ• ISO āφ⧰⧁ ECMA āϏāĻ‚āĻ¸ā§āĻĨāĻžāχ āĻ¸ā§āĻŦā§€āĻ•ā§ƒāϤāĻŋ āĻĻāĻŋāϛ⧇āĨ¤






24. C and C++ (āϚāĻŋ āφ⧰⧁ āϚāĻŋ++)


C is a high-level programming language developed by Dennis Ritchie and Brian Kernighan at Bell Laboratories in the 1970s. It is similar to the English language. C++ is an object-oriented programming language developed from C. It was designed to combine the power of assembly language with high-level programming.


C āĻšā§ˆāϛ⧇ āĻāϟāĻž high-level programming language āϝāĻŋ Dennis Ritchie āφ⧰⧁ Brian Kernighan āĻ 1970 āĻĻāĻļāĻ•āϤ Bell Laboratories āϤ āωāĻ¨ā§āύāϝāĻŧāύ āϕ⧰āĻŋāĻ›āĻŋāϞāĨ¤ āχ āχāς⧰āĻžāĻœā§€ āĻ­āĻžāώāĻžā§° āĻĻ⧰⧇ āϏāĻšāϜāĨ¤ C++ āĻšā§ˆāϛ⧇ C ā§° āωāĻ¨ā§āύāϤ object-oriented programming languageāĨ¤ āχāϝāĻŧāĻžāĻ• assembly language ā§° āĻ•ā§āώāĻŽāϤāĻž high-level language āϤ āĻ…āĻ¨ā§āĻ¤ā§°ā§āϭ⧁āĻ•ā§āϤ āϕ⧰āĻžā§° āωāĻĻā§āĻĻ⧇āĻļā§āϝ⧇ āωāĻ¨ā§āύāϝāĻŧāύ āϕ⧰āĻž āĻšā§ˆāĻ›āĻŋāϞāĨ¤


25. Views (āĻ­āĻŋāω)

A view is a virtual table that does not store its own data. It displays data taken from another base table and helps users access specific information. āĻ­āĻŋāω āĻšā§ˆāϛ⧇ āĻāύ⧇ āĻāϟāĻž virtual table āϝāĻžā§° āύāĻŋāϜāĻ¸ā§āĻŦ āĻĄāĻžāϟāĻž āύāĻžāĻĨāĻžāϕ⧇āĨ¤ āχ āĻ…āĻ¨ā§āϝ base table ā§° āĻĒā§°āĻž āĻĄāĻžāϟāĻž āϞ⧈ āĻĻ⧇āĻ–ā§ā§ąāĻžāϝāĻŧ āφ⧰⧁ āĻŦā§āĻ¯ā§ąāĻšāĻžā§°āĻ•āĻžā§°ā§€āĻ• āύāĻŋā§°ā§āĻĻāĻŋāĻˇā§āϟ āϤāĻĨā§āϝ āĻĒā§ā§°āĻžāĻĒā§āϤ āϕ⧰āĻžāϤ āϏāĻšāĻžāϝāĻŧ āϕ⧰⧇āĨ¤


26. Twisted Pair Cable (āϟ⧁āχāĻˇā§āĻŸā§‡āĻĄ āĻĒ⧇āϝāĻŧāĻžā§° āϕ⧇āĻŦāϞ)

Twisted pair cable consists of two copper wires twisted together and covered with plastic or Teflon insulation. It can carry signals up to about 1 km without a repeater.


āϟ⧁āχāĻˇā§āĻŸā§‡āĻĄ āĻĒ⧇āϝāĻŧāĻžā§° āϕ⧇āĻŦāϞāϤ āĻĻ⧁āϟāĻž āϤāĻžāĻŽā§° āϤāĻžāρ⧰ āĻāϕ⧇āϞāϗ⧇ āĻĒ⧇āρāϚāĻŋ ā§°āĻ–āĻž āĻšāϝāĻŧ āφ⧰⧁ āĻĒā§āϞāĻžāĻˇā§āϟāĻŋāĻ• āĻŦāĻž Teflon āĻ†ā§ąā§°āϪ⧇⧰⧇ āĻĸāĻ•āĻž āĻĨāĻžāϕ⧇āĨ¤ āχ repeater āύ⧋āĻšā§‹ā§ąāĻžāĻ•ā§ˆ āĻĒā§ā§°āĻžāϝāĻŧ 1 āĻ•āĻŋāϞ⧋āĻŽāĻŋāϟāĻžā§°āϞ⧈ āϏāĻ‚āϕ⧇āϤ āĻŦāĻšāύ āϕ⧰āĻŋāĻŦ āĻĒāĻžā§°ā§‡āĨ¤


27. Cross Platform (āĻ•ā§ā§°āĻ› āĻĒā§āϞ⧇āϟāĻĢā§°ā§āĻŽ)

Cross-platform software is software that can work on different operating systems and computer hardware. āĻ•ā§ā§°āĻ› āĻĒā§āϞ⧇āϟāĻĢā§°ā§āĻŽ āĻšā§ˆāϛ⧇ āĻāύ⧇ āϚāĻĢā§āĻŸā§ąā§‡ā§° āϝāĻŋ āĻŦāĻŋāĻ­āĻŋāĻ¨ā§āύ operating system āφ⧰⧁ computer hardware āϤ āϚāϞāĻŋāĻŦ āĻĒāĻžā§°ā§‡āĨ¤


28. Metropolitan Area Network (MAN) (āĻŽā§‡āĻŸā§ā§°ā§‹āĻĒāϞāĻŋāϟāĻžāύ āĻā§°āĻŋāϝāĻŧāĻž āύ⧇āĻŸā§ąā§°ā§āĻ•)


MAN is a network used to connect private and public computers within the same city. Cable television networks are examples of MAN. It generally covers a large geographical area of about 100 km.


MAN āĻšā§ˆāϛ⧇ āĻāύ⧇ āĻāϟāĻž āύ⧇āĻŸā§ąā§°ā§āĻ• āϝāĻŋ āĻāϕ⧇ āϚāĻšā§°ā§° āĻŦā§āϝāĻ•ā§āϤāĻŋāĻ—āϤ āφ⧰⧁ ā§°āĻžāϜāĻšā§ā§ąāĻž āĻ•āĻŽā§āĻĒāĻŋāωāϟāĻžā§° āϏāĻ‚āϝ⧋āĻ— āϕ⧰āĻŋāĻŦāϞ⧈ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āϕ⧰āĻž āĻšāϝāĻŧāĨ¤ Cable television network āχāϝāĻŧāĻžā§° āωāĻĻāĻžāĻšā§°āĻŖāĨ¤ āχ āϏāĻžāϧāĻžā§°āĻŖāϤ⧇ āĻĒā§ā§°āĻžāϝāĻŧ 100 āĻ•āĻŋāϞ⧋āĻŽāĻŋāϟāĻžā§° āĻāϞ⧇āĻ•āĻžāϞ⧈ āĻŦāĻŋāĻ¸ā§āϤ⧃āϤ āĻĨāĻžāϕ⧇āĨ¤


29. Mesh Topology (āĻŽā§‡āĻļ āϟāĻĒ’āϞāϜāĻŋ)

Mesh topology is a network arrangement without a central host computer. It can be full mesh or partial mesh topology. It is mainly used in backbone networks. Even if one node or communication link fails, data transmission continues.


āĻŽā§‡āĻļ āϟāĻĒ’āϞāϜāĻŋ āĻšā§ˆāϛ⧇ āĻāύ⧇ āĻāϟāĻž āύ⧇āĻŸā§ąā§°ā§āĻ• āĻŦā§āĻ¯ā§ąāĻ¸ā§āĻĨāĻž āϝ’āϤ āϕ⧋āύ⧋ āϕ⧇āĻ¨ā§āĻĻā§ā§°ā§€āϝāĻŧ host computer āύāĻžāĻĨāĻžāϕ⧇āĨ¤ āχ full mesh āφ⧰⧁ partial mesh āĻĻ⧁āϝāĻŧā§‹ āϧ⧰āĻŖā§° āĻš’āĻŦ āĻĒāĻžā§°ā§‡āĨ¤ āĻŽā§‚āϞāϤāσ backbone network āϤ āχāϝāĻŧāĻžā§° āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āĻšāϝāĻŧāĨ¤ āϕ⧋āύ⧋ node āĻŦāĻž communication link āύāĻˇā§āϟ āĻšāϞ⧇āĻ“ data transfer āϚāϞāĻŋ āĻĨāĻžāϕ⧇āĨ¤


30. Wireless Technology (āĻŦ⧇āϤāĻžā§° āĻĒā§ā§°āϝ⧁āĻ•ā§āϤāĻŋ)

Wireless technology is used to connect computers without cables. It uses infrared and radio waves for short-distance communication and networking. āĻŦ⧇āϤāĻžā§° āĻĒā§ā§°āϝ⧁āĻ•ā§āϤāĻŋ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āϕ⧰āĻŋ cable āύ⧋āĻšā§‹ā§ąāĻžāĻ•ā§ˆ āĻ•āĻŽā§āĻĒāĻŋāωāϟāĻžā§°āϏāĻŽā§‚āĻš āϏāĻ‚āϝ⧋āĻ— āϕ⧰āĻž āĻšāϝāĻŧāĨ¤ āχāϝāĻŧāĻžāϤ infrared āφ⧰⧁ radio wave āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āϕ⧰āĻŋ āĻ¸ā§āĻŦāĻ˛ā§āĻĒ āĻĻā§‚ā§°āĻ¤ā§āĻŦā§° network āĻ¸ā§āĻĨāĻžāĻĒāύ āϕ⧰āĻž āĻšāϝāĻŧāĨ¤


============================================================================


31. PHP (PHP - Hypertext Preprocessor) (āĻĒāĻŋ.āĻāχāϚ.āĻĒāĻŋ.)

PHP is a software programming language used for creating dynamic web pages. Initially, it was called Personal Home Page. It was developed by Rasmus Lerdorf and is commonly used with HTML. Websites like Facebook and Yahoo were built using PHP.


PHP āĻšā§ˆāϛ⧇ dynamic web page āϤ⧈āϝāĻŧāĻžā§° āϕ⧰āĻŋāĻŦāϞ⧈ āĻŦā§āĻ¯ā§ąāĻšā§ƒāϤ āĻāϟāĻž programming languageāĨ¤ āφ⧰āĻŽā§āĻ­āĻŖāĻŋāϤ⧇ āχāϝāĻŧāĻžāĻ• Personal Home Page āĻŦā§‹āϞāĻž āĻšā§ˆāĻ›āĻŋāϞāĨ¤ āχāϝāĻŧāĻžā§° āωāĻ¨ā§āύāϝāĻŧāύ Rasmus Lerdorf āĻ āϕ⧰āĻŋāĻ›āĻŋāϞāĨ¤ PHP āϏāĻžāϧāĻžā§°āĻŖāϤ⧇ HTML ā§° āϏ⧈āϤ⧇ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āϕ⧰āĻž āĻšāϝāĻŧāĨ¤ Facebook āφ⧰⧁ Yahoo āφāĻĻāĻŋ website āϤ PHP āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āϕ⧰āĻž āĻšā§ˆāĻ›āĻŋāϞāĨ¤


32. URL (Uniform Resource Locator) (āχāω.āφ⧰.āĻāϞ.)


A URL is the address of a website or web page on a computer network. It tells the location of information and how it can be accessed. A URL may contain domain names, words, numbers, and symbols. By typing a URL, a user can directly open a web page.


URL āĻšā§ˆāϛ⧇ āϕ⧋āύ⧋ website āĻŦāĻž web page ā§° āĻ āĻŋāĻ•āύāĻžāĨ¤ āχ āϤāĻĨā§āϝ āĻ•’āϤ āφāϛ⧇ āφ⧰⧁ āϕ⧇āύ⧇āĻ•ā§ˆ āϏ⧇āχ āϤāĻĨā§āϝ āϞāĻžāĻ­ āϕ⧰āĻŋāĻŦ āĻĒāĻžā§°āĻŋ āϏ⧇āϝāĻŧāĻž āϜāύāĻžāϝāĻŧāĨ¤ URL āϤ domain name, āĻļāĻŦā§āĻĻ, āϏāĻ‚āĻ–ā§āϝāĻž āφ⧰⧁ āϚāĻŋāĻšā§āύ āĻĨāĻžāĻ•āĻŋāĻŦ āĻĒāĻžā§°ā§‡āĨ¤ URL āϟāĻžāχāĻĒ āϕ⧰āĻŋ āĻŦā§āĻ¯ā§ąāĻšāĻžā§°āĻ•āĻžā§°ā§€āϝāĻŧ⧇ āϏ⧋āϜāĻžāĻ•ā§ˆ web page āϖ⧁āϞāĻŋāĻŦ āĻĒāĻžā§°ā§‡āĨ¤


33. Cyber Space (āϏāĻžāχāĻŦāĻžā§° āĻ¸ā§āĻĒ⧇āϚ)

The term “Cyber Space” was first used by William Gibson in his book Neuromancer. It refers to the virtual world of computer communication networks and information systems spread across the world.


“Cyber Space” āĻļāĻŦā§āĻĻāĻŸā§‹ āĻĒā§ā§°āĻĨāĻŽā§‡ William Gibson āĻ āϤ⧇āĻ“āρ⧰ Neuromancer āύāĻžāĻŽā§° āĻ—ā§ā§°āĻ¨ā§āĻĨāϤ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āϕ⧰āĻŋāĻ›āĻŋāϞāĨ¤ āχ āĻŦāĻŋāĻļā§āĻŦāϜ⧁⧰āĻŋ āĻŦāĻŋāĻ¸ā§āϤ⧃āϤ computer communication network āφ⧰⧁ āϤāĻĨā§āϝ āĻ­āĻžāĻŖā§āĻĄāĻžā§°ā§° āĻ•āĻžāĻ˛ā§āĻĒāύāĻŋāĻ• āϜāĻ—āϤāĻ• āĻŦ⧁āϜāĻžāϝāĻŧāĨ¤


34. Spyware (āĻ¸ā§āĻĒāĻžāĻ‡ā§ąā§‡ā§°)

Spyware is a malicious software program that secretly collects information such as passwords, email messages, usernames, and browsing history without the user’s knowledge.


āĻ¸ā§āĻĒāĻžāĻ‡ā§ąā§‡ā§° āĻšā§ˆāϛ⧇ āĻāύ⧇ āĻāϟāĻž āĻ•ā§āώāϤāĻŋāĻ•āĻžā§°āĻ• āϚāĻĢā§āĻŸā§ąā§‡ā§° āϝāĻŋ āĻŦā§āĻ¯ā§ąāĻšāĻžā§°āĻ•āĻžā§°ā§€ā§° āĻ…āĻœā§āĻžāĻžāϤ⧇ password, email, username āφ⧰⧁ browsing history āφāĻĻāĻŋ āϤāĻĨā§āϝ āϏāĻ‚āĻ—ā§ā§°āĻš āϕ⧰⧇āĨ¤


35. Threads (āĻĨā§ā§°ā§‡āĻĄāĻ›)

In internet discussions, a thread is a separate discussion started by users on a particular topic. āχāĻŖā§āϟāĻžā§°āύ⧇āϟāϤ āφāϞ⧋āϚāύāĻž āϚāϞāĻžāĻ•āĻžāϞ⧀āύ āϕ⧋āύ⧋ āĻŦāĻŋāώāϝāĻŧā§° āĻ“āĻĒā§°āϤ āĻŦā§āĻ¯ā§ąāĻšāĻžā§°āĻ•āĻžā§°ā§€āϝāĻŧ⧇ āφ⧰āĻŽā§āĻ­ āϕ⧰āĻž āĻĒ⧃āĻĨāĻ• āφāϞ⧋āϚāύāĻž āĻĨā§ā§°ā§‡āĻĄ āĻŦ⧁āϞāĻŋ āĻ•ā§‹ā§ąāĻž āĻšāϝāĻŧāĨ¤






Key Logger (āĻ•āĻŋ-āϞāĻ—āĻžā§°)


A key logger is a software program that records the keys pressed by a user while working on a computer. It runs secretly without the user’s knowledge and is a type of spyware.


āĻ•āĻŋ-āϞāĻ—āĻžā§° āĻšā§ˆāϛ⧇ āĻāύ⧇ āĻāϟāĻž āϚāĻĢā§āĻŸā§ąā§‡ā§° āĻĒā§ā§°āĻ—ā§ā§°āĻžāĻŽ āϝāĻŋ āĻŦā§āĻ¯ā§ąāĻšāĻžā§°āĻ•āĻžā§°ā§€āϝāĻŧ⧇ āĻ•āĻŽā§āĻĒāĻŋāωāϟāĻžā§°āϤ āĻ•āĻžāĻŽ āϕ⧰āĻžā§° āϏāĻŽāϝāĻŧāϤ āϟāĻŋāĻĒāĻž key āϏāĻŽā§‚āĻšā§° ⧰⧇āĻ•ā§°ā§āĻĄ ā§°āĻžāϖ⧇āĨ¤ āχ āĻŦā§āĻ¯ā§ąāĻšāĻžā§°āĻ•āĻžā§°ā§€ā§° āĻ…āĻœā§āĻžāĻžāϤ⧇ āĻ—ā§‹āĻĒāύ⧇ āϚāϞāĻŋ āĻĨāĻžāϕ⧇ āφ⧰⧁ āχ spyware ā§° āĻāϟāĻž āĻĒā§ā§°āĻ•āĻžā§°āĨ¤