Computer Terminology 3 - āĻāĻŽā§āĻĒāĻŋāĻāĻāĻžā§° āĻāĻžā§°ā§āĻŽāĻŋāύ'āϞāĻāĻŋ 3
1. Router (ā§°āĻžāĻāĻāĻžā§°)
A router is a networking device that sends data packets to the correct destination through the internet in a short time. It works using both hardware and software. ā§°āĻžāĻāĻāĻžā§° āĻšā§āĻā§ āĻāĻāĻž āύā§āĻā§ąā§°ā§āĻ āĻĄāĻŋāĻāĻžāĻāĻ, āϝāĻŋ āĻāĻŖā§āĻāĻžā§°āύā§āĻā§° āĻŽāĻžāϧā§āϝāĻŽā§ āĻĄāĻžāĻāĻž āĻĒā§āĻā§āĻ āϏāĻ āĻŋāĻ āĻ āĻŋāĻāύāĻžāϞ⧠āĻāĻŽ āϏāĻŽāϝāĻŧāϤ āĻĒā§ā§°ā§ā§°āĻŖ āĻā§°ā§āĨ¤ āĻ āĻšāĻžā§°ā§āĻĄā§ąā§ā§° āĻā§°ā§ āĻāĻĢā§āĻā§ąā§ā§°ā§° āϏāĻšāĻžāϝāĻŧāϤ āĻāĻžāĻŽ āĻā§°ā§āĨ¤
2. Modem (āĻŽāĻĄā§āĻŽ)
A modem is used to connect a computer to a network. It converts digital data into analog signals and analog signals into digital data. āĻŽāĻĄā§āĻŽ āĻāĻŽā§āĻĒāĻŋāĻāĻāĻžā§°āĻ āύā§āĻā§ąā§°ā§āĻā§° āϏā§āϤ⧠āϏāĻāϝā§āĻ āĻā§°āĻŋāĻŦāϞ⧠āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āĻā§°āĻž āĻšāϝāĻŧāĨ¤ āĻ āĻĄāĻŋāĻāĻŋāĻā§āϞ āĻĄāĻžāĻāĻžāĻ āĻāύāĻžāϞāĻ āϏāĻāĻā§āϤāϤ āĻā§°ā§ āĻāύāĻžāϞāĻ āϏāĻāĻā§āϤāĻ āĻĄāĻŋāĻāĻŋāĻā§āϞ āĻĄāĻžāĻāĻžāϤ āĻĒā§°āĻŋāĻŖāϤ āĻā§°ā§āĨ¤
3. Gopher (āĻā§āĻĢāĻžā§°)
Gopher is a service that helps users search and retrieve documents from remote computers through the internet. āĻā§āĻĢāĻžā§° āĻšā§āĻā§ āĻāύ⧠āĻāĻāĻž āϏā§ā§ąāĻž āϝāĻžā§° āϏāĻšāĻžāϝāĻŧāϤ āĻāĻŖā§āĻāĻžā§°āύā§āĻā§° āĻŽāĻžāϧā§āϝāĻŽā§ āĻĻā§ā§°ā§ąā§°ā§āϤ⧠āĻāĻŽā§āĻĒāĻŋāĻāĻāĻžā§°ā§° āĻĒā§°āĻž āĻĄāĻā§āĻŽā§āύā§āĻ āĻŦāĻŋāĻāĻžā§°āĻŋ āĻāϞāĻŋāϝāĻŧāĻžāĻŦ āĻā§°ā§ āĻĒā§ā§°āĻžāĻĒā§āϤ āĻā§°āĻŋāĻŦ āĻĒāĻžā§°āĻŋāĨ¤
4. Ping (āĻĒāĻŋāĻ)
Ping is a utility used to check whether a particular computer or IP address is reachable over a network. āĻĒāĻŋāĻ āĻšā§āĻā§ āĻāύ⧠āĻāĻāĻž āĻŦā§āĻ¯ā§ąāϏā§āĻĨāĻž āϝāĻžā§° āϏāĻšāĻžāϝāĻŧāϤ āĻā§āύ⧠āύāĻŋā§°ā§āĻĻāĻŋāώā§āĻ āĻāĻŽā§āĻĒāĻŋāĻāĻāĻžā§° āĻŦāĻž IP Address āύā§āĻā§ąā§°ā§āĻāϤ āϏāĻā§ā§°āĻŋāϝāĻŧ āĻāĻā§ āύ⧠āύāĻžāĻ āĻĒā§°ā§āĻā§āώāĻž āĻā§°āĻž āĻšāϝāĻŧāĨ¤
5. Anonymous Server (āĻāύā§āύāĻŋāĻŽāĻžāĻ āĻāĻžā§°ā§āĻāĻžā§°)
An anonymous server is a server that allows users to connect without requiring a special identity or password. āĻāύā§āύāĻŋāĻŽāĻžāĻ āĻāĻžā§°ā§āĻāĻžā§° āĻšā§āĻā§ āĻāύ⧠āĻāĻāĻž āĻāĻžā§°ā§āĻāĻžā§°, āϝāĻžā§° āϏā§āϤ⧠āϏāĻāϝā§āĻ āϏā§āĻĨāĻžāĻĒāύ āĻā§°āĻŋāĻŦāϞ⧠āĻŦāĻŋāĻļā§āώ āĻĒā§°āĻŋāĻāϝāĻŧ āĻŦāĻž āĻĒāĻžāĻā§ąā§°ā§āĻĄā§° āĻĒā§ā§°āϝāĻŧā§āĻāύ āύāĻšāϝāĻŧāĨ¤
6. Pop-up (āĻĒāĻĒ-āĻāĻĒ)
A pop-up is an unwanted window that automatically opens while viewing a web page. āĻĒāĻĒ-āĻāĻĒ āĻšā§āĻā§ āĻāύ⧠āĻāĻāĻž āĻ āĻŦāĻžāĻā§āĻāĻŋāϤ āĻāĻāĻŖā§āĻĄā§, āϝāĻŋ ā§ąā§āĻŦ āĻĒā§āĻ āĻāĻžāĻāĻāϤ⧠āϏā§āĻŦāϝāĻŧāĻāĻā§āϰāĻŋāϝāĻŧāĻāĻžā§ąā§ āĻā§āϞ⧠āϝāĻžāϝāĻŧāĨ¤
7. Search Engine (āĻāĻžā§°ā§āĻ āĻāĻā§āĻāĻŋāύ)
A search engine helps users find required information from the huge collection of data on the World Wide Web. It keeps a list of web pages for searching. āĻāĻžā§°ā§āĻ āĻāĻā§āĻāĻŋāύ āĻšā§āĻā§ āĻāύ⧠āĻāĻāĻž āĻŦā§āĻ¯ā§ąāϏā§āĻĨāĻž āϝāĻŋ World Wide Web ā§° āĻŦāĻŋāĻļāĻžāϞ āϤāĻĨā§āϝ āĻāĻžāĻŖā§āĻĄāĻžā§°ā§° āĻĒā§°āĻž āĻĒā§ā§°āϝāĻŧā§āĻāύā§āϝāĻŧ āϤāĻĨā§āϝ āĻŦāĻŋāĻāĻžā§°āĻŋ āĻāϞāĻŋāϝāĻŧāĻžāĻŦāϞ⧠āϏāĻšāĻžāϝāĻŧ āĻā§°ā§āĨ¤ āĻ āĻŦāĻŋāĻāĻŋāύā§āύ ā§ąā§āĻŦ āĻĒā§āĻā§° āϤāĻžāϞāĻŋāĻāĻž āϏāĻā§°āĻā§āώāĻŖ āĻā§°āĻŋ ā§°āĻžāĻā§āĨ¤
Examples: Google, Yahoo, AltaVista etc. āĻāĻĻāĻžāĻšā§°āĻŖ: Google, Yahoo, AltaVista āĻāĻĻāĻŋāĨ¤
8. Surfing (āĻāĻžā§°ā§āĻĢāĻŋāĻ)
Surfing means searching and browsing information through the internet using hyperlinks on web pages. āĻāĻžā§°ā§āĻĢāĻŋāĻ āĻšā§āĻā§ āĻāĻŖā§āĻāĻžā§°āύā§āĻā§° āĻŽāĻžāϧā§āϝāĻŽā§ ā§ąā§āĻŦ āĻĒā§āĻā§° hyperlink āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āĻā§°āĻŋ āϤāĻĨā§āϝ āĻŦāĻŋāĻāĻžā§°āĻŋ āĻā§ā§ąāĻž āĻĒā§ā§°āĻā§ā§°āĻŋāϝāĻŧāĻžāĨ¤
9. Thumbnail (āĻĨāĻžāĻŽā§āĻŦāύā§āĻāϞ)
A thumbnail is a very small preview image used to display pictures or maps. āĻĨāĻžāĻŽā§āĻŦāύā§āĻāϞ āĻšā§āĻā§ āύāĻā§° āĻāĻāĻžā§°ā§° āϏ⧰⧠āĻāĻŦāĻŋ, āϝāĻžā§° āϏāĻšāĻžāϝāĻŧāϤ āĻĄāĻžāĻā§° āĻāĻŦāĻŋ āĻŦāĻž āĻŽāĻžāύāĻāĻŋāϤā§ā§°ā§° āĻĒā§ā§°ā§āĻŦāĻĻā§°ā§āĻļāύ āĻĻā§āĻā§ā§ąāĻž āĻšāϝāĻŧāĨ¤
10. Cloud Computing (āĻā§āϞāĻžāĻāĻĄ āĻāĻŽā§āĻĒāĻŋāĻāĻāĻŋāĻ)
Cloud computing means using internet-based services and applications through a computer, such as email, web browsers, YouTube, Facebook, and Twitter. āĻā§āϞāĻžāĻāĻĄ āĻāĻŽā§āĻĒāĻŋāĻāĻāĻŋāĻ āĻšā§āĻā§ āĻāĻŖā§āĻāĻžā§°āύā§āĻā§° āĻŽāĻžāϧā§āϝāĻŽā§ āĻŦāĻŋāĻāĻŋāύā§āύ āϏā§ā§ąāĻž āĻā§°ā§ āĻāĻĒā§āϞāĻŋāĻā§āĻāύ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āĻā§°āĻž, āϝā§āύ⧠āĻ-āĻŽā§āĻāϞ, ā§ąā§āĻŦ āĻŦā§ā§°āĻžāĻāĻāĻžā§°, YouTube, Facebook, Twitter āĻāĻĻāĻŋāĨ¤
===================================================================================
11. Firewall (āĻĢāĻžāϝāĻŧāĻžā§°ā§ąāϞ)
A firewall provides security to a computer, data, or network from unauthorized users. It can be hardware, software, or both. It helps maintain the privacy and security of LAN networks connected to the internet.
āĻĢāĻžāϝāĻŧāĻžā§°ā§ąāϞ āĻšā§āĻā§ āĻāύ⧠āĻāĻāĻž āϏā§ā§°āĻā§āώāĻž āĻŦā§āĻ¯ā§ąāϏā§āĻĨāĻž āϝāĻŋ āĻāĻŽā§āĻĒāĻŋāĻāĻāĻžā§°, āĻĄāĻžāĻāĻž āĻŦāĻž āύā§āĻā§ąā§°ā§āĻāĻ āĻ āύāϧāĻŋāĻā§āϤ āĻŦā§āĻ¯ā§ąāĻšāĻžā§°āĻāĻžā§°ā§ā§° āĻĒā§°āĻž āϏā§ā§°āĻā§āώāĻž āĻĻāĻŋāϝāĻŧā§āĨ¤ āĻ āĻšāĻžā§°ā§āĻĄā§ąā§ā§°, āĻāĻĢā§āĻā§ąā§ā§° āĻŦāĻž āĻĻā§āϝāĻŧā§āĻāĻžāĻ āĻš’āĻŦ āĻĒāĻžā§°ā§āĨ¤ āĻ āĻāĻŖā§āĻāĻžā§°āύā§āĻāϤ LAN āύā§āĻā§ąā§°ā§āĻā§° āĻā§āĻĒāύā§āϝāĻŧāϤāĻž āĻŦāĻāĻžāĻ ā§°āĻžāĻā§āĨ¤
12. Digital Signature (āĻĄāĻŋāĻāĻŋāĻā§āϞ āϏā§āĻŦāĻžāĻā§āώ⧰)
Digital signature is a technology used to maintain the authenticity and security of electronic documents and messages. The signature is attached to the document in coded form and widely used in e-governance and e-commerce.
āĻĄāĻŋāĻāĻŋāĻā§āϞ āϏā§āĻŦāĻžāĻā§āώ⧰ āĻšā§āĻā§ āĻāύ⧠āĻāĻāĻž āĻĒā§ā§°āϝā§āĻā§āϤāĻŋ āϝāĻŋ āĻāĻŽā§āĻĒāĻŋāĻāĻāĻžā§°āϤ āĻĨāĻāĻž āĻĄāĻā§āĻŽā§āύā§āĻ āĻŦāĻž āĻŦāĻžā§°ā§āϤāĻžā§° āϏāϤā§āϝāϤāĻž āĻā§°ā§ āϏā§ā§°āĻā§āώāĻž āĻŦāĻāĻžāĻ ā§°āĻžāĻā§āĨ¤ āĻāĻ āϏā§āĻŦāĻžāĻā§āώ⧰ coded form āϤ āĻĄāĻā§āĻŽā§āύā§āĻā§° āϏā§āϤ⧠āϏāĻāϝā§āĻā§āϤ āĻĨāĻžāĻā§ āĻā§°ā§ āĻ-āĻļāĻžāϏāύ (e-governance) āĻā§°ā§ e-commerce āϤ āĻŦāĻšā§āϞāĻāĻžā§ąā§ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āĻā§°āĻž āĻšāϝāĻŧāĨ¤
13. Biometric Techniques (āĻŦāĻžāϝāĻŧā§āĻŽā§āĻā§ā§°āĻŋāĻ āĻĒā§ā§°āϝā§āĻā§āϤāĻŋ)
Biometric technology is used to identify a person through fingerprints, face shape, iris, voice, etc. The computer stores the samples of authorized users for identification.
āĻŦāĻžāϝāĻŧā§āĻŽā§āĻā§ā§°āĻŋāĻ āĻĒā§ā§°āϝā§āĻā§āϤāĻŋ āĻšā§āĻā§ āĻāύ⧠āĻāĻāĻž āĻĒāĻĻā§āϧāϤāĻŋ āϝāĻžā§° āϏāĻšāĻžāϝāĻŧāϤ āĻāĻā§āϞāĻŋā§° āĻāĻžāĻĒ, āĻŽā§āĻā§° āĻāĻā§āϤāĻŋ, āĻāĻā§ā§° āĻĒā§āϤāϞāĻŋ, āĻāĻŖā§āĻ āϏā§āĻŦā§° āĻāĻĻāĻŋ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āĻā§°āĻŋ āĻŦā§āϝāĻā§āϤāĻŋā§° āĻĒā§°āĻŋāĻāϝāĻŧ āĻāĻŋāύāĻžāĻā§āϤ āĻā§°āĻž āĻšāϝāĻŧāĨ¤ āĻāϝāĻŧāĻžā§° āĻŦāĻžāĻŦā§ āĻāĻŽā§āĻĒāĻŋāĻāĻāĻžā§°āϤ āĻāĻāϤā§āĻ āĻ āύā§āĻŽā§āĻĻāĻŋāϤ āĻŦā§āϝāĻā§āϤāĻŋā§° āϤāĻĨā§āϝ āϏāĻā§°āĻā§āώāĻŖ āĻā§°āĻŋ ā§°āĻāĻž āĻšāϝāĻŧāĨ¤
14. Speaker (āϏā§āĻĒā§āĻāĻžā§°)
A speaker converts electrical signals received from the sound card into sound waves. It is connected to the sound card through a 3.5 mm stereo connector. Multimedia speakers also contain an amplifier and volume control knob.
āϏā§āĻĒā§āĻāĻžā§°ā§ āĻāĻžāĻāĻŖā§āĻĄ āĻāĻžā§°ā§āĻĄā§° āĻĒā§°āĻž āĻĒā§ā§ąāĻž āĻŦā§āĻĻā§āϝā§āϤāĻŋāĻ āϏāĻāĻā§āϤāĻ āĻļāĻŦā§āĻĻ āϤ⧰āĻāĻāϤ āĻĒā§°āĻŋāĻŖāϤ āĻā§°ā§āĨ¤ āĻāϝāĻŧāĻžāĻ 3.5 mm stereo connector ā§° āϏāĻšāĻžāϝāĻŧāϤ sound card ā§° āϏā§āϤ⧠āϏāĻāϝā§āĻ āĻā§°āĻž āĻšāϝāĻŧāĨ¤ Multimedia speaker āϤ amplifier āĻā§°ā§ volume control knob āĻĨāĻžāĻā§āĨ¤
15. Screen Projector (āϏā§āĻā§ā§°āĻŋāύ āĻĒā§ā§°āĻā§āĻā§āĻā§°)
A screen projector displays computer screen images and videos on a large screen. It is used for movies, multimedia presentations, and group viewing.
āϏā§āĻā§ā§°āĻŋāύ āĻĒā§ā§°āĻā§āĻā§āĻā§° āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āĻā§°āĻŋ āĻāĻŽā§āĻĒāĻŋāĻāĻāĻžā§°ā§° āϏā§āĻā§ā§°āĻŋāύāϤ āĻĨāĻāĻž āĻāĻŦāĻŋ, āĻāĻŋāĻĄāĻŋāĻ ’ āĻā§°ā§ āĻāĻāύāĻžāĻŦā§ā§° āĻĄāĻžāĻā§° āϏā§āĻā§ā§°āĻŋāύāϤ āĻĻā§āĻā§ā§ąāĻž āĻšāϝāĻŧāĨ¤ āĻāϝāĻŧāĻžāĻ multimedia presentation āĻā§°ā§ āĻĻāϞā§āϝāĻŧ āĻĒā§ā§°āĻĻā§°ā§āĻļāύ⧰ āĻŦāĻžāĻŦā§ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āĻā§°āĻž āĻšāϝāĻŧāĨ¤
16. Parallel Port (āĻĒā§ā§°ā§āϞā§āϞ āĻĒ’ā§°ā§āĻ)
A parallel port is used to connect devices and transfer 8 bits or more data simultaneously at high speed. It generally has a 25-pin connector and is commonly used for printers, so it is also called a printer port.
āĻĒā§ā§°ā§āϞā§āϞ āĻĒ’ā§°ā§āĻ āĻĄāĻŋāĻāĻžāĻāĻ āϏāĻāϝā§āĻ āĻā§°ā§ āĻāĻā§ āϏāĻŽāϝāĻŧāϤ⧠8 āĻŦāĻŋāĻ āĻŦāĻž āϤāĻžāϤā§āϧāĻŋāĻ āĻĄāĻžāĻāĻž āĻĻā§āϰā§āϤāĻāϤāĻŋāϤ āϏā§āĻĨāĻžāύāĻžāύā§āϤ⧰ āĻā§°āĻŋāĻŦāϞ⧠āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āĻā§°āĻž āĻšāϝāĻŧāĨ¤ āĻāϝāĻŧāĻžāϤ āϏāĻžāϧāĻžā§°āĻŖāϤ⧠25-pin connector āĻĨāĻžāĻā§ āĻā§°ā§ āĻĒā§ā§°āĻŋāĻŖā§āĻāĻžā§°ā§° āϏā§āϤ⧠āϏāĻāϝā§āĻ āĻā§°āĻžā§° āĻŦāĻžāĻŦā§ āĻāϝāĻŧāĻžāĻ printer port āĻŦā§āϞāĻŋāĻ āĻā§ā§ąāĻž āĻšāϝāĻŧāĨ¤
17. Winchester Disk (āĻāĻāĻā§āĻā§āώā§āĻāĻžā§° āĻĄāĻŋāϏā§āĻ)
A Winchester disk consists of two or more hard disk platters mounted one above another on a central shaft. A motor rotates the disks inside a sealed box to protect them from dust, scratches, and moisture. Hard disks used in personal computers are examples of Winchester disks.
āĻāĻāĻā§āĻā§āώā§āĻāĻžā§° āĻĄāĻŋāϏā§āĻāϤ āĻĻā§āĻāĻž āĻŦāĻž āϤāĻžāϤā§āϧāĻŋāĻ hard disk platter āĻāĻāĻž āĻā§āύā§āĻĻā§ā§°ā§āϝāĻŧ shaft ā§° āĻāĻĒā§°āϤ āĻāĻāĻžā§° āĻāĻĒā§°āϤ āĻāύāĻā§ āϏā§āĻĨāĻžāĻĒāύ āĻā§°āĻž āĻšāϝāĻŧāĨ¤ āĻāϝāĻŧāĻžāϤ āĻĨāĻāĻž motor āĻ āĻĄāĻŋāϏā§āĻāĻŦā§ā§° āĻā§ā§°āĻžāϝāĻŧāĨ¤ āϧā§āϞāĻŋ, āĻāĻāĻā§ā§° āĻā§°ā§ āĻā§°ā§āĻĻā§ā§°āϤāĻžā§° āĻĒā§°āĻž ā§°āĻā§āώāĻž āĻā§°āĻŋāĻŦāϞ⧠āĻāϝāĻŧāĻžāĻ sealed box āϤ ā§°āĻāĻž āĻšāϝāĻŧāĨ¤ Personal computer āϤ āĻŦā§āĻ¯ā§ąāĻšā§āϤ hard disk āĻāϝāĻŧāĻžā§° āĻāĻĻāĻžāĻšā§°āĻŖāĨ¤
18. Smart Card (āϏā§āĻŽāĻžā§°ā§āĻ āĻāĻžā§°ā§āĻĄ)
A smart card is a small plastic card made of PVC. It is read using a smart card reader and is used in ATM cards, credit cards, security cards, and identity cards. Many smart cards contain a microprocessor and EEPROM.
āϏā§āĻŽāĻžā§°ā§āĻ āĻāĻžā§°ā§āĻĄ āĻšā§āĻā§ PVC āĻĒā§āϞāĻžāώā§āĻāĻŋāĻā§°ā§ āύāĻŋā§°ā§āĻŽāĻŋāϤ āĻāĻāĻž āϏ⧰⧠āĻāĻžā§°ā§āĻĄāĨ¤ āĻāϝāĻŧāĻžāĻ smart card reader ā§° āϏāĻšāĻžāϝāĻŧāϤ āĻĒāĻĸāĻŧāĻž āĻšāϝāĻŧāĨ¤ āĻāϝāĻŧāĻžāĻ ATM card, credit card, security card āĻā§°ā§ identity card āĻšāĻŋāĻāĻžāĻĒā§ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āĻā§°āĻž āĻšāϝāĻŧāĨ¤ āĻŦāĻšā§ āϏā§āĻŽāĻžā§°ā§āĻ āĻāĻžā§°ā§āĻĄāϤ microprocessor āĻā§°ā§ EEPROM āĻĨāĻžāĻā§āĨ¤
19. MS-DOS (Microsoft Disk Operating System) (āĻāĻŽ.āĻāĻ.-āĻĄāĻ)
MS-DOS is a 16-bit operating system developed jointly by Microsoft and IBM in 1981. It is command-prompt based and has limited graphical features, so its use has decreased today.
MS-DOS āĻšā§āĻā§ āĻāĻāĻž 16-bit operating system, āϝāĻŋ Microsoft āĻā§°ā§ IBM āĻ āϝā§āĻĨāĻāĻžā§ąā§ 1981 āĻāύāϤ āϤā§āϝāĻŧāĻžā§° āĻā§°āĻŋāĻāĻŋāϞāĨ¤ āĻ command prompt āĻāĻŋāϤā§āϤāĻŋāĻ operating system āĻā§°ā§ āĻāϝāĻŧāĻžāϤ graphical āϏā§āĻŦāĻŋāϧāĻž āĻāĻŽ āĻĨāĻžāĻāĻžāϤ āĻŦā§°ā§āϤāĻŽāĻžāύ āĻāϝāĻŧāĻžā§° āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āĻāĻŽāĻŋ āĻā§āĻā§āĨ¤
20. Unix (āĻāĻāύāĻŋāĻā§āϏ)
Unix is an operating system developed by Ken Thompson and Dennis Ritchie at Bell Laboratories in 1970. It was the first operating system written in a high-level language and was designed for networking and communication. It also provides data security and is mainly used for web servers.
Unix āĻšā§āĻā§ āĻāĻāĻž operating system āϝāĻŋ Ken Thompson āĻā§°ā§ Dennis Ritchie āĻ 1970 āĻāύāϤ Bell Laboratories āϤ āĻāύā§āύāϝāĻŧāύ āĻā§°āĻŋāĻāĻŋāϞāĨ¤ āĻ high-level language āϤ āϞāĻŋāĻāĻž āĻĒā§ā§°āĻĨāĻŽ operating system āĻāĻāĻŋāϞāĨ¤ āĻāϝāĻŧāĻžāĻ networking āĻā§°ā§ communication ā§° āĻŦāĻžāĻŦā§ āϤā§āϝāĻŧāĻžā§° āĻā§°āĻž āĻšā§āĻāĻŋāϞ āĻā§°ā§ āĻ data security āĻ āĻĒā§ā§°āĻĻāĻžāύ āĻā§°ā§āĨ¤ āĻŽā§āϞāϤāĻ web server āϤ āĻāϝāĻŧāĻžā§° āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āĻšāϝāĻŧāĨ¤
================================================================================
21. Retail Software (ā§°āĻŋāĻā§āĻāϞ āĻāĻĢā§āĻā§ąā§ā§°)
Retail software is software available in the market for public purchase. Anyone can buy it by paying the required cost. Examples include Microsoft Office, Microsoft Windows, and Tally. User manuals and instructions are usually provided with it.
ā§°āĻŋāĻā§āĻāϞ āĻāĻĢā§āĻā§ąā§ā§° āĻšā§āĻā§ āĻāύ⧠āĻāĻĢā§āĻā§ąā§ā§° āϝāĻŋ āĻŦāĻāĻžā§°āϤ āĻŦāĻŋāĻā§ā§°ā§ā§° āĻŦāĻžāĻŦā§ āĻāĻĒāϞāĻŦā§āϧ āĻĨāĻžāĻā§āĨ¤ āϝāĻŋāĻā§āύ⧠āĻŦā§āϝāĻā§āϤāĻŋāϝāĻŧā§ āĻŽā§āϞā§āϝ āĻĒā§°āĻŋāĻļā§āϧ āĻā§°āĻŋ āĻāϝāĻŧāĻžāĻ āĻāĻŋāύāĻŋāĻŦ āĻĒāĻžā§°ā§āĨ¤ āĻāĻĻāĻžāĻšā§°āĻŖāϏā§āĻŦā§°ā§āĻĒā§ Microsoft Office, Microsoft Windows āĻā§°ā§ TallyāĨ¤ āϏāĻžāϧāĻžā§°āĻŖāϤ⧠āĻāϝāĻŧāĻžā§° āϏā§āϤ⧠user manual āĻā§°ā§ āύāĻŋāϰā§āĻĻā§āĻļāύāĻž āĻĻāĻŋāϝāĻŧāĻž āĻšāϝāĻŧāĨ¤
22. Syntax Rule (āϏāĻŋāύāĻā§āĻā§āϏ āύāĻŋāϝāĻŧāĻŽ)
Syntax rules are the grammatical rules used in computer programming languages for proper use of words and symbols. āϏāĻŋāύāĻā§āĻā§āϏ āύāĻŋāϝāĻŧāĻŽ āĻšā§āĻā§ āĻāĻŽā§āĻĒāĻŋāĻāĻāĻžā§° programming language āϤ āĻļāĻŦā§āĻĻ āĻā§°ā§ āĻāĻŋāĻšā§āύ āϏāĻ āĻŋāĻāĻāĻžā§ąā§ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āĻā§°āĻžā§° āύāĻŋāϝāĻŧāĻŽāϏāĻŽā§āĻšāĨ¤
23. C Sharp (C#) (āĻāĻŋ āĻļāĻžā§°ā§āĻĒ)
C# is a programming language developed by Microsoft mainly for internet and software development. It is recognized by ISO and ECMA standards organizations. C# āĻšā§āĻā§ Microsoft āĻĻā§āĻŦāĻžā§°āĻž āĻāύā§āύāϝāĻŧāύ āĻā§°āĻž āĻāĻāĻž programming language, āϝāĻŋ āĻŽā§āϞāϤāĻ internet āĻā§°ā§ software development ā§° āĻŦāĻžāĻŦā§ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āĻā§°āĻž āĻšāϝāĻŧāĨ¤ āĻāϝāĻŧāĻžāĻ ISO āĻā§°ā§ ECMA āϏāĻāϏā§āĻĨāĻžāĻ āϏā§āĻŦā§āĻā§āϤāĻŋ āĻĻāĻŋāĻā§āĨ¤
Key Logger (āĻāĻŋ-āϞāĻāĻžā§°)
A key logger is a software program that records the keys pressed by a user while working on a computer. It runs secretly without the user’s knowledge and is a type of spyware.
āĻāĻŋ-āϞāĻāĻžā§° āĻšā§āĻā§ āĻāύ⧠āĻāĻāĻž āĻāĻĢā§āĻā§ąā§ā§° āĻĒā§ā§°āĻā§ā§°āĻžāĻŽ āϝāĻŋ āĻŦā§āĻ¯ā§ąāĻšāĻžā§°āĻāĻžā§°ā§āϝāĻŧā§ āĻāĻŽā§āĻĒāĻŋāĻāĻāĻžā§°āϤ āĻāĻžāĻŽ āĻā§°āĻžā§° āϏāĻŽāϝāĻŧāϤ āĻāĻŋāĻĒāĻž key āϏāĻŽā§āĻšā§° ā§°ā§āĻā§°ā§āĻĄ ā§°āĻžāĻā§āĨ¤ āĻ āĻŦā§āĻ¯ā§ąāĻšāĻžā§°āĻāĻžā§°ā§ā§° āĻ āĻā§āĻāĻžāϤ⧠āĻā§āĻĒāύ⧠āĻāϞāĻŋ āĻĨāĻžāĻā§ āĻā§°ā§ āĻ spyware ā§° āĻāĻāĻž āĻĒā§ā§°āĻāĻžā§°āĨ¤