Home / Current Affairs / Qoutes, Essays / Miscellaneous / Frequently Asked Computer-related And IT Abbreviations

Frequently Asked Computer-related And IT Abbreviations

A
ACL Access Control List
AES Advanced Encryption Standard
AG Access Gateway
ARP Address Resolution Protocol

B
BRAS Broadband Remote Access Server

C
CESoPSN Circuit-Emulation Service over Packet Switched Network
CLI Command Line Interface
CSMA Carrier Sense Multiple Access

D
DBA Dynamic Bandwidth Allocation
DHCP Dynamic Host Configuration Protocol

DoS Denial of Service
DSLAM Digital Subscriber Line Access Multiplexer

E
ETS European Telecommunication Standards
ETSI European Telecommunication Standards Institute

F
FE Fast Ethernet
FEC Forward Error Correction
FTP File Transfer Protocol
FTTB Fiber To The Building

G
GEM G-PON Encapsulation Mode
GPON Gigabit-capable Passive Optical Network

I
ICMP Internet Control Message Protocol
IEC International Electrotechnical Commission
IEEE Institute of Electrical and Electronics Engineers

IGMP Internet Group Management Protocol
IP Internet Protocol
IPTV IP Television
ITU-T International Telecommunication Union – Telecommunication Standardization Sector

L
LAN Local Area Network
LOS Loss Of Signal

M
MAC Medium Access Control
MDU Multiple Dwelling Unit
MGC Media Gateway Controller
MIB Management Information Base

O
OAM Operation, Administration, and Management
OLT Optical Line Terminal

PC Personal Computer
PITP Policy Information Transfer Protocol
PMD Physical Media Dependent
POE Power Over Ethernet
POTS Plain Old Telephone Service
PON Passive Optical Network
PQ Priority Queuing
PSN Packet Switched Network
PSTN Public Switched Telephone Network
PWE3 Pseudo Wire Emulation Edge-to-edge

Q
QinQ 802.1q in 802.1q
QoS Quality of Service

R
RF Radio-Frequency
RSTP Rapid Spanning Tree Protocol

S
SAToP Structure-Agnostic Transport over Packet

SBU Single Business Unit
SNMP Simple Network Management Protocol
STP Spanning Tree Protocol

T
T-CONT Transmission Container
TCP/IP Transmission Control Protocol/Internet Protocol
TDM Time Division Multiplexing
TFTP Trivial File Transfer Protocol

U
UCD User-Centered Design
UDP User Datagram Protocol

V
VLAN Virtual LAN
VoIP Voice over IP
VMAC Virtual MAC

W
WRR Weighted Round Robin

 

Electronic Record-keeping

  • Ray Tomlinson invented E-mail on the ARPANET System in 1971.
  • Email stands for electronic mail.
  • Email is a method to exchange messages between people using electronic devices.
  • An email address identifies an email box to which messages are delivered.
  • An email address consists of two principal parts: a username and a domain name.
  • @symbol is used to separate the username from the domain name in an email address.
  • On July 4, 1996, Hotmail launched the first free web-based email service.
  • Hotmail was founded in 1996 by Sabeer Bhatia and Jack Smith. It was purchased by Microsoft in 1997.
  • Microsoft phased out Hotmail, relaunching the service as Outlook.com in 2012.
  • CC in email stands for carbon copy.
  • cc recipients are not expected to take action or respond to an email, but they can if they want to.
  • The prime purpose of cc is to keep someone aware even if there not directly concerned with the email.
  • bcc in email stands for blind carbon copy.
  • Email spam is the unwanted messages sent in bulk by email.
  • Email spam is also known as junk email.
  • Deleted e-mails are usually stored for a defined time in a trash folder.
  • Email marketing is the act of sending a commercial message to man people using email.
  • Email spoofing is the creation of email messages with a forged sender address.
  • Email bombing is sending hundreds of thousands of messages to a person’s e-mail address.
  • G-mail is a free mailing service developed by Google.
  • Gmail stands for Google mail.
  • Clickon the compose mail to write a new mail or message.
  • Drafts are any messages that you write until you publish it or send it to trash.
  • Outlook mail is an email service owned by Microsoft.
  • Phishing is a fraudulent attempt to obtain sensitive information or data by email, phone, or text message.
  • Phishing is a type of cybercrime.
  • Any type of file can be sent in an attachment to the email.
  • Attachment size limit in gmail is 25 MB.
  • One can send a file in gmail greater than 25 MB via Google drive.
  • A user gets a free space of up to 15 GB in Google drive.
  • For more than 15 GB storage on Google drive, you can upgrade to Google One.
  • Gmail’s star system allows you to mark your most important emails.
  • In gmail starred system, the starred messages are labelled by yellow stars.
  • In gmail, search box is located at the top of the page.
  • E2EE stands for end to end encryption.
  • E2EE is a system where only the communicating users can read messages.
  • ProtonMail is an E2EE email service.
  • MIME stands for Multipurpose Internet Mail Extensions.
  • ASCII stands for American Standard Code for Information Interchange.
  • DNS stands for Domain Name System.
  • ASAP stands for as soon as possible.
  • LMK is an acronym for Let me know.
  • EOM denotes end of message.
  • FWD denotes forward.
  • OOO stands for out of office.
  • NRN stands for No reply needed.
  • TLTR stands for Too long to read.
  • WFH denotes work from home.
  • FYI means for your information.
  • TYT denotes take your time.

About Noshin Bashir

Check Also

MCQs Series: Microsoft PowerPoint, General Knowledge, And MS Word

General Science The method of growing plants without soil in a nutrient-rich solution is called …

Leave a Reply

Your email address will not be published. Required fields are marked *