| Sn | Key Points | Explanation |
| 1 | Active cell | The cell used in the spreadsheet in which the user is working |
| 2 | Active window | The window present in the computer, which is currently active by the user, is called the active window |
| 3 | Algorithm | the sequence if instructions given to a computer by which a task is completed is called algorithm |
| 4 | Alignment | the process of arranging paragraph is called alignment |
| 5 | ALU (Arithmetic logic unit ) | it can perform a large number of arithmetical and logical calculations |
| 6 | Antivirus | antivirus is a group or program of instructions by which the computer is protected from virus damage |
| 7 | AI – (Artificial intelligence) | in computer language the ability to think understand and reason in conformity with human qualities is called artificial intelligence |
| 8 | BIT BYTE | A binary digit i e 0 or 1 is called a bit it is the smallest unit of computer |
| 9 | Browser | SOFTWARE that displays html file as web pages |
| 10 | Bus | A type of path that carries data or electronic signals from one place to another |
| 11 | Bug | this is a type of error found in programs present in the computer |
| 12 | Cell | the part made from column and row is called cell |
| 13 | Client computer | A computer that provides information exchange to server in a network is called a client computer |
| 14 | clip art | It is a group pf pictures and images present in a computer |
| 15 | compiler | It convert high level language into machine language |
| 16 | computer aided design | It used in the construction modified analysis or optimization of a design in a computer system |
| 17 | CD – Rom | It is a storage device made of plastic and data is stored with the help of laser beam |
| 18 | Cookie | An HTTP cookie is a small piece of data stored on the user’s computer by the web browser while browsing a website |
| 19 | Debugging | Debugging is the process of finding and correcting mistakes in the given data and program |
| 20 | Dial – Up line | the line by which the communication system is established is called a dial – up line |
| 21 | Domain name | It is used to identify and locate connected computers on the internet |
| 22 | Dots per inch | Print resolution is measured in dots per inch (or “DPI”) |
| 23 | Ethernet | It is a modern technology which is used to connect local computers in LAN |
| 24 | Expansion slot | the space above the motherboard to which the computer’s capacity is added by adding other accessories is called the expansion slot |
| 25 | Firewall | It is a group of hardware and software which is used to protect the network |
| 26 | Freeware | It is a form of software distribution which is available at no charge |
| 27 | GIGO | Garbage in garbage out is the error that comes in the output due to incorrect data inputted and programmed Garbage in garbage out |
| 28 | GUI (Graphical user interface) | Use of these icons on a pointing device as is done through the mouse |
| 29 | Hacker | A person making unauthorized entry on another person’s computer is called a hacker |
| 30 | Home page | the first page to open on the website is the home page |
| 31 | IP Address | each computer connected to the internet has a unique address |
| 32 | Interpreter | It converts high level language into machine language |
| 33 | Icon | these are small graphical icons which are displayed on a computer screen |
| 34 | JPEG | JPEG mean joint photographic experts group this is the format used for digital photography |
| 35 | MAC Address | It is a hardware identification number |
| 36 | Netiquette | Netiquette is a combination of the words network and etiquette and is defined as a set of rules for acceptable online behavior |
| 37 | Open-source software | It is software that is distributed with source code |
| 38 | NIC (Network interface card) | It is used to connect a personal computer to a network |
| 39 | OUTPUT | the result given by the computer is called output |
| 40 | Program | A group of instruction is called a programs |
| 41 | Protocol | the set of rules that aid in data transmission between two computers is called a protocol |
| 42 | Proprietary software | It is also known as non- free software or closed source software is computer software for which the software’s publisher or another person retains intellectual property rights |
| 43 | Qwerty | It is a standard computer keyboard |
| 44 | Reboot | this is a process to shut down the computer and restart it |
| 45 | Register | A register is type of computer memory in which data is stored |
| 46 | Template | It is a predefined document that is stored in the computer |
| 47 | virus | viruses are programs that negatively impact the computer |
| 48 | zoom | by this a picture or object is enlarged |