Latest Jobs

January 6, 2017

Banking Knowledge Computer Terminology

The basic computer terms are frequently asked in all the Bank Interviews. These terms are useful not only for your test but also for your general knowledge. Knowledge and Understanding of Important these terms play a very crucial role in the final selection. Knowing basic terms not only gives you an edge over other candidates but also shows your interest level for the job.

the practice of combining multiple backup data streams into a single stream that can be written to a single storage device. For example, backing up 4 PCs to a single tape drive at once.

multi streaming
the practice of creating multiple backup data streams from a single system to multiple storage devices. For example, backing up a single database to 4 tape drives at once.

normal backup
full backup used by Windows Server 2003.

near store
provisionally backing up data to a local staging backup device, possibly for later archival backup to a remote store device.

open file backup
the ability to back up a file while it is in use by another application. See File locking.

remote store
backing up data to an offsite permanent backup facility, either directly from the live data source or else from an intermediate near store device.

restore time
the amount of time required to bring a desired data set back from the backup media.

retention time
the amount of time in which a given set of data will remain available for restore. Some backup products rely on daily copies of data and measure retention in terms of days. Others retain a number of copies of data changes regardless of the amount of time.

site-to-site backup
backup, over the internet, to an offsite location under the user's control. Similar to remote backup except that the owner of the data maintains control of the storage location.

synthetic backup
a term used by Net Backup for a restorable backup image that is synthesized on the backup server from a previous full backup and all the incremental backups since then. It is equivalent to what a full backup would be if it were taken at the time of the last incremental backup.

tape library
a storage device which contains tape drives, slots to hold tape cartridges, a barcode reader to identify tape cartridges and an automated method for physically moving tapes within the device. These devices can store immense amounts of data.

true image restore
a term used by Net Backup and Backup Exec for the collection of file deletion and file movement records so that an accurate restore can be performed.

trusted paper key
a machine-readable print of a cryptographic key.

virtual Tape Library (VTL)
a storage device that appears to be a tape library to backup software, but actually stores data by some other means. A VTL can be configured as a temporary storage location before data is actually sent to real tapes or it can be the final storage location itself.

Asymmetric Digital Subscriber Line is a technology for transmitting digital information at a high bandwidth on existing phone lines to homes and businesses. ADSL is asymmetric in the sense that it uses most of the channel to transmit downstream to the user and only a small part to receive information from the user. This means, high download rates and slower upload rates. Generally if you see 2Mb ADSL broadband, it refers to 2 Mbit/s Max d/load rate. The upload rate will probably be around 256 kbit/s Max. (ADSL has a maximum download rate of 8 Mbit/s, ADSL2 is capable of up to 16 Mbit/s and ADSL2+ is rated at 24 Mbit/s maximum.)

writing on or otherwise using online journals known as web logs or blogs cable modem Primary competitor to ADSL, uses digital information transmitted over a cable television infrastructure.

Cascading Style Sheets; while HTML dictates the content of page, CSS regulates the format, including headers, footers, navigation bars, etc. While all of these elements can be created in HTML, such a method would have to be repeated on every web page. CSS on the other hand, is applied to all pages of a website.

A bully who harasses his or her victims online through various means such as spamming, defaming or negative impersonation of the victim.

A method of connection to the internet using existing copper phone lines using a modem on the client's end to send information at a slow speed, normally reaching maximum speed at about 56 kbit/s. This technology uses the voice spectrum of the telephone lines to transmit data using a system of sounds that only the receiving modem or ISP understand.

someone who searches the Internet for references of themselves

The opposite of "win", "fail" expresses an ability to incorrectly perform acts ranging from idiotically simple to impossibly difficult, often consisting of an amusing element.

A flamer is someone who makes de gra ding or insulting remarks on a forum or other Internet message board, the verb of which is "flame".

the act of making and adding friends online through social networking sites such as Facebook and MySpace

Protocol to exchange files between two computers.

the Game
A popular mind game, often referred to on public message boards as a way to irritate other users.

searching through the Google search engine

A player of an online game who harasses other players.

Hyper Text Markup Language, the coding language used to create hypertext documents for the World Wide Web. In HTML, a block of text can be surrounded with tags that indicate how it should appear (for example, in bold face or italics). Also, in HTML a word, a block of text, or an image can be linked to another file on the Web. HTML files are viewed with a World Wide Web browser.

clueless user; everybody giving a hard time to (computer) administrators

Leet, or "1337", (from elite) is someone who is unnaturally adept at a certain trait or ability. Originally used as a slightly infra dig expression in the hacker community. Later usage centered around video games players.

me too
Used as a response on a threaded discussion when the new poster wanted the same information as the previous

mouse potato someone who spends a lot of time at the computer, in analogy to a couch potato who spends a lot of time watching TV. Also known as a "Comp Head" in relation to a crack cocaine addict, or "coke head".

A new or unexperienced person, someone who does not know the rules of a website, or has only recently joined. A wordplay on newbie.

The act of attempting to obtain private or sensitive information such as user names, passwords and credit card information through the use of fake emails from trustworthy sites.

PHP Hypertext Preprocessor, the coding language to create interactive web pages and so forth.

Protocol to retrieve email.

A person who scours the Internet for media and posts the findings on the Reddit website. Once posted, other members can upvote or downvote the material based on their evaluation of it.

Protocol to send email.

the act of sending unsolicited email or posting many useless messages in a forum website.

someone who searches for information via whatever means needed which would compromise the security of a site. This activity often includes searching trash or refuse disposed in recycle bins from the facility.

someone who attempts to gain infamy in chat or on forums by use of but not limited to links to disturbing items, bashing (fighting, put down) with others, copying or mimicking other's real posts into perverted messages.

a small message sent by a user of the website Twitter.

The act of removing someone from a list of friends on social networking profiles of Facebook, MySpace or Bebo. It is also the Oxford dictionary's 2009 Word of the Year.

Similar to "leet", "win" expresses an ability to perform an otherwise impossible act through pure luck or practice, or an object or statement that constitutes an amusing or amazing element.

You Tuber
a person who produces video content for the video-sharing site YouTube.

backup policy
an organisation's procedures and rules for ensuring that adequate amounts and types of backups are made, including suitably frequent testing of the process for restoring the original production system from the backup copies.

backup rotation scheme
a method for effectively backing up data where multiple media are systematically moved from storage to usage in the backup process and back to storage. There are several different schemes. Each takes a different approach to balance the need for a long retention period with frequently backing up changes. Some schemes are more complicated than others.

backup site
a place where business can continue after a data loss event. Such a site may have ready access to the backups or possibly even a continuously updated mirror.

backup software
computer software applications that are used for performing the backing up of data, i.e., the systematic generation of backup copies. See also: List of backup software.

backup window
the period of time that a system is available to perform a backup procedure. Backup procedures can have detrimental effects to system and network performance, sometimes requiring the primary use of the system to be suspended. These effects can be mitigated by arranging a backup window with the users or owners of the system(s).