Skip to main content

Most Important Full Forms

 

CPU : CENTRAL PROCESSING UNIT

 

OS : OPERATING SYSTEM


UPS : UNINTERRUPTIBLE POWER SUPPLY


RAM : RANDOM-ACCESS MEMORY


ROM : READ-ONLY MEMORY


LCD : LIQUID CRYSTAL DISPLAY
 

LED : LIGHT-EMITTING DIODE

 

FAT : FILE ALLOCATION TABLE


DOC : DOCUMENT
 

MMC : MULTIMEDIA CARD
 

CD : COMPACT DISC
 

DVD : DIGITAL VERSATILE DISC
 

ISO : INTERNATIONAL ORGANIZATION FOR STANDARDIZATION
 

DB : DATABASE
 

IC : INTEGRATED CIRCUIT
 

TEMP : TEMPORARY
 

WMP : WINDOWS MEDIA PLAYER
 

MP3 : MOVING PICTURE EXPERTS GROUP PHASE 3 (MPEG-3)
 

MPEG : MOVING PICTURE EXPERTS GROUP PHASE (MPEG)
 

JPG : JOINT PHOTOGRAPHIC EXPERTS GROUP
 

AVI : AUDIO VIDEO INTERLEAVE
 

WMV : WINDOWS MEDIA VIDEO
 

GIF : GRAPHICS INTERCHANGE FORMAT
 

USB : UNIVERSAL SERIAL BUS
 

IP : INTERNET PROTOCOL
 

DNS : DOMAIN NAME SYSTEM
 

HTTP : HYPERTEXT TRANSFER PROTOCOL
 

HTTPS : HYPERTEXT TRANSFER PROTOCOL SECURE
 

HTML : HYPERTEXT MARKUP LANGUAGE
 

XML : EXTENSIBLE MARKUP LANGUAGE
 

CSS : CASCADING STYLE SHEETS
 

ASP : ACTIVE SERVER PAGES
 

SQL : STRUCTURED QUERY LANGUAGE
 

WWW : WORLD WIDE WEB
 

.COM : COMMERCIAL
 

.NET : NETWORK
 

.ORG : ORGANIZATION
 

.EDU : EDUCATIONAL
 

.GOV : GOVERMENTAL
 

.INFO : INFORMATION
 

.BIZ : BUSINESS

 

Thanks for reading this Blog!!!!!

Comments

Popular Posts

Man in the middle attack types

Types Of Man-In-The-Middle Attacks : Today internet is one of the most essential thing in our normal life and it plays a vital role in every industries. Our demand of internet is growing day by day and it is not going to stop until now.  Man in the middle attack is one of the most common cyber-attack. In this attack an attacker act as a medium between the user and the server when a user send a request to a website for a particular data it can be in any form like login credentials, bank details etc. then server send data to user but when a person is interacting between user & server he/she can see all data. So today i will tell you how an attacker can perform a man in the middle attack ,so just read this blog careful................... 1⃣ IP spoofing:   Every device capable of connecting to the web has an online protocol (IP) address, which is analogous to the road address for your home.  By spoofing an IP address, an attacker can trick you into thinking you’re intera...

Some useful shortcuts of Libre Office Writer

Ctrl+A   Select All Ctrl+J    Justify Ctrl+D Double Underline Ctrl+E Centered Ctrl+F Find and Replace Ctrl+Shift+P Superscript Ctrl+L Align Left Ctrl+R Align Right Ctrl+Shift+B Subscript Ctrl+Y Redo last action Ctrl+0 (zero) Apply Default   paragraph style Ctrl+1 Apply Heading 1 paragraph style Ctrl+2 Apply Heading 2 paragraph style Ctrl+3 Apply Heading 3 paragraph style Ctrl+5 1.5 Line Spacing Ctrl+ Plus Key(+) Calculates the selected text and copies the result to the clipboard. Ctrl+Hyphen(-) Custom hyphens; hyphenation set by you. Ctrl+Shift+minus sign (-) Non-breaking dash (is not used for hyphenation) Ctrl+multiplication sign * (only on number pad) Run macro field Ctrl+Shift+Space Non-breaking spaces. Non-breaking spaces are not used for hyphenation and are not expanded if the text is justified. Shift+Enter Line break without paragraph change Ctrl+Enter Manual page break Ctrl+Shift+Enter Column break in multicolumnar texts Alt+Enter I...