0% found this document useful (0 votes)
1 views

COMPUTER

The document provides an overview of personal computers, categorizing them by size and portability, and detailing their components such as the motherboard, processor, and mass storage devices. It discusses the functionality of personal computers for general tasks and the importance of user-friendly software. Additionally, it explains the role of microprocessors and memory in computing, along with the distinction between re-programmable and embedded systems.

Uploaded by

Denial Ramchiary
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

COMPUTER

The document provides an overview of personal computers, categorizing them by size and portability, and detailing their components such as the motherboard, processor, and mass storage devices. It discusses the functionality of personal computers for general tasks and the importance of user-friendly software. Additionally, it explains the role of microprocessors and memory in computing, along with the distinction between re-programmable and embedded systems.

Uploaded by

Denial Ramchiary
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 103

Basics of Computers and Applications

PERSON AL COM PU T ERS M ass st orage.


Per sonal comput er s can be cat egor ized by size and I t can be
por t abilit y as : (i ) H ar d disk
1. Deskt op comput er s (ii ) Floppy dr ive or zip dr ive (bot h wit h media)
2. L apt op or not ebooks (iii )Opt ical dr ive (CD or DVD)
3. Per sonal Digit al Assist ants (PDAs) The oper at ing syst em (e.g., M icr osoft Windows, Linux
4. Por t able comput er s or many ot her s) can be locat ed on eit her of t hese, but
5. Tablet comput er s t ypically it son one of t he har d disks. Alive CD is also
possible, but ver y slow and used for eit her inst allation
6. Wear able comput er s
of t he OS or pr oblem solving.
U ses.
A typical computer also has
Per sonal computers ar e normally operated by one user
at a time to perform such general purpose tasks as word (i ) Sound car d (ii ) Net wor k car d
pr ocessing, I nter net br owsing, I nternet faxing, e-mail (iii )M oder n and possibly r out er
and other digit al messaging , multimedia playback, Common addit i ons, connect ed on t he out si de
computer game play, computer pr ogr amming, etc. The (per ipher als).
user of modern personal computer may have significant Pr i nt er ; Scanner ; Webcam; Speak er s; M i cr ophone;
knowledge of the operating environment and application Headset; Car d reader ; Gaming devices such as a joystick
pr ogr am s, bu t i s n ot n ecessar i l y i n t er est ed i n Sever al funct ions (implement ed by chipset s) can be
pr ogr amming not even able to wr ite pr ogr ams for the integr ated into the mother boar d, such as typically USB
computer. Ther efore, most software written primarily and net wor k, but also gr aphics and sound. But even if
for per sonal comput er s t ends t o be desi gned wi t h these ar e pr esent, a separ ate car d can be added if what
simplicity of use, or “user-friendliness” in mind. However, is available isn’t sufficient .
the software industry continuously provide a wide range The gr aphics and sound car d can have a br eak out box
of new products for use in personal computer s, tar geted to keep the analog par ts away fr om the electr omagnetic
at both the exper t and the non-expert user. r adiat ion inside t he comput er case. For r eally lar ge
COM PU T ER COM PON EN TS amount s of dat a, a t ape dr ive can be used or (ext r a)
1. Comput er case wit h power supply (usually sold har d disks can be put t oget her in an ext er nal case.
t oget her ) These component s can usually be put t oget her wit h
2. Mother boar d lit t le k nowledge, t o build a comput er. I f somet hing
3. Pr ocessor wit h fan (usually sold t oget her ) shouldn’t go somewher e, it usually doesn’t fit (this used
4. At least one memor y car d t o not always be t he case in t he past ) and if it does fit
it can usually do lit t le har m.
5. M ass st or age
Most per sonal computer s ar e standar dized to the point
6. K eyboar d and mouse for input
t hat pur chased soft war e is expect ed t o r un wit h lit t le
7. M onit or for out put or no customizat ion for the par t icular comput er. M any
The mot her boar d connect s ever t hing t oget her. The PCs ar e also user -upgr adeable, especially desktop and
memory card(s), graphics card and processor are mounted wor kst at ion class comput er s. Devices such as main
directly onto the motherboard (the processor in a socket memor y, mass st or age, even t he mot her boar d and
an the memory and graphics cards in an expansion slot). cent r al pr ocessing unit may be easily r eplaced by an
The mass storage is connected to it with cables. Same for end user. This upgr adeabilit y is, however, not idefinit e
keyboard and mouse, except that they are external and due t o r api d ch anges i n t h e per sonal compu t er
connect to the back plate. The monitor is also connected indust r y, A PC that was consider ed t op-of-the-line five
to the back plate, except not (usually) dir ectly to the or six year s pr ior may be impr act ical t o upgr ade due
motherboard, but to a connector in the graphics card. t o changes in indust r y st andar ds. Such a comput er
2 Basics of Computers and Applications
usually must be t ot ally r eplaced once it ’s no longer semiconductor flash memor y has dr opped in cost, the
suitable for its pur pose. This upgr ade and replacement pr evailing for m of mass stor age in personal computers
cycle is par tially r elated to new r eleases of the pr imar y is st ill t he elect r omechanical har d disk.
mass-mar ket oper at ed syst em, which t ends t o dr ive The disk dr ives use a sealed H ead/Disk Assembly
t he acquisition of new har dwar e and t ends of obsolet e (H D A ) w h i ch w as f i r st i n t r odu ced by I B M ’s
pr ev i ou sl y ser v i ceabl e h ar dw ar e (see pl an n ed “ Wi nchest er ” di sk syst em. The use of a seal ed
obsol escence). assembly allowed t he use of t he positive air pr essur e
The har dwar e capabilit ies of per sonal comput er s can t o dr ive out par t icles fr om t he sur face of t he disk,
somet imes be ext ended by t he addit ion of expansion which impr oves r eliabilit y.
car ds connect ed via an expansion bus. Some standar d Video Car d.
per ipheral buses often used for adding expansion cards
The video car d- ot her wise cal led a gr aphics car d,
in personal computers as of 2005 ar e PCI , AGP (a high-
gr aphics adapt er or video adapt er - pr ocessor s and
speed PCI bus dedicat ed t o gr aphics adapt er s), and
r ender s t he gr aphics out put fr om t he comput er t o
PCI Expr ess. Most per sonal computer s as of 2005 have
t he comput er display, also called t he Visual Display
mul t i pl e physi cal PCI expansi on sl ot s. M any al so
Unit (VDU), and is an essent ial par t of t he moder n
i ncl ude an AGP bus and expansi on sl ot or a PCI
comput er.
Expr ess bus and one or mor e explansion slot s, but
few PCs cont ain bot h buses. M I CROPROCE SSOR.
M ot her boar d. A micr opr ocessor is a mult ipur pose pr ogr ammable
logic device t hat r eads binar y inst r uct ions fr om a
The mother boar d (or mainboar d) is the pr imar y cir cuit
st or age device called memor y, accept s binar y dat a
boar d wi t hi n a per sonal com put er. M an y ot h er
as i n pu t an d pr ocess dat a accor di n g t o t h ose
component s connect di r ect l y or i ndi r ect l y t o t he
instr uctions and pr ovides r esults as output. A typical
mot her boar d. M ot her boar ds usually cont ain one or
pr ogr ammable machine can be r epr esent wit h t hr ee
mor e CPUs, suppor t ing cir cuit r y - usually int egr at ed
component s : micr opr ocessor, memor y, and I /O.
cir cuits (I Cs) pr oviding the inter face between the CPU
memor y and input /out put per ipher al cir cuit s, main
memor y, and facilities for init ial setup of the computer Memory
immediat ely aft er being power ed on (often called boot
fi r mwar e or, i n I BM PC compat i bl e comput er s, a
Micro
BI OS). I n many por t abl e and embedded per sonal processor
comput er s, t he mot her boar d houses near ly all of t he
PC’s cor e component s. Oft en a mot her boar d will also
cont ain one or mor e per ipher al buses and physical I/O
connect or s for expansi on pur poses. Somet i mes a
secondar y daught er boar d i s connect ed wi t h t he
These t hr ee component s wor k t oget her or int er act
mot her boar d t o pr ovide fur t her expandibilit y or t o
wit h each ot her t o per for m a given t ask, t hus t hey
sat isfy space constr aint s.
compr ise a syst em
M ain M emory.
H ARD WARE .
A PC’s main memor y (i.e., it s pr imar y st or e) is fast
The physical component s of t his syst em ar e called
st or age t hat is dir ect ly accessible by t he CPU, and is
har dwar e.
used t o st or e t he cur r ent ly execut ing pr ogr am and
i mmi di at el y needed dat a. PCs use semi conduct or SOF TWARE
Random Access Memor y (RAM ) of var ious kinds such A set of inst r uct ions wr it t en for t he micr opr ocessor
as DRAM or SRAM as t heir pr imar y st or age. Which t o per for m a t ask is called a pr ogr am and a gr oup of
exact kind depends on cost /per for mance issues at any pr ogr ams is called soft war e.
par t icular t ime. M ain memor y is much fast er t han APPL I CAT I ON S.
mass st or age devices like har d disks or opt ical discs,
Th e mi cr opr ocessor appl i cat i ons ar e cl assi fi ed
but is usually volat ile, meaning it does not r et ain it s
pr imar ily in t wo cat egor ies
contents (inst r uctions or data) in the absence of power,
and is much mor e expensive for a given capacit y t han ( i ) I n Re-programmable syst ems.
is most mass st or age. M ain memor y is gener ally not Such as micr ocomput er s, t he micr opr ocessor is
suit able for long-t er m or ar chival dat a st or age. used for comput ing and dat a pr ocessing. These
M ass st or age devices st or e pr ogr ams and dat a even systems, include gener al pur pose micr opr ocessor
when t he power i s off; t hey do r equi r e power t o capabl e of handl i ng l ar ge dat a. M ass st or age
per for m r ead/wr it e funct ions dur ing usage. Although device (disks), and per ipher als such as I /O device
(pr inter ).
Basics of Computers and Applications 3
( ii ) Embedded syst em. The CPU cont ains var ious r egist er s t o st or e dat a,
I n embedded syst ems, t he micr opr ocessor is par t AL U t o per for m Ar it hmet ic and logical, oper at ions,
of a f i n al pr odu ct an d i s n ot av ai l abl e f or inst r uction decoder s, count er s and cont r ol lines. The
r epr ogr ammabl e t o t he end user. A copyi ng CPU r eads i n st r uct i on s fr om t h e memor y and
machine is a t ypi cal example of an embedded per for m t he t asks specified. I t communicat es wit h
syst em . Th e mi cr opr ocessor s u sed i n t hese input /out put devices eit her t o accept or to send dat a.
syst ems ar e gener ally cat egor ised as These devices ar e also known as per ipher als. The
CPU i s t h e pr i m ar y an d cen t r al pl ay er i n
( a ) M i cr ocon t r ol l er s t h at i n cl u de al l t h e
communicat ing wit h devices such as memor y, input
components like micr opr ocessor, memor y and
an d ou t pu t . H ow ev er , t h e t i m i n g of t h e
I /O.
communicat ion pr ocess is cont r olled by t he gr oup of
( b) I ntegrated microprocessor that include various cir cuit called cont r ol unit . CPU on single chip called
devices such as timers and various types of I /O mi cr opr ocessor.
on a chip.
( c) Gener al pur pose micropr ocessor with discr ete
component s such as micr opr ocessor, memor y Arithmetic
Logic Unit
and I /O. (ALU)
Embedded syst ems can also be incr eased as pr oducts
t hat use micr opr ocessor t o per for m t heir oper at ions
t hey ar e called as micr opr ocessor based pr oduct s.
e.g. washing machines, dish washer s, aut omobi le Control
Input Output
dashboar d cont r ol s, t r affi c l i ght cont r ol l er s, and Unit
aut omat ic t est ing inst r ument s.
BI N ARY DI GI T.
The micr opr ocessor oper at es in binar y digit s 0 and Memory
1, also known as bit s. Bit is an abbr eviat ion for t he
Fig. (a) Traditional block diagram of
t er m binar y digit . Those digit s ar e r epr esent ed in
ter ms of electr ical voltages in the machine : gener ally
0 r epr esent s one vol t age l evel and 1 r epr esent s
anot her. The digit s 0 and 1 ar e also synonyms wit h
Micro
low and high r espect ively. processor
Input Output
Each mi cr opr ocessor r ecogni zes and pr ocesses a as CPU
gr oup of bit s called t he wor d and micr opr ocessor ar e
classified accor ding t o t heir wor d lengt h.
M emor y.
M emor y is like t he pages of a not ebook wit h space
Memory
for a fixed number of binar y number s on each line.
H owever t hese pages ar e gener ally made of semi- F i g. (b) Bl ock di agr am of a compu t er w i t h t he a
conduct or mat er ial. Each line in 8 bit r egist er t hat comput er micr oprocessor as CPU
can st or e 8 bi t bi nar y bi t s, and sever al of t hese 1. bit micr opr ocessor.
r egist er s ar e ar r anged in a sequence called memor y. The I nt el 4004 was t he fir st 4 bit pr ogr ammable
I nput /Out put . device t hat was pr imar ily used in calculat or s.
The user can enter instructions and data into memor y 2. bit micr opr ocessor.
thr ough devices such as keyboar d or simple switches. The int el 8008 is 8 bit micr opr ocessor, which was
These devices ar e called input devices. in t ur n super seded by t he I nt el 8080. I nt el 8080
The mi cr opr ocessor r eads i nst r uct i ons fr om t he wi dely used i n cont r ol applicat ions, and small
memor y and pr ocesses t he dat a accor ding t o t hose comput er s also wer e designed using t he 8080 as
inst r uct ions. The r esult can be displayed by a device t he CPU. Wit hin a few year s aft er t he emer gence
such as seven segment L ED (light emit t ing diodes) of t he 8080, t he M ot or ola 6800 and Zilog Z80 and
or pr i nt ed by a pr i nt er. These devi ces ar e call ed I nt el 8085 mi cr opr ocessor wer e devel oped as
out put devices. impr ovement s
M I CROPROCESSOR AS A CPU . 3. 16 bit microprocessor. 8086/88
The cent r al pr ocessing unit (CPU) consist s of t he 4. 32 bit microprocessor. 80380/486 and Pent ium
Ar ithmet ic Logic Unit (ALU) and Cont r ol Unit (CU). 5. 64 bit microprocessor. M ot or ola 68000 ser ies
4 Basics of Computers and Applications
M I CROCOM PU T E RS. e.g. These computers include such systems as Intel
M icr ocomput er is classified in four gr oups. SDK85, SDK86, Motorola Evaluation kits, these are
1. Per sonnel comput er s. generally used to write and execute assembly language
programs and to perform interfacing experiments
These micr ocomputer s ar e single user systems and
being used for var iety of pur poses, such as payr oll, 4. Si n gl e ch i p m i cr ocom pu t er s ( m i cr o-
busi ness account s, wor d pr ocessi ng, l egal and cont r ol l er s)
medi cal r ecor d k eepi ng, per sonnel fi nance and These micr ocomput er s ar e designed on a single
inst r uctions. A typical configur ation includes a 16 chip, which t ypically includes a chip of 64 byt es of
or 32 bit micr opr ocessor, 2 to 4 M B (megabyte) of R/W memor y fr om 4K t o 2K byt es of ROM and
system memory, a video screen, a dot matrix pr inter. sever al si ngl e l i nes t o connect I /Os. These ar e
2. Work st at ions. complet e micr ocomput er s on a chip, t hey ar e also
k n ow n as m i cr ocon t r ol l er s. T h ese ar e u sed
These ar e high per for mance cousi ns of t he PC.
pr i m ar i l y f or su ch f u n ct i on s as con t r ol l i n g
T hey ar e used i n en gi n eer i n g an d sci en t i fi c
applications such as computer -aided design (CAD), appliances and t r affic light s. e.g. Zilog Z8, I nt el
computer aided engineer ing (CAE), and computer - M CS51 and 96 ser ies, and M ot or ola 68H C11.
aided manufacturing (CAM), they generally include COM PU TER LAN GU AGES. N ibble.
syst em memor y l ar ger t han 200 M B, st or age I t is a gr oup of four bit s
memor y in giga byt es and high r esolut ion scr een. M nemonic : A combinat ion of let t er s t o suggest t he
The wor k st at i ons ar e desi gned ar ound RI SC oper at ion of an inst r uct ion.
pr ocessor s. The RI SC pr ocessor s t end t o be fast er
and mor e effi ci ent t han t he pr ocessor s used i n Compiler : A pr ogr am t hat t r anslat es english like
per sonnel comput er. wor ds of high language in t he machine language of a
comput er. A complier r eads a given pr ogr am, called a
3. Single boar d micr ocomput er s. sour ce code and t hen t r anslat es t he pr ogr am int o t he
These mi cr ocomput er s ar e pr i mar i l y used i n machine language which is called an object code.
college, labor atories and industr ies for instr uctional
Assembler : A comput er pr ogr am t hat t r anslat es an
pur poses or t o evaluate the per for mance of a given
assembly language pr ogr am fr om mnemonics t o t he
mi cr opr ocessor. They can al so be par t of some
binar y machine code of a comput er.
lar ger syst ems. Typical ly t hese micr ocomput er s
include 8 or 16 bit micr opr ocessor. M onit or program : A pr ogr am t hat int er pr et s t he
input fr om a keyboar d and conver t s t he input int o it s
binar y equivalent .

COM PU TER SYSTEM .


8085 Programming M odel.
The 8085 pr ogr amming model includes six r egist er s, one accumulat or and one flag r egist er. I t has t wo 16 bit
r egist er t he st ack point er and t he pr ogr am count er.
Registers : The 8085 has six gener al pur pose r egist er s t o st or e 8 bit dat a. These ar e ident ical as B, C, D, E, H
and L . They can be combined as Regist er s pair s BC, DE, and H L t o per for m some 16 bit oper at ions. The
pr ogr ammer can use t hese r egist er s t o st or e or copy dat a int o t he r egist er s by using dat a copy inst r uct ions.

Accumulator A (8) Flag Register

B (8) C (8)
D (8) E (8)
H (8) L (8)
Stack pointer (SP) (16)
Program counter (PC) (16)

Data Bus Address Bus

Lines Lines

Bidirectional Unidirectional
F ig. (a) Progr amming model
D7 D6 D5 D4 D3 D2 D1 D0
S Z AC P CY
F ig. (b) F lab Register
Basics of Computers and Applications 5
Accumulat or. I N STRU CTI ON CODES.
The Accumulat or is an 8 bit r egist er t hat is par t of t he An inst r uct ion code is a gr oup of bit s t hat inst r uct t he
ar it hmet ic/logic unit (AL U). This r egist er is used t o comput er t o per for m a specific oper at ion. I t is usually
st or e 8 bit dat a and t o per for m ar it hmet ic/logic unit divided i nt o par t s, each havi ng it s own par t i cular
(AL U). This r egist er is used t o st or e 8-bit dat a and t o int er pr et at ion. The most basic par t of an inst r uct ion
per for m ar it hmet ic and logical oper at ions. The r esult codes is it s oper at ion par t .
of an oper at i on i s st or ed i n t he accumul at or. The Oper at ion Code.
accumulat or is also ident ified as r egist er A.
The oper at ion code of an inst r uct ion is a gr oup of bit s
FLAGS. that define such oper ations as add, subt r act , mult iply,
The ALU includes five flip-flops, which ar e set or r eset shift and complement . The number of bit s r equir ed
aft er an oper at ion accor ding t o dat a condit ions of t he for t he oper at ion code of an inst r uct ion depends on
r esult in t he accumulat or and ot her r egist er s. They t he t ot al number of oper at i ons avai l abl e i n t he
ar e called zer o (Z), car r y (CY); sign (S), par it y (P) and comput er. The oper at ion code must consist of at least
Auxiliar y car r y (AC) flags. n bit s for a given 2n (or less) dist inct oper at ions.
The most commonly used flags ar e zer o, car r y, and OP Code.
sign. The micr opr ocessor uses t hese flags t o t est dat a What t ask t o be per for med, called t he oper at ion code
condit ions. (OPcode).
Aft er an addit ion of t wo number s, if t he sum in t he Oper and.
accumulat or is lar ger t han eight bits, the flip-flop used
When dat a t o be oper at ed on called t he oper and. The
t o indicat e a car r y called car r y flag (CY) is set t o one.
oper and (or dat a) can be specified in var ious ways. I t
When an ar ithmetic oper ation is zer o the flip flop called
may include 8-bit or (16 bit) data, an int er nal r egist er,
t he zer o (Z) flag is set t o one.
a memor y location, or 8 bit (or 16 bit) addr ess. I n some
The fl ags have cr i t i cal i mpor t ance i n t he deci si on inst r uct ions, t he oper and is implicit .
making pr ocess of t he micr opr ocessor. The condit ions
ADDRESSI N G M ODES.
(set or r eset ) of t he flags ar e t est ed t hr ough soft war e
inst r uct ions. The control unit of a computer is designed to go through
an inst r uct ion cycle t hat is divided int o t hr ee major
PROGRAM COU N TER (PC).
phases.
T h i s 16 bi t r egi st er deal s wi t h sequ en ci n g t h e
(i) Fet ch t he inst r uct ion fr om memor y
execut ion of inst r uct i on. Thi s r egi st er i s a memor y
point er. M emor y locat ions have 16 bit addr esses, and (ii ) Decode t he inst r uct ion
that is why t his is a 16-bit r egister. The micr opr ocessor (iii) Execut e t he inst r uct ion
uses t hi s r egi st er t o sequence t he execut i on of t he I mplied mode.
inst r uct ions. The funct ion of t he pr ogr am count er is
A l l r egi st er r ef er en ce i n st r uct i on s t h at u se an
t o point t o t he memor y addr esses fr om which t he next
accumul at or ar e i mpl i ed mode i nst r uct i ons. Zer o
byt e is t o be fet ched. When a byt e (machine code) is
addr ess inst r uct ions in a st ack-or ganized comput er
being fet ched, t he pr ogr am count er is incr ement ed by
ar e implied mode inst r uct ions since t he oper ands ar e
one t o point t o t he next memor y locat ion.
implied t o be on t op of t he st ack.
STACK POI N TER (SP).
I mmediat e mode.
The stack pointer is also a 16 bit register used as memory
The operand is specified in the instruction itself. In other
poi n t er. I t poi n t s t o a m em or y l ocat i on i n
words, an immediate mode instruction has an operand
R/W memor y, called t he stack. The beginning of st ack
field r ather than an addr ess field. The operand field
is defined by loading a 16-bit address in the stack pointer.
contains the actual operand to be used in conjunction
OPCODE FORM AT. with the operation specified in the instr uctions.
I n t he desi gn of t he 8085 mi cr opr ocessor chi p, al l Regist er mode.
oper ations, registers and status flags are identified with
I n t his mode t he oper ands ar e in r egist er s, that r eside
a specific code.
wit hin t he CPU. The par t icular r egist er is select ed
All int er nal r egist er s ar e ident ified as follows : fr om a r egist er field in t he inst r uct ion. A K bit field
Code Regist er s Code Regist er pair s can specify any one of 2k r egist er s.
000 B 00 BC Regist er indir ect mode.
001 C 01 DE
I n this mode t he inst r uct ion specifies a r egist er in t he
010 D 10 HL
CPU, whose cont ent gives t he addr ess of t he oper and
011 E 11 A F or S P
in memor y. The advant age of a r egist er indir ect mode
100 F
inst r uct ion is t hat t he addr ess field of t he inst r uct ion
101 G
uses fewer bit s t o select a r egist er t han would have
110 Reser ved for M emor y Relat ed Oper at ion
been r equir ed t o specify a memor y addr ess dir ect ly,
111 A
6 Basics of Computers and Applications
Aut o I ncrement or Decrement mode. devices used in par t icular applicat ions ar e dat a glove,
This is similar t o r egist er indir ect mode except t hat t ouch panels, image scanner s and voice syst ems.
t he r egist er is incr ement ed or decr ement ed aft er or 1. K eyboar ds.
befor e it s value is used t o access memor y. When t he An alphanumer ic keyboar d on a gr aphics syst em
addr ess st or ed in t he r egist er r efer s t o a t able of dat a i s used pr i mar i l y as a devi ce for ent er i ng t ext
in memor y, it is necessar y t o incr ement and decr ement st r i ngs. The k eyboar d i s an effi ci ent devi ce for
t he r egist er s aft er ever y access t o t he t able input t ing such non gr aphics dat a as pict ur e labels
D ir ect addressing mode. associated with graphics display. Keyboar ds can also
I n t hi s mode t he effect i ve addr ess i s equal t o t he be pr ovided with featur e to facilitate entr y of scr een
addr ess par t of t he inst r uct ion. The oper and r esides coor dinat es, menu select or s or gr aphics funct ions.
in memor y and it s addr ess is given dir ect ly by t he 2. M ouse.
addr ess field of t he inst r uct ion. A mouse is small hand held box used t o posit ion
I ndir ect addr essing mode. t he scr een cur sor. Wheels or r oller s on t he but t on
I n t his mode t he addr ess field of t he inst r uct ion gives of t he mouse can be used t o r ecor d t he amount
t he addr ess wher e t he effect ive addr ess is st or ed in and dir ect ion of movement s. Anot her met hod for
memor y. det ect ing mouse mot ion is wit h an opt ical sensor.
Effect ive addr ess = addr ess par t of inst r uct ion For t hese syst ems, t he mouse i s moved over a
special mouse pad t hat has gr id of hor izont al and
+ cont ent of CPU r egist er v er t i cal l i n es. T h e opt i cal sen sor det ect s
I N PU T AN D OU TPU T SYSTEM movement s acr oss t he l i nes i n t he gr i d. Si nce
mouse can be picked up and put down at anot her
I nput /out put devices ar e t he means t hr ough which
posit ion wit hout change in cur sor movement . I t is
t he M PU communicat es wit h t he out side wor ld. The
used for making r elat ive changes in t he posit ion of
M PU accept s binar y dat a as input fr om devices such
t he scr een cur sor. One, t wo or t hr ee but t ons ar e
as keyboar ds and A/D conver t er s and send dat a t o
usual l y i ncl uded on t he t op of t he mouse for
out put devices such as L EDs or pr int er s. Ther e ar e
signalling t he execut ion of some oper at ion, such
t wo differ ent met hods by which I /O devices can be
as r ecor ding cur sor position or invoking a funct ion.
ident ified. One uses an 8 bit addr ess and t he ot her
Most gener al pur pose graphics system now included
uses a 16 bit addr ess.
a mouse and keyboar d as major input devices.
PERI PH ERAL M APPED I /O.
3. Track Ball and Space Ball.
I n this type of I /O, the MPU uses eight addr ess lines to
A t r ack ball is a ball t hat can be r ot at ed wit h t he
identify an input or an output device; t his is known as
fi nger s or pal m of t he hand t o pr oduce scr een-
per ipher al mapped I /O. The eight addr ess lines can
cur sor movement , pot ent iomet er s at t ached t o t he
have 256 (28 combinat ions) addr esses; t hus the MPU
ball measur e t he amount and dir ect ion of r ot at ion.
can identify 256 input devices and 256 output devices
Tr ackballs are often mounted on keyboar ds or other
with addresses ranging fr om 00H to FFH input and
devices such as t he mouse.
output devices are differentiated by the contr ol signals.
The MPU uses the I /O Read Contr ol Signal for input While a track ball is two dimensional posting device,
devices and the I /O Wr ite Contr ol Signal for output a space ball pr ovides six degr ee of fr eedom. Unlike
devices. The entir e r ange of I /O addr esses fr om 00 to t he t r ack ball, space ball does not act ually move.
FF is known as an I /O map, and individual addr esses St r ain gauges measur e t he amount of pr essur e
ar e r efer r ed t o as I /O devices addr esses 8 I /O por t applied to t he spaceball to pr ovide input for spat ial
number s. posit ioning and or ient at ion as t he ball is pushed or
pulled in var ious dir ect ions. Space balls ar e used
M E M ORY M APPE D I /O (I /O W I T H 16 BI T
for t hr ee-di mensi onal posi t i oni ng and sel ect i on
ADDRESSES).
oper at ions in vir t ual r ealit y syst ems, modelling,
I /O is connect ed as if it is memor y r egist er. This is animat ion, CAD, and ot her applicat ions.
known as memor y mapped I /O. The M PU uses t he
4. Joyst i ck s.
same cont r ol signal (M emor y Read or M emor y Wr it e)
an d i n st r u ct i on s as t h ose of m em or y. I n som e A joyst ick consist s of a small, ver t ical lever called
micr opr ocessor such as mot or ola 6800, all I /O have st ick mount ed on a base t hat is used t o st eer and
16 bit addr esses. I /Os and memor y shar e t he same scr een cur sor ar ound. M ost joyst icks select scr een
memor y map (64K). I n memor y mapped I /O, the MPU posi t i on wi t h act ual st i ck movem ent . Ot her s
follows the same steps as if it is accessing a memor y r espond t o pr essur e on t he st ick. Some joyst icks
r egist er. ar e mount ed on keyboar d, ot her s funct ion as st and
alone unit s. Pot ent iomet er mount ed at t he base of
I N PU T DEVI CES joyst ick measur es t he amount of movement , and
These include a mouse, tr ack ball, space ball, joyst ick, spr ings r etur n the stick to the center position when
digit izer s, dials and but t on boxes. Some ot her input i t i s r el eased on e or m or e bu t t on s can be
Basics of Computers and Applications 7
pr ogr ammed t o act as input swi t ches t o si gnal input can be r ecor ded using opt ical, elect r ical or
cer t ai n act ions once a scr een posi t i on has been acoust ical met hods.
select ed. 9. L ight Pens.
5. Dat a Glove. Light pen is pencil-shaped devices ar e used to select
Dat a glove t hat can be used t o gr asp a “ vir t ual” scr een posit ions by detect ing the light coming fr om
object . The glove is const r uct ed wit h a ser ies of point s on t he CRT scr een. They ar e sensit ive t o
sensor s t hat det ect hand and fi nger mot i ons. t he shor t bur st of light emit t ed fr om t he phosphor
Elect r omagnet ic coupl ing bet ween t r ansmi t t ing coat ing at t he inst ant t he elect r on beam st r ikes a
antennas and r eceiving antennas is used to pr ovide par t icular point . Ot her light sour ces, such as t he
infor mat ion about t he posit ion and or ient at ion of back gr ound l i ght i n t he r oom, ar e usual l y not
the hand. The tr ansmitting and r eceiving antennas det ect ed by a light pen.
can each be st r uct ur ed as a set of t hr ee mut ually
per pendicular coils, for ming a t hr ee dimensional PRI N T E RS.
car t esian co-or dinat e syst em. Pr inter s pr oduce output by either impact or non-impact
6. D igit izer s. methods. I mpact pr inter s pr ess for med char acter faces
against an inked r ibbon ont o t he paper. A line pr int er
A com m on dev i ce f or dr aw i n g, pai n t i n g or
is an example of impact device wit h t he t ype faces
int er act ively select ing co-or dinat e posit ions on an
mount ed on bands, chai ns, dr ums or wheels. Non-
object is a digit izer. These devices can be used t o
i mpact pr int er s and pl ot t er s use l aser t echniques,
i n pu t co-or di n at e v al u es i n ei t h er a t w o
i nk j et spr ays, xer ogr aphi c pr ocesses as used i n
dimensional or t hr ee dimensional space. Typically,
phot ocopyi ng machi ne, el ect r ost at i c met hods and
a digit izer is used t o scan over a dr awing or object
and t o input a set of discr et e co-or dinat e posit ions, elect r ot her mal met hods t o get images on t o paper.
which can be joined wit h st r aight -line segment s t o Char acter impact printers often have a dot matrix print
appr oximat e the cur ve or sur face shapes. One t ype head containing a r ectangular ar r ay of pr otr uding wir e
of digit izer is t he gr aphics t ablet , also r efer r ed t o pins, with the number of pens depending on the quality
as a dat a t abl et wh i ch i s u sed t o i n pu t t wo of t he pr int er.
dimensional coor dinates by activating a hand cursor I n a l aser devi ce, l aser beam cr eat es a ch ar ge
or st yles at select ed posit ions on a flat sur face. di st r i but i on on a r ot at i n g dr um coat i ng wi t h a
7. I mage Scanners. phot oel ect r i c mat er i al , such as sel eni um. Toner i s
Dr awing, gr aphs, color and black and whit e photos applied t o t he dr um and t hen t r ansfer r ed t o paper.
or t ext can be st or ed for comput er pr ocessing wit h I nkjet met hods pr oduce out put by squir t ing i nk in
an image scanner by passing an opt ical scanning hor izont al r ows acr oss a r oll of paper wr apped on a
mechanism over t he infor mat ion t o be st or ed. The dr um. The electr ically char ged ink st r eam is deflected
gr adat ions of gr ay scale or color ar e t hen r ecor ded by an elect r ic field t o pr oduce dot mat r ix pat t er ns. A
and st or ed in an ar r ay. Once we have t he int er nal deskt op inkjet plot t er wit h r esolut ion of 360 dot s per
r epr esen t at i on of a pi ct u r e, w e can appl y inch.
t r ansfor mat ions t o r ot at e, scale or cr op the pict ur e
An elect r ost at ic device places a negat ive char ge on
t o a par t i cul ar scr een ar ea. We can al so appl y
t he paper, one complet e r ow at a t ime along t he lengt h
var ious image pr ocessing met hods t o modify t he
of t he paper. Then t he paper is exposed t o a t oner.
ar r ay r epr esent at ion of t he pict ur e. For scanned
The t oner is posit ively char ged and so it is at t r act ed
t ext i nput , var i ous edi t i ng oper at i ons can be
per for med on st or ed document s. Some scanner s t o t he negat ively char ged, ar eas, wher e it adher es t o
ar e able t o scan eit her gr aphical r epr esent at ion or pr oduce the specified output . Elect r other mal met hods
t ext , and t hey come i n a var i et y of si zes and use heat in a dot mat r ix pr int head t o out put pat t er ns
capabilities. on heat sensi t i ve paper. We can get l i mi t ed col or
out put on an impact pr int er by using differ ent color ed
8. Touch Panels.
r ibbons.
Touch panel s al l ow di spl ayed object s or scr een
Non impact devices use var ious techniques to combine
posit ions t o be select ed wit h t he t ouch of a finger.
thr ee color pigments (cyan, magneta and yellow) to
A t ypi cal appl i cat i on of t ouch panels i s for t he
pr oduce a r ange of color pat t er ns.
selection of pr ocessing options that ar e r epr esented
wit h gr aphical icons. Some syst ems, such as t he Par allel pr int er s use :
plasma panels ar e designed wit h t ouch scr eens. (a) RS-232C interface
Ot her syst em can be adapt ed for t ouch input by (b) Cent r onics int er face
fit t ing a t r anspar ent device wit h a t ouch-sensing
mechanism over t he video monit or scr een. Touch (c) H andshake mode
8 Basics of Computers and Applications
STORAGE U N I T 1. F loppy Disk Drive (F DD) : I n t hi s devi ce, t he
I t consist s of main memor y and secondar y memor y. medium used t o r ecor d t he dat a is called as floppy
disk. I t is a flexible cir cular disk of diamet er 3.5
M ain M emory :
i nches made of pl ast i c coat ed wi t h a magnet i c
1. A fl i p-fl op made of el ect r oni c semi conduct or mat er ial. This is housed in a squar e plast ic jacket .
devices is used t o fabr icat e a memor y cell. These Dat a r ecor ded on a floppy disk is r ead and st or ed in
memor y cel l s or gani zed as a Random Access a comput er 's memor y by a device called a floppy
Memor y (RAM). Each cell has a capabilit y to stor e disk is r ead and st or ed in a comput er 's memor y by
one bit of infor mat ion. A main memor y or st or e a device called a floppy disk dr ive (FDD). A floppy
of a comput er is or ganized using a lar ge number disk is inser t ed in a slot of t he FDD. Floppy Disks
of cells. Each cell st or es a binar y digit . wit h var ious capacit ies ar e as follow:
2. A memor y cell, which does not loose the bit st or ed
 51/4 dr ive- 360KB, 1.2MB (1 KB= 210 = 1024 bytes)
i n i t when no power is suppl ied t o t he cell , i s
known as a non-volat ile cell.  31/2 dr ive- 1.44 M b, 2.88 M B (1M B= 220 byt es)
3. A wor d is a gr oup of bit s, which ar e st or ed and 2. Compact Disk Drive (CDD) : CD-ROM (Compact
r etr ieved as a unit. A memor y system is or ganized Disk Read Onl y M emor y) used a l aser beam t o
t o st or e a number of wor ds. r ecor d and r ead dat a along spir al t r acks on a 51/4
di sk . A di sk can st or e ar ou n d 650 M B of
4. A Byt e consist s of 8 bit s. A wor d may st or e one or
infor mat ion. CD-ROM s ar e nor mally used t o st or e
mor e byt es.
massive t ext dat a. Recent ly CD wr it er s have come
5. The st or age capacit y of a memor y is t he number in the mar ket . Using a CD wr it er, lot of infor mation
of byt es it can st or e. can be wr it t en on CD-ROM and st or ed for fut ur e
6. The addr ess of t he locat ion fr om wher e a wor d is r efer ence.
t o be r et r i eved or t o be st or ed i s ent er ed i n a 3. H ard Disk Drive (H DD) : Unlike a floppy disk
M emor y Addr ess Register (M AR). t hat is flexible and r emovable, t he har d disk used
7. The dat a r et r ieved fr om memor y or t o be st or ed in t he PC is per manent ly fixed. The dat a t r ansfer
in memor y ar e placed in a M emor y Dat a Regist er r ate between the CPU and har d disk is much higher
(MDR). as compar ed to the between the CPU and the floppy
8. The t ime t aken t o wr it e a wor d is known as t he disk dr ive. The CPU can use t he har d disk t o load
Wr it e t ime. pr ogr ams and dat a as well as t o st or e dat a.
9. The t ime t o r et r ieve i nfor mat i on i s cal led t he CLASSI FI CATI ON OF COM PU TERS
Access t ime of t he memor y.
Comput er s come in sizes fr om t iny t o monst r ous, in
10. The t ime t aken t o access a wor d in a memor y is bot h appear ance and power. The size of a comput er
independent of the addr ess of t he wor d and hence
t hat a per son or an or ganizat ion needs depends on
it is know as a Random Access M emor y (RAM ).
t he comput ing r equir ement s.
 The main memor y used t o st or e pr ogr ams and
Supercomputers : The might iest comput er s-and, of
dat a in a comput er is a RAM .
cou r se, t h e m ost ex pen si v e-ar e k n ow n as
11. A RAM may be fabricated with per manently stor ed super comput er s. Super comput er s pr ocess billions of
i nfor mat i on, whi ch cannot be er ased. Such a inst r uct ions per second. One uses super comput er s for
memor y is called a Read Only M emor y (ROM ). t asks t hat r equir e mammoth dat a manipulation, such
 For mor e specialized uses, a user can st or e his as wor l dwi de weat h er f or ecast i ng and weapons
won special funct ions or pr ogr ams in a ROM . r esear ch.
Such ROM 's ar e called Pr ogr ammable ROM
M ainframes : I n t he jar gon of t he comput er t r ade,
(PROM).
lar ge comput er s ar e called mainfr ames. M ainfr ames
12. A ser ial access memor y is or ganized by ar r anging ar e capable of pr ocessing dat a at ver y high speeds-
memor y cells in a linear sequence. millions of inst r uct ions per second-and have access t o
 I nfor mat ion is r et r ieved or st or ed in such a billions of char act er s of dat a. Their pr incipal use of it
memor y by using a r ead/wr it e head. is for pr ocessing vast amount s of dat a quickly, some
 Dat a is pr esent ed ser ially for wr it ing and is of t h e obvi ou s cu st om er s ar e ban k s, i n su r an ce
r et r ieved ser ially dur ing r ead. companies, and manufact ur er s.
Secondary / Auxiliary storage devices : M agnet ic Personal Computers : Per sonal comput er s ar e oft en
sur face r ecor ding devices used in comput er s as H ar d called PCs. A PC usually comes wit h a tower that holds
disks, Floppy disks, CD-ROM s and M agnet ic t apes. the main cir cuit boar ds and disk dr ives of the computer,
Basics of Computers and Applications 9
and a collect ion of per ipher als, such as a keyboar d, An exampl e of a L A N woul d be a comput er
mouse, and moni t or. The t er m "PC" oft en means net wor k wit hin a building.
machines t hat ar e compat ible t o I BM ot her t han a 2. M et r opolit an ar ea net wor k (M AN), which is used
Macint osh. for medi um si ze ar ea. exampl es for a cit y or a
Personal Computers (PC) and M AC : A PC is based st at e.
on a mi cr opr ocessor or i gi nal l y made by t he I nt el 3. Wide ar ea net wor k (WAN) t hat is usually a lar ger
Company (I ntel's Pentium) with other companies such net wor k t hat cover s a lar ge geogr aphic ar ea.
as AM D. The comput er s made by M acint oshes which
4. Wir eless L ANs and WANs (WL AN & WWAN) ar e
uses, Power PC pr ocessor, made by M ot or ol a ar e
t he wir eless equivalent of t he L AN and WAN.
r efer r ed as M ac. Also, t he oper at ing syst em soft war e
t hat r uns t hese t wo kinds of comput er s is differ ent . I P ADDRESS
PCs usual l y use an Oper at i ng Syst em made by An I nt ernet Prot ocol addr ess (I P addr ess) i s a
M icr osoft , i.e., Windows. M acint oshes use oper at ing
n u m er i cal l abel assi gn ed t o each dev i ce (e.g.,
syst em, called M ac OS, made by Apple.
comput er, pr i n t er ) par t i ci pat i ng i n a comput er
N ot ebook Comput ers : A comput er t hat fi t s i n a n et w or k t h at u ses t h e I n t er n et Pr ot ocol f or
br i efcase?. N ot ebook compu t er s, al so k nown as communicat ion.[1] An I P addr ess ser ves t wo pr incipal
L apt op comput er s, ar e por t abl e and popul ar wit h funct ions: host or networ k inter face identification and
tr aveler s who need a comput er that can go with them. locat ion addr essing. I t s r ole has been char act er ized
M ost n ot ebook s accept di sk et t es or n et w or k as follows: “ A name indicates what we seek. An address
connect i ons, so i t i s easy t o move dat a fr om one
indicates where it is. A route indicates how to get there.
comput er t o anot her.
I mport ant Devices U sed in N et work
I N TERN ET
1. M odem : A modem (modulat or -demodulat or ) is a
The I nt ernet i s a global syst em of int er connect ed device t hat modulat es an analog car r ier signal t o
comput er net wor ks t hat use t he st andar d I nt er net encode digit al infor mat ion, and also demodulat es
Pr ot ocol Sui t e (TCP/I P) t o ser ve bi l l i ons of user s such a car r ier signal t o decode t he t r ansmit t ed
wor ldwide. I t is a net wor k of net wor ks t hat consist s infor mat ion. The goal is t o pr oduce a signal t hat
of millions of pr ivat e, public, academic, business, and can be tr ansmitted easily and decoded to repr oduce
gover nment net wor ks, of local t o global scope, t hat the or iginal digit al data. M odems can be used over
ar e li nked by a br oad ar r ay of elect r onic, wir eless any means of t r ansmit t ing analog signals, fr om
and opt ical net wor king t echnologies. The I nt er net light emit t ing diodes t o r adio.
car r ies a vast r ange of infor mat ion r esour ces and 2. Router : A router is a device t hat for war ds dat a
ser v i ces, su ch as t h e i n t er -l i n k ed h y per t ex t pack et s acr oss compu t er n et wor k s. Rou t er s
document s of t he Wor ld Wide Web (WWW) and t he per for m t he dat a “ t r affic dir ect ing” funct ions on
infr ast r uct ur e t o suppor t elect r onic mail. t he I nt er net . A r out er is connect ed t o t wo or mor e
dat a lines fr om di ffer ent net wor ks. When dat a
N ET WORKS comes in on one of t he lines, t he r out er r eads t he
A computer network, oft en simply r efer r ed t o as a addr ess infor mat ion in t he packet t o det er mine
net wor k , i s a col l ect i on of comput er s and devi ces it s ult imat e dest inat ion.
i nt er connect ed by communi cat i ons channel s t hat 3. Bridge : A net work bridge connect s mul t i pl e
faci l i t at e communi cat i ons and al l ows shar i ng of net wor k segment s. Br idging i s a for war di ng
t echni que used i n pack et -swi t ched comput er
r esour ces and i nfor mat i on among i nt er connect ed
net wor k s. U nl i k e r out i ng, br i dgi ng mak es no
devices. Computer networking or Data communi-
assumptions about where in a networ k a par ticular
cat ions (D at acom) i s t he engi neer i ng di sci pl i ne addr ess is locat ed. I nst ead, it depends on flooding
concer ned wit h t he comput er net wor ks. and examinat ion of sour ce addr esses in r eceived
The t hr ee t ypes of net wor ks ar e: packet header s t o locat e unknown devices. Once
(i ) t he I nt er net a device has been locat ed, it s locat ion is r ecor ded
in a t able wher e t he M AC addr ess is st or ed so as
(ii ) t he int r anet
t o pr eclude t he need for fur t her br oadcast ing.
(iii ) t he ext r anet .
4. H ub : hub is a device for connecting multiple twisted
Examples of differ ent net wor k met hods ar e: pair or fiber optic Ethernet devices together and
1. Local ar ea networ k (LAN), which is usually a small making them act as a single segment. The device is
net wor k const r ained t o a small geogr aphic ar ea. a for m of multiport repeater.
10 Basics of Computers and Applications
5. Repeater : A repeater is an elect r onic device t hat as Office Open XM L and it s SP2 updat e will suppor t
r eceives a signal and r et r ansmit s it at a higher ODF and PDF. Wor d is also available in some edit ions
level and/or higher power, or ont o t he ot her side of M icr osoft Wor ks. I t is available for t he Windows
of an obst r uct i on, so t hat t he si gnal can cover and M ac platfor ms. The fir st ver sion of Wor d, r eleased
longer dist ances. in t he aut umn of 1983, was for t he M S-DOS oper at ing
6. Server : A ser ver comput er i s a comput er, or system and had the distinction of introducing the mouse
ser ies of comput er s, t hat link ot her comput er s or t o a br oad populat ion. Wor d 1.0 could be pur chased
el ect r oni c devi ces t oget her. They oft en pr ovi de wit h a bundled mouse, t hough none was r equir ed.
essent i al ser vi ces acr oss a net wor k , ei t her t o Following t he pr ecedent s of L isaWr it e and M acWr it e,
private user s inside a lar ge or ganization or to public Wor d for Macintosh attempted to add closer WYSI WYG
users via the inter net. For example, when you enter feat ur es int o it s package. Wor d for M ac was r eleased
a quer y in a sear ch engine, t he quer y is sent fr om in 1985. Wor d for M ac was t he fir st gr aphical ver sion
your computer over t he int er net to t he ser ver s t hat of M icr osoft Wor d. Despit e it s bugginess, it became
st or e all t he r elevant web pages. The r esult s ar e one of t he most popular M ac applicat ions.
sent back by t he ser ver t o your comput er.
EXCEL
EM AI L M i cr osoft Excel i s a spr eadsheet pr ogr am whi ch
E l ect r on i c m ai l , com m on l y cal l ed em a i l or or iginally competed with the dominant Lotus 1-2-3, but
e-mail, is a met hod of exchanging digit al messages eventually outsold it . I t is available for the Windows
fr om an aut hor t o one or mor e r ecipi ent s. M oder n and Mac platfor ms. Micr osoft r eleased the fir st ver sion
email oper at es acr oss t he I nt er net or ot her comput er of Excel for the Mac in 1985, and t he fir st Windows
net wor ks. Some ear ly email syst ems r equir ed t hat ver sion (number ed 2.05 to line up with t he Mac and
t he aut hor and t he r ecipient bot h be online at t he bu n dl ed w i t h a st an dal on e Wi n dow s r u n -t i m e
same t ime, a la i nst ant messaging. Today’s email envir onment) in November 1987.
syst ems ar e based on a st or e-and-for war d model . OU TLOOK
Email ser ver s accept , for war d, del iver and st or e
M icr osoft Outlook (not t o be confused with Out look
messages. Neit her t he user s nor t heir comput er s ar e
Expr ess) is a per sonal infor mation manager and e-mail
r equi r ed t o be onl i ne si mul t aneousl y; t hey need
communication softwar e. The replacement for Windows
connect only br iefly, t ypically t o an email ser ver, for
Messaging, Micr osoft M ail and Schedule+ star ting in
as long as it t akes t o send or r eceive messages.
Office 97, it includes an e-mail client, calendar, t ask
EM AI L ADDREES manager and addr ess book.
An email address ident ifies an email box t o which On t he M ac, M i cr osoft offer ed sever al ver si ons of
email messages ar e deliver ed. An example for mat of Outlook in the late 1990s, but only for use with Microsoft
an email addr ess is lewis @ example .com which is Exchange Ser ver. I n Offi ce 2001, i t i nt r oduced an
r ead as lewis at example dot net . I t has two par t s. The alter nat ive application with a slightly differ ent featur e
par t befor e t he @sign is t he local-par t of t he addr ess, set called Micr osoft Entour age. I t reintr oduced Outlook
oft en t he user name of t he r ecipient lewis and the par t in Office 2011, r eplacing Entour age.
aft er t he @ sign is a domain name i.e. example.com
POWE RPOI N T
t o which t he email message will be sent .
M i cr osof t Power Poi n t i s a popu l ar pr esent at i on
M S OFFI CE pr ogr am for Windows and M ac. I t is used t o cr eat e
M icrosoft Office is a proprietary commercial office suite slideshows, composed of t ext , gr aphics, movies and
of inter-related desktop applications, servers and services ot her object s, which can be displayed on-scr een and
for the Microsoft Windows and Mac OS X oper ating navigat ed t hr ough by t he pr esent er or pr int ed out on
systems, intr oduced by Micr osoft in 1989. I nitially a t r anspar encies or slides.
marketing term for a bundled set of applications, the first
version of Office contained Microsoft Word, Micr osoft
Excel, and Microsoft PowerPoint.
W ORD
Micr osoft Wor d is a wor d pr ocessor and was pr eviously
consi der ed t o be t he mai n pr ogr am i n Offi ce. I t s
pr opr i et ar y DOC for mat i s consi der ed a de fact o
standard, although Word 2007 can also use a new XML-
based, Micr osoft Office-optimized format called .DOCX
which has been st andar dized by Ecma I nt er nat ional
Basics of Computers and Applications 11

PRACTI CE EXERCI SE
OBJECTI VE TYPE QU ESTI ON S 8. I n a gener ic micr opr ocessor, inst r uct ion cycle time
1. Which of t he following is t he fast est ? is

(a) CPU (a) shor t er t han machine cycle t ime

(b) magnet ic t apes and disks (b) lar ger t han machine cycle t ime

(c) video t er minal (c) exact ly double t he machine cycle t ime

(d) sensor s, mechanical cont r oller s (d) exact ly t he same as t he machine cycle t ime

2. The input unit of a comput er 9. Pr ogr am St at us Wor d (PSW) cont ai ns var i ous
(differ ent) st atus of
(a) feeds dat a t o t he CPU or memor y
(a) CPU
(b) r et r ieves dat a fr om CPU
(b) ALU
(c) dir ect s all ot her unit s
(c) pr ogr am
(d) all of t hese
(d) r egist er s
3. Offline device is
10. When an int er r upt occur s, CPU saves t he value
(a) a device which is not connect ed t o CPU
of— — — in a st ack,
(b) a device which is connect ed t o CPU
(a) accumulator
(c) a dir ect access st or age device
(b) pr ogr am st at us wor d (PSW) only
(d) an I /O device
(c) I nstr uct ion Addr ess Counter (I AC)only
4. Which of t he following is a set of gener al pur pose
(d) bot h PWS and I AC
int er nal r egist er s ?
11. Bus Ar bit r at ion is
(a) Stack
(a) clear ing t he bus
(b) Scratchpad
(b) lat ching infor mat ion on t he bus
(c) Addr ess r egist er
(c) deciding t he cont r oller of t he bus
(d) St at us r egist er
(d) cont r olling t he bus
5. A single bus st r uct ur e is pr imar ily found in
12. Cont r ol M emor y Addr ess Regist er is pr esent in
(a) main fr ames
(a) ALU
(b) super comput er s
(b) I nst r uct ion Regist er Unit
(c) high per for mance machines
(c) Cont r ol Unit
(d) mini-and micr o-comput er s
(d) Disk Cont r ol I nt er face Unit
6. Which of t he following r egist er s is used t o keep
t r ack of addr ess of t he memor y locat ion wher e 13. Which of t he fol lowi ng is not one of t he t hr ee
t he next inst r uct ion is locat ed ? pr i mar y funct i ons t hat on-l i ne di r ect access
syst em can ser ve?
(a) M emor y Addr ess Regist er
(a) inquir y
(b) M emor y Dat a Regist er
(b) backup
(c) I nst r uct ion Regist er
(c) update
(d) Pr ogr am Count er
(d) pr ogr amming
7. Which of t he following r egist er s is loaded wit h
t he cont ent s of t he memor y locat ion point ed by 14. Which of the following is not tr ue of punched cards
t he PC ? as dat a ent r y media?

(a) M emor y Addr ess Regist er (a) They can be used as t ur n ar ound document s

(b) M emor y Dat a Regist er (b) They ar e inexpensive

(c) I nst r uct ion Regist er (c) I nput is slow compar ed wit h ot her media

(c) Pr ogr am count er (d) They ar e easily damaged


12 Basics of Computers and Applications

15. M agnet ic t ape can ser ve as 7. ASCI I coding all ocat ed bi nar y codes t o Engli sh
(a) input media al phabet s and symbols for comput er use. M or e
r ecent ly a new st andar d has been adopt ed which
(b) out put media
al locat es code t o almost all t he languages of t he
(c) secondar y st or age media wor l d and also t o symbols cover i ng mor e t han a
(d) all of t hese lakh char act er s. The new st andar d is call ed
LEVEL-1 (a) CCS
1. I n t he cont ext of I nfor mat ion Technology, OCR (b) Unicode
means (c) Standar d CCS code
(a) Opt ical Char act er Recognit i on
(d) Univer sal CCS code
(b) Oct agonal Cycl ic Rechar ge
[RRB JE 2014 GREEN SH I FT ]
(c) Oct adecimal Cycli c Regener at i on
8. For using passwor ds on t he I nt er net a soft war e
(d) Opt ical Char act er Regener at i on
is used so t hat t he passwor d is not int er cept ed
[RRB JE 2014 GREEN SH I FT ]
easi ly. I t is call ed

2. I n Boolean algebr a 1  1  0  0 = ? (a) Coding (b) Malwar e
(c) Virus (d) Encr ypt ion
(a) 0 (b) 1
[RRB JE 2014 GREEN SH I FT ]
(c) 2 (d) – 1
[RRB JE 2014 GREEN SH I FT ]
9. A soft war e, codi ng of which is available fr eely on
I nt er net and i s open for user s for fur t her use
3. Which of t he fol lowi ngis not an I /O devi ce of t he
an d i m pr ov em en t an d w h i ch i s gen er al l y
comput er ?
developed in a coll abor at i ve manner is call ed
(a) Keyboar d (b) Joy st i ck
(a) open sour ce soft war e
(c) ALU (d) Pr int er
[RRB JE 2014 GREEN SH I FT ]
(b) unlicensed soft war e
4. W h at i s f l oat i n g poi n t w i t h r ef er en ce t o (c) fr ee soft war e
comput er s? (d) communi t y soft war e
(a) I t i s a soft war e subr out i ne ar ound whi ch [RRB JE 2014 GREEN SH I FT ]
ot her subr out i nes ar e bui lt 10. Wh i ch of t h e f ol l ow i n g ar e m ach i n e l ev el
(b) I t i s a r epr esent at i on of r eal number s t o languages?
facilit at e comput ing
(a) C++ (b) Java
(c) I t i s t h e m ai n al gebr ai c f or m u l a of t h e
(c) Python (d) None of t hese
soft war e
(d) I t i s t h e vol t age poi n t gi v en t o var i ou s [RRB JE 2014 GREEN SH I FT ]

oper at i ng unit s of t he comput er 11. Which of t he fol lowing st at ement s is i ncor r ect ?
[RRB JE 2014 GREEN SH I FT ] (a) M i cr osoft windows is GUI
5. A syst em of di gi t al r u l es for exch an ge and (b) L i nux is GUI
pr ocessi ng of dat a bet ween var i ous devi ces i s
(c) M or e t han 5000 k B dat a can be st or ed in a
called
DVD
(a) soft war e pr ogr amme
(d) A 1 TB fl ash dr i ve can st or e 2 mi ll ion fil es
(b) algor it hm
each of size 1 M B
(c) pr ot ocol
[RRB JE 2014 GREEN SH I FT ]
(d) infor mat ion pr ocessing
12. The t er ms AL U, CPU, I /O devi ces per t ai n t o
[RRB JE 2014 GREEN SH I FT ]
(a) comput er s
6. A t heor et ical comput er wi t h infini t e t ype and
m em or y, u sed i n an al y si s of pr obl em s of (b) envi r onment al engineer i ng
comput at i on, is call ed (c) di esel engi ne
(a) Tape calculat or (b) Babbage machine (d) en gi n eer i n g dr aw i n g an d or t h ogon al
(c) Tur i ng machi ne (d) Theor et ical machi ne pr oject i ons
[RRB JE 2014 GREEN SH I FT ] [RRB JE 2014 GREEN SH I FT ]
Basics of Computers and Applications 13
13. I n a comput ing devi ce 'M H z' is ment i oned in t he 5. Who wr ot e/invent ed t he L inux soft war e?
specifi cat ions. I t r efer s t o (a) M i cr osoft (b) Apple I NC
(a) si ze of memor y (c) IBM (d) None of t hese
(b) speed of comput at i on [RRB SSE 2014 YELLOW SH I FT]

(c) cl ock speed 6. A t echnique of anonymous communicat i on over


a computer networ k using encr yption of messages
(d) none of t he above
and spl it t ing bet ween t he nodes, i s cal led-
[RRB JE 2014 GREEN SH I FT ]
(a) Spice r out i ng
14. The value of binary 1111 is :
(b) Onion r out i ng
(a) 23 (b) 23 – l (c) Cabbage r out ing
(c) 24 (d) 24 – l (d) Flower r out i ng
[RRB JE 2014 RED SH I FT ] [RRB SSE 2014 YELLOW SH I FT]
15. The term 'Operating System' means : 7. Pr ocessing speed of comput er i s measur ed i n-
(a) A set of programmes which controls computer (a) M I PS(M i lli on I nst r uct i on Per Second)
working (b) M H z of clock
(b) The way a computer operator works (c) Bot h (a) and (b)
(c) Conversion of high level language into (d) None of t hese [RRB SSE 2014 YELLOW SHIFT]
machine level language 8. To close a pr esent at ion and quit Power Point , one
(d) None of these must click t he close but t on on t he :
[RRB JE 2014 RED SH I FT ] (a) menu bar (b) t i t le bar
LEVEL-2 (c) st andar d t ool bar (d) common t ask s t oolbar
1. Which of t hese i s N OT an Oper at ing Syst em? [RRB SSE 2014 RED SH I FT]

(a) Android (b) iOS 9. Expr ession + + i is equi valent in ‘C’ t o :


(c) Linux (d) Power poi nt (a) i = i + l (b) i = i + 2
[RRB SSE 2014 YELLOW SH I FT] (c) i = 2i (d) None of t hese
2. A soft war e user i nt er face feat ur e t hat allows t he [RRB SSE 2014 RED SH I FT]
user t o view somet hing ver y si mi lar t o t he end 10. W h i ch of t h e f ol l ow i n g r at i on al r el at i on
r esul t whi l e t he document i s bei ng cr eat ed i s oper at ions in 'C means "not equal t o" ?
called- (a) # (b) ==
(a) For mat cr eat or (b) For mat fideli t y
(c) ! = (d) < =
(c) WYSI WYG (d) WYGI WYS [RRB SSE 2014 RED SH I FT]
[RRB SSE 2014 YELLOW SH I FT]
11. M i cr osoft Windows is a/an :
3. I n a comput er syst em t her e ar e soft war es and
(a) Wor d-pr ocessing pr ogr am
l anguages at var i ous l evel s, l i k e H i gh l evel
L an gu age (H L ), M ach i n e L an gu age (M L ), (b) Dat abase pr ogr am
Compiler (C). Which of the following is the cor r ect (c) Oper at ing syst em
indi cat ive r epr esent at i on fr om user (U) t o t he (d) Gr aphics pr ogr am
comput er (COM P)? [RRB SSE 2014 RED SH I FT]
(a) U  H L  C  M L  Comp 12. __________wi ll t r ansl at e t he compl et e pr ogr am
(b) U  C  M L  H L  Comp at once fr om a H i gh L evel L anguage t o t he
M achine L anguage.
(c) U  C  H L  M L  Comp
(a) Compiler (b) Joy st i ck
(d) U  M L  H L  C  Comp
(c) Por t s (d) L i ght pen
[RRB SSE 2014 YELLOW SH I FT]
[RRB SSE 2014 RED SH I FT]
4. Which of t hese devi ces per for ms t he funct ion of 13. The wor d funct ion t hat cor r ect s t ext as we t ype
bot h i n pu t dev i ce an d ou t pu t dev i ce f or a
is r efer r ed t o as :
comput er ?
(a) Aut o inser t (b) Aut o cor r ect
(a) Joy St i ck (b) M ouse
(c) Aut o summar i ze (d) Tr ack changes
(c) Modem (d) Pr int er
[RRB SSE 2014 RED SH I FT]
[RRB SSE 2014 YELLOW SH I FT]
14 Basics of Computers and Applications
14. Pr imar y Stor age, in computer t er minology, r efer s 15. What does an elect r onic spr eadsheet consist of ?
to : (a) Rows (b) Columns
(a) H ar d Disc Dr i ve (c) Cells (d) Al l of t he above
(b) Random Access M emor y (RAM ) [RRB SSE 2014 RED SH I FT]
(c) Read Only M emor y (ROM )
(d) T he st or age devi ce wher e t h e oper at i n g
syst em is st or ed
[RRB SSE 2014 RED SH I FT]

AN SWERS
OBJECTI VE TYPE QU ESTI ON S
1. (a) 2. (a) 3. (a) 4. (b) 5. (d) 6. (d) 7. (c) 8. (b) 9. (a) 10. (d)

11. (c) 12. (c) 13. (d) 14. (b) 15. (d)

LEVEL-1
1. (a) 2. (a) 3. (c) 4. (b) 5. (c) 6. (c) 7. (b) 8. (d) 9. (a) 10. (d)

11. (d) 12. (a) 13. (c) 14. (d) 15. (a)

LEVEL-2
1. (d) 2. (c) 3. (a) 4. (c) 5. (d) 6. (c) 7. (b) 8. (b) 9. (b) 10. (c)

11. (c) 12. (a) 13. (b) 14. (b) 15. (d)

EXPLAN ATI ON S

LEVEL-1 and r euse of t r ansl at ed dat a et c. ver y easy. Al so


it r epr esent s each char act er wi t h 16 bit s.
1. Opt i cal Char act er Reader i s ful l for m of OCR,
which can r ead a char acter and conver t its bitmap 8. To pr ot ect passwor ds et c. Encr ypt i on i s used
image t o equival ent ASCI I codes. which i s coding each dat a point i n a par t icul ar
pat t er n whi ch is not easy t o decode.
2. I t i s equivalent t o 0.1 = 0
9. Open sour ce soft war es l i k e U ni x have t hei r
3. Ar it hmet i c L ogical Unit i s not an I nput devi ce
sour ce code fr eely avai lable and t hese ar e devel-
whil e all t he ot her t hr ee ar e.
oped t hr ough collabor at ion of coder s fr om acr oss
4. Fl oat i ng point number s ar e used i n comput er s
t he wor ld. M any devel oper s as a pr inci ple use
t o r epr esent r eal number s. Si nce r eal number s
only open sour ce soft war es.
can not be accur at ely r epr esent ed i n comput er s
10. Al l t he l anguages ment ioned her e ar e high l evel
t hr ough binar y number s.
languages, in which i t i s easier t o wr it e code.
5. Pr ot ocols ar e r ules developed for exchanging and
11. 1 TB fl ash dr i ve can st or e appr oximat ely 1 mi l-
pr ocessing of dat a bet ween var i ous devices. Ex-
li on file sizes each of 1 M B.
ampl es incl ude H TTP, I P, FTTP et c.
12. Al l t hese devi ces ar e r elat ed t o comput er s. CPU
6. Tur i ng machi ne i s a mat hemat i cal model of a
is Cent r al Pr ocessi ng Unit , whi le AL U is Ar it h-
hypot het i cal comput ing machi ne which can use
met i c and L ogi cal uni t , whil e I /O is I nput Out -
a pr edefi ned set of r ules t o det er mi ne a r esult
put devi ces.
fr om a set of input var iables.
13. M H z is used t o measur e t he number of oper a-
7. The new st andar d which all ocat es codes t o al-
t i ons t hat can be done by t he CPU i n 1 second.
most al l languages and symbol s, t ot ali ng mor e
So i t r efer s t o clock speed.
t han a lakh i s cal led U ni code. I t mak es t r ansfer
Basics of Computers and Applications 15
14. 1111 of binar y i s 24 – 1. I t i s 23 + 22 + 21 + 20 8. To close applications such as Powerpoint, MS-word
15. An oper at ing system (OS) is syst em soft war e that et c. one must click t he close but t on on t he t it le
manages comput er har dwar e and soft war e r e- bar which is at t he t op r ight hand cor ner.
sour ces and pr ovides common ser vices for com- 9. ++I in C means i = i + 2. This was a way developed
put er pr ogr ams.
t o wr it e smaller lines in code.
LEVEL-2 10. != means not equal t o in C.
1.Power point is not an oper at ing syst em but an appli- 11. M icr osoft Windows is t he wor ld's most popular
cat ion t o make pr esent at ion slides.
commer cial oper at ing syst em for PCs.
2. When user s can see somet hing ver y similar t o
12. Com pi l er s ar e u sed t o t r an sl at e en t i r e
end r esult while document cr eat ion, it is called
pr ogr am s f r om H i gh l ev el l an gu age t o
WYSI WYG.
m ach i n e l an gu age, so t h at com pu t er can
3. I t is t he cor r ect r epr esent at ion wher e user gives under st and and execut e it .
input in high level language, it is t hen compiled
13. When we t ype t ext , Aut o cor r ect feat ur e cor r ect s
an d becom es m ach i n e l an gu age w h i ch i s
t he wor d's spelling or any ot her por t ion of t he
comput ed and t he out put is similar ly pr ovided t o
t ext .
t he user.
14. Pr imar y st or age, also known as main st or age or
4. The modem is an input and an out put device. I t
memor y, is t he ar ea in a comput er in which dat a
is used for sending and r eceiving infor mation and
i s st or ed for qui ck access by t he comput er 's
dat a over t elephone lines.
pr ocessor. The t er ms r andom access memor y
5. L I NUX soft war e was invent ed by L inus Tor valds (RAM ) and memor y ar e oft en used as synonyms
while st udying comput er science at Univer sity of for pr imar y or main st or age.
H elsinki in 1991.
15. An elect r onic spr eadsheet like M S-Excel consist s
7. Pr ocessing speed is measur ed in MH z. Nowadays of Cells which are ar r anged in Rows and Columns.
i t i s even measur ed i n GH z i .e. Gi ga H er t z. So all ar e pr esent .
Basically it r epr esent s how many oper at ions can
be pr ocessed in 1 second.
ASHUTOSH SHUKLA OFFICIAL

1500 Computer Awareness Question

JOIN US ON
हमारे टे लीग्राम चैनल से जुड़ने के ललए यहाां क्ललक करें –
CLICK HERE
हमारे यट्
ू यब
ू चैनल से जुड़ने के ललए यहाां क्ललक करें -
CLICK HERE
हमारे इांस्टाग्राम पेज से जुड़ने के ललए यहाां क्ललक करें -
CLICK HERE
1) The code for a Web page is written using Hypertext Markup language
2) The first computers were programmed using Machine language
3) A filename is a unique name that you give to a file of information
4) This can be another word for program software
5) Any data or instruction entered into the memory of a computer is considered as storage
6) Which part of the computer displays the work done monitor
7) A series of instructions that tells a computer what to do and how to do it is called a program
8) Hardware is the part of a computer that one can touch and feel .

9) The role of a computer sales representative generally is to determine a buyer’s needs and
match it to the correct hardware and software.
10) Supercomputers refers to the fastest, biggest and most expensive computers
11) Executing is the process of carrying out commands
12) The rectangular area of the screen that displays a program, data, and or information is a
window
13) The process of a computer receiving information from a server on the internet is known as
downloading
14) Disk drive is the part of the computer helps to store information
15) Arithmetic operations include addition, subtraction, multiplication, and division
16) A keyboard is the king of input device
17) An error is known as bug
18) A collection of related information sorted and dealt with as a unit is a file
19) Sending an e-mail is similar to writing a letter
20) IT stands for information technology
21) A menu contains commands that can be selected
22) Plotter, printer, monitor are the group consists of output devices
23) Edit menu is selected to cut, copy and paste
24) The most important or powerful computer in a typical network is network server
25) The primary purpose of software is to turn data into information
26) The ability to find an individual item in a file immediately direct access is used.
27) To make a notebook act as a desktop model, the notebook can be connected to a docking
station which is connected to a monitor and other devices
28) You can use the tab key to move a cursor across the screen, indent a paragraph.
29) A collection of related files is called record.
30) Storage that retains its data after the power is turned off is referred to as non-volatile
storage.
31) Internet is an example of connectivity.
32) Testing is the process of finding errors in software code.
33) A syntax contains specific rules and words that express the logical steps of an algorithm.
34) Changing an existing document is called the editing documentation
35) Virtual memory is memory on the hard disk that the CPU uses as an extended RAM.
36) Computers use the binary number system to store data and perform calculations.
37) The windows key will launch the start buttons.
38) To move to the beginning of a line of text, press the home key.
39) When sending an e-mail, the subject lines describe the contents of the message.
40) Tables, paragraphs and indexes work with when formatting text in word.
41) TB is the largest unit of storage.
42) The operating system tells the computer how to use its components.
43) When cutting and pasting, the item cut is temporarily stored in clipboard.
44) The blinking symbol on the computer screen is called the cursor.
45) Magnetic tape is not practical for applications where data must be quickly recalled because
tape is a sequential because tape is a sequential access medium.
46) Rows and columns are used to organize data in a spread sheet.
47) When you are working on documentation on PC, the document temporarily stored in flash
memory.
48) One megabyte equals approximately 1 million bytes.
49) Information travels between components on the motherboard through buses.
50) RAM refers to the memory in your computer.
51) Computer connected to a LAN can share information and or share peripheral equipment 52)
Microsoft office is an application suite
53) Utilities can handle most system functions that aren’t handled directly by the operating
system

54) If you receive an e-mail from someone you don’t know then you should delete it without
opening it
55) A set of instructions telling the computer what to do is called program
56) LAN refers to a small single site network
57) A collection of programs that controls how your computer system runs and processes
information is called operating system.
58) Device drivers are small, special-purpose programs 59) Transformation of input into
output is performed by the CPU 60) Data going into the computer is called input.
61) Binary choice offer only two options
62) To indent the first paragraph of your report, you should use tab key

63) Fields are distinct item that don’t have much meaning to you in a given context
64) A website address is a unique name that identifies a specific web site on the web
65) Modem is an example of a telecommunications device
66) A set of computer programs used for a certain function such as word processing is the
best definition of a software package
67) You can start Microsoft word by using start button
68) A blinking symbol on the screen that shows where the next character will appear is a
cursor
69) Highlight and delete is used to remove a paragraph from a report you had written
70) Data and time are available on the desktop at taskbar
71) A directory within a directory is called sub directory
72) Testing is the process of finding errors in software code
73) In Excel, charts are created using chart wizard option
74) Microcomputer hardware consists of three basic categories of physical equipment
system unit, input/output, memory
75) Windows is not a common feature of software applications
76) A tool bar contains buttons and menus that provide quick access to commonly used
commands
77) For creating a document, you use new command at file menu
78) Input device is equipment used to capture information and commands
79) A programming language contains specific rules and words that express the logical
steps of an algorithm
80) One advantage of dial-up internet access is it utilizes existing telephone security
81) Protecting data by copying it from the original source is backup
82) Network components are connected to the same cable in the star topology
83) Two or more computers connected to each other for sharing information form a network
84) A compute checks the database of user name and passwords for a match before
granting access
85) Computers that are portable and convenient for users who travel are known as laptops
86) Spam is the term for unsolicited e-mail
87) Utility software type of program controls the various computer parts and allows the user
to interact with the computer
88) Each cell in a Microsoft office excel document is referred to by its cell address, which is
the cell’s row and column labels
89) Eight digit binary number is called a byte
90) Office LANs that are spread geographically apart on a large scale can be connected
using a corporate WAN
91) Storage is the process of copying software programs from secondary storage media to
the hard disk
92) The code for a web page is written using Hyper Text Markup Language
93) Small application programs that run on a Web page and may ensure a form is
completed properly or provide animation are known as flash
94) In a relational database, table is a data structure that organizes the information about a
single topic into rows and columns
95) The first computers were programmed using assembly language
96) When the pointer is positioned on a hyperlink it is shaped like a hand
97) Booting process checks to ensure the components of the computer are operating and
connected properly
98) Checking the existing files saved on the disk the user determine what programs are
available on a computer
99) Special effect used to introduce slides in a presentation are called animation
100) Computers send and receive data in the form of digital signals
101) Most World Wide Web pages contain HTML commands in the language
102) Icons are graphical objects used to represent commonly used application
103) UNIX is not owned and licensed by a company
104) In any window, the maximize button, the minimize button and the close buttons appear
on the title bar
105) Dial-up Service is the slowest internet connection service
106) Every component of your computer is either hardware or software
107) Checking that a pin code number is valid before it is entered into the system is an
example of data validation
108) A compiler translates higher level programs into a machine language program, which is
called object code
109) The ability to find an individual item in a file immediately direct access
110) Computers connected to a LAN can share information and/or share peripheral
equipment
111) A CD-RW disk can be erased and rewritten
112) The two major categories of software include system and application
113) Windows 95, Windows 98 and Windows NT are known as operating systems
114) Information on a computer is stored as analog data
115) A spread sheet that works like a calculator for keeping track of money and making
budgets
116) To take information from one source and bring it to your computer is referred to as
download
117) Each box in a spread sheet is called a cell
118) Network components are connected to the same cable in the bus topology
119) Two or more computers connected to each other for sharing information form a network
120) A computer checks the database of user names and passwords for a match before
granting access.
121) Spam is the other name for unsolicited e-mail
122) Operating system controls the various computer parts and allows the user to interact
with the computer
123) Each cell in a Microsoft Office Excel document is referred to by its cell address, which
is the cell’s row and column labels
124) Download is the process of copying software programs from secondary storage media
to the hard disk
125) The code for a web page is written using Hypertext Markup Language
126) Small application programs that run on a web page and may ensure a form is
completed properly or provide animation are known as Flash
127) A file is a unique name that you give to a file of information
128) For seeing the output, you use monitor
129) CDs are of round in shape
130) Control key is used in combination with another key to perform a specific task
131) Scanner will translate images of text, drawings and photos into digital form
132) CPU is the brain of the computer
133) Something which has easily understood instructions is said to be user friendly
134) Information on a computer is stored as digital data
135) For creating a document, you use new command at file menu
136) The programs and data kept in main memory while the processor is using them
137) Ctrl + A command is used to select the whole document
138) Sending an e-mail is same as writing a letter
139) A Website address is a unique name that identifies a specific website on the web 140)
Answer sheets in bank PO’s/Clerk’s examinations are checked by using Optical Mark
Reader
141) Electronic data exchange provides strategic and operational business opportunity
142) Digital signals used in ISDN have whole number values
143) Assembler is language translation software
144) Manual data can be put into computer by scanner
145) In a bank, after computerization cheques are taken care of by MICR
146) The banks use MICR device to minimize conversion process
147) Image can be sent over telephone lines by using scanner
148) Microchip elements are unique to a smart card
149) MS-DOS is a single user operating system
150) Basic can be used for scientific and commercial purpose
151) All computers can execute machine language programs

152) Programs stored in ROM can’t be erased


153) Ethernet is used for high speed telecommunications
154) IP address can change even if the domain name remains same
155) Each directory entry can be of 32 bytes
156) With the help of Control + Del a letter can be erased in a word
157) Disk can keep maximum data
158) FORTRAN is a scientific computer language
159) Computer language COBOL is useful for commercial work
160) COBOL is a high standard language like English
161) In computer the length of a word can be measured by byte
162) Byte is the unit of storage medium
163) ROM is not a computer language
164) Oracle is a database software
165) Sequential circuit is full aid
166) Processor is must for computer
167) ROM keeps permanent memory
168) Screen display is called by windows in lotus
169) Pascal is a computer language
170) Expanded form of IBM is International business machine
171) IC chips are made of silicon

172) India’s Silicon Valley situated at Bangalore


173) RAM and ROM are the storage devices of computer
174) DOS is to create relation between hardware and software
175) LOTUS 1-2-3 is software
176) Voice mail is a personal security code for GSM subscribers
177) Tables holds actual data in the database
178) Trojan is a virus
179) Static keys make WEB insecure
180) Video signal needs highest bandwidth
181) Connectivity means communication between systems
182) Controlling is not required for high level language programs before it is executed
183) 3 out of three rollers are responsible for the movement of cursor on screen
184) Hardware that adds two numbers is arithmetic logical unit
185) Data accuracy is not done by modem
186) LAN is used for networks setup within a building
187) A data communication system requires terminal device, communication channel,
protocols
188) Most common channel used by networks today is satellite
189) Run Time is not a type of error
190) A five-digit card attribute used for postal ZIP codes it will be restored as a numeric data
191) Computer viruses can be attached to an executable program
192) MS-DOS was the first operating system
193) The smallest space where information on a hard disk is kept in a cluster
194) An information is processed data
195) Intelligence is not a characteristic of a computer
196) Private key is used to spend a digital signature
197) Negative numbers can be represented in binary
198) VDU is not an essential part of a computer
199) The printers are line printer, laser, dot matrix
200) Speed of clock of CPU is measured in megahertz
201) Cache is not a secondary storage device
202) Disk can be used to store sequential files and random files
203) Windows is not an application
204) When taking the output information is produced in hardcopy and/or softcopy form

205) Control unit’s function is to decode program instructions


206) The most powerful type of computer amongst the following is supercomputer
207) GO TO statement is used in C, C++, basic language
208) File menu is selected to print
209) The name a user assigns to a document is called a filename
210) A processor is an electronic device that processes data, converting it into information
211) Control words are words that a programming language has set aside for its own use
212) Monitor and printer are the two types of output devices
213) To access properties of an object, the mouse technique to use is right-clicking
214) An operating system is a program that makes the computer easier to use
215) Connections to the internet using a phone line and a modem are called dial-up
connections
216) To access a mainframe or supercomputer, users often use a terminal
217) A flaw in a program that causes it to produce incorrect or inappropriate results is called
a bug
218) A web site address is a unique name that identifies a specific web site on the web
219) Every component of your computer is either hardware or software
220) To make the number pad act as directional arrows, you press the num lock key
221) When creating a word-processed document, formatting text involves the user changing
how words on the page appear, both on the screen and in printed form
222) The ALU performs simple mathematics for the CPU
223) A computer program is a set of keywords, symbols, and a system of rules for
constructing statements by which humans can communicate the instructions to be
executed by a computer
224) The another word for program is software

225) The name of the computer’s brain is CPU


226) A computer is a device that electronically processes data, converting it to information
227) Laptops are computers that can be carried around easily
228) The secret code that restricts entry to some programs is password
229) The basic goal of computer process is to convert data into information
230) The disk is placed in the CPU in a computer
231) A hard copy of a document is printed on the printer
232) The name that the user gives to a document is referred to as file name
233) Restarting a computer that is already on is referred to as warm booting
234) E-mail is the transmission of messages and files via a computer network
235) The person who writes and tests computer programs is called a programmer
236) The information you put into the computer is called data
237) The output devices make it possible to view or print data
238) A chat is a typed conversation that takes place on a computer
239) Hardware includes the computer and all the devices connected to it that are used to
input and output data
240) The most common method of entering text and numerical data into a computer system
is through the use of a keyboard
241) Mouse, keyboard, plotter are the group consist of only input devices
242) 256 values can be represented by a single byte
243) Transformation of input into output is performed by the CPU

244) Vertical-market applications can handle most system functions that aren’t handled
directly by the operating system
245) Device drivers are small, special-purpose programs
246) LAN refers to a small, single-site network
247) A set of instructions telling the computer what to do is called program
248) Data going into the computer is called input

249) If you receive an e-mail from someone you don’t know, then delete it without opening it
250) Two options does a binary choice offer
251) A collection of programs that controls how you computer system runs and processes
information is called operating system
252) Rows and columns are data organized in a spreadsheet
253) When cutting and pasting, the item cut is temporarily stored in clipboard
254) When you are working on a document on a PC, the document is temporarily stored in
flash memory
255) One megabyte equals approximately 1 million bytes
266) A cluster represents a group of sectors
267) Digital signals used in ISDN have discrete values
268) Assembler is language translation software
269) Manual data can be put into computer by scanner
270) Bandwidth means channel capacity amount of data following via cables and measure of
speed
271) Chip can keep maximum data
272) Debugging is the process of finding errors in software code
273) Time Bomb are viruses that are triggered by the passage of time or on a certain data
274) Linux is an open source operating system
275) Boot sector viruses are often transmitted by a floppy disk left in the floppy drive
276) Operating system controls the way in which the computer system functions and
provides a medium by which users can interact with the computer
277) Servers are computers that provide resources to other computers connected to a
network
278) Field names describe what a data field is
279) You must install router on a network if you want to share a broadband internet
connection
280) A goal of normalization is to minimize the number of redundancy
281) Programs from the same developer, sold, bundled, together, that are provide better
integration and share common features, tool box and menus are known as software
suits
282) A data ware house is one that organizes important subject areas
283) URL term identifies a specific computer on the web and the main page of the entire site
284) A proxy server is used to process client request for web pages
285) When data changes in multiple list and list are not updated, this causes data
inconsistency
286) Granting an outside organization access to internet web pages is often implemented
using a extranet
287) The code that relational database management systems use to perform their database
task is refer to as SQL
288) URL stands for Uniform resource locator
289) A data base management system is a software system used to create, maintain and
provide controlled access to a database
290) The two broad categories of software are system and application
291) The metal or plastic case that holds all the physical parts of the computer is known as
system unit
292) Data integrity means that the data contained in the database is accurate and reliable
293) A local area network is a private corporate network used exclusively by company
categories
294) Eight bits equal to one byte
295) A byte can hold one character data
296) A characteristic of a file server is manages files operations and is shared on a network
298) The development process of computer started in 1617
299) The role of Blaze Pascal in the development of computer is addition and subtraction of
numbers
300) The inventor of computer is Charles Babbage
301) The IBM made the first electronic computer in 1953
302) The silicon based transistor started to made by Gordon Tin in 1954
303) IBM is a company
304) The personal computer invented in 1981
305) 1 Kilobyte is equal to 1024 bytes
306) LCD means liquid crystal display
307) UPS converts DC voltage into AC voltage
308) The word ZIP means Zicxac Inline Pin

309) With the help of Pal switch we can increase or decrease the speed of computer’s
processing
310) The full form of MICR is magnetic ink character reader
311) Swift networks are used between banks
312) Panda is a virus
313) Boot sector is hardware
314) Debug searches the fault of any software
315) OCR means optical character recognition
316) The total printout of a program is called listing
317) With the help of ZIP we can decrease the size of any programs
318) We can format the hard disk with the help of Booting
319) CANNED is called as readymade software
320) The process of creating third file by mixing two files is called as mail merging
321) The figures and lines etc. made by computer is called as graphics
322) Each line represents 65 letters in a WordStar
323) Nokia- 7500 is not the example of Micro Processor
324) The first name of the digital computer is Unvake
325) The modern computer was invented in 1946
326) The full form of DOS is disk operating system
327) The expanded form of FORTRAN is formula translation
328) The great revolution came in computer sector in 1960
329) Magnetic tape is called as Input device of computer
330) The first mechanical computer of Charles Babbage is known as punch card machine
331) The IC chip used in computer is generally made in silicon
332) Telephone broadcast is the example of simplex transmission
333) Optical, Mechanical are the kinds of mouse
334) Control panel is used for increasing and decreasing the speed of the cursor of mouse
335) The capacity of modern main frame digital computer is 10(to the power of -12) mbps
336) With the help of my computer we can know about the usage and availability of space in
computer
337) We use both MS-Word and page maker for making resume
338) Earliest computers that would work with FORTRAN was second generation
339) Back Ups in database are maintained for to restore the lost data
340) IDEA is a encryption technique
341) DBRM takes care of storage of data in a database
342) The job of DBMS is to decrease redundancy
343) Digital signatures use encryption for authenticating
344) OS acts as intermediary agency between user and hardware
345) Plotters gives the highest quality output
346) ROM is built in memory in computer
347) FLASH is a RAM
348) PRAM is not a RAM
349) FLASH device is used in cell phones
350) Internal storage is same as the primary storage
351) IMAC is name of a machine
352) First generation computers could do batch processing
353) The analytic engine was created by Charles Babbage
354) Voicemail of GSM service provider has the personal security code for its subscribers
355) Senior manager decided about the division of work with respect to IT security
356) Encrypting file system of window XP professional operating system protects the data of
a user, even if the computer is shared between users
357) The .mpeg is the format of a movie file
358) Controlling is NOT required for high level language program before it is executed
359) A plotter is output device
360) 80286 is a hardware part of microprocessor
361) Top-bottom approach can not be the measure of network traffic
362) A switching mode power supply is used for converting raw input power to stabilize DC
power
363) Spooler can manage the whole printing process
364) Validity routines control procedures can be used to ensure completeness of data
365) Less expensive than leased line networks is not a characteristic of virtual private
networks (PVN)
366) Program policy framework provides strategic direction to an organization
367) Cross bar switches have common control
368) Row-level security is the most basic part for database security
369) Voice recognition software can not be used for converting text into voice
370) The user account can only be created by the network administrator
371) IBM-700 belongs to second generation
372) Allocating adequate bandwidth would help her in speeding up the data transfer over net
373) BCD means binary coded decimal
374) Extended system configuration data is same as BIOS
375) Digitizer is an input device
376) Caramel is the latest platform of Intel Centrio microprocessor
377) RISC is known as storage device
378) NORTON is an anti-virus
379) The system file of an operating system is COM
380) ATMs of bank have real currency
381) A program that converts high level language to machine language is assembler

382) ‘.txt’ files can be made in notepad, MS word, DOS editor


383) .Zip is a compressed file
384) Internet is a WAN
385) MP3 technology compresses a sound sequence to one-twelfth of its original size
386) At a time only one operating system can be at work on a computer
387) If multiple programs can be executed at the same time, it is distributed operating
system
388) If the operating system provides quick attention, it is real time operating system
389) Distributed operating system uses network facility
390) FORMAT command in MS-DOS is used for recreating disk information
391) COPY command in MS-DOS is used to copy one or more files in disk drive to another,
copy from one directory to another directory
392) REN command is Internal command

393) Tom Burners-Li propounded the concept of “World wide web”


394) The memory address sent from the CPU to the main memory over a set of wires is
called address bus
395) MODEM is an electronic device required the computer to connect to the INTERNET
396) A source program is a program which is to be Tran scripted in machine language
397) Virus in computer relates to program
398) Floppy is not a storage medium in the computer related hardware
399) DOS floppy disk does not have a boot record
400) The CPU in a computer comprises of Store, arithmetic and logical unit and control unit
401) In computer parlor a mouse is a screen saver
402) UNIVA is the name of the computer which was first used for programming and playing
of music
403) The IC chips for computer is prepared from silicon
404) Database management systems are comprised of tables that made up of rows called
records and columns called fields
405) Nano is equal to 10(to the power of -9)
406) In computers RAM is a non-volatile memory
407) Disk and tape drives are commonly used as hard copy
408) When computer is connected to LAN and data is sent across it for storage/processing
is online processing
409) The primary storage unit is also referred to as internal storage
410) Oracle is not an operating system
411) Data are raw facts and figures
412) Holding of all data and instructions to be processed is one of the functions of storage
unit
413) To select the entire row in Excel, click mouse at row heading
414) Database is known as structured data
415) Normal view and outline view notes pane appears in power point
416) The user protection feature of an operating system is required in multi-user system only
417) In word, Ctrl + Del combination of keys press to delete an entire word
418) In MS-Word double clicking a word selects the word
419) Word document can be navigated in web layout view
420) In Excel, addressing mode(s) that can be used in a formula is/are only absolute and
relative
421) Note page views can you use to show just the slide and its contents
422) Hardware that adds two numbers is arithmetic logical unit
423) The computer as a machine and all other physical equipment associated with it are
termed as hardware
424) Plotters are very useful in applications such as computer aided design
425) Corel DRAW is a graphic package
426) The print to file option creates .prn file
427) The enhanced keyboard contains 101 keys
428) Data processing cycle consists of input cycle, output cycle and processing cycle
429) Page Setup is not an option of Edit menu
430) Radar chart is used to show a correlation between two data series
431) A computerized business information system includes hardware, software and data
facts
432) Purchase order file is a transaction file
433) A typical computerized business application system will have both master and
transaction file
434) Problem identification is taken first in designing a program
435) The purpose of the EXIT command is to get out of a condition loop
436) Employees details is a master file for the pay roll system
437) A slow memory can be connected to 8085 by using READY
438) A processor needs software interrupt to obtain system services which need execution
of privileged instructions
439) A CPU has two modes- privileged and non-privileged. In order to change the mode
from the privileged to the non-privileged, a software interrupt is needed
440) Swap space resides at disk
441) The process of assigning load addressed to the various parts of the program and
adjusting the code and data in the program to reflect the assigned address is called
relocation
442) 1 Sector= 4096 bytes
443) Two stacks of size required to implement a queue of size n
444) 1 Floppy = 6, 30,784 bytes or 308 KB
445) Consider a machine with 64 MB physical memory and a 32-bit virtual address space. If
the page size is 4 KB, then size of the page table is 2 MB
446) Consider a virtual memory system with FIFO page replacement policy. For an arbitrary
page access pattern, increasing the number of page frames in main memory will
always decrease the number of page faults
447) Consider a scheme R(A, B, C, D) and functional dependencies A->B and C-> D. Then
the decomposition of R into R1 (AB) and R2 (CD) is dependency preserving and
lossless join
448) Main memory requires a device driver
449) RAM can be divided into 2 types
450) Two friends suitably arrange 4 blocks of different colors to exchange coded information
between them. 4 bits of information is one exchanging each time
451) Cache memory is a part of main memory

452) The number 43 in 2’s complement representation is 01010101


453) The 8085 microprocessor responds to the presence of an interrupt by checking the
TRAP pin for ‘high’ status at the end of each instruction fetch
454) All machinery and apparatus of computer is called hardware
455) The number 1024 bytes is the complement representation of 1 Kilo byte
456) System design specifications do not include blueprint showing the layout of hardware
457) Web pages are uniquely identified using URL
458) The results of arithmetic and logical operations are stored in an accumulator
459) The input device that is closely related to touch screen is the light pen
500) F2 keys of control center specified below displays data, toggles browse/edit
501) A compiler breaks the source code into a uniform stream of tokens by lexical analysis
502) The number of processes that may running at the same time in a large system can be
thousands
503) LET.BAS files are related to Microsoft word utility
504) A command in UNIX can have one or more arguments
505) A hard disk is logically organized according to cylinders and sectors
506) A frame can include text & graphics, tables & graphics, graphics
507) All the formatting data for the paragraph is stored in the paragraph mark
508) The abbreviation CAD stands for computer aided design
509) We can define hypertext definition in notebooks using Macsyma 2.0
510) The addressing mode(s) that can be used in a formula is/are- absolute, relative and
mixed
511) WINDOWS can work in enhanced and standard modes
512) The part of a machine level instruction which tells the central processor what has to be
done is an operation code
513) O-Matrix software packages do not have animation capabilities
514) In order to paste text form the clipboard in the document being edited, press the Ctrl-A
key
515) A program that converts a high level language program to a set of instructions that can
run on a computer is called a compiler
516) Faster execution of programs is not an advantage of a subroutine
517) First generation of computer period is 1945-1950
518) IBM built first PC in the year 1981
519) A small computer program embedded within an HTML document when a user retrieves
the web page from a web server is called an applet
520) Another name for systems implementation is transformation
521) The central host computer or file server in a star network maintains control with its
connecting devices through polling
522) C++ does not check whether the index value is within scope
523) The browser uses uniform resource locator to connect to the location or address of
internet resources
524) In the centralized computing architecture, the entire file is downloaded from the host
computer to the user’s computer in response to a request for data
525) An expert system enables one or more users to move and react to what their senses
perceive in a computer simulated environment
526) Popping or removing an element from an empty stack is called underflow
527) The ability to combine data and operations on that data in a single unit is known as
polymorphism
528) A router is a device that sites between your internal network and the internet and limits
access into and out of your network based on your organization’s access policy
529) In C++, private, protected, and public are reserved words and are called member
access specifiers
530) The integration of all kinds of media such as audio, video, voice, graphics and text into
one coherent presentation combined is called multimedia
531) The derived class can redefine the public member functions of the base class
532) A technique for searching special databases, called data warehouses, looking for
related information and patterns is called data mining
533) Like the quick sort the merge sort uses the divide and conquer technique to sort a list
534) The use of expert systems technology can greatly reduce the number of calls routed to
a customer service department
535) Building a list in the backward manner, a new node is always inserted at the beginning
of the list
536) Creating a web site is also called web authoring
537) Using the optimization analysis approach, the expert system starts with a conclusion
and tries to verify that the rules, facts, and conclusion all match. If not, the expert
system chooses another conclusion
538) Both the application program and operating system program only describes the
software
539) Root is one of the items given below is not an item of the menu bar
540) BACKUP is not an internal command
541) In a disk, each block of data is written into one sector
542) Hard copy is a printed copy of machine output
543) A boot strap is a small utilization computer program to start up in inactive computer
544) CAD is oriented towards software
545) Icons are picture commands
546) IBM company for the first time launched pocket computers
547) PROM is a computer part

548) Algorithms can handle most system functions that aren’t handled directly by the
operating system
549) Device drivers are small, special-purpose programs
550) LAN refers to a small, single site network
551) A collection of programs that controls how your computer system runs and processes
information is called operating system
552) When we are working on a document on a PC the document is temporarily stored in
RAM
553) Information travels between components on the motherboard through buses
554) Microsoft is a vertical market application
555) RAM refers to the memory in your computer
556) Computers connected to a LAN can share information and / or share equipment
557) Magnetic tape is not practical for applications where data must be quickly recalled
because tape is a sequential access medium
558) In Late 1988 computer viruses land in India for the first time
559) ALU is a part of the CPU
560) In computer technology a compiler means a program, which translates source program
into object program
561) American computer company IBM is called big blue
562) The first IBM PC did not have any ROM
563) The digital computer was developed primarily in UK
564) Programs which protect a disk from catching an infection are called antidotes
565) The first movie with terrific computer animation and graphics was released in 1982 is
Tron
566) An integrated circuit is fabricated on a tiny silicon chip
567) The word size of a microprocessor refers to the amount of information that can be
stored in the byte
568) Daisy-wheel printer cannot print graphics
569) In the IBM PC-AT, the word AT stands for advanced terminology
570) Dedicated computer means which is assigned one and only one task
571) Real time programming type of computers programming is used for aero plane ticket
reservation system
572) RAM means memory which can be both read and written to
573) Laser printer uses light beam and electro statically sensitive black powder
574) The Santa Clara Valley, California is popularly known a Silicon Valley of America
because many silicon chip manufacturing firms are located there
575) A program written in machine language is called assembler
576) International business machine was the first company in the world to build computer for
sale
577) PARAM is a parallel computer
578) For communications, wide area networks use special purpose telephone wires and
fiber optic cables and microwaves
579) Data transfer rate in modems is measured in bits per second
580) A compiler cannot detect logical errors in source programs
581) Throughput, turnaround time, response time are measures of system performance
582) OLTP architecture can handle a limited number of dimensions whereas OLAP
architecture does not have any limit on the number of dimensions 583) The binary
equivalent of (40.125) suffix 10 is 101000.001

584) Kernel is the only art of an operating system that a user cannot replace or modify
585)
Symbol signifies a magnetic disk
586) COBOL programming language was initially developed for consumer electronics goods
587) Running, blocked, ready, terminated are different states of a process
588) Rational rose is an example of a modeling language
589) A disk worm is an example of optical devices
590) A RAID is a disk array
591) The first private internet service provider in India was Satyam infoway
592) The maximum and minimum unsigned number which can be stored in a 8 bit word is 0
and 255
593) Stack is a part of memory
594) HIT RATIO is associated with cache performance
595) Laser printer is a page printer
596) Storage capacity of a disk system depends upon number of recording surfaces and
number of sectors per track
597) Abstraction is associated with object oriented technology and database technology
598) The terms opcode and operand are associated with any high level language
599) Dynamic binding is associated with object oriented programming
600) The term CHIP, JEWELLARY means a processor with high capacity
601) A watch point is associated with debugger
602) A multithreaded program uses multiple processes
603) Time sharing is a mechanism to provide spontaneous interactive use of a computer
system by many users in such a way that each user is given the impression that he/she
has his/her own computer
604) The typical scheme of memory management used in IBMOS/360 mainframe system
was that of multiprogramming with variable number of memory partitions
605) The concepts used for realization of virtual memory are swapping, demand paging and
In-line secondary storage
606) Oracle 8i is an example of OORDBMS
607) ALPHA, RIOS, SPARC are examples of RISC Processors
608) The scope of an identifier refers to where in the program an identifier is accessible
609) Hierarchy is not a component of relational database

610) A two-way selection in C++ is the if…else


611) A recursive function executes more efficiently than its iterative counterpart
612) The body of the recursive function contains a statement that causes the same function
to execute before completing the last call
613) Variables that are created during program execution are called dynamic variables
614) When destroying a list, we need a delete pointer to deallocate the memory
615) The first character in the ASCII character set is the null character, which is nonprintable
616) A variable for which memory is allocated at block entry and deallocated at block exit is
called a static variable
617) Signal to noise ratio compares signal strength to noise level
618) The ability to create new objects from existing objects is known as inheritance
619) Software tools that provide automated support for the systems development process
are OLAP tools
620) Applications/Web server tier processes HTTP protocol, scripting tasks, performs
calculations, and provides access to data
621) A language used to describe the syntax rules is known as meta language
622) In a preorder traversal, the binary tree is traversed as follows
623) The general syntax of the function prototype of a value returning function is function
name (parameter list)
624) Competitive intelligence is the process of gathering enough of the right information in a
timely manner and usable form and analyzing it so that it can have a positive impact
625) Tracing values through a sequence is called a play out
626) In a binary tree, each comparison is drawn as a circle, called a node

627) The term used as a measurement of a communication channel’s data capacity is


bandwidth
628) In addition to the nature of the problem, the other key factor in determining the best
solution method is function
629) An E-R data model solves the problem of presenting huge information system data
models is to users and developers
630) In C++, predefined functions are organized into separate libraries
631) The standard protocol (communication rules for exchange of data) of the internet is
TCP/IP
632) For efficiency purposes, wherever possible, you should overload operators as member
functions
633) Modifying algorithms that change the order of the elements, not their values, are also
called modifying algorithms
634) As long as the tables in a relational database share at least one common data attribute,
the tables in a relational database can be normalized to provide useful information and
reports
635) DBMS is a simple, fourth generation language used for data retrieval
636) An occurrence of an undesirable situation that can be detected during program
execution is known a exception
637) A photo of the company headquarters would be an example of the use of a static web
page
638) The Pentium processor contains thousands of transistors
639) SOI technology has been successful with reference to SRAM
640) Secondary storage device is needed to print output results
641) Static random access memory does not fall under the category of secondary storage
devices
642) Floppy disk is universal, portable and inexpensive but has its own limitation in terms of
storage capacity and speed
643) Some physical property of the microscopic area of the disk surface is changed for
recording in common for all types of disks
644) In a disk, each block of data is written into two or more sectors
645) A floppy disk rotates at 100rpm
646) A hard disk has 500 to 1000 tracks or more
647) The storage capacity of a cartridge tape is 400 MB
648) Single density recording is also known as frequency modulation
649) Printer is not an input device
650) The input device that is most closely related to a touch screen is the light pen
651) Laser printer generates characters from a grid of pins
652) The liquid crystal display works on the basis of the relation between polaristion and
electric field
653) A COBOL program in source code is not considered to be system software
654) Firmware stored in a hard disk
655) A compiler breaks the source code into a uniform stream of tokens by lexical analysis
656) Sorting of a file tasks is not performed by a file utility program
657) Floppy disk does not generate a hardware interrupt
658) Ada language is associated with real time processing
659) MS DOS is usually supplied on a cartridge tape
660) BREAK is not an internal DOS command
661) Kernel of MS-DOS software resides in ROM
662) The UNIX operating system (available commercially) has been written in C language
663) MS-DOS has better file security system as compared to UNIX
664) UNIX is only a multiprogramming system
665) The UNIX operating system uses three files to do the task mentioned
666) In UNIX, end-of-file is indicated by typing CTRL D
667) Abacus is said to be invented by Chinese
668) An operating system is necessary to work on a computer
669) The first UNIX operating system, as it was in the development stage, was written in the
assembly language
670) FAST drivers scientific software packages was developed under contract with NASA
671) LEFT () is not a date function
672) FIF editor is a windows based application
673) Graphics is inserted in frame
674) A language translator is best described as a system software
675) The specification of a floppy is identified by TPI
676) DISC () is not a database function
677) In opening menu of word star C OPTION should be selected for protecting a file
678) The most advanced form of ROM is electronically erasable programmable ROM
679) Secondary storage device is needed to store large volumes of data and programs that
exceed the capacity of the main memory
680) MORE sends contents of the screen to an output device
681) NFS stands for N/W file system
682) Main protocol used in internet is TCP/IP
683) We can create a simple web page by using front page express
684) The first line/bar on the word window where the name of the document is displayed is
called title bar
685) The clock frequency of a Pentium processor is 50 MHz
686) The input device that is most likely to be used to play computer games is the joystick
687) Linking the program library with main program is not performed by a file utility program
688) The UNIX operating system has been written in C language
689) BIOS of MS-DOS resides in ROM
690) The sector size of a floppy disk varies from 128 bytes to 1024 bytes
691) A program type of errors is flagged by compilers
692) A floppy diskette is organized according to tracks and sectors
693) In word star, the maximum permissible length of search string is 65
694) C is a third generation high level language
695) A CPU has a 16-bit program counter. This means that the CPU can address 64 K
memory locations
696) STR () is used for converting a numeric into a character string
697) BASIC language is normally used along with an interpreter
698) In UNIX, open files are shared between the parent and the child
699) In spite of the extra power needed for refreshing. DRAMs are widely used in computers
because of its lower cost relatives to SRAMs
700) PIF editor belongs to Main group
701) SUM () is not a financial function
702) 98/04/12 cannot be used to enter a date
703) Windows is popular because of its being expensive
704) Personal computers currently sold in India have main memories at an entry level in the
range of megabytes
705) The unit in CPU or processor, which performs arithmetic and logical operations is ALU
706) RAM is volatile
707) The result of arithmetic and logical operations is stored in an accumulator
708) A small amount of memory included in the processor for high speed access is called
cache
709) A bus is an electronic track system
710) A co-processor is used to improve the speed of mathematical calculations
711) Intel 80286 belongs to third generation microprocessors
712) A hexadigit can be represented by eight binary bits
713) The number of processes that may running at the same time in a large system can be
thousands
714) FORTRAN is a 3GL
715) Root is not an item of the Menu bar
716) Difficult to do what it projects is not considered to be a feature of the spreadsheet
717) While starting the Lotus 1-2-3, the current cell reference is shown at top left hand
corner of the screen
718) Bill gates is the chief of Microsoft
719) Excel office assistant can be made to appear by using F1 key and help menu
720) 9 per page is the max no of showing positioning of per page handouts
721) Alignment buttons are available on formatting toolbar
722) Pico second is 10(to the power of-9)
723) Logo refers to a computer language
724) The most appropriate command to permanently remove all records from the current
table is Zap
725) The efficient and well designed computerized payroll system would be on-line real time
system
726) The scripts which are designed to receive value from Web users is CGI script
727) WAIS stands for – wide assumed information section
728) Modem is used for connecting PC using telephone lines
729) Token bus is the most popular LAN protocol for bus topology
730) Manipulating data to create information is known as analysis
731) A separate document form another program sent along with an E-mail message is
known as E-mail attachment
732) When you boot up a PC — portions of the operating system are copied from disk into
memory
733) Correcting errors in a program is called debugging
734) A word processor would most likely be used to type a biography
735) A database is an organized collection of data about a single entity
736) Fire fox is a web browser
737) Most of the commonly used personal computers/laptops do not have a command key
known as turnover
738) Full form of USB is known as Universal serial bus
739) The quickest and easiest way in Word to locate a particular word or phrase in a
document is to use the find command
740) Computer sends and receives data in the form of digital signals
741) Icons are graphical objects used to represent commonly used application
742) Most World Wide Web pages contain HTML commands in the language
743) In any window, the maximize button, the minimize button and the close buttons appear
on the title bar
744) Checking that a pin code number is valid before it is entered into the system in an
example of data validation
745) Windows 95 and windows 98 and Windows NT are known as operating systems
746) Information on a computer is stored as analog data
747) A program that works like a calculator for keeping track of money and making budgets
is spreadsheet
748) To take information from one source and bring it to your computer is referred to as
download
749) Windows is not a common feature of software applications
750) A toolbar contains buttons and menus that provide quick access to commonly used
commands
751) Input device is an equipment used to capture information and commands
752) Most of the commonly available personal computers/laptops have a keyboard popularly
known as QWERTY
753) Editing a document consists of reading through the document you’ve created then—
correcting your errors
754) Virtual Box is not a famous operating system
755) Junk e-mail is also called spam
756) DOC is the default file extension for all word documents
757) .bas, .doc and .htm are examples of extensions
758) Codes consisting of bars or lines of varying widths or lengths that are computer
readable are known as a bar code
759) Convenience, speed of delivery, generally and reliability are all considered as the
advantages of e-mail
760) E-commerce allows companies to conduct business over the internet
761) The most important or powerful computer in a typical network is network server
762) To make a notebook act as a desktop model, the notebook can be connected to a
docking station which is connected to a monitor and other devices
763) Storage that retains its data after the power is turned off is referred to as non-volatile
storage
764) Virtual memory is memory on the hard disk that the CPU uses as an extended RAM
765) To move to the beginning of a line of text, press the home key
766) When sending and e-mail, the subject line describes the contents of the message
767) Microsoft is an application suite
768) Information travels between components on the motherboard through bays
769) One advantage of dial-up internet access is it utilizes existing telephone security
770) Network components are connected to the same cable in the star topology
771) Booting checks to ensure the components of the computer are operating and
connected properly
772) Control key is used in combination with another key to perform a specific task
773) Scanner will translate images of text, drawings, and photos into digital form
774) Information on a computer is stored as digital data
775) The programs and data kept in main memory while the processor is using them
776) Storage unit provide storage for information and instruction
777) Help menu button exist at start
778) Microsoft company developed MS Office 2000
779) Charles Babbage is called the father of modern computing
780) Data link layer of OSI reference model provides the service of error detection and
control to the highest layer
781) Optical fiber is not a network
782) OMR is used to read choice filled up by the student in common entrance test
783) A network that spreads over cities is WAN
784) File Manager is not a part of a standard office suite
785) A topology of computer network means cabling between PCs

786) In UNIX command “Ctrl + Z” is used to suspend current process or command


787) Word is the word processor in MS Office
788) Network layer of an ISO-OSI reference model is for networking support
789) Telnet helps in remote login
790) MS Word allows creation of .DOC type of documents by default
791) In case of MS-access, the rows of a table correspond to records
792) Record maintenance in database is not a characteristic of E-mail
793) In a SONET system, an add/drop multipliers removes noise from a signal and can also
add/remove headers
794) The WWW standard allows grammars on many different computer platforms to show
the information on a server. Such programmers are called Web Browsers
795) One of the oldest calculating device was abacus
796) Paint art is not a special program in MS Office
797) Outlook Express is a e-mail client, scheduler, address book
798) The first generation computers had vacuum tubes and magnetic drum
799) Office Assistant is an animated character that gives help in MSOffice
800) Alta Vista has been created by research facility of Digital Electronic corporation of USA
801) We are shifting towards computerization because technologies help in meeting the
business objectives
802) Spiders search engines continuously send out that starts on a homepage of a server
and pursue all links stepwise
803) Static keys make a network insecure
804) Joy Stick is an input device that cannot be used to work in MS Office
805) Artificial intelligence can be used in every sphere of life because of its ability to think
like human beings
806) To avoid the wastage of memory, the instruction length should be of word size which is
multiple of character size
807) Electronic fund transfer is the exchange of money from one account to another
808) Format menu in MS Word can be use to change page size and typeface
809) Assembly language programs are written using Mnemonics
810) DMA module can communicate with CPU through cycle stealing
811) A stored link to a web page, in order to have a quick and easy access to it later, is
called bookmark
812) B2B type of commerce is characterized by low volume and high value transactions in
banking
813) Advanced is not a standard MS Office edition
814) Workstation is single user computer with many features and good processing power
815) History list is the name of list that stores the URL’s of web pages and links visited
in past few days
816) FDDI access mechanism is similar to that of IEEE 802.5
817) MS Office 2000 included a full-fledged web designing software are called FrontPage
2000
818) Macintosh is IBM’s microcomputer
819) X.21 is physical level standard for X.25
820) Enter key should be pressed to start a new paragraph in MS Word
821) Main frame is most reliable, robust and has a very high processing power.
822) Formatting of these toolbars allows changing of Fonts and their sizes
823) The ZZ command is used to quit editor after saving
824) The program supplied by VSNL when you ask for internet connection for the e-mail
access is pine
825) The convenient place to store contact information for quick, retrieval is address book
826) Digital cash is not a component of an e-wanet
827) For electronic banking, we should ensure the existence and procedures with regard to
identification of customers who become members electronically
828) Jon Von Neumann developed stored-program concept
829) Hardware and software are mandatory parts of complete PC system
830) Firewall is used in PC for security
831) Two rollers are actually responsible for movement of the cursor in mouse
832) In case of a virus getting into computer NORTON will help
833) Tour the server room is to be done by the auditor while internet banking services audit
834) Documentation while developing a software for a Bank is required for auditing
835) Water supply has not become computerized
836) Concurrency control in distributed database supports multi-user access
837) Fifth generation computers are knowledge processors
838) Transistors were first used in 2nd generation computers
839) Intelligence is not a characteristic of a computer
840) A camera is an processing machine
841) To protect organization from virus or attacks all mails sent and received should be
monitored, all messages should be encrypted, E- mails should be used only for official
purpose
842) Internet collects millions of people all over the world
843) A computer based information system is a system in which a computer is used to
process data to get information
844) The time between program input and outputs is called execution time
845) Third generations of computers have On-line real time systems
846) MIME is a compressor that packages different formats into SMTP compatible type
847) The earliest software was developed using the waterfall model
848) EDI e- commerce system can handle non monetary documents
849) Collection to tracks on a disk forms spindle
850) A disk where number of sectors are fixed is called hard sectored
851) Half duplex transmission techniques let computer to alternatively send and receive data
852) Multiplexing combines signals from different sources into one and sends on a faster
channel
853) Message switcher chooses correct data path for an incoming message and forwards it
to relevant line
854) Speech recognition use thermal sensors along with infrared rays for identification
855) Trojan horse are self replicating malicious code independent of the action of the user,
but slow down the processor on entering a network
856) Generation of PIN in bank ATM would require PIN entered is encrypted
857) Availability, integrity, confidentiality is most necessary for data to be useful
858) Grid is a supercomputer created by networking many small computers
859) A character that changes its value throughout the program is called variables
860) A program coded in programming is done by assembling
861) In write mode of file existing text is replaced by new one
862) When an organization gives contract for development of a software, it has to give data
to the service provider. In such cases, the ownership of data should be with the
client/organization that outsource services
863) Under a centralized organization Intranet be an effective networking tools
864) For optical fiber used in point to point transmission, the repeater spacing is 10-100 km
865) Favorites are accessible from the start menu
866) Task pre-emption, task priority and semaphores are not needed by server program
from an operation system
867) The objective of multiprogramming operating system is to maximize CPU utilization
868) The environment provided to ASP is based on Client/server
869) HUB is layer1 device, central device, dumb device
870) The UNIX, echi command is used to display the message or value of any variable on
the screen
871) QAM is used in high speed modem
872) Frame Relay technique uses connection oriented
873) Bipolar always has a non-zero average amplitude
874) In a SONET system, an add/drop multipliers can remove signals from a path
875) The server on the internet is also known as Host

876) For multiple branching in ‘C’ we use switch statement


877) Web site is a collection of HTML documents, graphic files, audio and video files
878) The first network that initiated the internet was ARPANET
879) In MODEMS a digital signal changes some characteristic of a carrier wave
880) The binary values are represented by two different frequencies in frequency shift keying
881) Messenger mailbox is present in Netscape communicator
882) Switching is a method in which multiple communication devices are connected to one
another efficiently
883) A bridge recognizes addresses of layer 3
884) EPROM is permanent storage device

885) “.TIF” extension name stands for tagged image format


886) The overhead using BRI is 10 percent of the total data rate

887) In programming languages the key word “Void” means it does not return any value
when finished
888) The keyboard shortcut to restart your computer is Ctrl + Alt + Del
889) FORTRAN is not a programming language
890) The instruction LOAD A is a one address instruction
891) MS-Excel is also known as spread sheet
892) Manchester encoding is used in Ethernet technology
893) The instruction of a program which is currently being executed are stored in main
memory
894) In DOS environment, the command used to save the file is ^Z
895) All high level language uses compiler and interpreter

896) In html coding <p> …… </p> tag is used to display a paragraph


897) In HTML coding, the following attributes color, size, face used in font tag
898) DHTML stands for dynamic hyper text markup language
899) Fiber optics cable supports data rate up to 100 mbps to 2 gbps
900) In Photoshop software we can modify, delete, and edit the image
901) Most common channel used by networks today is telephone lines
902) Sybase SQL server and Microsoft SQL server 7.0 is not an example of RDBMS
903) In programming language, Null point is used to tell end of linked list
904) A technique which collects all deleted space onto free storage list is called garbage
collection
905) Node to node delivery of the data unit is the responsibility of the data link layer
906) Insulating material is the major factor that makes co axial cable less susceptible to
noise than twisted pair cable
907) A data communication system covering an area the size of a town or city is MAN
908) Virtual memory system allows the employment of the full address space
909) The basic circuit of ECL supports the OR-NOR logic
910) Micro instructions are kept in control store
911) In HTML coding no shade attribute of HR tag suppresses the shading effect and fields
a solid line
912) Internet domains are classified by their functions. In that regard “.com” represents
commercial
913) HTTP in URL stands for hyper text transfer protocol

914) The “Nyquist theorem” specifies the minimum sampling rate to be twice the bandwidth
of a signal
915) Memory allocation at the routine is known as dynamic memory allocation
916) In HTML loading, <BR> tag is used for displaying a new line
917) HTTP protocols are used by internet mail
918) A policy on firewalls needs not ensure that it is logically secured
919) The script which is designed to receive value from the web users is java script
920) GET method and HEAD method is the C91 method of involving a C91 program
921) Analog switched line telephone service is least expensive
922) A toll used to find a synonym or antonym for a particular word is thesaurus

923) In C++ coding, Cout<<”tent”; is used to display character or strings or numeric screen
924) In this processing, a number of jobs are put together and executed as a group batch
processing
925) The process of finding and correcting errors in a program is a process called debugging
926) cn pass command is used to change your password in UNIX system
927) HTML code is always starts with <html></html>
928) If there are 5 routers and b networks in an internet work using link state routing, there
will be 5 routing tables
929) A scripting language similar to HTML and which runs only on a browser is java script
930) By RAID technique, data is stored in several disk units by breaking them into smaller
pieces and storing each piece in separate disk
931) The most popular network protocol whose routing capabilities provide maximum
flexibility in an enterprise wide network is known as TCP/IP
932) New group that enable you to communicate with other Microsoft windows user about
issues and concerns with your computer
933) Analog-digital conversion type needs sampling of a signal
934) In an optical fiber, the inner core is less dense than the cladding
935) Six types of heading are available in HTML
936) RDBMS is an acronym for relational database management system
937) In MS-Word, page layout view is also known as true WYS/WYG
938) In HTML coding, <UL> (Unordered list) is used to give bullets in your document 939)
Transmission media are usually categorized as guided or unguided
940) A virtual circuit is the physical connection between an end point and a switch or
between two switches
941) Passing of the frame to next station can happen at a token ring station
942) R-C coupling method is suitable for voltage amplification
943) Normal is not a type of HTML pages
944) In HTML coding <LI> tag is used for denoting items in a list of type <UL>
945) In MS-Word the keyboard shortcut F7 used for spelling and grammar check
946) DBMS is not an operating system
947) HTML is basically used to design web-site

948) In HTML coding, Dynamic web-pages are created in advance of the user’s request
949) In Dos, primary name of a file can have a maximum of 10 characters
950) du command is used to show file system disk usage in UNIX
951) Maximum length of a text file is 255 characters
952) Frame format of CSMA/CD and Ethernet protocol differ in the block error control
953) On an Ethernet LAN implementation with 10 base 5 the maximum number of segments
can be five
954) Overflow condition in linked list may occur when attempting to create a node when
linked list is empty
955) Code segment register is where the microprocessor looks for instruction
956) Web-site is collection of web-pages and Home-page is the very first page that we see
on opening of a web-site
957) The subsystem of the kernel and hardware that cooperates to translate virtual to
physical addresses comprises memory management subsystem 958) A device
operating at the physical layer is called a repeater
959) FORTRAN is a mathematically oriented languages used for scientific problems
960) If we want to convert the text which is in small letters to capital letters then select the
required text and press Shift +F3
961) Datagram packet switching uses the entire capacity of a dedicated link
962) In the datagram approach to packet switching, each packet of a message follows the
same path from sender to receiver
963) FDM technique transmits analog signals
964) X.21 protocol consists of only physical level
965) In a dedicated link, the only traffic is between the two connected devices
966) In a start topology, if there are n devices in network, each device has n-1
967) A unique number assigned to a process when the process first starts running PID
968) Modems is necessary for multiplexing
969) In MS-Word WYSIWYG stands for what you see is where you get
970) The primary purpose of shutdown procedure in UNIX system is that all active process
may be properly closed
971) In time- division circuit switching, delivery of data is delayed because data must be
stored and retrieved from RAM
972) Subnet usually comprises layers 1 & 2, layer 1 through 3 of OSI model
973) An image in a web-page can be aligned left and right using HTML coding
974) RFC stands for request for comment
975) Packet filtering firewall and proxy firewall is not a type of firewall

976) Most news reader’s presents news groups articles in threads


977) The sharing of a medium and its path by two or more devices is called multiplexing
978) Sending messages, voice, and video and graphics files over digital communication link
is done by the method e-mail
979) In a computer network, a computer that can control a group of other computers for
sharing information as well as hardware utilities is known as server 980) Telephone
number, zip code is defined as a numeric field
981) In shell programming, tr command is used for character translation
982) Cat text>>output would append a file called test to the end of a file called output
983) In a network with 25 computers, mesh topology would require the more extensive
cabling
984) Dialog control is a function of the presentation layer
985) The program which takes user input, interprets it and takes necessary action is shell
986) Most appropriate data structure in C to represent linked list is array
987) Menu bar is usually located below that title bar that provides categorized options
988) Latest version of Microsoft Word is Word XP
989) You save your computer files on disc and in folders
990) when the text automatically goes onto the next line this is called word wrap
991) WYSIWYG is short for what you see is what you get
992) Left justify is the same as align left
993) To put text on the right of the page use the align right button
994) Lotus 1-2-3 is a popular DOS based spreadsheet package
995) 65,535 characters can be typed in a single cell in excel
996) Comments put in cells are called cell tip
997) Getting data from a cell located in a different sheet is called referencing
998) A numeric value can be treated as a label value if it precedes with apostrophe
999) Data can be arranged in a worksheet in an easy to understand manner using auto
formatting, applying styles, changing fonts
1000) An excel workbook is a collection of worksheets and charts
1001) Most manufacturers setup their BIOS to load into upper memory during the boot
process
1002) Device drivers loaded in the config.sys file is loaded into the following memory area:
Conventional memory
1003) 40ns memory speeds is the fastest
1004) System software often uses the ROM BIOS
1005) In CMOS setup, if you enable shadowing ROM is copied to RAM 1006) Static
variables are local to the block in which they are declared.
1007) During the normal PC boot process, ROM BIOS is active first .
1008) During boot-up, the memory test checks and verifies that contiguous memory is
installed
1009) 601 error code identifies a floppy drive problem
1010) If you get frequent general protection faults, this could indicate poor quality of memory
chips
1011) You are looking at a memory module thought to be a DIMM module. 168 pins would
be on a DIMM module
1012) The system BIOS and ROM chips are called firmware
1013) Extended located above the first 1024K of memory
1014) WRAM type of RAM is normally the fastest
1015) RAM component is used for short-term data storage
1016) A SIMM has 40 pins
1017) RAM provides quickest access to data
1018) Narrowcast linking is not a transmission technology
1019) The data flow diagram is for analyzing requirements of user
1020) The elements of computer processing system are hardware, data, users and
procedures
1021) On August 23, 2005 an accounting clerk prepared an invoice dated August 31, 2005.
Range check control can check this
1022) Library management software is for documenting the changes that are made to
program and controlling the version numbers of the programs
1023) Steganography is hiding the data but not necessarily making it invisible and not easily
detectable
1024) A computer is an electronic device
1025) An online transaction is transaction done via internet
1026) Using anti-virus software is preventive measure
1027) For security we should consider local data reduction, event correction low resource
utilization
1028) OS is not a peripheral of PC
1029) The most common input device used today is keyboard
1030) The third generation of the computer were in 1965-1971
1031) Gateways to allow a network to use the resources of another main frame is a
component of internet
1032) Mouse cannot be shared
1033) EDI means electronic data interface
1034) Mainframes network where a huge compute does all computing and front end PCs are
dumb terminals
1035) A modem that cannot be moved from its position is called fixed modem
1036) A device that receives data from slow speed devices, and transmits it to different
locations is called remote concentrator
1037) Organization would prefer in house development of software to ensure that the
development adhere to defined quality
1038) Actual intelligence is not a feature of PC
1039) Network that uses two OSI protocol layers as against three used in X.25 is a “frame
relay”
1040) Microsoft excel is versatile application and spread sheet program
1041) System flowcharts show relationship that link the input processing and output of the
system
1042) To identifying the system to be tested the penetration testing is done
1043) Platform in computer world means computer hardware and operating systems
1044) A character that retains its value during program execution is constants
1045) Data accuracy is not done by modem
1046) OMR is used to read choice filled up by a student in common entrance tests
1047) The term remote with respect to network means machine located far off
1048) In two-tier client server architecture the client is usually fat client
1049) The senior management provides the go-ahead approval for the development of
projects
1050) Manual data can be put into computer by Scanner
1051) E-mail address is made up of two parts
1052) The normal way to undo a command by pressing the following key combinations
together CTRL-Z
1053) The owner of a process is user that invokes the process
1054) In datagram packet switching all the datagram’s of a message follow the same
channel of a path
1055) X.25 LAPP uses a specific subset of HDLC protocol
1056) Presentation layer of the OSI reference model is concerned with the syntax of data
exchanged between application entities
1057) Edge-triggered D flip –flop memory elements uses an PC circuit at its input
1058) Programs that extend the capabilities of a server are C41 scripts
1059) The primary goal of ISDN is the integration of voice services and non-voice services
1060) Flow control in OSI model is done by transport layer
1061) The optical links between any two SONET devices is called a section
1062) A user can get files from another compute on the internet by using FTP
1063) The key fields which are tested by a packet filtering firewall are source IP address ,
TCP/UDP source port, destination IP address
1064) The server on the internet is also known as gateway
1065) VBScript can perform calculation of data

1066) In MS-Word, ‘mail merge’ can be defined writing a letter once and dispatching it to a
number of recipients
1067) Coaxial cables are good for digital transmission and long distance transmission
1068) LRU is a page replacement policy used for memory management
1069) Commercial TV is an example of distributive services with user control
1070) The exact format of frame in case of synchronous transmission depends on whether
transmission scheme is either character oriented or bit oriented
1071) RING topology is least affected by addition/remove of a node
1072) EX-OR gates recognizes only words that have an odd number of 1

1073) To interconnect two homogenous WAN’s we need a router


1074) Co-axial cables provides data rates over 50 mbps
1075) The outermost orbit of an atom can have a maximum of 8 electrons
1076) The protocol for sharing hypertext information on the world wide web is HTTP

1077) ISDN’s basic rate interface (BRI) is also known as 2 D + B


1078) The mode of data transmission of unshielded twisted pair cable is full duplex
1079) Data accuracy is not done by modem
1080) Query is used to answer a question about a database
1081) AM and FM are examples of analog to analog modulation
1082) Redundancy is the concept of sending extra bits for use in error detection
1083) The physical layer is concerned with transmission of bits over the physical medium
1084) The number of input lines required for a 8 to 1 multiplexes is 8
1085) The bar-code (rectangular pattern of lines of varying width and spaces) used for
automatic product identification by computer
1086) FSK is most affected by noise
1087) Stack is a LIFO structure
1088) CPU is not an input device of a computer
1089) Program of a computer presented as a sequence of instructions in the form of binary
numbers is called machine language
1090) Possible problems with java scrip can be security or limited graphics and multimedia
capabilities
1091) For locating any document on the WWW. There is a unique address known as URL
1092) Design view would use to define a table and specify fields
1093) Traversal process is faster for threaded trees compared with their unthreaded
counterparts
1094) The command used to display help on any particular command is man
1095) In C++ programming, the extension of program is .cpp
1096) A generic team that refers to the combination of all commercial transactions executed
over electronic media for the exchange of product and services
1097) In DOS, the command used to create a new file is called copy con
1098) Backup helps you to create a copy of the information on your hard disk and saves
original data in case data on your computer got damaged or corrupted due to
malfunctioning of hard-disk
1099) LAN is usually privately owned and links the devices in a single office, building or
campus
1100) In justified type of alignment, text gets aligned along both left and right margins
1101) The internal programming language for a particular chip is called machine language
1102) The inner core of an optical fiber is glass and plastic in composition
1103) When a small amount of trivalent impurity is added to a pure-semiconductor it is called
P-type semiconductor
1104) In MS-Access, a table can have one primary key/keys
1105) In DOS, Deltree command is used to delete all the files as well as sub-directories of a
directory
1106) Netscape navigator is a web-browser
1107) Multiplexing involves one path and one channel
1108) Table, form, queries, reports, macros, modules are objects in an access database
1109) The clown command in UNIX changes home directory of a user
1110) BCD stands for binary coded decimal
1111) When we run a program in HTML coding, notepad is used as backend and
internetexplorer works as front end
1112) If the M bit in X.25 standard is set to 1, it means that thee is more than one packet
1113) The modem is a device that connects n input stream outputs
1114) Array is linear data structure
1115) A T.V. broadcast is an example of simplex transmission
1116) Search engine will search its database to find items whose tent contains all or at least
one of the words given to it

1117) In UNIX, command “! $” is used to repeat entire less command line


1118) PCM is an example of analog to digital
1119) A simple protocol used for fetching an e-mail from a mailbox is POP 3
1120) For a small web site, one needs to buy space from the ISP
1121) An operating system that acts as an intermediary between user and computer
hardware

1122) Attair, the world’s first personal computer, was introduced in the year 1979
1123) Half duplex data flows in both directions, but any one direction at the time
1124) Ring requires a central controller or hub
1125) The OSI model consists of seven layers
1126) The main job of one of the following is to allocate CPU to processes scheduler
1127) 10,500 valid Min & Max zoom sizes in MS office
1128) Before printing a document you should always use print preview
1129) Excel XP is the latest version of excel
1130) A worksheet can have a maximum of 256 number of rows
1131) Character is not a valid data type in Excel
1132) Formula bar in an Excel window allows entering values and formulas
1133) Direct memory access is a technique for transferring data from main memory to a
device without passing it through the CPU
1134) 5 30-bit SIMMS are required to populate a bank on a 486 system that has a 32-bit
data bus

1135) SRAM uses a clock to synchronize a memory chip’s input and output signal
1136) Cycle-stealing type of DMA transfer will operate when a CPU is operating
1137) A series 100 POST error code indicates a problem with the system board
1138) You have an old PC that you decide to upgrade with a 1 gig IDE hard drive. You find
that you can’t configure CMOS to see the entire hard drive. The best you can do is
540 meg. Then use a device driver that makes the bios see the drive as
1139) When SHADOWING is enabled in computers BIOS Instructions stored in various
ROM chips are copied into
1140) POST stands for power on self test
1141) Checking the hard disk while running Windows 3.1, you discover a very large file
called 396SPART.PAR. That file is windows permanent swap file
1142) CMOS contains the computer BIOS and maintains its data with the use of a battery for
periods when the system is powered down
1143) TSR stands for terminate and stay
1144) LAN is not an inter network
1145) Memory is temporary and storage is permanent
1146) Echo checking cannot assure data accuracy in an application
1147) Focus on manual records is not necessary for computerization system in a bank
1148) Permanent establishment, residence-based, Income based classification are the
approaches used to tax online transactions
1149) Computer of computer communication for business transactions is called EDI
1150) Client-server computing is used in Network multi-media
1151) Back up of files is taken for security
1152) Operating system is not a software category
1153) Computer program looking “normal” but containing harmful code is infected by Trojan
horse
1154) Private key is used to append a digital signature
1155) Most dangerous risk in leaking of information is ignorance about the existence of risk
1156) IMAP (Internet message access protocol) takes care of E-mail at client side
1157) The CPU has control unit, arithmetic-logic unit and primary storage
1158) 1st generation computer is the bulkiest PC
1159) E-R diagram represents relationship between entities of system
1160) User is technically least sound
1161) Minicomputers is not there during fourth generation computer
1162) Microchip is unique to a smartcard
1163) Internet was started as network for defences forces of America
1164) A program permanently stored in hardware is called firmware
1165) Taking back-up of a file against crash is a curative measure
1166) Simplex transmission technique permits data flow in only one direction
1167) Front end processor relieves the host computer from tedious jobs and does them
itself

1168) Software can’t be touched


1169) Physical access to a database can be altered by hiring procedure
1170) The sound signal carried by telephone line is analog
1171) All decisions for LAN are taken by the IT steering committee
1172) An input device gives data to a computer
1173) Correction of program is done by debugging
1174) File transfer is the function of the application layer
1175) A policy on firewalls need not ensure that is logically secured
1176) A modem performs modulation, demodulation, data compression
1177) Personnel security does not fall under the category of operations to be performed
during development of software
1178) CASE tool cannot help with understanding requirements
1179) UPC cannot be used for source of data automation
1180) The banks are MICR device to minimize conversion process
1181) MP3 files cannot be navigated using ClipArt browser
1182) Close option in File pull-down menu is used to close a file in MSWord
1183) 3 ½ is the size of a standard floppy disc
1184) When entering in a lot of text in capitals you should use the caps lock key
1185) Files created with Lotus 1-2-3 have an extension 123
1186) Contents, objects, Scenarios of a worksheet can be protected from accidental
modification
1187) Device drivers that are loaded in windows 3.X are loaded into the sytem.ini file

1188) 30 pin SIMM’s, 72 pin SIMM’s, 168 pin DIMM’s types of RAM sockets can be seen on
mother boards
1189) The Power on self test determines the amount of memory present, the date/time, and
which communications ports and display adapters are installed in a microcomputer
1190) Virtual memory refers to using a file on the hard disk to simulate RAM
1191) BIOS (ROM) is considered firmware
1192) A population application of computer networking is the WWW of newsgroup called
Netnews
1193) a = 10; export a is a valid command sequence in UNIX
1194) Set date will you give in UNIX to display system time
1195) Circuit switched network networks requires that all channels in a message
transmission path be of the same speed
1196) The Vi program available under UNIX can be created to open a virtual terminal
1197) A 4-bit ring counter is initially loaded with 1001
1198) The standard defined for fiber optics is 802.8
1199) Digitizers can be converted from “dumb” to “smart” through the addition of a
microprocessor
1200) The extension of database file is given by dbf
1201) VRML code is based on Unicode
1202) Use net discussion groups have their own system of organization to help you find
things just as internet excel
1203) Http protocol is used for WWW
1204) Protocol conversion can be handled by gateway
1205) In ISDN teleservices, the network can change or process the contents of data
1206) A longer instruction length may be -1024 to 1023
1207) A microprocessor is a processor with a reduced instruction set and power requirement
1208) The term server refers to any device that offers a service to network users
1209) Using HTML, Front page, DHTML we can make web-site
1210) Usually security in a network is achieved by cryptography
1211) PSTN stands for public switched telephone network
1212) A thyratron cannot be used as a amplifier
1213) An input device conceptually similar to mouse is joystick
1214) Netscape navigator and other browsers such as the internet explorer are available
free on the internet
1215) In MS-logo Bye command is used to come out from that screen
1216) In C++ programming, the command to save the program file is F3
1217) Data lines which provide path for moving data between system modules are known as
data bus
1218) Bubble sort technique does not use divide and conquer methodology
1219) The OSI model shows how the network functions of computer to be organized
1220) A 8 bit microprocessor must have 8 data lines
1221) A protocol that permits the transfer of files between computer on the network is FIP
1222) A data structure, in which an element is added and removed only from one end is
known as stack
1223) In linked list, the successive elements must occupy contiguous space in memory
1224) In OSI model reference, layer 2 lies in between the physical layer and the network
layer
1225) In synchronous TDM, for n signal sources, each frame contains at least n slots
1226) Mouse and joystick are graphic input devices
1227) In linked list, a node contains at least node number, data field
1228) Gopher is not a web browser
1229) Device drivers controls the interaction between the hardware devices and operating
systems
1230) The shortest path in routing can refer to the least expensive path
1231) An ordinary pen which is used to indicate locations on the computer screen by
sensing the ray of light being emitted by the screen, is called light pen
1232) Netiquettes are some rules and regulations that have to be followed by users
1233) Gateway uses the greatest number of layers in the OSI model
1234) A set of standards by which servers communicate with external programs is called
common gateway interface
1235) UNIVAC is a computer belonging to third generation
1236) API allows a client/server relationship to be developed between an existing host
application and a PC client
1237) Semi-insulator is a substance which has resistivity in between conductors and
insulators
1238) Multi vibrator is a two stage amplifier with output of one feedback to the input of the
other
1239) Macro is used to automate a particular task or a series of tasks
1240) Internet is network of networks
1241) A set of devices or combination of hardware and software that protects the systems
on one side from system on the other side is firewall
1242) Simple, transparent, multi post are bridge types
1243) When bandwidth of medium exceeds the required bandwidth of signals to be
transmitted we use frequency division multiplexing
1244) Direct or random access of element is not possible in linked list

1245) In Dos, the “Label” command is used to display the label of disk
1246) At the lower end of electromagnetic spectrum we have radio wave
1247) In Word, Ctrl + Del combination of keys is pressed to delete an entire word
1248) Plotters are very useful in applications such as computer aided design
1249) Web browser is a type of network application software
1250) 65535 characters can be typed in a single cell in Excel
1251) Overtime analysis is useful for formulating personnel policies and derived form the
payroll system
1252) Multiple worksheets can be created and used at a time
1253) UNIX is both time sharing and multiprogramming system
1254) Floppy Disk is universal portable and inexpensive but has its own limitation in terms of
storage capacity and speed
1255) Personal computers currently sold in India have main memories at an entry level in
the range of megabytes
1256) UNIX has better security for files relative to MS-DOS
1257) The UNIX operating system has been written in C language
1258) Syntax errors is flagged by compilers
1259) PARAM is an example of super computer
1260) Mother board holds the ROM, CPU, RAM and expansion cards
1261) CD-ROM is as a magnetic memory
1262) The binary number system has a base 2
1263) GUI is used as an interface between software and user
1264) E-mail is transaction of letters, messages and memos over communications network
1265) Device drivers are small , special purpose programs
1266) LAN refers to a small, single site network
1267) One megabyte equals approximately 1 million bytes
1268) Magnetic tape is not practical for applications where data must be quickly recalled
because tape is a sequential access medium
1269) User id, URI and time stamp is not used by organization when a user visits its site
1270) DBRM takes care of storage of data in a data base
1271) Plotters give the highest quality output
1272) Encrypting file system features of windows XP professional operating system protects
the data of a user, even if the computer is shared between users
1273) Loading is not required for high level language program before it is executed
1274) Top – bottom approach cannot be the measure of network traffic
1275) Devices such as magnetic disks, hard disks, and compact disks, which are used to
store information, are secondary storage devices
1276) Various input and output devices have a standard way of connecting to the CPU and
Memory. These are called interface standards
1277) The place where the standard interfaces are provided to connect to the CPU and
Memory is known as Port
1278) Binary numbers are positional numbers
1279) The base of the hexadecimal system is sixteen
1280) Display capabilities of monitor are determined by adapter card
1281) Mouse has a use in graphical user interface and applications as input device
1282) Drum plotter, flat bed plotter, graphic display device is an output device
1283) The time taken to write a word in a memory is known as write name
1284) 1 MB is equivalent to 2 (to the power of 20 bytes)
1285) A memory cell, which does not loose the bit stored in it when no power is supplied to
the cell, is known as non-volatile cell
1286) Magnetic surface recoding devices used in computers such as hard disks, floppy
disks, CD-ROMs are called secondary / auxiliary storage devices
1287) The electronic circuits / devices used in building the computer that executes the
software is known as hardware
1288) Assembler is a translator which translates assembly language program into a machine
language program
1289) Interpreter is a translator which translates high level language program into a machine
language program
1290) Machine language programs are machine dependent
1291) The programs written in assembly language are machine independent
1292) High level languages are developed to allow application programs, which are machine
independent
1293) The Vacuum tubes are related to first generation computers
1294) Mark I was the first computer that used mechanical switches
1295) First generation computers relied on machine language to perform operations, and
they only solve one problem at a time
1296) In first generation computers input was based on punched cards
1297) In second generation computers input was based on print outs
1298) Vacuum tube generates more energy and consumes more electricity
1299) Second generation computers moved from cryptic binary machine language to
symbolic, or assembly languages which allowed programmers to specify instructions
in words
1300) Most electronic devices today use some form of integrated circuits placed on printed
circuit boards thin pieces of bakelite or fiberglass that have electrical connections
etched onto them is called mother board
1301) The operating system, which allowed the device to run many different applications at
one time with a central program that monitored the memory was introduced in third
generation computers
1302) In third generation computers, users interacted through keyboards and monitors
1303) The fourth generation computers saw the development of GUIs, the mouse and
handheld devices
1304) First computers that stored instructions in memory are second generation computers
1305) In second generation computers transistors replaced vacuum tubes
1306) The micro processor was introduced in fourth generation computer
1307) Integrated Circuits (IC) are introduced and the replacement of transistors started in
third generation computers
1308) Fifth generation computing is based on artificial intelligence
1309) Assembly language is low-level language
1310) In assembly language mnemonics are used to code operations, alphanumeric
symbols are used for address, language lies between high-level language and
machine language

1311) The computer’s secondary memory is characterized by low cost per bit stored
1312) Acknowledgement from a computer that a packet of data has been received and
verified is known as ACK
1313) Acoustic coupler is a communications device which allows an ordinary telephone to be
used with a computer device for data transmission
1314) ALGOL is a high-level language
1315) A high level programming language named after Ada Augusta, coworker with Charles
Babbage is Ada
1316) Adder is a logic circuit capable of forming the sum of two or more quantities
1317) To identify particular location in storage area one have a address
1318) A local storage register in the CPU which contains the address of the next instruction
to be executed is referred as address register
1319) A sequence of precise and unambiguous instructions for solving a problem in a finite
number of operations is referred as algorithm
1320) PC/AT is an example of Bi-directional keyboard interface
1321) DIMM is not an I/O bus
1322) PCI bus is often called as mezzanine bus
1323) 8088 is an original IBM PC inter CPU chip
1324) 80386 is a 32-bit processor
1325) A Pentium or Pentium pro board should run at 60 or 66 MHZ
1326) The maximum bandwidth of EISA bus is 33 M/sec
1327) A computer system runs millions of cycles per second so that speed is measured in
MHz
1328) Heat sink is the metal device that draws heat away from an electronic device
1329) Pentium chip has 64 bit & 32 bit registers
1330) A mother board should contain at least 4 memory sockets
1331) The 1.2 MB drive spin at 360 rpm
1332) Intensity of sound is called amplitude
1333) A single zero bit is called starting bit
1334) PnP stands for plug and play

1335) A computers system’s clock speed is measured as frequency


1336) Maximum RAM of XT type is 1 M
1337) The data in 8 bit bus is sent along 8 wires simultaneously in parallel
1338) The bus is simple series of connection that carry common signals
1339) Mainly memories are divided into two types they are logical memories and physical
memories
1340) System based on the new Pentium II processor have the extended memory limit of 4G
1341) Full form of EMS memory is excluded memory specification
1342) The 286 & 386 CPU have 24 address lines
1343) Bus has both the common meaning and computer meaning
1344) Data on a floppy disk is recorded in rings called tracks
1345) A group of characters that have a predefined meaning database
1346) In a spreadsheet a cell is defined as the intersection of a row and column
1347) Document file is created by word processing programs
1348) Real time is not a type of error
1349) The mouse device drivers, if loaded in the config.sys file, its typically called mouse.sys
1350) Peer to peer means computer to computer
1351) RLL refers to run length limits
1352) The most important aspect of job scheduling is the ability to multiprogramming
1353) Modem is a modulator-demodulator system
1354) A data communication system requires terminal device, communication channel,
protocols
1355) The start button appears at the lower left of the screen
1356) Windows is GUI
1357) TIF stands for tagged image format
1358) The first network that initiated the internet is ARPANET
1359) In modems a digital signal changes some characteristic of a carrier wave
1360) Favorites are accessible from the start menu
1361) The virus is a software program

1362) BANK’S is not memory chip


1363) We use RAM code to operate EGA
1364) A scanner is attached to LPT or SCSI host adapter port
1365) RAM bus is not a bus
1366) Processor bus is the fastest speed bus in system
1367) Resolution is the amount of detail that a monitor can render
1368) Sound blaster is a family of sound cards sold by creative labs
1369) MIDI is a family of sound cards sold by creative labs
1370) MIDI is a standard for connecting musical instruments to PC’s
1371) By connecting a MIDI cable to the joystick port you can connect your PC to a MIDI
device
1372) MPC stands for multimedia personal computer
1373) Video cards, video and graphics card are example of video & audio
1374) The display technology used by monitor is CRT
1375) On a LAN each personal computer is called workstations
1376) The CPU is the next most important file server after the hard disk
1377) It is best to use the game adaptor interface on the sound card and disable any other
on system
1378) Mouse port uses keyboard controller
1379) The number of sectors per track in 1.44 MB floppy disk is 18
1380) Pentium II system can address 62 G memory
1381) The mouse was invented by Englebart

1382) The server’s network adapter card is its link to all the work stations on LAN
1383) Magnetic drives such as floppy and hard disk drives operate by electro magnetism
1384) Clock timing is used to determine that start and end of each bit cell
1385) Head designs are of 4 types
1386) Latency is the average time that it takes for a sector to be a available after the heads
1387) Each sector is having 512 bytes
1388) DDD means digital diagnostic disk
1389) PC Technical is written in assembly language and has direct access to the system’s
hardware for testing
1390) Check it pro deluxe gives detailed information about the system hardware
1391) The last 128k of reserved memory is used by mother board
1392) There are 80 cylinders are there for an 1.44 m floppy
1393) IBM changed ROM on the system to support key boards
1394) +12 V signal for disk drive is used for power supply

1395) CD ROM’s are single sided


1396) The storage capacity of a CDROM is 650 MB
1397) XGB has 2048 K graphic memory
1398) Most sound boards generate sounds by using fm synthesis
1399) Microscope helps you trouble shoot PS/2 system
1400) General purpose of diagnostic program run in batch mode
1401) The routing of data elements are called bits
1402) Operating system often called as kernel
1403) IPC stands for inter process communication
1404) Many programming errors are detected by the hardware
1405) When a process exists, he operating system must free the disk space used by its
memory image
1406) Buffering attempts to keep both CPU and I/O device busy all the time
1407) Software is not an example of file mapping
1408) The most important aspect of job scheduling is the ability to multiprogramming
1409) There are two types of floppy disks
1410) System calls can be grouped into three major categories

1411) “FIFO” stands for first in first out


1412) In the two-level directory structure, each user has its own user file directory
1413) The number of bytes in a page is always a power of 2
1414) A process that does not determinate while the operating system is functionary is
called dynamic
1415) The three main types of computer programming languages are machine language,
assembly language, high level language
1416) There are 2 types of processor modes
1417) An input device is an electromechanical device that generates data for a computer to
read
1418) The first implementation of UNIX was developed at Bell Telephone Laboratories in the
early 1970
1419) A connection less protocol is more dynamic
1420) The throughput is a measure of work for processor
1421) COBOL stands for common business oriented language
1422) Reset button is used to do cool booting
1423) In MS-EXCEL the no of rows, no of columns are 16384,256
1424) FOXPRO is a package and programming language
1425) Mostly used date format in computer is MM-DD-YY
1426) Reservation of train ticket uses real time mode of processing
1427) A floppy disk is a thin plastic disc coated with magnetic oxide
1428) In binary addition 1+1 = 1
1429) Universal building blocks of a computer system are NAND & NOR
1430) In COBOL programming characters length per line is 64
1431) In FOXPRO, the maximum fields in a record are 128
1432) QUIT command is used to come out of FOXPRO
1433) Count command is used to count the specified records in a file with or without
condition
1434) F1 key is pressed for help in FOXPRO
1435) One Giga byte = 1024 mega bytes
1436) Small scale integration chip contains less than 12 gates
1437) The most common monitor sizes are 14, 15, 17
1438) IBM PC and DOS has BIOS support for 3 LPT ports
1439) EDO stands for external data organizer
1440) The number of wires in IDE Hard Disk cable are 16
1441) If the data transfer rate is 150 k/sec then it is called single speed
1442) A typical buffer for a CD-ROM drives 156 K
1443) The 2.88 M floppy drives have 36 no of sectors
1444) 1 MB is equal to 2 (to the power of 10 KB)
1445) ROM is a primary storage device
1446) The process of loading and starting up DOS is called booting
1447) The Dos Prompt is mainly C:\>
1448) C:\>ver is used for displaying current version name

1449) Intel 440x “Natoma” is an example for mother board chipset


1450) Direct memory access channels are used by medium speed communication devices
1451) The 486 Sx chip is twice as fast as a 386 Dx with same clock speed
1452) On a 286 or 386 sx system, the extended memory limits 16M
1453) The 385 Dx, 386 CPU have 32 address lines
1454) Shared memory does require 16 K of VMA space

1455) DIMM’s are 168 pin modules


1456) The function of +12V power supple is to run disk drive motors and also cooling fans
1457) SPS generally referred as rechargeable batteries
1458) Parallel interface is not the interfaces that can be used to connect the mouse to the
computer
1459) The mouse interrupts usually occurs if the system uses a mouse port
1460) The video adapter BIOS handles communication between the Video Chipset & Video
Ram
1461) Pentium pro CPU’s have full of 323, they can track of 44 G of memory in address lines
1462) The processor bus is the communications path way between CPU and immediate
support chip
1463) VL-bus can move data 32 bit at a time
1464) A modem attached to system on COM ports
1465) Horizontal scan refers to the speed at which the electron beam across the screen
1466) RGB monitor display 80 column text
1467) When transition changes from negative to positive the head would detect positive
voltage spike
1468) Animation means to make still picture, move and talk like in cartoon pictures
1469) Analogues: The use of a system in which the data is of a continuously variable
physical quantity such as voltage or angular person
1470) Animation: A simulation of movement created by displaying a series of pictures or
frames
1471) Application means a piece of software designed to meet a specific purpose
1472) Active X is a model for writing programs. Active X technology is used to make
interactive Web pages that look and behave like computer programs, rather than static
pages. With Active X, users can ask or answer questions, use push buttons, and
interact in other ways with the web page
1473) Batch processing is a technique in which a number of similar items or transactions are
processed in groups or batches during a machine run
1474) BIS: Bureau of Indian Standards. It is a national organization of India to define
standards

1475) Browser is a link between the computer and the internet. It’s actually a program that
provides a way to look in the hand interact with all information on the internet. A
browser is a client program that uses the Hypertext Transfer Protocol (http) to make
requests of Web servers throughout the Internet on behalf of the browser user.
1476) CIO (Chief information officer) : The senior executive in a company responsible for
information management and for delivering IT services
1477) Client/server architecture: A type of network in which computer processing is
distributed among many individual PCs and a more powerful, central computer clients
can share files and retrieve data stored on the server
1478) Collaborative software: Groupware, such as Lotus Notes or Microsoft Exchange
1479) Computer-Aided design: Refers to any computer-enabled method of design also
called computer-assisted design.
1480) Commuter: A group of electronic device used for performing multipurpose tasks
1481) Channel: It consists of controller card, interface cable and power supply
1482) CORBA: CORBA is the acronym for Common Object Request Broker Architecture
1483) CBT: Computer based training
1484) Certification: Skills and knowledge assessment process
1485) Computer Crime: The act of stealing, cheating or otherwise defrauding an
organization with the use of a computer
1486) Cyber café: Café offering internet browsing facility
1487) Cryptography: Method used to protect privacy and security on the internet
1488) DBMS: An acronym for the database management system. A program that maintains
and controls the access to collection of related information in electronic files
1489) Data: Facts coded and structured for subsequent processing, generally using a
computer system
1490) Digital signature: Encrypted signature used for providing security for the
messages/data transferred through the internet
1491) Digital computer: A device that manipulates discrete data and performs arithmetic and
logic operations on these data
1492) Data transmission: The movement of data from one location of storage to another. If
the locations are geographically far away, generally done via satellites.
1493) Disk Mirroring: The data is written on two or more hard disks simultaneously over the
same channel
1494) Disk Duple Xing: The data is written on two or more hard disks simultaneously over
the different channel
1495) Dumb Terminals: Hardware configuration consisting of a keyboard and monitor that is
capable of sending and receiving information but has no memory or processing
capabilities.
1496) Download: Process of transferring a file system from one system to another
1497) E-commerce: Business transactions conducted over extranets or the internet
1498) Enterprise, resource planning: An integrated system of operation application
combining logistics, production, contract and order management, sales forecasting
and financial and HR management
1499) Electronic data interchange (EDI) : Electronic transmission or documents through
point to point connections using a set of standard forms, message and data elements,
this can be via leased lines private networks or the internet
1500) Data processing: It is a method concerning with the systematic recording, arranging,
filing, processing and dissemination of facts of business

JOIN US ON
हमारे टे लीग्राम चैनल से जुड़ने के ललए यहाां क्ललक करें –
CLICK HERE
हमारे यूट्यूब चैनल से जुड़ने के ललए यहाां क्ललक करें -
CLICK HERE
हमारे इांस्टाग्राम पेज से जुड़ने के ललए यहाां क्ललक करें -
CLICK HERE
ASHUTOSH SHUKLA OFFICIAL

- COMPUTER ONE LINER-

JOIN US ON
- COMPUTER ONE LINER -
➤ WORM stands for? - Write Once Read Memory

➤ Memory unit is a part of -Central Processing Unit

➤ companies developed MS Office-2000? - Microsoft

➤ What is the meaning of ‗MICR‘? -Magnetic Ink Character Recognition

➤ VIRUS stands for -Vital Information Resource Under Seize

➤ The technique that extends storage capacities of main memory beyond the actual size of the main
memory is called - Virtual storage

➤ Command we can use to close the windows. - Alt+F4

➤ Algorithm is used ------- -To describe a set of procedure by given result is obtained

➤ FOXPRO is a ---------. -Language

➤ Who is considered to the father of computers? -Charles Babbage

➤ will connect you to the Internet? -An Internet service provider

➤ What software allows you to view internet sites? - A browser

➤ When more than one window is open, to switch to the next window—is the key combination. -

CTRL+F6

➤ Where are data and program stored when the processor uses them ? - Main memory

➤ Represents raw facts, where- as.................is a meaningful data. - Data, information

➤ Saving is a process-To copy the document from memory to storage medium

➤ PNG stands for - Portable Network Graphics

➤ The maximum Zoom percentage in MS PowerPoint is . -400%

➤ The word FTP stands for - File Transit Protocol

➤ A peer-to-peer LAN is an appropriate network architecture for .- Home network.

➤ Similar to a hub in an Ethernet network, a helps relay data between wireless


network nodes. -Wireless access point wireless adapter

➤ Cell phones use to access the Internet. - Micro browser software

➤ In CSMA/CD, the computer sends a fixed unit of data called a(n) . - Packet.

SUBSCRIBE US ON YOUTUBE - ASHUTOSH SHUKLA OFFICIAL

➤ The uniform resource locator (URL) is case sensitive in the . - Directory

➤ ASCII is a(n) . -Encoding standard used to represent letters and characters.

➤ A global network made up of thousands of privately owned computers and networks is called

the: -Internet.

➤________ is NOT a basic function of the operating system?- Provide the word processing

system.

➤________ scrambles a message by applying a secret code?-Encryption

➤ The Internet began with the development of –ARPANET

➤ Who designed the first electronic computer - ENIAC ? -Van Neuman

➤________ is not a network? -Optical Fiber

➤ In MICR, C stands for?-Character

➤ Virtual memory is? Memory on the hard disk that the CPU uses an extended RAM

➤________ is the process of finding errors in software code? -Testing

➤ What is the shortcut key to "Undo" the last action in a document? -Ctrl + Z

➤ The programs which are as permanent as hardware and stored in ROM is known as –Firmware

➤ For creating a document, you use........ Command at File Menu. -New

➤ Computer uses the _number system to store data and perform calculations. -Binary

➤ .............. is the process of carrying out commands. -Executing

➤ In word, when you indent a paragraph, you....-push the text in with respect to the margin

➤ ASCII stands for . American Standard Code for Information Interchange

➤________ is used by the browser to connect to the location of the Internet resources ? URL
➤________ is the process of dividing the disk into tracks and sectors. Formatting

➤ What is the permanent memory built into your computer called ? -ROM

➤ Which computer memory is used for storing programs and data currently being processed by

the CPU?

➤ Changing an existing document is called the document.- Editing

➤ What is backup?-Protecting data by copying it from the original source to a

Different Destination

➤ What is a popular program for creating documents that can be read on both a PC and A Macintosh
computer? -Adobe Acrobat

➤ An image on a computer screen is made up of a matrix of what?-Pixels

➤ What does dots per inch (DPI) measure? -density of the pixels ona computer screen

➤ What type of software creates a smaller file that is faster to transfer over the Internet?

- Compression

➤ A unit of computer information that contains data as well as all the procedures or operations

is called- An object.

➤ The world's first truly cross-platform programming language is called . –Java

➤ The most widely used type of database management system is the - Relational database

➤ What is the newest type of database, which is well suited for multimedia applications, called?

Object oriented database

➤ What do the circles on a data flow diagram represent? - Transformation processes

➤ The type of printer that prints by selectively unchanging static electricity from spots on a

metal drum is a(n) - Laser printer

➤ A warm boot in older versions of Windows is caused by - Typing the Ctrl+ Alt+ Delete

key combination

➤ Setting fonts for the text in your document is an example of -Formatting.


➤________is the file system used by the operating system to identify the physical locations

of files on the hard drive. - FAT

➤________ software allows the user to speak into the computer rather than type in text. -

Speech recognition

➤ A server uses applications software to support its client computers. - back-end

➤ What does the XP stand for in Windows XP? –Experience

➤ Which symbol is used in Excel to denote exponential numbers? - ^

➤________ is NOT a source of viruses?- E-mail messages

➤ Which printer type is an impact printer? - Dot-matrix printers

SUBSCRIBE US ON YOUTUBE - ASHUTOSH SHUKLA OFFICIAL

➤ What type of software must to be used to translate scanned text into a format that can

be manipulated?- OCR

➤ High Resolution‖ computer monitors will have - High dpi

➤ A world wide web contains web pages - Residing in manycomputers linked

together using HTML

➤ Word processing, spreadsheet, and photo-editing are examples of . -

application software

➤ Retail employees typically use terminals to process sales transactions. - point

of sale

➤ The primary purpose of a computer is to process _ and convert it into

information.- data

➤ The simultaneous processing of two or more programs by multiple processors is - multiprocessing

➤ Help Menu is available at which button? - Start

➤ The……….folder retains copies of messages that you have started but are not yetready to send.

Drafts
➤ The records the name and exact location of every file on a disk. - file

allocation table

➤ Inheritance is the ability of an object to pass on its characteristics to its . - Subclasses

➤ activities is NOT a component of e-business? - Cash flow management

➤ extends data across networks rather than store it in one central site?.-

Distributed database

➤ What is a serial port that adds a direct connection to a network? - NIC

➤________is saved to noncontiguous clusters on a hard disk? - Fragmented file

➤ What should be used if a company wants to include its company name and logo at the

bottom of every page of a brochure?-Footer

➤________is an event-driven programming language developed in the early 1990. - VB

➤ Linux is a - Real-time operating system

➤ The runs the front-end applications software in a network. -Client

➤ is used for close a tab on a browser? - Ctrl + W

SUBSCRIBE US ON YOUTUBE - ASHUTOSH SHUKLA OFFICIAL

➤ What is RISC? - Microprocessor

➤ NORTON‘ is an - Anti-Virus Program

➤ A program that converts high level language to machine Language is _ -Compiler

➤ Zip is a -----file. -Compressed File

➤ At a time how many operating system can be at work on a computer ? -Only one

➤ Answer Sheets in bank PO‘s/Clerk‘s examinations are checked by using – Optical Mark Reader

➤ Image can be sent over telephone lines by using ------ -Fax

➤________is a Scientific Computer Language? -FORTRAN

➤ What is Oracle‖ ?-Database Software

➤ IC Chip is made of -----.-Silicon


➤ At which place is India‘s Silicon Valley situated? -Bangalore

➤ A connection from one HTML document to another HTML document

is called - Hyper Link

➤ This device is used to connect your computer with a telephone line, so that can

access information from other servers and ordinary users too, said device is called - Modem

➤ Device on one network can communicate with devices on another network via - Gateway

➤ The screen background is known as the -Desktop

➤ is not an input device? - VDU

➤ What are the units used to count the speed of a printer ? - DPI

➤ A computer that combines the characteristic of analog and

digital Computers -Hybrid Computer

➤ Compiler in computer system is a . - Process

➤ What is an intersection of a row and column in a spreadsheet?-Cell

➤ What is the process of creating movement from still images?-Animation

➤ A set of rules for creating markup languages that enables programming to capture specific

types of data by creating their own elements is called . – XML

➤ Small plain text files that are written to your computer's hard disk by many of the Web

sites you visit are called . - Cookies

➤________ is the proper way to denote a cell in a spreadsheet? - C5

➤ Which broadband service is the most available? - Satellite

➤________ is a set of rules computers use to talk to each other.- Protocol

➤ Which backup method only backs up files that have been modified since the last backup?-

Incremental backup

➤ Which type of transmission media is known as regular telephone wire? - Twisted-pair wire

➤ What is the purpose of a firewall on a computer? - To protect a computer from unauthorized access
➤ A disk's content that is recorded at the time of manufacture and that cannot be changed

or erased by the user is _ . - Read-only

➤ In word, you can change Page Margins by - Clicking the right mouse button on

the Ruler

➤ Which part of the computer helps to store information? - Disk - drive

➤ Which key is used to delete one character to the left of the current position of the cursor ? -

Backspace

➤ If you want to connect to your own computer through the Internet from another

location, you can use– Telnet

➤ A (n) ……….is a special visual and audio effect applied in Power-point to text or content. -

Animation

➤ Where does most data go first with in a computer memory hierarchy?–RAM

➤ All of the following are examples of storage devices EXCEPT - printers

➤ Select the Odd one - Operating system

➤ Perforated paper used as input or output media is known as - Paper tape

➤ The first generation computer system used - Vacuum tubes

➤ To access properties of an object, the mouse technique to use is - right-clicking

➤ The ALU and Control Unit jointly known as - CPU

➤ Computers process data into information by working exclusively with - characters

➤ COBOL stands for - Common Business Oriented Language

➤ What is the other name for programmed chip?-ROM

➤ Store data temporarily and pass it on as directed by the control unit. - Register

➤ RAID stands for - Redundant Array of Inexpensive Disks

➤ In most Microsoft programs, what does 'alt+f4' do? -Ends the program

➤ A device that is used to transmit data from one location to another is known as - Carrier
➤ Programs developed by an outside supplier and provided to the user in a machine readable

form is known as _ -Canned programs

➤ describe one or more characteristics of a modem computer - .An electronic device

➤ Octal number system has a base _. - Eight

➤ PL 1 (Programming Language One) Is _. - High level programming Language

➤________is a disadvantage of machine language? -Machine Dependent

➤ Android Operating system is an example of which kind of Source Model?- Open Source

➤ You can use the tab key to - Indent a paragraph

➤ Which process checks to ensure the components of the computer and operating are

connected properly? - Booting

➤ What is the correct association between a hardware component and a computer function? -

Mouse > input

➤ The sharing of a medium and its path by 2 or more devices is called . - Multiplexing

➤ The server on the internet is also known as . - Host

➤ A database management system (DBMS) is a - Software system used to

create, maintain and provide controlled access to a database.

➤________ is an example of connectivity? - Internet

➤ What menu is selected to cut, copy and paste? -Edit

➤ To save a document in different location use . - Save as

➤ Programming language built into user programs such as Word and Excel are known as

.- visual programming languages

➤ Codes consisting of lines of varying widths or lengths that are computerreadable are

known as .- a bar code

➤ To reload a Web page, press the button. - Refresh

➤ Personal computers can be connected together to form a .- network


➤ Eight-digit binary number is called a . - byte.

➤________ can be used to select the entire document? - CTRL+A

➤ A concentric circle on a disk is called a - track

➤ DSL is an example of a(n) connection. -broadband

➤ Instructions and data that are processed by the CPU are located in . –RAM

➤ All of the following are considered to be storage devices EXCEPT . - CPU

➤ The commonly used UNIX commands like date, ls, cat etc. are stored in . - bin directory

➤ A circuit with about 100 transistors fabricated on a single chip is called .- MSI

➤ One megabyte equals approximately -1 million bytes

➤ A computer checks the of user names and passwords for a match before granting access.

- Data base

➤ Computers that are portable and convenient for users who travel are known as _ -

Laptops

➤ What is the term for unsolicited e-mail? – Spam

➤ The tells the computer how to use its components. - Operating system

➤ When sending an e-mail, the line describes the contents of the message. - Subject

➤ The key will launch the start buttons. – Windows

➤ What is the ultimate purpose of Defragmentation? - Create More Free Space

➤ Which input device cannot be used to work in MS Office? - Joy stick

➤ . ........... Is a method in which multiple communication devices are connected to one

another efficiently. - Switching

➤ ............. is a collection of web - pages and .......... is the very first page that we see on opening

of a website - Website, Home page

➤ What's considered the 'backbone' of the World Wide Web? – HTTP

➤ SMTP stands for - Simple Mail Transfer Protocol


➤ Small application programs that run on a Web page and provide animation

are known as - flash

➤ The errors that can be pointed out by the compiler known as .- Syntax errors

➤ A contains specific rules and words that express the logical steps of an algorithm? - syntax

➤ A Proxy server is used for which of the following? - To process client requests for web pages

➤ Storage that retains its data after the power is turned off is referred to as? - non-volatile storage

➤ Which term identifies main page of the entire site? - URL

➤ A hard copy of a document is - printed on the printer

➤ Which is the part of a computer that one can touch and feel? -Hardware

➤ CPU stands for - central processing unit

➤ Start or restart the computer known as - boot .

➤ This is not a function category in Excel . - Logical

➤ The operating system that is self-contained in a device and resident in the ROM is -

Embedded Operating System

➤ To be able to 'boot', the computer must have a(n) .......... - Operating System

➤ On-line real time systems become popular in..........Generation.- Third Generation access is the ability
of a device to "jump" directly to the requested data. - Random

➤ .........is the combination of keys to switch between the last four places that you have edited. - ALT +
CTRL + Z

➤ ............ is the functional key to display save-as box. - F12

➤ Accessing data on tapes is much ....... than that accessing data on disks.- Slower

➤ Who amongst the following is called the father of modern computing?- Charles Babbage

➤ If you begin typing an entry into a cell and then realize that you don't want yourentry placed

into a cell, you Press the . - Erase key

➤ Superscript, subscript, outline, emboss, engrave are known as _.- Font effects
➤ What is object of UPS? - Provides backup power

➤ Documents converted to .......... can be published to the Web. - HTML

➤ Holding the mouse button down while moving an object or text is known as - Dragging

➤ When was the first Windows operating system launched? - 1985

➤ What is the difference between a CD-ROM and a CD-RW? - A CD-RW can be written to,

but a CD-ROM can only be read from

➤ What happens when we try to delete the fries on the floppy ? - The files get deleted and

can restored again.

➤ An educational institution would generally have the following in its domain name ...... -.edu

➤ POST stands for ........... - Power on Self Test

➤________ can input graphical images and pictures for a computer? -Scanner

➤________ categories would include a keyboard ? - Input Device

➤ In Word you can force a page break–By positioning your cursor at the appropriate place

and pressing Ctrl +Enter

➤ LSTs (Large Integration) used in?- Fourth generation

➤ The purpose of an application program is to? - Meet specific user needs

➤ Hypertext is a - A system of managing textual Information by creating associations between different


documents.

➤ For running WINDOW minimum disk free space required is?- 8 MB

➤ printers generates character from a grid? - Dot matrix

➤ Accumulator is a . - Register

➤ Function key refreshes the current window.- F5

➤ In 1983, this person was the first to offer a definition of the term 'computer virus'? -

Frederick Cohen

➤ To minimize all open windows and display the desktop?- Windows logo +D
➤ In MS-Word 'alt + shift + d' does what? - Automatically inserts the date

➤________ deletes an item immediately without placing it in the recycle bin.- Shift +delete

➤ is not a network topology?- Linear

➤ A list of rules for transferring data over a network is called?- Protocol

➤ A table consists of -Rows and columns

➤ What does 'ctrl +esc' do?-Shows the start menu

➤ A proxy server is used as the computer? - Access user permissions

➤ best defines embedded system?-A computer and software system that controls a machine

➤ To see the document before the printout is taken, use........ - Print Preview

➤ Digital video consists of a series of - Frames

➤ The is the smallest meaningful unit of data. - field

➤ What are the four main aspects of data handling with a computer? - Input,processing,

output, and storage

➤ Most cash registers are now computers that are known as _ Terminals. - POS

➤________ is NOT an example of system maintenance? - Replacing user interfaces

➤________is the primary task of a NAS server? - File sharing

➤ If you change Windows 98 to Windows XP, you are actually performing ........... .-upgrade

➤ To make a copy of the current document to disk ........ - Use the 'save as' command

➤ The main system board of a computer is called the ..........integrated circuit . - motherboard

➤ Your position in the text is shown by a .......... - Cursor

➤ How many megabytes make a gigabyte ? - 1024

➤ Using output devices one can ............ - view or print data

➤ Which contents are lost when the computer turns off ? - memory

➤ When you save to this, your data will remain intact even when the computer is turned

off– Secondary storage device


➤ A central computer that holds collections of data and programs for many PCs, workstations,

and other computers is a(n) –Server

➤ The piece of hardware that converts your computer's digital signal to an analog signal

that can travel over telephone lines is called a–modem

➤ When the pointer is positioned on a……….it is shaped like a hand. - hyperlink

➤ Mobile Commerce is best described as–Buying and selling goods/services through wireless Hand held
devices

➤ _ is a storage device that uses rigid, permanently installed magnetic disks to

store data/information.-hard disk

➤ A device, which is not connected to CPU, is called as ........ - Off-line device

➤ A computer program that converts an entire program into machine language at one time is

called a/ an -compiler

➤ What is MS Word?-Word Processing Software

➤ For Scientific work the most popular language is? - FORTRON

➤ TCP stands for . - Transmission control protocol

➤ The first graphical web browser are?-Mosaic

➤ Total memory of system can be known using?-MEM commands

➤ The meaning of double-click is? - Pushing and releasing the main mouse button twice in rapid
succession when the on-tree mouse pointer is positioned over the desired item.

➤ The term overflow means? - An excess of Internal storage

➤ The access time refers to - Time required locating and retrieving stored data

➤ Rotational delay time is also known as- Latency

➤ Which memory is non-volatile and may be written only once?- PROM

➤ Technique to implement virtual memory where memory is divided into units of fixed size memory is–
Paging

➤ An adder where all the bits of the two operands are added simultaneously–Parallel adder
➤ The point at which the flow of text in a document moves to the top of a new page–Page break

➤ Multiprocessor is a computer system- Where many CPU under a common control

➤ Non-document files are–Non ASCII files that can be listed for any word processing software

➤________ is not a non-impact printer?-Laser printer

➤ EDVAC stands for - Electronic Discrete Variable Automatic Computer

➤ When a file is saved for the first time- . -it must be given a name to identify it

➤ The computers which are relatively rare because of their cost and size are – Super Computers

➤ A mistake in an algorithm that causes incorrect results is called a . - Logical error

➤ A(n) .... program is one that is ready to run and does not need to be altered in any way. - Executable

➤ A set of step-by-step procedures for accomplishing a task is known as a(n)—algorithm

➤ The main directory of a disk is called the………directory. -root

➤ A………is a collection of data that is stored electronically as a series of records in a table.- database

➤ As you create documents, graphs and pictures your computer holds the data in—Memory

➤ ………processing is used when a large mail-order company accumulates orders and processes them
together in one large set.-Batch

➤ Computer programs are written in a high-level programming language; however, the human readable
version of a program is called—source code

➤ What happens if you press Ctrl + Shift + F8?-It activates the rectangular selection

➤______ is not valid version of MS Office? - Office Vista

➤ What is the short cut key to open the Open dialog box in ms word?- Ctrl + F12

➤ How can you disable extended selection mode?- Press Esc to disable

➤ Auto Calculate will quickly add selected cells if you….. - click the Auto Calculate button on the toolbar

➤ You can add a hyperlink to your worksheet by pressing. - Ctrl + K

➤ are 'attempts by individuals to obtain confidential information from you by falsifying

their identity. - Phishing


➤ is the fastest type of computer?- Supercomputer

➤ is not a term pertaining to the Internet? - Keyboard

➤ The operating system that is self-contained in a device and resident in the ROM is .......

- Embedded Operating System

➤ The computer abbreviation KB usually means–Kilo Byte

➤ .......... is the key to close a selected drop - down list; cancel a command and close a dialog box.

- ESC

➤ is NOT one of the four major data processing functions of a computer? - analyzing the data or
information

➤ The CPU and memory are located on the - motherboard

➤ A ............ is an additional set of commands that the computer displays after you make a

selection from the main menu - dialog box

➤ A letter, memo, proposal or other file that is created using Microsoft Word is called as? - Document

➤______ are parts of the CPU? -Control unit

➤ is not the portable computer? - Series Computes

➤ The ROM chip which can be rewritten several times and requires the action of

ultraviolet radiations to erase its contents is Flash memory - EPROM

➤ FPI stands for - Frames per inch

➤ A terabyte comprises -1024 gigabyte

➤ The memory which is utmost accessible to the processor is -Cache memory

➤ In which kind of disk does the read/write head physically touches the surface? - Floppy Disk

➤ What is the correct syntax for typing a function into a cell? Equal sign, Function Name, Matching
brackets

➤ If you see a small red triangle in the top right corner of a cell, it means there is something attached to
the call. What is it? - A comment

➤ Cache memory is–Smaller and faster than main storage


➤ The overall design, construction, organization and interconnecting of the various components of a
computer system is referred as–Computer Architecture

➤ BIOS are responsible for - Handling the particulars of input/output operations

➤ BISYNC is an abbreviation for–Binary synchronous

➤ A process of trying out a new product by independent users before it is finally

manufactured/developed– Beta Test

➤ An E-mail protocol for storage, management and change, especially in corporate offices–

Message handling service

➤ Password is–Code by which a user gains access to a computer system

➤ The technique where digital signals are converted to its analog form for transmission over

an analog facility is called–Modulation

➤ Narrowband channel is a communication channels–That handles low volumes of data

➤ MIME is an acronym for .... - Multipurpose Internet Mail Extension

➤ The........... Settings are automatic and standard. -Default

➤ Pop-ups are a form of on the World Wide Web? - Online Advertising

➤ Which of the following is true about Operating System? - All are true

➤ All formula in Excel start with. -=

➤ displays the contents of the active cell? - Formula bar

➤ Tab scrolling buttons - Allow you to view additional sheet tabs

➤ What is the keyboard shortcut for creating a chart from the selected cells? -F11

➤ You cannot close MS Word application by - From File menu choose Close submenu

➤ Which file starts MS Word? - Winword.exe

➤ Where can you find the horizontal split bar on MS Word screen? - On the top of vertical scroll bar

➤ One of the functions of the arithmetic logic unit is to - receive data from the registers

➤ What is defined as the number of bits that the CPU processes as a unit? - A computer word
Systems use a light beam to scan input data and convert it into electrical signals, which are sent to the
computer for processing. - Optical recognition

➤ Devices accept the spoken word through a microphone and convert it into binary code that can be
understood by the computer. - Speech recognition

➤ Name the technique of processing transactions in random order. - Transaction processing

➤ Means that a transaction is processed fast enough for the result to come back

and be acted upon right away. - Real-time processing

➤ uses an area of memory to temporarily store data from disk that the program

might need soon.- Disk caching

➤ What is a device that prevents electrical problems from affecting computer data files? – A surge
protector

➤ What is any text that can be keyed in, such as a memo? - A text document

➤ What type of program lets you produce professional-looking documents containing both text

and graphics? A desktop publisher

➤ The letter and number of the intersecting column and row is the - Cell address

➤ What is the standard query language supported by most DBMSs? – Structured Query Language (SQL)

➤ are three fundamental characteristics that make a computer useful? - Speed, reliability, and storage
capability

➤ is an appropriate use of groupware? - A team project

➤ Software used for database management can store data, update it, retrieve it, report it, and print it -
manipulate

➤______ is NOT a function of an operating system? - Formatting a word document

➤______ helps describe the Windows .NET Server?- It is designed for different levels of network
complexity.

➤ The process of analyzing large data sets in search of new, previously undiscovered relationships is
known as - data mining

➤ The focus of the first phase of the systems development life cycle is to - Identify problems and
opportunities
➤ is a network in which computers are located physically close together, often in the same building?-
LAN

➤ What is a modulator/demodulator that is connected to a circuit board or motherboard? - Internal


modem

➤ What kind of server converts IP addresses to domain names? - DNS

➤ In the OSI model, the actual transmission of data is handled in the layer. - physical

➤______ is NOT true about laptop computers. - They cannot be connected to a PC.

➤ On a CD-RW you can - read, write and rewrite information

➤ In computer terminology, information means - Data in more useful

➤ What is output? - What the processor gives to the user

➤ What is the main difference between a mainframe and a super computer ? - Supercomputers are

focused to execute few programs as fast as possible while mainframe uses its power to execute as

many programs concurrently.

➤ Programs such as Mozilla Firefox that serve as navigable windows into the Web are called ..........

- Web browsers

➤ What is the function of Recycle Bin? - Store deleted file

➤ Which device cannot be shared in network ? – Keyword

➤ A right click on the desktop itself will........ - open the Display Properties dialog box

➤ To edit the selected cell in ms excel-Press F2

➤ You can convert existing Excel worksheet data and charts to HTML document by using the -

Internet Assistant Wizard

➤______ is graphics solution for Word Processors? - Clipart

➤ You can detect spelling and grammar errors by-Press F7

➤ What is the shortcut key to Indent the paragraph in ms word? - None of these

➤______ storage media provides sequential access only . - Magnetic tape


➤ What is the storage area for e-mail messages called? - A mailbox

➤ The set of parallel electrical conducting lines through which different components on the

mother board of a PC unit are linked together are called . - Buses

➤ A PDA's memory contents remain intact when it is turned off because - A battery keeps

current available for RAM

➤ A network of geographically distant computers and terminals is called a-Wide area

network (WAN)

➤ One byte represents -Eight bits

➤ Saving files in HTML format - Makes it possible for anyone to view the file in a Web

browser

➤ would NOT be performed with application software. - Hard disk cleanup

➤ statements is TRUE about the public switched telephone network (PSTN)? -PSTN

is comprised of a variety of physical media, including twisted pair and fiber optic cable

➤ best describes the difference between the Internet and the World Wide Web? -

The Internet is the physical network of global computers, while the World Wide Web is many hypertext

Documents distributed globally over many computers.

➤ runs on a user's local computer and is used to request and display Web pages? - Web browser

➤ computer types is most powerful? - Professional workstation

➤ is the most frequently used input device? - Mouse

➤ A modem is necessary if you want to-Connect to other computers or to the Internet using phone line,
cable, or wireless connections.

➤ MS Excel is a? - Window based spreadsheet package

➤ What is the flow of data between countries commonly called? -Trans border data flow

➤ is NOT a purpose of antivirus programs? - Copy the name of the virus and send it to Microsoft for
inspection

➤ <H1> is an example of . - HTML


➤ Which type of network requires HPNA adapters for communication between network nodes? -

Phone line

➤ To analyze vast quantities of scientific data and display underlying patterns, you would use a -

Supercomputer

➤ The free, open-source operating system that is becoming popular is - Linux

➤ What term is used to describe software that monitors your online computer activities? - Spyware

➤ is a memory management technique that makes the random access memory appear largerthan it is?
- Virtual memory

➤ The two major components of system software are - The operating system and system utilities

➤ may be necessary for you to do after you install new application software? - Do a warm boot

➤ The power-on self-test---------------- - Verifies that the computer hardware is workingproperly

➤ Input, processing, output, and storage are collectively referred to as - The

information processing cycle

➤ is NOT part of the motherboard? - Connector

➤ An example of a wireless medium that sends data through the air or space is - Microwaves.

➤ To reverse the effect of your last action in word ------------ - Use the Undo command

➤ Information that comes from an external source and fed into computer software is called ............... -
Input

➤ The basic unit of a worksheet into which you enter data in Excel is called a– cell

➤ All of the following are examples of real security and privacy risks EXCEPT - Spam

➤______ is not an example of hardware. - Interpreter

➤ In Excel, this is a prerecorded formula that provides a shortcut for complex calculations......... –

Function

➤ The process of trading goods over the Internet is known as ............. - e-commerce

➤ A device that connects to a network without the use of cables is said to be–free
➤ _ is a circuit that issue signals at regular intervals...? -Clock

➤ A set of related programs are known as------------- - Package

➤ The 0 and 1 in the binary numbering system are called binary digits or .... -bits

➤ The 7-bit ASCII code widely used - For data communication work

➤ animations cannot be done in PowerPoint? - table, revealed row by row

➤ Several views are available in MS Front Page. is NOT a valid view ? - Web Server View

➤ One of the components of central processing unit (CPU) of the computer that

performs mathematical and logical operations is ... - ALU (arithmetic logical unit)

➤ ......... is the key we use to run the selected command. - ENTER

➤ To name a constant, you use the _dialog box. - Define name

➤ When you insert an Excel file into a Word document, the data are - Placed in a word table

➤ A function inside another function is called a …..Function. - Nested

➤ Selects the entire Row press------- -Shift + Space

➤ CPU capacity can be measured in – MHz

➤ "Zipping" a fie means- Compressing the message

➤ A .......... shares hardware, software, and data among authorized users. - network

➤ To produce a high - quality graphics (hardcopy) in color, you would want to use a - Plotter

➤ When was the first Windows operating system launched? - 1985

➤ Thesaurus tool in MS Word is used for-Synonyms and Antonyms words

➤ What is the smallest and largest font size available in Font Size tool on formatting toolbar? -8

and 72

➤ Aligns the selected text or line to justify the screen press------- - Ctrl + J

➤______is different from other? - Internet

➤ When data changes in multiple lists and all lists are not updated, this causes? - data inconsistency
➤ Granting an outside organization access to internet web pages is often implemented using a(n)?

extranet

➤ Loading Operating System onto RAM is called? - Booting

➤ The purpose of the primary key in a database is to - provide a map of the data

➤ Using Windows Explorer, a plus (+) sign in front of a folder indicates - the folder contains subfolders.

➤ All of the following statements concerning windows are true EXCEPT— windows are an example of a
command-driven environment.

➤ The memory resident portion of the operating system is called the—Kernel.

➤ The basic input/output system (BIOS) is stored in - ROM.

➤______ is not a tower? - Peripheral

➤ The horizontal and vertical lines on a worksheet are called—gridlines

➤ What is usually used for displaying information at public places ? - Touch Screen Kiosks

➤ Which key is used in combination with another key to perform a specific task ? - Control

➤ Fax machines and imaging systems are examples of—imaging systems

➤ What is MP3? - A Sound format

➤______ is a process that permits multiple computers to use the same IP address and hide their actual
IP addresses from the Internet. - Network address translation(NAT)

➤ What characteristic of read-only memory (ROM) makes it useful? -Data in ROM is nonvolatile, that is,
it remains there even without electrical power.

➤ Data representation is based on the………number system, which uses two numbers to represent all
data. - binary

➤ To what temporary area can you store text and other data, and later paste them to another location?
- The clipboard

➤ Classes, instances, and methods are characteristics of - Object-oriented design

➤ correctly describes the CD-R and DVD-R discs? - You may record data to the disc surface once

And then may only read its contents

➤ To move down a page in a document …… - scroll


➤ CD-ROM stands for…… - CD-read only memory

➤ Use this when you want to make all letters capital without having to use the shift key for

each character……… -caps lock key

➤ -------------------is a program that has been physically etched onto a chip. - Firmware

➤ The type of memory that must have a constant power supply is - SDRAM.

➤ What type of e-commerce is being used when a student buys a computer from Dell.com? - B2C

➤ is the basic language of web page writing. - Hypertext markup language

➤ The topology where all the nodes are attached in a circular wiring arrangement is called a -

Ring topology

➤ Hard disk performance can be improved by using a(n) - Disk cache.

➤ Which is NOT a characteristic of a system unit? - Represents data as binary numbers

➤ Where are the Editing group and the Replace command found? - On the Home tab

➤ What function displays row data in a column or column data in a row? - Transpose

➤ This type of software contains rows and columns. - Spreadsheet

➤ Software for organizing storage and retrieval of information is a(n)—database program

➤ To insert a word into the middle of a sentence-move the cursor to the desired location in

the sentence and type the new word

➤ A high-speed transmission line that carries WAN traffic is called a - Backbone

➤ A DVD is an example of a(n)–optical disc

➤ Grouping and processing all of a firm's transactions at one time is called–batch processing

➤ Semi Conductor Memory is known as? - RAM

➤ Every computer on the Internet is known as? - Host

➤ A spiral shape track formatting is present in - Optical Disk

➤ -------------- Types of virus that stays permanently in the RAM memory -Resident

➤ groups contains graphical file extensions? - JPG, GIF, BMP


➤ A number system with a base of two is referred as–Binary number system

➤ is not true for primary storage? -It is a part of the CPU

➤ is the advantage of Assembly language over Machine language? -All the above

➤ VPN stands for------- - Virtual Private Network

➤______ is true about Dial-up internet access? -It utilizes the existing telephone services

➤ memories can be read directly by the computer processor? - Main Memory

➤ The communication between a processor and other devices inside the computer is done

through? - Bus

➤ Who is/are the founders of Microsoft? - Bill Gates and Allen Paul

➤ What is the difference between a check box and Radio button? - In check boxes multiple options can
be selected whereas in radio buttons only single option can be selected

➤ If a memory chip is volatile, it will....... - lose its contents if current is turned off

➤ is NOT a function of a microprocessor? - Keeps the system unit cool

➤ To connect to a WAN, you must have - POP

➤ During the operation, the control unit determines what the program is telling

the computer to do. - decode

➤ has a large storage capacity, up to 17 GB if both layers and both sides are used. - DVD-ROM

➤ A card connects each computer to the wiring in the network. - network interface

➤ What is the initial page of the Web site? -The home page

➤ What is the term for a set of step-by-step instructions that direct a computerto perform its tasks?

program

➤ To execute a given DOS program, you must type a(n) _. - command

➤ PC cards, flash memory cards, and smart cards are all examples of - Solid state

storage devices.
➤ A is a unique identification number generated by a computer hardware component or a program. -
GUID

➤ RAM is an example of volatile storage and serves as the computer's---------- -Shortterm memory

➤ When a computer prints a report, this output is called -Hard copy

➤ The ascending order of a data hierarchy is--------- - Data in more useful or intelligible form

➤ A floppy disk contains------------ - Both circular tracks and sectors

➤ A plotter is---------An output device to produce drawings and graphics

➤ is a graphical package? –CorelDraw

➤ A mouse, trackball, and joystick are examples of ." - pointing devices

➤ The Internet uses----------------- - Packet switching

➤ What would you use for immediate, real-time communication with a friend? - Instant

Messaging

➤ is used to create newspaper style columns? - Format Columns

➤ How much space in minimum must be provided between columns? - 0"

➤ Which operation you will perform if you need to move a block of text? - Cut and Paste

➤ The electronic switches in the ENIAC were - vacuum tubes

➤ Help Menu is available at which button? – Start

➤ A……….is the term used when a search engine returns a Web page that matches the search criteria. –

Success

➤ In Excel……….allows users to bring together copies of work-books that other

user have worked on independently. –Merging

➤ What kind of memory is static and non - volatile?–ROM

SUBSCRIBE US ON YOUTUBE - ASHUTOSH SHUKLA OFFICIAL

➤ ---- Is the Virus that overwrites the files or a few parts being replaced? - File infectors

➤ is an advantage of stored programs? - Reliability


➤______is an Object Oriented Programming Language? - Both 2 and

➤ MICR is exclusively used in------------- - Banking Industry

➤ is an audio input device? -Only 1 & 3

➤ Digital Camera is an? - Input Device

➤ The internet service that provides a multimedia interface to available resources is called----------------

World Wide Web

➤ What is the short-cut key to display save -as dialog box in MS-Word? - F12

➤______ is not a web browser? – C

➤ The backspace key is most often used to? - Delete a character to the left of the cursor

➤ keyboard shortcuts is used to view the properties of a selected object? - Alt +

Enter

➤ What is the function of a Drop Cap in MS - Word? - It lets you begin a paragraph with a

large dropped Initial capital letter

➤ is a data - entry device? - All of the above

➤ is true about CPU? - It makes the information resulting from processing available for use

➤ Adwords is an------------- - Advertising Service by Google

➤______ is the largest storage? – Terabyte

➤______ is fastest? - Cache Memory

➤ Each Web address is actually a series of numbers, which is usually called as------------ - IPaddress

➤______ is used to connect a personal computer to a network. – NIC

➤______ is the short-cut key to close an active tab of a browser. - Ctrl + W

➤______ is true about URL. - It is a global address of documents and otherresources

on World Wide Web

➤ keyboard short-cut is used to center the paragraph? - Ctrl + E

➤ _ functions is not performed by servers? - Word Processing


➤______is true about Secondary Storage? - Does not require constant power

➤______ is the full form of LSI? - Large Scale Integration

➤ Computer languages is used for Artificial Intelligence? – PROLOG

➤______ is the slowest Internet connection? - Dial-Up

➤ What is the full form of USB? - Universal Serial Bus

➤ 'FIND' option is available under which of the following menu? - Edit

➤ Compilers and interpreters are themselves----- - Programs

You might also like