COMPUTER
COMPUTER
B (8) C (8)
D (8) E (8)
H (8) L (8)
Stack pointer (SP) (16)
Program counter (PC) (16)
Lines Lines
Bidirectional Unidirectional
F ig. (a) Progr amming model
D7 D6 D5 D4 D3 D2 D1 D0
S Z AC P CY
F ig. (b) F lab Register
Basics of Computers and Applications 5
Accumulat or. I N STRU CTI ON CODES.
The Accumulat or is an 8 bit r egist er t hat is par t of t he An inst r uct ion code is a gr oup of bit s t hat inst r uct t he
ar it hmet ic/logic unit (AL U). This r egist er is used t o comput er t o per for m a specific oper at ion. I t is usually
st or e 8 bit dat a and t o per for m ar it hmet ic/logic unit divided i nt o par t s, each havi ng it s own par t i cular
(AL U). This r egist er is used t o st or e 8-bit dat a and t o int er pr et at ion. The most basic par t of an inst r uct ion
per for m ar it hmet ic and logical oper at ions. The r esult codes is it s oper at ion par t .
of an oper at i on i s st or ed i n t he accumul at or. The Oper at ion Code.
accumulat or is also ident ified as r egist er A.
The oper at ion code of an inst r uct ion is a gr oup of bit s
FLAGS. that define such oper ations as add, subt r act , mult iply,
The ALU includes five flip-flops, which ar e set or r eset shift and complement . The number of bit s r equir ed
aft er an oper at ion accor ding t o dat a condit ions of t he for t he oper at ion code of an inst r uct ion depends on
r esult in t he accumulat or and ot her r egist er s. They t he t ot al number of oper at i ons avai l abl e i n t he
ar e called zer o (Z), car r y (CY); sign (S), par it y (P) and comput er. The oper at ion code must consist of at least
Auxiliar y car r y (AC) flags. n bit s for a given 2n (or less) dist inct oper at ions.
The most commonly used flags ar e zer o, car r y, and OP Code.
sign. The micr opr ocessor uses t hese flags t o t est dat a What t ask t o be per for med, called t he oper at ion code
condit ions. (OPcode).
Aft er an addit ion of t wo number s, if t he sum in t he Oper and.
accumulat or is lar ger t han eight bits, the flip-flop used
When dat a t o be oper at ed on called t he oper and. The
t o indicat e a car r y called car r y flag (CY) is set t o one.
oper and (or dat a) can be specified in var ious ways. I t
When an ar ithmetic oper ation is zer o the flip flop called
may include 8-bit or (16 bit) data, an int er nal r egist er,
t he zer o (Z) flag is set t o one.
a memor y location, or 8 bit (or 16 bit) addr ess. I n some
The fl ags have cr i t i cal i mpor t ance i n t he deci si on inst r uct ions, t he oper and is implicit .
making pr ocess of t he micr opr ocessor. The condit ions
ADDRESSI N G M ODES.
(set or r eset ) of t he flags ar e t est ed t hr ough soft war e
inst r uct ions. The control unit of a computer is designed to go through
an inst r uct ion cycle t hat is divided int o t hr ee major
PROGRAM COU N TER (PC).
phases.
T h i s 16 bi t r egi st er deal s wi t h sequ en ci n g t h e
(i) Fet ch t he inst r uct ion fr om memor y
execut ion of inst r uct i on. Thi s r egi st er i s a memor y
point er. M emor y locat ions have 16 bit addr esses, and (ii ) Decode t he inst r uct ion
that is why t his is a 16-bit r egister. The micr opr ocessor (iii) Execut e t he inst r uct ion
uses t hi s r egi st er t o sequence t he execut i on of t he I mplied mode.
inst r uct ions. The funct ion of t he pr ogr am count er is
A l l r egi st er r ef er en ce i n st r uct i on s t h at u se an
t o point t o t he memor y addr esses fr om which t he next
accumul at or ar e i mpl i ed mode i nst r uct i ons. Zer o
byt e is t o be fet ched. When a byt e (machine code) is
addr ess inst r uct ions in a st ack-or ganized comput er
being fet ched, t he pr ogr am count er is incr ement ed by
ar e implied mode inst r uct ions since t he oper ands ar e
one t o point t o t he next memor y locat ion.
implied t o be on t op of t he st ack.
STACK POI N TER (SP).
I mmediat e mode.
The stack pointer is also a 16 bit register used as memory
The operand is specified in the instruction itself. In other
poi n t er. I t poi n t s t o a m em or y l ocat i on i n
words, an immediate mode instruction has an operand
R/W memor y, called t he stack. The beginning of st ack
field r ather than an addr ess field. The operand field
is defined by loading a 16-bit address in the stack pointer.
contains the actual operand to be used in conjunction
OPCODE FORM AT. with the operation specified in the instr uctions.
I n t he desi gn of t he 8085 mi cr opr ocessor chi p, al l Regist er mode.
oper ations, registers and status flags are identified with
I n t his mode t he oper ands ar e in r egist er s, that r eside
a specific code.
wit hin t he CPU. The par t icular r egist er is select ed
All int er nal r egist er s ar e ident ified as follows : fr om a r egist er field in t he inst r uct ion. A K bit field
Code Regist er s Code Regist er pair s can specify any one of 2k r egist er s.
000 B 00 BC Regist er indir ect mode.
001 C 01 DE
I n this mode t he inst r uct ion specifies a r egist er in t he
010 D 10 HL
CPU, whose cont ent gives t he addr ess of t he oper and
011 E 11 A F or S P
in memor y. The advant age of a r egist er indir ect mode
100 F
inst r uct ion is t hat t he addr ess field of t he inst r uct ion
101 G
uses fewer bit s t o select a r egist er t han would have
110 Reser ved for M emor y Relat ed Oper at ion
been r equir ed t o specify a memor y addr ess dir ect ly,
111 A
6 Basics of Computers and Applications
Aut o I ncrement or Decrement mode. devices used in par t icular applicat ions ar e dat a glove,
This is similar t o r egist er indir ect mode except t hat t ouch panels, image scanner s and voice syst ems.
t he r egist er is incr ement ed or decr ement ed aft er or 1. K eyboar ds.
befor e it s value is used t o access memor y. When t he An alphanumer ic keyboar d on a gr aphics syst em
addr ess st or ed in t he r egist er r efer s t o a t able of dat a i s used pr i mar i l y as a devi ce for ent er i ng t ext
in memor y, it is necessar y t o incr ement and decr ement st r i ngs. The k eyboar d i s an effi ci ent devi ce for
t he r egist er s aft er ever y access t o t he t able input t ing such non gr aphics dat a as pict ur e labels
D ir ect addressing mode. associated with graphics display. Keyboar ds can also
I n t hi s mode t he effect i ve addr ess i s equal t o t he be pr ovided with featur e to facilitate entr y of scr een
addr ess par t of t he inst r uct ion. The oper and r esides coor dinat es, menu select or s or gr aphics funct ions.
in memor y and it s addr ess is given dir ect ly by t he 2. M ouse.
addr ess field of t he inst r uct ion. A mouse is small hand held box used t o posit ion
I ndir ect addr essing mode. t he scr een cur sor. Wheels or r oller s on t he but t on
I n t his mode t he addr ess field of t he inst r uct ion gives of t he mouse can be used t o r ecor d t he amount
t he addr ess wher e t he effect ive addr ess is st or ed in and dir ect ion of movement s. Anot her met hod for
memor y. det ect ing mouse mot ion is wit h an opt ical sensor.
Effect ive addr ess = addr ess par t of inst r uct ion For t hese syst ems, t he mouse i s moved over a
special mouse pad t hat has gr id of hor izont al and
+ cont ent of CPU r egist er v er t i cal l i n es. T h e opt i cal sen sor det ect s
I N PU T AN D OU TPU T SYSTEM movement s acr oss t he l i nes i n t he gr i d. Si nce
mouse can be picked up and put down at anot her
I nput /out put devices ar e t he means t hr ough which
posit ion wit hout change in cur sor movement . I t is
t he M PU communicat es wit h t he out side wor ld. The
used for making r elat ive changes in t he posit ion of
M PU accept s binar y dat a as input fr om devices such
t he scr een cur sor. One, t wo or t hr ee but t ons ar e
as keyboar ds and A/D conver t er s and send dat a t o
usual l y i ncl uded on t he t op of t he mouse for
out put devices such as L EDs or pr int er s. Ther e ar e
signalling t he execut ion of some oper at ion, such
t wo differ ent met hods by which I /O devices can be
as r ecor ding cur sor position or invoking a funct ion.
ident ified. One uses an 8 bit addr ess and t he ot her
Most gener al pur pose graphics system now included
uses a 16 bit addr ess.
a mouse and keyboar d as major input devices.
PERI PH ERAL M APPED I /O.
3. Track Ball and Space Ball.
I n this type of I /O, the MPU uses eight addr ess lines to
A t r ack ball is a ball t hat can be r ot at ed wit h t he
identify an input or an output device; t his is known as
fi nger s or pal m of t he hand t o pr oduce scr een-
per ipher al mapped I /O. The eight addr ess lines can
cur sor movement , pot ent iomet er s at t ached t o t he
have 256 (28 combinat ions) addr esses; t hus the MPU
ball measur e t he amount and dir ect ion of r ot at ion.
can identify 256 input devices and 256 output devices
Tr ackballs are often mounted on keyboar ds or other
with addresses ranging fr om 00H to FFH input and
devices such as t he mouse.
output devices are differentiated by the contr ol signals.
The MPU uses the I /O Read Contr ol Signal for input While a track ball is two dimensional posting device,
devices and the I /O Wr ite Contr ol Signal for output a space ball pr ovides six degr ee of fr eedom. Unlike
devices. The entir e r ange of I /O addr esses fr om 00 to t he t r ack ball, space ball does not act ually move.
FF is known as an I /O map, and individual addr esses St r ain gauges measur e t he amount of pr essur e
ar e r efer r ed t o as I /O devices addr esses 8 I /O por t applied to t he spaceball to pr ovide input for spat ial
number s. posit ioning and or ient at ion as t he ball is pushed or
pulled in var ious dir ect ions. Space balls ar e used
M E M ORY M APPE D I /O (I /O W I T H 16 BI T
for t hr ee-di mensi onal posi t i oni ng and sel ect i on
ADDRESSES).
oper at ions in vir t ual r ealit y syst ems, modelling,
I /O is connect ed as if it is memor y r egist er. This is animat ion, CAD, and ot her applicat ions.
known as memor y mapped I /O. The M PU uses t he
4. Joyst i ck s.
same cont r ol signal (M emor y Read or M emor y Wr it e)
an d i n st r u ct i on s as t h ose of m em or y. I n som e A joyst ick consist s of a small, ver t ical lever called
micr opr ocessor such as mot or ola 6800, all I /O have st ick mount ed on a base t hat is used t o st eer and
16 bit addr esses. I /Os and memor y shar e t he same scr een cur sor ar ound. M ost joyst icks select scr een
memor y map (64K). I n memor y mapped I /O, the MPU posi t i on wi t h act ual st i ck movem ent . Ot her s
follows the same steps as if it is accessing a memor y r espond t o pr essur e on t he st ick. Some joyst icks
r egist er. ar e mount ed on keyboar d, ot her s funct ion as st and
alone unit s. Pot ent iomet er mount ed at t he base of
I N PU T DEVI CES joyst ick measur es t he amount of movement , and
These include a mouse, tr ack ball, space ball, joyst ick, spr ings r etur n the stick to the center position when
digit izer s, dials and but t on boxes. Some ot her input i t i s r el eased on e or m or e bu t t on s can be
Basics of Computers and Applications 7
pr ogr ammed t o act as input swi t ches t o si gnal input can be r ecor ded using opt ical, elect r ical or
cer t ai n act ions once a scr een posi t i on has been acoust ical met hods.
select ed. 9. L ight Pens.
5. Dat a Glove. Light pen is pencil-shaped devices ar e used to select
Dat a glove t hat can be used t o gr asp a “ vir t ual” scr een posit ions by detect ing the light coming fr om
object . The glove is const r uct ed wit h a ser ies of point s on t he CRT scr een. They ar e sensit ive t o
sensor s t hat det ect hand and fi nger mot i ons. t he shor t bur st of light emit t ed fr om t he phosphor
Elect r omagnet ic coupl ing bet ween t r ansmi t t ing coat ing at t he inst ant t he elect r on beam st r ikes a
antennas and r eceiving antennas is used to pr ovide par t icular point . Ot her light sour ces, such as t he
infor mat ion about t he posit ion and or ient at ion of back gr ound l i ght i n t he r oom, ar e usual l y not
the hand. The tr ansmitting and r eceiving antennas det ect ed by a light pen.
can each be st r uct ur ed as a set of t hr ee mut ually
per pendicular coils, for ming a t hr ee dimensional PRI N T E RS.
car t esian co-or dinat e syst em. Pr inter s pr oduce output by either impact or non-impact
6. D igit izer s. methods. I mpact pr inter s pr ess for med char acter faces
against an inked r ibbon ont o t he paper. A line pr int er
A com m on dev i ce f or dr aw i n g, pai n t i n g or
is an example of impact device wit h t he t ype faces
int er act ively select ing co-or dinat e posit ions on an
mount ed on bands, chai ns, dr ums or wheels. Non-
object is a digit izer. These devices can be used t o
i mpact pr int er s and pl ot t er s use l aser t echniques,
i n pu t co-or di n at e v al u es i n ei t h er a t w o
i nk j et spr ays, xer ogr aphi c pr ocesses as used i n
dimensional or t hr ee dimensional space. Typically,
phot ocopyi ng machi ne, el ect r ost at i c met hods and
a digit izer is used t o scan over a dr awing or object
and t o input a set of discr et e co-or dinat e posit ions, elect r ot her mal met hods t o get images on t o paper.
which can be joined wit h st r aight -line segment s t o Char acter impact printers often have a dot matrix print
appr oximat e the cur ve or sur face shapes. One t ype head containing a r ectangular ar r ay of pr otr uding wir e
of digit izer is t he gr aphics t ablet , also r efer r ed t o pins, with the number of pens depending on the quality
as a dat a t abl et wh i ch i s u sed t o i n pu t t wo of t he pr int er.
dimensional coor dinates by activating a hand cursor I n a l aser devi ce, l aser beam cr eat es a ch ar ge
or st yles at select ed posit ions on a flat sur face. di st r i but i on on a r ot at i n g dr um coat i ng wi t h a
7. I mage Scanners. phot oel ect r i c mat er i al , such as sel eni um. Toner i s
Dr awing, gr aphs, color and black and whit e photos applied t o t he dr um and t hen t r ansfer r ed t o paper.
or t ext can be st or ed for comput er pr ocessing wit h I nkjet met hods pr oduce out put by squir t ing i nk in
an image scanner by passing an opt ical scanning hor izont al r ows acr oss a r oll of paper wr apped on a
mechanism over t he infor mat ion t o be st or ed. The dr um. The electr ically char ged ink st r eam is deflected
gr adat ions of gr ay scale or color ar e t hen r ecor ded by an elect r ic field t o pr oduce dot mat r ix pat t er ns. A
and st or ed in an ar r ay. Once we have t he int er nal deskt op inkjet plot t er wit h r esolut ion of 360 dot s per
r epr esen t at i on of a pi ct u r e, w e can appl y inch.
t r ansfor mat ions t o r ot at e, scale or cr op the pict ur e
An elect r ost at ic device places a negat ive char ge on
t o a par t i cul ar scr een ar ea. We can al so appl y
t he paper, one complet e r ow at a t ime along t he lengt h
var ious image pr ocessing met hods t o modify t he
of t he paper. Then t he paper is exposed t o a t oner.
ar r ay r epr esent at ion of t he pict ur e. For scanned
The t oner is posit ively char ged and so it is at t r act ed
t ext i nput , var i ous edi t i ng oper at i ons can be
per for med on st or ed document s. Some scanner s t o t he negat ively char ged, ar eas, wher e it adher es t o
ar e able t o scan eit her gr aphical r epr esent at ion or pr oduce the specified output . Elect r other mal met hods
t ext , and t hey come i n a var i et y of si zes and use heat in a dot mat r ix pr int head t o out put pat t er ns
capabilities. on heat sensi t i ve paper. We can get l i mi t ed col or
out put on an impact pr int er by using differ ent color ed
8. Touch Panels.
r ibbons.
Touch panel s al l ow di spl ayed object s or scr een
Non impact devices use var ious techniques to combine
posit ions t o be select ed wit h t he t ouch of a finger.
thr ee color pigments (cyan, magneta and yellow) to
A t ypi cal appl i cat i on of t ouch panels i s for t he
pr oduce a r ange of color pat t er ns.
selection of pr ocessing options that ar e r epr esented
wit h gr aphical icons. Some syst ems, such as t he Par allel pr int er s use :
plasma panels ar e designed wit h t ouch scr eens. (a) RS-232C interface
Ot her syst em can be adapt ed for t ouch input by (b) Cent r onics int er face
fit t ing a t r anspar ent device wit h a t ouch-sensing
mechanism over t he video monit or scr een. Touch (c) H andshake mode
8 Basics of Computers and Applications
STORAGE U N I T 1. F loppy Disk Drive (F DD) : I n t hi s devi ce, t he
I t consist s of main memor y and secondar y memor y. medium used t o r ecor d t he dat a is called as floppy
disk. I t is a flexible cir cular disk of diamet er 3.5
M ain M emory :
i nches made of pl ast i c coat ed wi t h a magnet i c
1. A fl i p-fl op made of el ect r oni c semi conduct or mat er ial. This is housed in a squar e plast ic jacket .
devices is used t o fabr icat e a memor y cell. These Dat a r ecor ded on a floppy disk is r ead and st or ed in
memor y cel l s or gani zed as a Random Access a comput er 's memor y by a device called a floppy
Memor y (RAM). Each cell has a capabilit y to stor e disk is r ead and st or ed in a comput er 's memor y by
one bit of infor mat ion. A main memor y or st or e a device called a floppy disk dr ive (FDD). A floppy
of a comput er is or ganized using a lar ge number disk is inser t ed in a slot of t he FDD. Floppy Disks
of cells. Each cell st or es a binar y digit . wit h var ious capacit ies ar e as follow:
2. A memor y cell, which does not loose the bit st or ed
51/4 dr ive- 360KB, 1.2MB (1 KB= 210 = 1024 bytes)
i n i t when no power is suppl ied t o t he cell , i s
known as a non-volat ile cell. 31/2 dr ive- 1.44 M b, 2.88 M B (1M B= 220 byt es)
3. A wor d is a gr oup of bit s, which ar e st or ed and 2. Compact Disk Drive (CDD) : CD-ROM (Compact
r etr ieved as a unit. A memor y system is or ganized Disk Read Onl y M emor y) used a l aser beam t o
t o st or e a number of wor ds. r ecor d and r ead dat a along spir al t r acks on a 51/4
di sk . A di sk can st or e ar ou n d 650 M B of
4. A Byt e consist s of 8 bit s. A wor d may st or e one or
infor mat ion. CD-ROM s ar e nor mally used t o st or e
mor e byt es.
massive t ext dat a. Recent ly CD wr it er s have come
5. The st or age capacit y of a memor y is t he number in the mar ket . Using a CD wr it er, lot of infor mation
of byt es it can st or e. can be wr it t en on CD-ROM and st or ed for fut ur e
6. The addr ess of t he locat ion fr om wher e a wor d is r efer ence.
t o be r et r i eved or t o be st or ed i s ent er ed i n a 3. H ard Disk Drive (H DD) : Unlike a floppy disk
M emor y Addr ess Register (M AR). t hat is flexible and r emovable, t he har d disk used
7. The dat a r et r ieved fr om memor y or t o be st or ed in t he PC is per manent ly fixed. The dat a t r ansfer
in memor y ar e placed in a M emor y Dat a Regist er r ate between the CPU and har d disk is much higher
(MDR). as compar ed to the between the CPU and the floppy
8. The t ime t aken t o wr it e a wor d is known as t he disk dr ive. The CPU can use t he har d disk t o load
Wr it e t ime. pr ogr ams and dat a as well as t o st or e dat a.
9. The t ime t o r et r ieve i nfor mat i on i s cal led t he CLASSI FI CATI ON OF COM PU TERS
Access t ime of t he memor y.
Comput er s come in sizes fr om t iny t o monst r ous, in
10. The t ime t aken t o access a wor d in a memor y is bot h appear ance and power. The size of a comput er
independent of the addr ess of t he wor d and hence
t hat a per son or an or ganizat ion needs depends on
it is know as a Random Access M emor y (RAM ).
t he comput ing r equir ement s.
The main memor y used t o st or e pr ogr ams and
Supercomputers : The might iest comput er s-and, of
dat a in a comput er is a RAM .
cou r se, t h e m ost ex pen si v e-ar e k n ow n as
11. A RAM may be fabricated with per manently stor ed super comput er s. Super comput er s pr ocess billions of
i nfor mat i on, whi ch cannot be er ased. Such a inst r uct ions per second. One uses super comput er s for
memor y is called a Read Only M emor y (ROM ). t asks t hat r equir e mammoth dat a manipulation, such
For mor e specialized uses, a user can st or e his as wor l dwi de weat h er f or ecast i ng and weapons
won special funct ions or pr ogr ams in a ROM . r esear ch.
Such ROM 's ar e called Pr ogr ammable ROM
M ainframes : I n t he jar gon of t he comput er t r ade,
(PROM).
lar ge comput er s ar e called mainfr ames. M ainfr ames
12. A ser ial access memor y is or ganized by ar r anging ar e capable of pr ocessing dat a at ver y high speeds-
memor y cells in a linear sequence. millions of inst r uct ions per second-and have access t o
I nfor mat ion is r et r ieved or st or ed in such a billions of char act er s of dat a. Their pr incipal use of it
memor y by using a r ead/wr it e head. is for pr ocessing vast amount s of dat a quickly, some
Dat a is pr esent ed ser ially for wr it ing and is of t h e obvi ou s cu st om er s ar e ban k s, i n su r an ce
r et r ieved ser ially dur ing r ead. companies, and manufact ur er s.
Secondary / Auxiliary storage devices : M agnet ic Personal Computers : Per sonal comput er s ar e oft en
sur face r ecor ding devices used in comput er s as H ar d called PCs. A PC usually comes wit h a tower that holds
disks, Floppy disks, CD-ROM s and M agnet ic t apes. the main cir cuit boar ds and disk dr ives of the computer,
Basics of Computers and Applications 9
and a collect ion of per ipher als, such as a keyboar d, An exampl e of a L A N woul d be a comput er
mouse, and moni t or. The t er m "PC" oft en means net wor k wit hin a building.
machines t hat ar e compat ible t o I BM ot her t han a 2. M et r opolit an ar ea net wor k (M AN), which is used
Macint osh. for medi um si ze ar ea. exampl es for a cit y or a
Personal Computers (PC) and M AC : A PC is based st at e.
on a mi cr opr ocessor or i gi nal l y made by t he I nt el 3. Wide ar ea net wor k (WAN) t hat is usually a lar ger
Company (I ntel's Pentium) with other companies such net wor k t hat cover s a lar ge geogr aphic ar ea.
as AM D. The comput er s made by M acint oshes which
4. Wir eless L ANs and WANs (WL AN & WWAN) ar e
uses, Power PC pr ocessor, made by M ot or ol a ar e
t he wir eless equivalent of t he L AN and WAN.
r efer r ed as M ac. Also, t he oper at ing syst em soft war e
t hat r uns t hese t wo kinds of comput er s is differ ent . I P ADDRESS
PCs usual l y use an Oper at i ng Syst em made by An I nt ernet Prot ocol addr ess (I P addr ess) i s a
M icr osoft , i.e., Windows. M acint oshes use oper at ing
n u m er i cal l abel assi gn ed t o each dev i ce (e.g.,
syst em, called M ac OS, made by Apple.
comput er, pr i n t er ) par t i ci pat i ng i n a comput er
N ot ebook Comput ers : A comput er t hat fi t s i n a n et w or k t h at u ses t h e I n t er n et Pr ot ocol f or
br i efcase?. N ot ebook compu t er s, al so k nown as communicat ion.[1] An I P addr ess ser ves t wo pr incipal
L apt op comput er s, ar e por t abl e and popul ar wit h funct ions: host or networ k inter face identification and
tr aveler s who need a comput er that can go with them. locat ion addr essing. I t s r ole has been char act er ized
M ost n ot ebook s accept di sk et t es or n et w or k as follows: “ A name indicates what we seek. An address
connect i ons, so i t i s easy t o move dat a fr om one
indicates where it is. A route indicates how to get there.
comput er t o anot her.
I mport ant Devices U sed in N et work
I N TERN ET
1. M odem : A modem (modulat or -demodulat or ) is a
The I nt ernet i s a global syst em of int er connect ed device t hat modulat es an analog car r ier signal t o
comput er net wor ks t hat use t he st andar d I nt er net encode digit al infor mat ion, and also demodulat es
Pr ot ocol Sui t e (TCP/I P) t o ser ve bi l l i ons of user s such a car r ier signal t o decode t he t r ansmit t ed
wor ldwide. I t is a net wor k of net wor ks t hat consist s infor mat ion. The goal is t o pr oduce a signal t hat
of millions of pr ivat e, public, academic, business, and can be tr ansmitted easily and decoded to repr oduce
gover nment net wor ks, of local t o global scope, t hat the or iginal digit al data. M odems can be used over
ar e li nked by a br oad ar r ay of elect r onic, wir eless any means of t r ansmit t ing analog signals, fr om
and opt ical net wor king t echnologies. The I nt er net light emit t ing diodes t o r adio.
car r ies a vast r ange of infor mat ion r esour ces and 2. Router : A router is a device t hat for war ds dat a
ser v i ces, su ch as t h e i n t er -l i n k ed h y per t ex t pack et s acr oss compu t er n et wor k s. Rou t er s
document s of t he Wor ld Wide Web (WWW) and t he per for m t he dat a “ t r affic dir ect ing” funct ions on
infr ast r uct ur e t o suppor t elect r onic mail. t he I nt er net . A r out er is connect ed t o t wo or mor e
dat a lines fr om di ffer ent net wor ks. When dat a
N ET WORKS comes in on one of t he lines, t he r out er r eads t he
A computer network, oft en simply r efer r ed t o as a addr ess infor mat ion in t he packet t o det er mine
net wor k , i s a col l ect i on of comput er s and devi ces it s ult imat e dest inat ion.
i nt er connect ed by communi cat i ons channel s t hat 3. Bridge : A net work bridge connect s mul t i pl e
faci l i t at e communi cat i ons and al l ows shar i ng of net wor k segment s. Br idging i s a for war di ng
t echni que used i n pack et -swi t ched comput er
r esour ces and i nfor mat i on among i nt er connect ed
net wor k s. U nl i k e r out i ng, br i dgi ng mak es no
devices. Computer networking or Data communi-
assumptions about where in a networ k a par ticular
cat ions (D at acom) i s t he engi neer i ng di sci pl i ne addr ess is locat ed. I nst ead, it depends on flooding
concer ned wit h t he comput er net wor ks. and examinat ion of sour ce addr esses in r eceived
The t hr ee t ypes of net wor ks ar e: packet header s t o locat e unknown devices. Once
(i ) t he I nt er net a device has been locat ed, it s locat ion is r ecor ded
in a t able wher e t he M AC addr ess is st or ed so as
(ii ) t he int r anet
t o pr eclude t he need for fur t her br oadcast ing.
(iii ) t he ext r anet .
4. H ub : hub is a device for connecting multiple twisted
Examples of differ ent net wor k met hods ar e: pair or fiber optic Ethernet devices together and
1. Local ar ea networ k (LAN), which is usually a small making them act as a single segment. The device is
net wor k const r ained t o a small geogr aphic ar ea. a for m of multiport repeater.
10 Basics of Computers and Applications
5. Repeater : A repeater is an elect r onic device t hat as Office Open XM L and it s SP2 updat e will suppor t
r eceives a signal and r et r ansmit s it at a higher ODF and PDF. Wor d is also available in some edit ions
level and/or higher power, or ont o t he ot her side of M icr osoft Wor ks. I t is available for t he Windows
of an obst r uct i on, so t hat t he si gnal can cover and M ac platfor ms. The fir st ver sion of Wor d, r eleased
longer dist ances. in t he aut umn of 1983, was for t he M S-DOS oper at ing
6. Server : A ser ver comput er i s a comput er, or system and had the distinction of introducing the mouse
ser ies of comput er s, t hat link ot her comput er s or t o a br oad populat ion. Wor d 1.0 could be pur chased
el ect r oni c devi ces t oget her. They oft en pr ovi de wit h a bundled mouse, t hough none was r equir ed.
essent i al ser vi ces acr oss a net wor k , ei t her t o Following t he pr ecedent s of L isaWr it e and M acWr it e,
private user s inside a lar ge or ganization or to public Wor d for Macintosh attempted to add closer WYSI WYG
users via the inter net. For example, when you enter feat ur es int o it s package. Wor d for M ac was r eleased
a quer y in a sear ch engine, t he quer y is sent fr om in 1985. Wor d for M ac was t he fir st gr aphical ver sion
your computer over t he int er net to t he ser ver s t hat of M icr osoft Wor d. Despit e it s bugginess, it became
st or e all t he r elevant web pages. The r esult s ar e one of t he most popular M ac applicat ions.
sent back by t he ser ver t o your comput er.
EXCEL
EM AI L M i cr osoft Excel i s a spr eadsheet pr ogr am whi ch
E l ect r on i c m ai l , com m on l y cal l ed em a i l or or iginally competed with the dominant Lotus 1-2-3, but
e-mail, is a met hod of exchanging digit al messages eventually outsold it . I t is available for the Windows
fr om an aut hor t o one or mor e r ecipi ent s. M oder n and Mac platfor ms. Micr osoft r eleased the fir st ver sion
email oper at es acr oss t he I nt er net or ot her comput er of Excel for the Mac in 1985, and t he fir st Windows
net wor ks. Some ear ly email syst ems r equir ed t hat ver sion (number ed 2.05 to line up with t he Mac and
t he aut hor and t he r ecipient bot h be online at t he bu n dl ed w i t h a st an dal on e Wi n dow s r u n -t i m e
same t ime, a la i nst ant messaging. Today’s email envir onment) in November 1987.
syst ems ar e based on a st or e-and-for war d model . OU TLOOK
Email ser ver s accept , for war d, del iver and st or e
M icr osoft Outlook (not t o be confused with Out look
messages. Neit her t he user s nor t heir comput er s ar e
Expr ess) is a per sonal infor mation manager and e-mail
r equi r ed t o be onl i ne si mul t aneousl y; t hey need
communication softwar e. The replacement for Windows
connect only br iefly, t ypically t o an email ser ver, for
Messaging, Micr osoft M ail and Schedule+ star ting in
as long as it t akes t o send or r eceive messages.
Office 97, it includes an e-mail client, calendar, t ask
EM AI L ADDREES manager and addr ess book.
An email address ident ifies an email box t o which On t he M ac, M i cr osoft offer ed sever al ver si ons of
email messages ar e deliver ed. An example for mat of Outlook in the late 1990s, but only for use with Microsoft
an email addr ess is lewis @ example .com which is Exchange Ser ver. I n Offi ce 2001, i t i nt r oduced an
r ead as lewis at example dot net . I t has two par t s. The alter nat ive application with a slightly differ ent featur e
par t befor e t he @sign is t he local-par t of t he addr ess, set called Micr osoft Entour age. I t reintr oduced Outlook
oft en t he user name of t he r ecipient lewis and the par t in Office 2011, r eplacing Entour age.
aft er t he @ sign is a domain name i.e. example.com
POWE RPOI N T
t o which t he email message will be sent .
M i cr osof t Power Poi n t i s a popu l ar pr esent at i on
M S OFFI CE pr ogr am for Windows and M ac. I t is used t o cr eat e
M icrosoft Office is a proprietary commercial office suite slideshows, composed of t ext , gr aphics, movies and
of inter-related desktop applications, servers and services ot her object s, which can be displayed on-scr een and
for the Microsoft Windows and Mac OS X oper ating navigat ed t hr ough by t he pr esent er or pr int ed out on
systems, intr oduced by Micr osoft in 1989. I nitially a t r anspar encies or slides.
marketing term for a bundled set of applications, the first
version of Office contained Microsoft Word, Micr osoft
Excel, and Microsoft PowerPoint.
W ORD
Micr osoft Wor d is a wor d pr ocessor and was pr eviously
consi der ed t o be t he mai n pr ogr am i n Offi ce. I t s
pr opr i et ar y DOC for mat i s consi der ed a de fact o
standard, although Word 2007 can also use a new XML-
based, Micr osoft Office-optimized format called .DOCX
which has been st andar dized by Ecma I nt er nat ional
Basics of Computers and Applications 11
PRACTI CE EXERCI SE
OBJECTI VE TYPE QU ESTI ON S 8. I n a gener ic micr opr ocessor, inst r uct ion cycle time
1. Which of t he following is t he fast est ? is
(b) magnet ic t apes and disks (b) lar ger t han machine cycle t ime
(d) sensor s, mechanical cont r oller s (d) exact ly t he same as t he machine cycle t ime
2. The input unit of a comput er 9. Pr ogr am St at us Wor d (PSW) cont ai ns var i ous
(differ ent) st atus of
(a) feeds dat a t o t he CPU or memor y
(a) CPU
(b) r et r ieves dat a fr om CPU
(b) ALU
(c) dir ect s all ot her unit s
(c) pr ogr am
(d) all of t hese
(d) r egist er s
3. Offline device is
10. When an int er r upt occur s, CPU saves t he value
(a) a device which is not connect ed t o CPU
of— — — in a st ack,
(b) a device which is connect ed t o CPU
(a) accumulator
(c) a dir ect access st or age device
(b) pr ogr am st at us wor d (PSW) only
(d) an I /O device
(c) I nstr uct ion Addr ess Counter (I AC)only
4. Which of t he following is a set of gener al pur pose
(d) bot h PWS and I AC
int er nal r egist er s ?
11. Bus Ar bit r at ion is
(a) Stack
(a) clear ing t he bus
(b) Scratchpad
(b) lat ching infor mat ion on t he bus
(c) Addr ess r egist er
(c) deciding t he cont r oller of t he bus
(d) St at us r egist er
(d) cont r olling t he bus
5. A single bus st r uct ur e is pr imar ily found in
12. Cont r ol M emor y Addr ess Regist er is pr esent in
(a) main fr ames
(a) ALU
(b) super comput er s
(b) I nst r uct ion Regist er Unit
(c) high per for mance machines
(c) Cont r ol Unit
(d) mini-and micr o-comput er s
(d) Disk Cont r ol I nt er face Unit
6. Which of t he following r egist er s is used t o keep
t r ack of addr ess of t he memor y locat ion wher e 13. Which of t he fol lowi ng is not one of t he t hr ee
t he next inst r uct ion is locat ed ? pr i mar y funct i ons t hat on-l i ne di r ect access
syst em can ser ve?
(a) M emor y Addr ess Regist er
(a) inquir y
(b) M emor y Dat a Regist er
(b) backup
(c) I nst r uct ion Regist er
(c) update
(d) Pr ogr am Count er
(d) pr ogr amming
7. Which of t he following r egist er s is loaded wit h
t he cont ent s of t he memor y locat ion point ed by 14. Which of the following is not tr ue of punched cards
t he PC ? as dat a ent r y media?
(a) M emor y Addr ess Regist er (a) They can be used as t ur n ar ound document s
(c) I nst r uct ion Regist er (c) I nput is slow compar ed wit h ot her media
15. M agnet ic t ape can ser ve as 7. ASCI I coding all ocat ed bi nar y codes t o Engli sh
(a) input media al phabet s and symbols for comput er use. M or e
r ecent ly a new st andar d has been adopt ed which
(b) out put media
al locat es code t o almost all t he languages of t he
(c) secondar y st or age media wor l d and also t o symbols cover i ng mor e t han a
(d) all of t hese lakh char act er s. The new st andar d is call ed
LEVEL-1 (a) CCS
1. I n t he cont ext of I nfor mat ion Technology, OCR (b) Unicode
means (c) Standar d CCS code
(a) Opt ical Char act er Recognit i on
(d) Univer sal CCS code
(b) Oct agonal Cycl ic Rechar ge
[RRB JE 2014 GREEN SH I FT ]
(c) Oct adecimal Cycli c Regener at i on
8. For using passwor ds on t he I nt er net a soft war e
(d) Opt ical Char act er Regener at i on
is used so t hat t he passwor d is not int er cept ed
[RRB JE 2014 GREEN SH I FT ]
easi ly. I t is call ed
2. I n Boolean algebr a 1 1 0 0 = ? (a) Coding (b) Malwar e
(c) Virus (d) Encr ypt ion
(a) 0 (b) 1
[RRB JE 2014 GREEN SH I FT ]
(c) 2 (d) – 1
[RRB JE 2014 GREEN SH I FT ]
9. A soft war e, codi ng of which is available fr eely on
I nt er net and i s open for user s for fur t her use
3. Which of t he fol lowi ngis not an I /O devi ce of t he
an d i m pr ov em en t an d w h i ch i s gen er al l y
comput er ?
developed in a coll abor at i ve manner is call ed
(a) Keyboar d (b) Joy st i ck
(a) open sour ce soft war e
(c) ALU (d) Pr int er
[RRB JE 2014 GREEN SH I FT ]
(b) unlicensed soft war e
4. W h at i s f l oat i n g poi n t w i t h r ef er en ce t o (c) fr ee soft war e
comput er s? (d) communi t y soft war e
(a) I t i s a soft war e subr out i ne ar ound whi ch [RRB JE 2014 GREEN SH I FT ]
ot her subr out i nes ar e bui lt 10. Wh i ch of t h e f ol l ow i n g ar e m ach i n e l ev el
(b) I t i s a r epr esent at i on of r eal number s t o languages?
facilit at e comput ing
(a) C++ (b) Java
(c) I t i s t h e m ai n al gebr ai c f or m u l a of t h e
(c) Python (d) None of t hese
soft war e
(d) I t i s t h e vol t age poi n t gi v en t o var i ou s [RRB JE 2014 GREEN SH I FT ]
oper at i ng unit s of t he comput er 11. Which of t he fol lowing st at ement s is i ncor r ect ?
[RRB JE 2014 GREEN SH I FT ] (a) M i cr osoft windows is GUI
5. A syst em of di gi t al r u l es for exch an ge and (b) L i nux is GUI
pr ocessi ng of dat a bet ween var i ous devi ces i s
(c) M or e t han 5000 k B dat a can be st or ed in a
called
DVD
(a) soft war e pr ogr amme
(d) A 1 TB fl ash dr i ve can st or e 2 mi ll ion fil es
(b) algor it hm
each of size 1 M B
(c) pr ot ocol
[RRB JE 2014 GREEN SH I FT ]
(d) infor mat ion pr ocessing
12. The t er ms AL U, CPU, I /O devi ces per t ai n t o
[RRB JE 2014 GREEN SH I FT ]
(a) comput er s
6. A t heor et ical comput er wi t h infini t e t ype and
m em or y, u sed i n an al y si s of pr obl em s of (b) envi r onment al engineer i ng
comput at i on, is call ed (c) di esel engi ne
(a) Tape calculat or (b) Babbage machine (d) en gi n eer i n g dr aw i n g an d or t h ogon al
(c) Tur i ng machi ne (d) Theor et ical machi ne pr oject i ons
[RRB JE 2014 GREEN SH I FT ] [RRB JE 2014 GREEN SH I FT ]
Basics of Computers and Applications 13
13. I n a comput ing devi ce 'M H z' is ment i oned in t he 5. Who wr ot e/invent ed t he L inux soft war e?
specifi cat ions. I t r efer s t o (a) M i cr osoft (b) Apple I NC
(a) si ze of memor y (c) IBM (d) None of t hese
(b) speed of comput at i on [RRB SSE 2014 YELLOW SH I FT]
AN SWERS
OBJECTI VE TYPE QU ESTI ON S
1. (a) 2. (a) 3. (a) 4. (b) 5. (d) 6. (d) 7. (c) 8. (b) 9. (a) 10. (d)
11. (c) 12. (c) 13. (d) 14. (b) 15. (d)
LEVEL-1
1. (a) 2. (a) 3. (c) 4. (b) 5. (c) 6. (c) 7. (b) 8. (d) 9. (a) 10. (d)
11. (d) 12. (a) 13. (c) 14. (d) 15. (a)
LEVEL-2
1. (d) 2. (c) 3. (a) 4. (c) 5. (d) 6. (c) 7. (b) 8. (b) 9. (b) 10. (c)
11. (c) 12. (a) 13. (b) 14. (b) 15. (d)
EXPLAN ATI ON S
JOIN US ON
हमारे टे लीग्राम चैनल से जुड़ने के ललए यहाां क्ललक करें –
CLICK HERE
हमारे यट्
ू यब
ू चैनल से जुड़ने के ललए यहाां क्ललक करें -
CLICK HERE
हमारे इांस्टाग्राम पेज से जुड़ने के ललए यहाां क्ललक करें -
CLICK HERE
1) The code for a Web page is written using Hypertext Markup language
2) The first computers were programmed using Machine language
3) A filename is a unique name that you give to a file of information
4) This can be another word for program software
5) Any data or instruction entered into the memory of a computer is considered as storage
6) Which part of the computer displays the work done monitor
7) A series of instructions that tells a computer what to do and how to do it is called a program
8) Hardware is the part of a computer that one can touch and feel .
9) The role of a computer sales representative generally is to determine a buyer’s needs and
match it to the correct hardware and software.
10) Supercomputers refers to the fastest, biggest and most expensive computers
11) Executing is the process of carrying out commands
12) The rectangular area of the screen that displays a program, data, and or information is a
window
13) The process of a computer receiving information from a server on the internet is known as
downloading
14) Disk drive is the part of the computer helps to store information
15) Arithmetic operations include addition, subtraction, multiplication, and division
16) A keyboard is the king of input device
17) An error is known as bug
18) A collection of related information sorted and dealt with as a unit is a file
19) Sending an e-mail is similar to writing a letter
20) IT stands for information technology
21) A menu contains commands that can be selected
22) Plotter, printer, monitor are the group consists of output devices
23) Edit menu is selected to cut, copy and paste
24) The most important or powerful computer in a typical network is network server
25) The primary purpose of software is to turn data into information
26) The ability to find an individual item in a file immediately direct access is used.
27) To make a notebook act as a desktop model, the notebook can be connected to a docking
station which is connected to a monitor and other devices
28) You can use the tab key to move a cursor across the screen, indent a paragraph.
29) A collection of related files is called record.
30) Storage that retains its data after the power is turned off is referred to as non-volatile
storage.
31) Internet is an example of connectivity.
32) Testing is the process of finding errors in software code.
33) A syntax contains specific rules and words that express the logical steps of an algorithm.
34) Changing an existing document is called the editing documentation
35) Virtual memory is memory on the hard disk that the CPU uses as an extended RAM.
36) Computers use the binary number system to store data and perform calculations.
37) The windows key will launch the start buttons.
38) To move to the beginning of a line of text, press the home key.
39) When sending an e-mail, the subject lines describe the contents of the message.
40) Tables, paragraphs and indexes work with when formatting text in word.
41) TB is the largest unit of storage.
42) The operating system tells the computer how to use its components.
43) When cutting and pasting, the item cut is temporarily stored in clipboard.
44) The blinking symbol on the computer screen is called the cursor.
45) Magnetic tape is not practical for applications where data must be quickly recalled because
tape is a sequential because tape is a sequential access medium.
46) Rows and columns are used to organize data in a spread sheet.
47) When you are working on documentation on PC, the document temporarily stored in flash
memory.
48) One megabyte equals approximately 1 million bytes.
49) Information travels between components on the motherboard through buses.
50) RAM refers to the memory in your computer.
51) Computer connected to a LAN can share information and or share peripheral equipment 52)
Microsoft office is an application suite
53) Utilities can handle most system functions that aren’t handled directly by the operating
system
54) If you receive an e-mail from someone you don’t know then you should delete it without
opening it
55) A set of instructions telling the computer what to do is called program
56) LAN refers to a small single site network
57) A collection of programs that controls how your computer system runs and processes
information is called operating system.
58) Device drivers are small, special-purpose programs 59) Transformation of input into
output is performed by the CPU 60) Data going into the computer is called input.
61) Binary choice offer only two options
62) To indent the first paragraph of your report, you should use tab key
63) Fields are distinct item that don’t have much meaning to you in a given context
64) A website address is a unique name that identifies a specific web site on the web
65) Modem is an example of a telecommunications device
66) A set of computer programs used for a certain function such as word processing is the
best definition of a software package
67) You can start Microsoft word by using start button
68) A blinking symbol on the screen that shows where the next character will appear is a
cursor
69) Highlight and delete is used to remove a paragraph from a report you had written
70) Data and time are available on the desktop at taskbar
71) A directory within a directory is called sub directory
72) Testing is the process of finding errors in software code
73) In Excel, charts are created using chart wizard option
74) Microcomputer hardware consists of three basic categories of physical equipment
system unit, input/output, memory
75) Windows is not a common feature of software applications
76) A tool bar contains buttons and menus that provide quick access to commonly used
commands
77) For creating a document, you use new command at file menu
78) Input device is equipment used to capture information and commands
79) A programming language contains specific rules and words that express the logical
steps of an algorithm
80) One advantage of dial-up internet access is it utilizes existing telephone security
81) Protecting data by copying it from the original source is backup
82) Network components are connected to the same cable in the star topology
83) Two or more computers connected to each other for sharing information form a network
84) A compute checks the database of user name and passwords for a match before
granting access
85) Computers that are portable and convenient for users who travel are known as laptops
86) Spam is the term for unsolicited e-mail
87) Utility software type of program controls the various computer parts and allows the user
to interact with the computer
88) Each cell in a Microsoft office excel document is referred to by its cell address, which is
the cell’s row and column labels
89) Eight digit binary number is called a byte
90) Office LANs that are spread geographically apart on a large scale can be connected
using a corporate WAN
91) Storage is the process of copying software programs from secondary storage media to
the hard disk
92) The code for a web page is written using Hyper Text Markup Language
93) Small application programs that run on a Web page and may ensure a form is
completed properly or provide animation are known as flash
94) In a relational database, table is a data structure that organizes the information about a
single topic into rows and columns
95) The first computers were programmed using assembly language
96) When the pointer is positioned on a hyperlink it is shaped like a hand
97) Booting process checks to ensure the components of the computer are operating and
connected properly
98) Checking the existing files saved on the disk the user determine what programs are
available on a computer
99) Special effect used to introduce slides in a presentation are called animation
100) Computers send and receive data in the form of digital signals
101) Most World Wide Web pages contain HTML commands in the language
102) Icons are graphical objects used to represent commonly used application
103) UNIX is not owned and licensed by a company
104) In any window, the maximize button, the minimize button and the close buttons appear
on the title bar
105) Dial-up Service is the slowest internet connection service
106) Every component of your computer is either hardware or software
107) Checking that a pin code number is valid before it is entered into the system is an
example of data validation
108) A compiler translates higher level programs into a machine language program, which is
called object code
109) The ability to find an individual item in a file immediately direct access
110) Computers connected to a LAN can share information and/or share peripheral
equipment
111) A CD-RW disk can be erased and rewritten
112) The two major categories of software include system and application
113) Windows 95, Windows 98 and Windows NT are known as operating systems
114) Information on a computer is stored as analog data
115) A spread sheet that works like a calculator for keeping track of money and making
budgets
116) To take information from one source and bring it to your computer is referred to as
download
117) Each box in a spread sheet is called a cell
118) Network components are connected to the same cable in the bus topology
119) Two or more computers connected to each other for sharing information form a network
120) A computer checks the database of user names and passwords for a match before
granting access.
121) Spam is the other name for unsolicited e-mail
122) Operating system controls the various computer parts and allows the user to interact
with the computer
123) Each cell in a Microsoft Office Excel document is referred to by its cell address, which
is the cell’s row and column labels
124) Download is the process of copying software programs from secondary storage media
to the hard disk
125) The code for a web page is written using Hypertext Markup Language
126) Small application programs that run on a web page and may ensure a form is
completed properly or provide animation are known as Flash
127) A file is a unique name that you give to a file of information
128) For seeing the output, you use monitor
129) CDs are of round in shape
130) Control key is used in combination with another key to perform a specific task
131) Scanner will translate images of text, drawings and photos into digital form
132) CPU is the brain of the computer
133) Something which has easily understood instructions is said to be user friendly
134) Information on a computer is stored as digital data
135) For creating a document, you use new command at file menu
136) The programs and data kept in main memory while the processor is using them
137) Ctrl + A command is used to select the whole document
138) Sending an e-mail is same as writing a letter
139) A Website address is a unique name that identifies a specific website on the web 140)
Answer sheets in bank PO’s/Clerk’s examinations are checked by using Optical Mark
Reader
141) Electronic data exchange provides strategic and operational business opportunity
142) Digital signals used in ISDN have whole number values
143) Assembler is language translation software
144) Manual data can be put into computer by scanner
145) In a bank, after computerization cheques are taken care of by MICR
146) The banks use MICR device to minimize conversion process
147) Image can be sent over telephone lines by using scanner
148) Microchip elements are unique to a smart card
149) MS-DOS is a single user operating system
150) Basic can be used for scientific and commercial purpose
151) All computers can execute machine language programs
244) Vertical-market applications can handle most system functions that aren’t handled
directly by the operating system
245) Device drivers are small, special-purpose programs
246) LAN refers to a small, single-site network
247) A set of instructions telling the computer what to do is called program
248) Data going into the computer is called input
249) If you receive an e-mail from someone you don’t know, then delete it without opening it
250) Two options does a binary choice offer
251) A collection of programs that controls how you computer system runs and processes
information is called operating system
252) Rows and columns are data organized in a spreadsheet
253) When cutting and pasting, the item cut is temporarily stored in clipboard
254) When you are working on a document on a PC, the document is temporarily stored in
flash memory
255) One megabyte equals approximately 1 million bytes
266) A cluster represents a group of sectors
267) Digital signals used in ISDN have discrete values
268) Assembler is language translation software
269) Manual data can be put into computer by scanner
270) Bandwidth means channel capacity amount of data following via cables and measure of
speed
271) Chip can keep maximum data
272) Debugging is the process of finding errors in software code
273) Time Bomb are viruses that are triggered by the passage of time or on a certain data
274) Linux is an open source operating system
275) Boot sector viruses are often transmitted by a floppy disk left in the floppy drive
276) Operating system controls the way in which the computer system functions and
provides a medium by which users can interact with the computer
277) Servers are computers that provide resources to other computers connected to a
network
278) Field names describe what a data field is
279) You must install router on a network if you want to share a broadband internet
connection
280) A goal of normalization is to minimize the number of redundancy
281) Programs from the same developer, sold, bundled, together, that are provide better
integration and share common features, tool box and menus are known as software
suits
282) A data ware house is one that organizes important subject areas
283) URL term identifies a specific computer on the web and the main page of the entire site
284) A proxy server is used to process client request for web pages
285) When data changes in multiple list and list are not updated, this causes data
inconsistency
286) Granting an outside organization access to internet web pages is often implemented
using a extranet
287) The code that relational database management systems use to perform their database
task is refer to as SQL
288) URL stands for Uniform resource locator
289) A data base management system is a software system used to create, maintain and
provide controlled access to a database
290) The two broad categories of software are system and application
291) The metal or plastic case that holds all the physical parts of the computer is known as
system unit
292) Data integrity means that the data contained in the database is accurate and reliable
293) A local area network is a private corporate network used exclusively by company
categories
294) Eight bits equal to one byte
295) A byte can hold one character data
296) A characteristic of a file server is manages files operations and is shared on a network
298) The development process of computer started in 1617
299) The role of Blaze Pascal in the development of computer is addition and subtraction of
numbers
300) The inventor of computer is Charles Babbage
301) The IBM made the first electronic computer in 1953
302) The silicon based transistor started to made by Gordon Tin in 1954
303) IBM is a company
304) The personal computer invented in 1981
305) 1 Kilobyte is equal to 1024 bytes
306) LCD means liquid crystal display
307) UPS converts DC voltage into AC voltage
308) The word ZIP means Zicxac Inline Pin
309) With the help of Pal switch we can increase or decrease the speed of computer’s
processing
310) The full form of MICR is magnetic ink character reader
311) Swift networks are used between banks
312) Panda is a virus
313) Boot sector is hardware
314) Debug searches the fault of any software
315) OCR means optical character recognition
316) The total printout of a program is called listing
317) With the help of ZIP we can decrease the size of any programs
318) We can format the hard disk with the help of Booting
319) CANNED is called as readymade software
320) The process of creating third file by mixing two files is called as mail merging
321) The figures and lines etc. made by computer is called as graphics
322) Each line represents 65 letters in a WordStar
323) Nokia- 7500 is not the example of Micro Processor
324) The first name of the digital computer is Unvake
325) The modern computer was invented in 1946
326) The full form of DOS is disk operating system
327) The expanded form of FORTRAN is formula translation
328) The great revolution came in computer sector in 1960
329) Magnetic tape is called as Input device of computer
330) The first mechanical computer of Charles Babbage is known as punch card machine
331) The IC chip used in computer is generally made in silicon
332) Telephone broadcast is the example of simplex transmission
333) Optical, Mechanical are the kinds of mouse
334) Control panel is used for increasing and decreasing the speed of the cursor of mouse
335) The capacity of modern main frame digital computer is 10(to the power of -12) mbps
336) With the help of my computer we can know about the usage and availability of space in
computer
337) We use both MS-Word and page maker for making resume
338) Earliest computers that would work with FORTRAN was second generation
339) Back Ups in database are maintained for to restore the lost data
340) IDEA is a encryption technique
341) DBRM takes care of storage of data in a database
342) The job of DBMS is to decrease redundancy
343) Digital signatures use encryption for authenticating
344) OS acts as intermediary agency between user and hardware
345) Plotters gives the highest quality output
346) ROM is built in memory in computer
347) FLASH is a RAM
348) PRAM is not a RAM
349) FLASH device is used in cell phones
350) Internal storage is same as the primary storage
351) IMAC is name of a machine
352) First generation computers could do batch processing
353) The analytic engine was created by Charles Babbage
354) Voicemail of GSM service provider has the personal security code for its subscribers
355) Senior manager decided about the division of work with respect to IT security
356) Encrypting file system of window XP professional operating system protects the data of
a user, even if the computer is shared between users
357) The .mpeg is the format of a movie file
358) Controlling is NOT required for high level language program before it is executed
359) A plotter is output device
360) 80286 is a hardware part of microprocessor
361) Top-bottom approach can not be the measure of network traffic
362) A switching mode power supply is used for converting raw input power to stabilize DC
power
363) Spooler can manage the whole printing process
364) Validity routines control procedures can be used to ensure completeness of data
365) Less expensive than leased line networks is not a characteristic of virtual private
networks (PVN)
366) Program policy framework provides strategic direction to an organization
367) Cross bar switches have common control
368) Row-level security is the most basic part for database security
369) Voice recognition software can not be used for converting text into voice
370) The user account can only be created by the network administrator
371) IBM-700 belongs to second generation
372) Allocating adequate bandwidth would help her in speeding up the data transfer over net
373) BCD means binary coded decimal
374) Extended system configuration data is same as BIOS
375) Digitizer is an input device
376) Caramel is the latest platform of Intel Centrio microprocessor
377) RISC is known as storage device
378) NORTON is an anti-virus
379) The system file of an operating system is COM
380) ATMs of bank have real currency
381) A program that converts high level language to machine language is assembler
548) Algorithms can handle most system functions that aren’t handled directly by the
operating system
549) Device drivers are small, special-purpose programs
550) LAN refers to a small, single site network
551) A collection of programs that controls how your computer system runs and processes
information is called operating system
552) When we are working on a document on a PC the document is temporarily stored in
RAM
553) Information travels between components on the motherboard through buses
554) Microsoft is a vertical market application
555) RAM refers to the memory in your computer
556) Computers connected to a LAN can share information and / or share equipment
557) Magnetic tape is not practical for applications where data must be quickly recalled
because tape is a sequential access medium
558) In Late 1988 computer viruses land in India for the first time
559) ALU is a part of the CPU
560) In computer technology a compiler means a program, which translates source program
into object program
561) American computer company IBM is called big blue
562) The first IBM PC did not have any ROM
563) The digital computer was developed primarily in UK
564) Programs which protect a disk from catching an infection are called antidotes
565) The first movie with terrific computer animation and graphics was released in 1982 is
Tron
566) An integrated circuit is fabricated on a tiny silicon chip
567) The word size of a microprocessor refers to the amount of information that can be
stored in the byte
568) Daisy-wheel printer cannot print graphics
569) In the IBM PC-AT, the word AT stands for advanced terminology
570) Dedicated computer means which is assigned one and only one task
571) Real time programming type of computers programming is used for aero plane ticket
reservation system
572) RAM means memory which can be both read and written to
573) Laser printer uses light beam and electro statically sensitive black powder
574) The Santa Clara Valley, California is popularly known a Silicon Valley of America
because many silicon chip manufacturing firms are located there
575) A program written in machine language is called assembler
576) International business machine was the first company in the world to build computer for
sale
577) PARAM is a parallel computer
578) For communications, wide area networks use special purpose telephone wires and
fiber optic cables and microwaves
579) Data transfer rate in modems is measured in bits per second
580) A compiler cannot detect logical errors in source programs
581) Throughput, turnaround time, response time are measures of system performance
582) OLTP architecture can handle a limited number of dimensions whereas OLAP
architecture does not have any limit on the number of dimensions 583) The binary
equivalent of (40.125) suffix 10 is 101000.001
584) Kernel is the only art of an operating system that a user cannot replace or modify
585)
Symbol signifies a magnetic disk
586) COBOL programming language was initially developed for consumer electronics goods
587) Running, blocked, ready, terminated are different states of a process
588) Rational rose is an example of a modeling language
589) A disk worm is an example of optical devices
590) A RAID is a disk array
591) The first private internet service provider in India was Satyam infoway
592) The maximum and minimum unsigned number which can be stored in a 8 bit word is 0
and 255
593) Stack is a part of memory
594) HIT RATIO is associated with cache performance
595) Laser printer is a page printer
596) Storage capacity of a disk system depends upon number of recording surfaces and
number of sectors per track
597) Abstraction is associated with object oriented technology and database technology
598) The terms opcode and operand are associated with any high level language
599) Dynamic binding is associated with object oriented programming
600) The term CHIP, JEWELLARY means a processor with high capacity
601) A watch point is associated with debugger
602) A multithreaded program uses multiple processes
603) Time sharing is a mechanism to provide spontaneous interactive use of a computer
system by many users in such a way that each user is given the impression that he/she
has his/her own computer
604) The typical scheme of memory management used in IBMOS/360 mainframe system
was that of multiprogramming with variable number of memory partitions
605) The concepts used for realization of virtual memory are swapping, demand paging and
In-line secondary storage
606) Oracle 8i is an example of OORDBMS
607) ALPHA, RIOS, SPARC are examples of RISC Processors
608) The scope of an identifier refers to where in the program an identifier is accessible
609) Hierarchy is not a component of relational database
887) In programming languages the key word “Void” means it does not return any value
when finished
888) The keyboard shortcut to restart your computer is Ctrl + Alt + Del
889) FORTRAN is not a programming language
890) The instruction LOAD A is a one address instruction
891) MS-Excel is also known as spread sheet
892) Manchester encoding is used in Ethernet technology
893) The instruction of a program which is currently being executed are stored in main
memory
894) In DOS environment, the command used to save the file is ^Z
895) All high level language uses compiler and interpreter
914) The “Nyquist theorem” specifies the minimum sampling rate to be twice the bandwidth
of a signal
915) Memory allocation at the routine is known as dynamic memory allocation
916) In HTML loading, <BR> tag is used for displaying a new line
917) HTTP protocols are used by internet mail
918) A policy on firewalls needs not ensure that it is logically secured
919) The script which is designed to receive value from the web users is java script
920) GET method and HEAD method is the C91 method of involving a C91 program
921) Analog switched line telephone service is least expensive
922) A toll used to find a synonym or antonym for a particular word is thesaurus
923) In C++ coding, Cout<<”tent”; is used to display character or strings or numeric screen
924) In this processing, a number of jobs are put together and executed as a group batch
processing
925) The process of finding and correcting errors in a program is a process called debugging
926) cn pass command is used to change your password in UNIX system
927) HTML code is always starts with <html></html>
928) If there are 5 routers and b networks in an internet work using link state routing, there
will be 5 routing tables
929) A scripting language similar to HTML and which runs only on a browser is java script
930) By RAID technique, data is stored in several disk units by breaking them into smaller
pieces and storing each piece in separate disk
931) The most popular network protocol whose routing capabilities provide maximum
flexibility in an enterprise wide network is known as TCP/IP
932) New group that enable you to communicate with other Microsoft windows user about
issues and concerns with your computer
933) Analog-digital conversion type needs sampling of a signal
934) In an optical fiber, the inner core is less dense than the cladding
935) Six types of heading are available in HTML
936) RDBMS is an acronym for relational database management system
937) In MS-Word, page layout view is also known as true WYS/WYG
938) In HTML coding, <UL> (Unordered list) is used to give bullets in your document 939)
Transmission media are usually categorized as guided or unguided
940) A virtual circuit is the physical connection between an end point and a switch or
between two switches
941) Passing of the frame to next station can happen at a token ring station
942) R-C coupling method is suitable for voltage amplification
943) Normal is not a type of HTML pages
944) In HTML coding <LI> tag is used for denoting items in a list of type <UL>
945) In MS-Word the keyboard shortcut F7 used for spelling and grammar check
946) DBMS is not an operating system
947) HTML is basically used to design web-site
948) In HTML coding, Dynamic web-pages are created in advance of the user’s request
949) In Dos, primary name of a file can have a maximum of 10 characters
950) du command is used to show file system disk usage in UNIX
951) Maximum length of a text file is 255 characters
952) Frame format of CSMA/CD and Ethernet protocol differ in the block error control
953) On an Ethernet LAN implementation with 10 base 5 the maximum number of segments
can be five
954) Overflow condition in linked list may occur when attempting to create a node when
linked list is empty
955) Code segment register is where the microprocessor looks for instruction
956) Web-site is collection of web-pages and Home-page is the very first page that we see
on opening of a web-site
957) The subsystem of the kernel and hardware that cooperates to translate virtual to
physical addresses comprises memory management subsystem 958) A device
operating at the physical layer is called a repeater
959) FORTRAN is a mathematically oriented languages used for scientific problems
960) If we want to convert the text which is in small letters to capital letters then select the
required text and press Shift +F3
961) Datagram packet switching uses the entire capacity of a dedicated link
962) In the datagram approach to packet switching, each packet of a message follows the
same path from sender to receiver
963) FDM technique transmits analog signals
964) X.21 protocol consists of only physical level
965) In a dedicated link, the only traffic is between the two connected devices
966) In a start topology, if there are n devices in network, each device has n-1
967) A unique number assigned to a process when the process first starts running PID
968) Modems is necessary for multiplexing
969) In MS-Word WYSIWYG stands for what you see is where you get
970) The primary purpose of shutdown procedure in UNIX system is that all active process
may be properly closed
971) In time- division circuit switching, delivery of data is delayed because data must be
stored and retrieved from RAM
972) Subnet usually comprises layers 1 & 2, layer 1 through 3 of OSI model
973) An image in a web-page can be aligned left and right using HTML coding
974) RFC stands for request for comment
975) Packet filtering firewall and proxy firewall is not a type of firewall
1066) In MS-Word, ‘mail merge’ can be defined writing a letter once and dispatching it to a
number of recipients
1067) Coaxial cables are good for digital transmission and long distance transmission
1068) LRU is a page replacement policy used for memory management
1069) Commercial TV is an example of distributive services with user control
1070) The exact format of frame in case of synchronous transmission depends on whether
transmission scheme is either character oriented or bit oriented
1071) RING topology is least affected by addition/remove of a node
1072) EX-OR gates recognizes only words that have an odd number of 1
1122) Attair, the world’s first personal computer, was introduced in the year 1979
1123) Half duplex data flows in both directions, but any one direction at the time
1124) Ring requires a central controller or hub
1125) The OSI model consists of seven layers
1126) The main job of one of the following is to allocate CPU to processes scheduler
1127) 10,500 valid Min & Max zoom sizes in MS office
1128) Before printing a document you should always use print preview
1129) Excel XP is the latest version of excel
1130) A worksheet can have a maximum of 256 number of rows
1131) Character is not a valid data type in Excel
1132) Formula bar in an Excel window allows entering values and formulas
1133) Direct memory access is a technique for transferring data from main memory to a
device without passing it through the CPU
1134) 5 30-bit SIMMS are required to populate a bank on a 486 system that has a 32-bit
data bus
1135) SRAM uses a clock to synchronize a memory chip’s input and output signal
1136) Cycle-stealing type of DMA transfer will operate when a CPU is operating
1137) A series 100 POST error code indicates a problem with the system board
1138) You have an old PC that you decide to upgrade with a 1 gig IDE hard drive. You find
that you can’t configure CMOS to see the entire hard drive. The best you can do is
540 meg. Then use a device driver that makes the bios see the drive as
1139) When SHADOWING is enabled in computers BIOS Instructions stored in various
ROM chips are copied into
1140) POST stands for power on self test
1141) Checking the hard disk while running Windows 3.1, you discover a very large file
called 396SPART.PAR. That file is windows permanent swap file
1142) CMOS contains the computer BIOS and maintains its data with the use of a battery for
periods when the system is powered down
1143) TSR stands for terminate and stay
1144) LAN is not an inter network
1145) Memory is temporary and storage is permanent
1146) Echo checking cannot assure data accuracy in an application
1147) Focus on manual records is not necessary for computerization system in a bank
1148) Permanent establishment, residence-based, Income based classification are the
approaches used to tax online transactions
1149) Computer of computer communication for business transactions is called EDI
1150) Client-server computing is used in Network multi-media
1151) Back up of files is taken for security
1152) Operating system is not a software category
1153) Computer program looking “normal” but containing harmful code is infected by Trojan
horse
1154) Private key is used to append a digital signature
1155) Most dangerous risk in leaking of information is ignorance about the existence of risk
1156) IMAP (Internet message access protocol) takes care of E-mail at client side
1157) The CPU has control unit, arithmetic-logic unit and primary storage
1158) 1st generation computer is the bulkiest PC
1159) E-R diagram represents relationship between entities of system
1160) User is technically least sound
1161) Minicomputers is not there during fourth generation computer
1162) Microchip is unique to a smartcard
1163) Internet was started as network for defences forces of America
1164) A program permanently stored in hardware is called firmware
1165) Taking back-up of a file against crash is a curative measure
1166) Simplex transmission technique permits data flow in only one direction
1167) Front end processor relieves the host computer from tedious jobs and does them
itself
1188) 30 pin SIMM’s, 72 pin SIMM’s, 168 pin DIMM’s types of RAM sockets can be seen on
mother boards
1189) The Power on self test determines the amount of memory present, the date/time, and
which communications ports and display adapters are installed in a microcomputer
1190) Virtual memory refers to using a file on the hard disk to simulate RAM
1191) BIOS (ROM) is considered firmware
1192) A population application of computer networking is the WWW of newsgroup called
Netnews
1193) a = 10; export a is a valid command sequence in UNIX
1194) Set date will you give in UNIX to display system time
1195) Circuit switched network networks requires that all channels in a message
transmission path be of the same speed
1196) The Vi program available under UNIX can be created to open a virtual terminal
1197) A 4-bit ring counter is initially loaded with 1001
1198) The standard defined for fiber optics is 802.8
1199) Digitizers can be converted from “dumb” to “smart” through the addition of a
microprocessor
1200) The extension of database file is given by dbf
1201) VRML code is based on Unicode
1202) Use net discussion groups have their own system of organization to help you find
things just as internet excel
1203) Http protocol is used for WWW
1204) Protocol conversion can be handled by gateway
1205) In ISDN teleservices, the network can change or process the contents of data
1206) A longer instruction length may be -1024 to 1023
1207) A microprocessor is a processor with a reduced instruction set and power requirement
1208) The term server refers to any device that offers a service to network users
1209) Using HTML, Front page, DHTML we can make web-site
1210) Usually security in a network is achieved by cryptography
1211) PSTN stands for public switched telephone network
1212) A thyratron cannot be used as a amplifier
1213) An input device conceptually similar to mouse is joystick
1214) Netscape navigator and other browsers such as the internet explorer are available
free on the internet
1215) In MS-logo Bye command is used to come out from that screen
1216) In C++ programming, the command to save the program file is F3
1217) Data lines which provide path for moving data between system modules are known as
data bus
1218) Bubble sort technique does not use divide and conquer methodology
1219) The OSI model shows how the network functions of computer to be organized
1220) A 8 bit microprocessor must have 8 data lines
1221) A protocol that permits the transfer of files between computer on the network is FIP
1222) A data structure, in which an element is added and removed only from one end is
known as stack
1223) In linked list, the successive elements must occupy contiguous space in memory
1224) In OSI model reference, layer 2 lies in between the physical layer and the network
layer
1225) In synchronous TDM, for n signal sources, each frame contains at least n slots
1226) Mouse and joystick are graphic input devices
1227) In linked list, a node contains at least node number, data field
1228) Gopher is not a web browser
1229) Device drivers controls the interaction between the hardware devices and operating
systems
1230) The shortest path in routing can refer to the least expensive path
1231) An ordinary pen which is used to indicate locations on the computer screen by
sensing the ray of light being emitted by the screen, is called light pen
1232) Netiquettes are some rules and regulations that have to be followed by users
1233) Gateway uses the greatest number of layers in the OSI model
1234) A set of standards by which servers communicate with external programs is called
common gateway interface
1235) UNIVAC is a computer belonging to third generation
1236) API allows a client/server relationship to be developed between an existing host
application and a PC client
1237) Semi-insulator is a substance which has resistivity in between conductors and
insulators
1238) Multi vibrator is a two stage amplifier with output of one feedback to the input of the
other
1239) Macro is used to automate a particular task or a series of tasks
1240) Internet is network of networks
1241) A set of devices or combination of hardware and software that protects the systems
on one side from system on the other side is firewall
1242) Simple, transparent, multi post are bridge types
1243) When bandwidth of medium exceeds the required bandwidth of signals to be
transmitted we use frequency division multiplexing
1244) Direct or random access of element is not possible in linked list
1245) In Dos, the “Label” command is used to display the label of disk
1246) At the lower end of electromagnetic spectrum we have radio wave
1247) In Word, Ctrl + Del combination of keys is pressed to delete an entire word
1248) Plotters are very useful in applications such as computer aided design
1249) Web browser is a type of network application software
1250) 65535 characters can be typed in a single cell in Excel
1251) Overtime analysis is useful for formulating personnel policies and derived form the
payroll system
1252) Multiple worksheets can be created and used at a time
1253) UNIX is both time sharing and multiprogramming system
1254) Floppy Disk is universal portable and inexpensive but has its own limitation in terms of
storage capacity and speed
1255) Personal computers currently sold in India have main memories at an entry level in
the range of megabytes
1256) UNIX has better security for files relative to MS-DOS
1257) The UNIX operating system has been written in C language
1258) Syntax errors is flagged by compilers
1259) PARAM is an example of super computer
1260) Mother board holds the ROM, CPU, RAM and expansion cards
1261) CD-ROM is as a magnetic memory
1262) The binary number system has a base 2
1263) GUI is used as an interface between software and user
1264) E-mail is transaction of letters, messages and memos over communications network
1265) Device drivers are small , special purpose programs
1266) LAN refers to a small, single site network
1267) One megabyte equals approximately 1 million bytes
1268) Magnetic tape is not practical for applications where data must be quickly recalled
because tape is a sequential access medium
1269) User id, URI and time stamp is not used by organization when a user visits its site
1270) DBRM takes care of storage of data in a data base
1271) Plotters give the highest quality output
1272) Encrypting file system features of windows XP professional operating system protects
the data of a user, even if the computer is shared between users
1273) Loading is not required for high level language program before it is executed
1274) Top – bottom approach cannot be the measure of network traffic
1275) Devices such as magnetic disks, hard disks, and compact disks, which are used to
store information, are secondary storage devices
1276) Various input and output devices have a standard way of connecting to the CPU and
Memory. These are called interface standards
1277) The place where the standard interfaces are provided to connect to the CPU and
Memory is known as Port
1278) Binary numbers are positional numbers
1279) The base of the hexadecimal system is sixteen
1280) Display capabilities of monitor are determined by adapter card
1281) Mouse has a use in graphical user interface and applications as input device
1282) Drum plotter, flat bed plotter, graphic display device is an output device
1283) The time taken to write a word in a memory is known as write name
1284) 1 MB is equivalent to 2 (to the power of 20 bytes)
1285) A memory cell, which does not loose the bit stored in it when no power is supplied to
the cell, is known as non-volatile cell
1286) Magnetic surface recoding devices used in computers such as hard disks, floppy
disks, CD-ROMs are called secondary / auxiliary storage devices
1287) The electronic circuits / devices used in building the computer that executes the
software is known as hardware
1288) Assembler is a translator which translates assembly language program into a machine
language program
1289) Interpreter is a translator which translates high level language program into a machine
language program
1290) Machine language programs are machine dependent
1291) The programs written in assembly language are machine independent
1292) High level languages are developed to allow application programs, which are machine
independent
1293) The Vacuum tubes are related to first generation computers
1294) Mark I was the first computer that used mechanical switches
1295) First generation computers relied on machine language to perform operations, and
they only solve one problem at a time
1296) In first generation computers input was based on punched cards
1297) In second generation computers input was based on print outs
1298) Vacuum tube generates more energy and consumes more electricity
1299) Second generation computers moved from cryptic binary machine language to
symbolic, or assembly languages which allowed programmers to specify instructions
in words
1300) Most electronic devices today use some form of integrated circuits placed on printed
circuit boards thin pieces of bakelite or fiberglass that have electrical connections
etched onto them is called mother board
1301) The operating system, which allowed the device to run many different applications at
one time with a central program that monitored the memory was introduced in third
generation computers
1302) In third generation computers, users interacted through keyboards and monitors
1303) The fourth generation computers saw the development of GUIs, the mouse and
handheld devices
1304) First computers that stored instructions in memory are second generation computers
1305) In second generation computers transistors replaced vacuum tubes
1306) The micro processor was introduced in fourth generation computer
1307) Integrated Circuits (IC) are introduced and the replacement of transistors started in
third generation computers
1308) Fifth generation computing is based on artificial intelligence
1309) Assembly language is low-level language
1310) In assembly language mnemonics are used to code operations, alphanumeric
symbols are used for address, language lies between high-level language and
machine language
1311) The computer’s secondary memory is characterized by low cost per bit stored
1312) Acknowledgement from a computer that a packet of data has been received and
verified is known as ACK
1313) Acoustic coupler is a communications device which allows an ordinary telephone to be
used with a computer device for data transmission
1314) ALGOL is a high-level language
1315) A high level programming language named after Ada Augusta, coworker with Charles
Babbage is Ada
1316) Adder is a logic circuit capable of forming the sum of two or more quantities
1317) To identify particular location in storage area one have a address
1318) A local storage register in the CPU which contains the address of the next instruction
to be executed is referred as address register
1319) A sequence of precise and unambiguous instructions for solving a problem in a finite
number of operations is referred as algorithm
1320) PC/AT is an example of Bi-directional keyboard interface
1321) DIMM is not an I/O bus
1322) PCI bus is often called as mezzanine bus
1323) 8088 is an original IBM PC inter CPU chip
1324) 80386 is a 32-bit processor
1325) A Pentium or Pentium pro board should run at 60 or 66 MHZ
1326) The maximum bandwidth of EISA bus is 33 M/sec
1327) A computer system runs millions of cycles per second so that speed is measured in
MHz
1328) Heat sink is the metal device that draws heat away from an electronic device
1329) Pentium chip has 64 bit & 32 bit registers
1330) A mother board should contain at least 4 memory sockets
1331) The 1.2 MB drive spin at 360 rpm
1332) Intensity of sound is called amplitude
1333) A single zero bit is called starting bit
1334) PnP stands for plug and play
1382) The server’s network adapter card is its link to all the work stations on LAN
1383) Magnetic drives such as floppy and hard disk drives operate by electro magnetism
1384) Clock timing is used to determine that start and end of each bit cell
1385) Head designs are of 4 types
1386) Latency is the average time that it takes for a sector to be a available after the heads
1387) Each sector is having 512 bytes
1388) DDD means digital diagnostic disk
1389) PC Technical is written in assembly language and has direct access to the system’s
hardware for testing
1390) Check it pro deluxe gives detailed information about the system hardware
1391) The last 128k of reserved memory is used by mother board
1392) There are 80 cylinders are there for an 1.44 m floppy
1393) IBM changed ROM on the system to support key boards
1394) +12 V signal for disk drive is used for power supply
1475) Browser is a link between the computer and the internet. It’s actually a program that
provides a way to look in the hand interact with all information on the internet. A
browser is a client program that uses the Hypertext Transfer Protocol (http) to make
requests of Web servers throughout the Internet on behalf of the browser user.
1476) CIO (Chief information officer) : The senior executive in a company responsible for
information management and for delivering IT services
1477) Client/server architecture: A type of network in which computer processing is
distributed among many individual PCs and a more powerful, central computer clients
can share files and retrieve data stored on the server
1478) Collaborative software: Groupware, such as Lotus Notes or Microsoft Exchange
1479) Computer-Aided design: Refers to any computer-enabled method of design also
called computer-assisted design.
1480) Commuter: A group of electronic device used for performing multipurpose tasks
1481) Channel: It consists of controller card, interface cable and power supply
1482) CORBA: CORBA is the acronym for Common Object Request Broker Architecture
1483) CBT: Computer based training
1484) Certification: Skills and knowledge assessment process
1485) Computer Crime: The act of stealing, cheating or otherwise defrauding an
organization with the use of a computer
1486) Cyber café: Café offering internet browsing facility
1487) Cryptography: Method used to protect privacy and security on the internet
1488) DBMS: An acronym for the database management system. A program that maintains
and controls the access to collection of related information in electronic files
1489) Data: Facts coded and structured for subsequent processing, generally using a
computer system
1490) Digital signature: Encrypted signature used for providing security for the
messages/data transferred through the internet
1491) Digital computer: A device that manipulates discrete data and performs arithmetic and
logic operations on these data
1492) Data transmission: The movement of data from one location of storage to another. If
the locations are geographically far away, generally done via satellites.
1493) Disk Mirroring: The data is written on two or more hard disks simultaneously over the
same channel
1494) Disk Duple Xing: The data is written on two or more hard disks simultaneously over
the different channel
1495) Dumb Terminals: Hardware configuration consisting of a keyboard and monitor that is
capable of sending and receiving information but has no memory or processing
capabilities.
1496) Download: Process of transferring a file system from one system to another
1497) E-commerce: Business transactions conducted over extranets or the internet
1498) Enterprise, resource planning: An integrated system of operation application
combining logistics, production, contract and order management, sales forecasting
and financial and HR management
1499) Electronic data interchange (EDI) : Electronic transmission or documents through
point to point connections using a set of standard forms, message and data elements,
this can be via leased lines private networks or the internet
1500) Data processing: It is a method concerning with the systematic recording, arranging,
filing, processing and dissemination of facts of business
JOIN US ON
हमारे टे लीग्राम चैनल से जुड़ने के ललए यहाां क्ललक करें –
CLICK HERE
हमारे यूट्यूब चैनल से जुड़ने के ललए यहाां क्ललक करें -
CLICK HERE
हमारे इांस्टाग्राम पेज से जुड़ने के ललए यहाां क्ललक करें -
CLICK HERE
ASHUTOSH SHUKLA OFFICIAL
JOIN US ON
- COMPUTER ONE LINER -
➤ WORM stands for? - Write Once Read Memory
➤ The technique that extends storage capacities of main memory beyond the actual size of the main
memory is called - Virtual storage
➤ Algorithm is used ------- -To describe a set of procedure by given result is obtained
➤ When more than one window is open, to switch to the next window—is the key combination. -
CTRL+F6
➤ Where are data and program stored when the processor uses them ? - Main memory
➤ In CSMA/CD, the computer sends a fixed unit of data called a(n) . - Packet.
➤ A global network made up of thousands of privately owned computers and networks is called
the: -Internet.
➤________ is NOT a basic function of the operating system?- Provide the word processing
system.
➤ Virtual memory is? Memory on the hard disk that the CPU uses an extended RAM
➤ What is the shortcut key to "Undo" the last action in a document? -Ctrl + Z
➤ The programs which are as permanent as hardware and stored in ROM is known as –Firmware
➤ Computer uses the _number system to store data and perform calculations. -Binary
➤ In word, when you indent a paragraph, you....-push the text in with respect to the margin
➤________ is used by the browser to connect to the location of the Internet resources ? URL
➤________ is the process of dividing the disk into tracks and sectors. Formatting
➤ What is the permanent memory built into your computer called ? -ROM
➤ Which computer memory is used for storing programs and data currently being processed by
the CPU?
Different Destination
➤ What is a popular program for creating documents that can be read on both a PC and A Macintosh
computer? -Adobe Acrobat
➤ What does dots per inch (DPI) measure? -density of the pixels ona computer screen
➤ What type of software creates a smaller file that is faster to transfer over the Internet?
- Compression
➤ A unit of computer information that contains data as well as all the procedures or operations
is called- An object.
➤ The most widely used type of database management system is the - Relational database
➤ What is the newest type of database, which is well suited for multimedia applications, called?
➤ The type of printer that prints by selectively unchanging static electricity from spots on a
➤ A warm boot in older versions of Windows is caused by - Typing the Ctrl+ Alt+ Delete
key combination
➤________ software allows the user to speak into the computer rather than type in text. -
Speech recognition
➤ What type of software must to be used to translate scanned text into a format that can
be manipulated?- OCR
application software
of sale
information.- data
➤ The……….folder retains copies of messages that you have started but are not yetready to send.
Drafts
➤ The records the name and exact location of every file on a disk. - file
allocation table
➤ extends data across networks rather than store it in one central site?.-
Distributed database
➤ What should be used if a company wants to include its company name and logo at the
➤ At a time how many operating system can be at work on a computer ? -Only one
➤ Answer Sheets in bank PO‘s/Clerk‘s examinations are checked by using – Optical Mark Reader
➤ This device is used to connect your computer with a telephone line, so that can
access information from other servers and ordinary users too, said device is called - Modem
➤ Device on one network can communicate with devices on another network via - Gateway
➤ What are the units used to count the speed of a printer ? - DPI
➤ A set of rules for creating markup languages that enables programming to capture specific
➤ Small plain text files that are written to your computer's hard disk by many of the Web
➤ Which backup method only backs up files that have been modified since the last backup?-
Incremental backup
➤ Which type of transmission media is known as regular telephone wire? - Twisted-pair wire
➤ What is the purpose of a firewall on a computer? - To protect a computer from unauthorized access
➤ A disk's content that is recorded at the time of manufacture and that cannot be changed
➤ In word, you can change Page Margins by - Clicking the right mouse button on
the Ruler
➤ Which key is used to delete one character to the left of the current position of the cursor ? -
Backspace
➤ If you want to connect to your own computer through the Internet from another
➤ A (n) ……….is a special visual and audio effect applied in Power-point to text or content. -
Animation
➤ Store data temporarily and pass it on as directed by the control unit. - Register
➤ In most Microsoft programs, what does 'alt+f4' do? -Ends the program
➤ A device that is used to transmit data from one location to another is known as - Carrier
➤ Programs developed by an outside supplier and provided to the user in a machine readable
➤ Android Operating system is an example of which kind of Source Model?- Open Source
➤ Which process checks to ensure the components of the computer and operating are
➤ What is the correct association between a hardware component and a computer function? -
➤ The sharing of a medium and its path by 2 or more devices is called . - Multiplexing
➤ Programming language built into user programs such as Word and Excel are known as
➤ Codes consisting of lines of varying widths or lengths that are computerreadable are
➤ Instructions and data that are processed by the CPU are located in . –RAM
➤ The commonly used UNIX commands like date, ls, cat etc. are stored in . - bin directory
➤ A circuit with about 100 transistors fabricated on a single chip is called .- MSI
➤ A computer checks the of user names and passwords for a match before granting access.
- Data base
➤ Computers that are portable and convenient for users who travel are known as _ -
Laptops
➤ The tells the computer how to use its components. - Operating system
➤ When sending an e-mail, the line describes the contents of the message. - Subject
➤ ............. is a collection of web - pages and .......... is the very first page that we see on opening
➤ The errors that can be pointed out by the compiler known as .- Syntax errors
➤ A contains specific rules and words that express the logical steps of an algorithm? - syntax
➤ A Proxy server is used for which of the following? - To process client requests for web pages
➤ Storage that retains its data after the power is turned off is referred to as? - non-volatile storage
➤ Which is the part of a computer that one can touch and feel? -Hardware
➤ The operating system that is self-contained in a device and resident in the ROM is -
➤ To be able to 'boot', the computer must have a(n) .......... - Operating System
➤ On-line real time systems become popular in..........Generation.- Third Generation access is the ability
of a device to "jump" directly to the requested data. - Random
➤ .........is the combination of keys to switch between the last four places that you have edited. - ALT +
CTRL + Z
➤ Accessing data on tapes is much ....... than that accessing data on disks.- Slower
➤ Who amongst the following is called the father of modern computing?- Charles Babbage
➤ If you begin typing an entry into a cell and then realize that you don't want yourentry placed
➤ Superscript, subscript, outline, emboss, engrave are known as _.- Font effects
➤ What is object of UPS? - Provides backup power
➤ Holding the mouse button down while moving an object or text is known as - Dragging
➤ What is the difference between a CD-ROM and a CD-RW? - A CD-RW can be written to,
➤ What happens when we try to delete the fries on the floppy ? - The files get deleted and
➤ An educational institution would generally have the following in its domain name ...... -.edu
➤________ can input graphical images and pictures for a computer? -Scanner
➤ In Word you can force a page break–By positioning your cursor at the appropriate place
➤ Accumulator is a . - Register
➤ In 1983, this person was the first to offer a definition of the term 'computer virus'? -
Frederick Cohen
➤ To minimize all open windows and display the desktop?- Windows logo +D
➤ In MS-Word 'alt + shift + d' does what? - Automatically inserts the date
➤________ deletes an item immediately without placing it in the recycle bin.- Shift +delete
➤ best defines embedded system?-A computer and software system that controls a machine
➤ To see the document before the printout is taken, use........ - Print Preview
➤ What are the four main aspects of data handling with a computer? - Input,processing,
➤ Most cash registers are now computers that are known as _ Terminals. - POS
➤ If you change Windows 98 to Windows XP, you are actually performing ........... .-upgrade
➤ To make a copy of the current document to disk ........ - Use the 'save as' command
➤ The main system board of a computer is called the ..........integrated circuit . - motherboard
➤ Which contents are lost when the computer turns off ? - memory
➤ When you save to this, your data will remain intact even when the computer is turned
➤ The piece of hardware that converts your computer's digital signal to an analog signal
➤ Mobile Commerce is best described as–Buying and selling goods/services through wireless Hand held
devices
➤ A computer program that converts an entire program into machine language at one time is
called a/ an -compiler
➤ The meaning of double-click is? - Pushing and releasing the main mouse button twice in rapid
succession when the on-tree mouse pointer is positioned over the desired item.
➤ The access time refers to - Time required locating and retrieving stored data
➤ Technique to implement virtual memory where memory is divided into units of fixed size memory is–
Paging
➤ An adder where all the bits of the two operands are added simultaneously–Parallel adder
➤ The point at which the flow of text in a document moves to the top of a new page–Page break
➤ Non-document files are–Non ASCII files that can be listed for any word processing software
➤ When a file is saved for the first time- . -it must be given a name to identify it
➤ The computers which are relatively rare because of their cost and size are – Super Computers
➤ A(n) .... program is one that is ready to run and does not need to be altered in any way. - Executable
➤ A………is a collection of data that is stored electronically as a series of records in a table.- database
➤ As you create documents, graphs and pictures your computer holds the data in—Memory
➤ ………processing is used when a large mail-order company accumulates orders and processes them
together in one large set.-Batch
➤ Computer programs are written in a high-level programming language; however, the human readable
version of a program is called—source code
➤ What happens if you press Ctrl + Shift + F8?-It activates the rectangular selection
➤ What is the short cut key to open the Open dialog box in ms word?- Ctrl + F12
➤ How can you disable extended selection mode?- Press Esc to disable
➤ Auto Calculate will quickly add selected cells if you….. - click the Auto Calculate button on the toolbar
➤ The operating system that is self-contained in a device and resident in the ROM is .......
➤ .......... is the key to close a selected drop - down list; cancel a command and close a dialog box.
- ESC
➤ is NOT one of the four major data processing functions of a computer? - analyzing the data or
information
➤ A ............ is an additional set of commands that the computer displays after you make a
➤ A letter, memo, proposal or other file that is created using Microsoft Word is called as? - Document
➤ The ROM chip which can be rewritten several times and requires the action of
➤ In which kind of disk does the read/write head physically touches the surface? - Floppy Disk
➤ What is the correct syntax for typing a function into a cell? Equal sign, Function Name, Matching
brackets
➤ If you see a small red triangle in the top right corner of a cell, it means there is something attached to
the call. What is it? - A comment
➤ An E-mail protocol for storage, management and change, especially in corporate offices–
➤ The technique where digital signals are converted to its analog form for transmission over
➤ Which of the following is true about Operating System? - All are true
➤ What is the keyboard shortcut for creating a chart from the selected cells? -F11
➤ You cannot close MS Word application by - From File menu choose Close submenu
➤ Where can you find the horizontal split bar on MS Word screen? - On the top of vertical scroll bar
➤ One of the functions of the arithmetic logic unit is to - receive data from the registers
➤ What is defined as the number of bits that the CPU processes as a unit? - A computer word
Systems use a light beam to scan input data and convert it into electrical signals, which are sent to the
computer for processing. - Optical recognition
➤ Devices accept the spoken word through a microphone and convert it into binary code that can be
understood by the computer. - Speech recognition
➤ Means that a transaction is processed fast enough for the result to come back
➤ uses an area of memory to temporarily store data from disk that the program
➤ What is a device that prevents electrical problems from affecting computer data files? – A surge
protector
➤ What is any text that can be keyed in, such as a memo? - A text document
➤ What type of program lets you produce professional-looking documents containing both text
➤ The letter and number of the intersecting column and row is the - Cell address
➤ What is the standard query language supported by most DBMSs? – Structured Query Language (SQL)
➤ are three fundamental characteristics that make a computer useful? - Speed, reliability, and storage
capability
➤ Software used for database management can store data, update it, retrieve it, report it, and print it -
manipulate
➤______ helps describe the Windows .NET Server?- It is designed for different levels of network
complexity.
➤ The process of analyzing large data sets in search of new, previously undiscovered relationships is
known as - data mining
➤ The focus of the first phase of the systems development life cycle is to - Identify problems and
opportunities
➤ is a network in which computers are located physically close together, often in the same building?-
LAN
➤ In the OSI model, the actual transmission of data is handled in the layer. - physical
➤______ is NOT true about laptop computers. - They cannot be connected to a PC.
➤ What is the main difference between a mainframe and a super computer ? - Supercomputers are
focused to execute few programs as fast as possible while mainframe uses its power to execute as
➤ Programs such as Mozilla Firefox that serve as navigable windows into the Web are called ..........
- Web browsers
➤ A right click on the desktop itself will........ - open the Display Properties dialog box
➤ You can convert existing Excel worksheet data and charts to HTML document by using the -
➤ What is the shortcut key to Indent the paragraph in ms word? - None of these
➤ The set of parallel electrical conducting lines through which different components on the
➤ A PDA's memory contents remain intact when it is turned off because - A battery keeps
network (WAN)
➤ Saving files in HTML format - Makes it possible for anyone to view the file in a Web
browser
➤ statements is TRUE about the public switched telephone network (PSTN)? -PSTN
is comprised of a variety of physical media, including twisted pair and fiber optic cable
➤ best describes the difference between the Internet and the World Wide Web? -
The Internet is the physical network of global computers, while the World Wide Web is many hypertext
➤ runs on a user's local computer and is used to request and display Web pages? - Web browser
➤ A modem is necessary if you want to-Connect to other computers or to the Internet using phone line,
cable, or wireless connections.
➤ What is the flow of data between countries commonly called? -Trans border data flow
➤ is NOT a purpose of antivirus programs? - Copy the name of the virus and send it to Microsoft for
inspection
Phone line
➤ To analyze vast quantities of scientific data and display underlying patterns, you would use a -
Supercomputer
➤ What term is used to describe software that monitors your online computer activities? - Spyware
➤ is a memory management technique that makes the random access memory appear largerthan it is?
- Virtual memory
➤ The two major components of system software are - The operating system and system utilities
➤ may be necessary for you to do after you install new application software? - Do a warm boot
➤ An example of a wireless medium that sends data through the air or space is - Microwaves.
➤ To reverse the effect of your last action in word ------------ - Use the Undo command
➤ Information that comes from an external source and fed into computer software is called ............... -
Input
➤ The basic unit of a worksheet into which you enter data in Excel is called a– cell
➤ All of the following are examples of real security and privacy risks EXCEPT - Spam
➤ In Excel, this is a prerecorded formula that provides a shortcut for complex calculations......... –
Function
➤ The process of trading goods over the Internet is known as ............. - e-commerce
➤ A device that connects to a network without the use of cables is said to be–free
➤ _ is a circuit that issue signals at regular intervals...? -Clock
➤ The 0 and 1 in the binary numbering system are called binary digits or .... -bits
➤ The 7-bit ASCII code widely used - For data communication work
➤ Several views are available in MS Front Page. is NOT a valid view ? - Web Server View
➤ One of the components of central processing unit (CPU) of the computer that
performs mathematical and logical operations is ... - ALU (arithmetic logical unit)
➤ When you insert an Excel file into a Word document, the data are - Placed in a word table
➤ A .......... shares hardware, software, and data among authorized users. - network
➤ To produce a high - quality graphics (hardcopy) in color, you would want to use a - Plotter
➤ What is the smallest and largest font size available in Font Size tool on formatting toolbar? -8
and 72
➤ Aligns the selected text or line to justify the screen press------- - Ctrl + J
➤ When data changes in multiple lists and all lists are not updated, this causes? - data inconsistency
➤ Granting an outside organization access to internet web pages is often implemented using a(n)?
extranet
➤ The purpose of the primary key in a database is to - provide a map of the data
➤ Using Windows Explorer, a plus (+) sign in front of a folder indicates - the folder contains subfolders.
➤ All of the following statements concerning windows are true EXCEPT— windows are an example of a
command-driven environment.
➤ What is usually used for displaying information at public places ? - Touch Screen Kiosks
➤ Which key is used in combination with another key to perform a specific task ? - Control
➤______ is a process that permits multiple computers to use the same IP address and hide their actual
IP addresses from the Internet. - Network address translation(NAT)
➤ What characteristic of read-only memory (ROM) makes it useful? -Data in ROM is nonvolatile, that is,
it remains there even without electrical power.
➤ Data representation is based on the………number system, which uses two numbers to represent all
data. - binary
➤ To what temporary area can you store text and other data, and later paste them to another location?
- The clipboard
➤ correctly describes the CD-R and DVD-R discs? - You may record data to the disc surface once
➤ Use this when you want to make all letters capital without having to use the shift key for
➤ -------------------is a program that has been physically etched onto a chip. - Firmware
➤ The type of memory that must have a constant power supply is - SDRAM.
➤ What type of e-commerce is being used when a student buys a computer from Dell.com? - B2C
➤ The topology where all the nodes are attached in a circular wiring arrangement is called a -
Ring topology
➤ Where are the Editing group and the Replace command found? - On the Home tab
➤ What function displays row data in a column or column data in a row? - Transpose
➤ To insert a word into the middle of a sentence-move the cursor to the desired location in
➤ Grouping and processing all of a firm's transactions at one time is called–batch processing
➤ -------------- Types of virus that stays permanently in the RAM memory -Resident
➤ is the advantage of Assembly language over Machine language? -All the above
➤______ is true about Dial-up internet access? -It utilizes the existing telephone services
➤ The communication between a processor and other devices inside the computer is done
through? - Bus
➤ Who is/are the founders of Microsoft? - Bill Gates and Allen Paul
➤ What is the difference between a check box and Radio button? - In check boxes multiple options can
be selected whereas in radio buttons only single option can be selected
➤ If a memory chip is volatile, it will....... - lose its contents if current is turned off
➤ During the operation, the control unit determines what the program is telling
➤ has a large storage capacity, up to 17 GB if both layers and both sides are used. - DVD-ROM
➤ A card connects each computer to the wiring in the network. - network interface
➤ What is the initial page of the Web site? -The home page
➤ What is the term for a set of step-by-step instructions that direct a computerto perform its tasks?
program
➤ PC cards, flash memory cards, and smart cards are all examples of - Solid state
storage devices.
➤ A is a unique identification number generated by a computer hardware component or a program. -
GUID
➤ RAM is an example of volatile storage and serves as the computer's---------- -Shortterm memory
➤ The ascending order of a data hierarchy is--------- - Data in more useful or intelligible form
➤ What would you use for immediate, real-time communication with a friend? - Instant
Messaging
➤ Which operation you will perform if you need to move a block of text? - Cut and Paste
➤ A……….is the term used when a search engine returns a Web page that matches the search criteria. –
Success
➤ ---- Is the Virus that overwrites the files or a few parts being replaced? - File infectors
➤ The internet service that provides a multimedia interface to available resources is called----------------
➤ What is the short-cut key to display save -as dialog box in MS-Word? - F12
➤ The backspace key is most often used to? - Delete a character to the left of the cursor
Enter
➤ What is the function of a Drop Cap in MS - Word? - It lets you begin a paragraph with a
➤ is true about CPU? - It makes the information resulting from processing available for use
➤ Each Web address is actually a series of numbers, which is usually called as------------ - IPaddress