Record
Record
Record
4. The correct hierarchical order, smallest to largest, for the following database terms
is:
_______.
a) Duplicate data
b) Data redundancy
c) Data inconsistency
d) Information overload
e) None
7. Which of the following programming method is used to minimize data errors when
data
9. How many layers are present in Open System Interconnection (OSI) model of
network
architecture?
10. Which layer of OSI model, firstly make use of unit of data called “Packet”?
a) Datalink Layer
b) Transport Layer
c) Network Layer
d) Presentation Layer
e) None
11. Communication between computers is established, maintained and terminated by
_____ .
a) Network Layer
b) Session Layer
c) Application Layer
d) Presentation Layer
e) None
12. Which term identifies a specific computer on the web and the main page of the
entire
site?
13. The place where data or information is stored for a short time is
14. The section of CPU which selects, interprets and sees to the execution of program
instructions?
e) None
a) RAM only
b) ROM only
a) An ad ware program
e) None
Answer : D
Answer : A
Answer : B
4.The unit of hardware, which an operator uses to monitor computer processing, is the
(a) Card Reader (b) CPU (c) Line Printer (d) Console
Answer : D
Answer : C
Answer : D
Answer : B
8.Transistors are associated with which computer system?
(a) First generation (b) Fifth generation
(c) Second generation (d) None of these
Answer : C
Answer : B
10.Who wrote the book ‘Computer Liberation and Dream Machine’, the first book on
personal computers?
(a) John McCarthy (b) Ted Nelson (c) Niklaus Wirth (d) Karl Capek
Answer : B
You can also interact with windows by dragging them with the mouse:
Taskbar Shortcuts
You can use any of these shortcut combinations to launch the applications in their
respective position on the taskbar, or more:
* Win+number (1-9): Starts the application pinned to the taskbar in that position, or
switches to that program.
* Shift+Win+number (1-9): Starts a new instance of the application pinned to the taskbar
in that position.
* Ctrl+Win+number (1-9): Cycles through open windows for the application pinned to
the taskbar is that position.
* Alt+Win+number (1-9): Opens the Jump List for the application pinned to the taskbar.
* Win+T: Focus and scroll through items on the taskbar.
* Win+B: Focuses the System Tray icons
In addition, you can interact with the taskbar using your mouse and a modifier key:
Operating systems (OSes) provide a set of functions needed and used by most
application-programs on a computer, and the necessary linkages for the control and
synchronization of the computer’s hardware
The Most popular operating systems presently in the market are Windows,Debian
GNU/Linux,Android,Mac OS X,Haiku
Haiku Started in August 18th, 2001 as OpenBeOS, this is the official open source
successor of BeOS.
An operating system (OS) is software, consisting of programs and data, that runs on
computers and manages the computer hardware and provides common services for
efficient execution of various application software.
For hardware functions such as input and output and memory allocation, the operating
system acts as an intermediary between application programs and the computer hardware,
although the application code is usually executed directly by the hardware, but will
frequently call the OS or be interrupted by it. Operating systems are found on almost any
device that contains a computer—from cellular phones and video game consoles to
supercomputers and web servers.
Examples of popular modern operating systems for personal computers are Microsoft
Windows, Mac OS X, and Linux.
What is Encryption
The translation of data into a secret code. Encryption is the most effective way to achieve
data security. To read an encrypted file, you must have access to a secret key or password
that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is
referred to as cipher text.
There are two main types of encryption: asymmetric encryption (also called public-key
encryption) and symmetric encryption.(also called private-key encryption)
Ans : Virus
Ans : 0 & 1
Ans : ENIAC
ENIAC
Ans : Ctrl + P
Ans : UNIVAC
Virtual Memory
ROM
ROM – Read-only memory: On ROM, data is prerecorded for read only which can not be
removed. ROM is nonvolatile and it retains its contents regardless the computer is on or
off. Most personal computers contain a small amount of ROM that stores critical
programs such as the program that boots the computer. In addition, ROMs are used in
calculators and peripheral devices such as laser printers, whose fonts are often stored in
ROMs. There are a few variations of ROM such as programmable read-only
memory(PROM), which is manufactured as blank chips on which data can be written
with a special device called a PROM programmer.
RAM
RAM – Random access memory: whose contents can be accessed (read, write and
remove) in any order. This is in contrast to sequential memory devices such as magnetic
tapes, discs and drums, in which the mechanical movement of the storage medium forces
the computer to access data in a fixed order. RAM is usually used for primary storage in
computers to hold active information such as data and programs. Common forms of
RAM are: SRAM (Static RAM) and DRAM (Dynamic RAM).