You are on page 1of 68

1) The code for a Web page is written using Hypertext Markup languageIBP !

) The first co"puters were progra""ed using Machine language #) $ filena"e is a uni%ue na"e that you gi&e to a file of infor"ation ') This can be another word for progra" software () $ny data or instruction entered into the "e"ory of a co"puter is considered as storage )) Which part of the co"puter displays the work done "onitor *) $ series of instructions that tells a co"puter what to do and how to do it is called a progra" +) Hardware is the part of a co"puter that one can touch and feel , -) The role of a co"puter sales representati&e generally is to deter"ine a buyer.s needs and "atch it to the correct hardware and software, 1/) uperco"puters refers to the fastest0 biggest and "ost expensi&e co"puters 11) 1xecuting is the process of carrying out co""ands 1!) The rectangular area of the screen that displays a progra"0 data0 and or infor"ation is a window 1#) The process of a co"puter recei&ing infor"ation fro" a ser&er on the internet is known as downloading 1') 2isk dri&e is the part of the co"puter helps to store infor"ation 1() $rith"etic operations include addition0 subtraction0 "ultiplication0 and di&ision 1)) $ keyboard is the king of input de&ice 1*) $n error is known as bug 1+) $ collection of related infor"ation sorted and dealt with as a unit is a file 1-) ending an e3"ail is si"ilar to writing a letter !/) IT stands for infor"ation technology !1) $ "enu contains co""ands that can be selected !!) Plotter0 printer0 "onitor are the group consists of output de&ices !#) 1dit "enu is selected to cut0 copy and paste

!') The "ost i"portant or powerful co"puter in a typical network is network ser&er !() The pri"ary purpose of software is to turn data into infor"ation !)) The ability to find an indi&idual ite" in a file i""ediately direct access is used, !*) To "ake a notebook act as a desktop "odel0 the notebook can be connected to a docking station which is connected to a "onitor and other de&ices !+) 4ou can use the tab key to "o&e a cursor across the screen0 indent a paragraph, !-) $ collection of related files is called record, #/) torage that retains its data after the power is turned off is referred to as non3 &olatile storage, #1) Internet is an exa"ple of connecti&ity, #!) Testing is the process of finding errors in software code, ##) $ syntax contains specific rules and words that express the logical steps of an algorith", #') 5hanging an existing docu"ent is called the editing docu"entation #() 6irtual "e"ory is "e"ory on the hard disk that the 5P7 uses as an extended 8$M, #)) 5o"puters use the binary nu"ber syste" to store data and perfor" calculations, #*) The windows key will launch the start buttons, #+) To "o&e to the beginning of a line of text0 press the ho"e key, #-) When sending an e3"ail0 the sub9ect lines describe the contents of the "essage, '/) Tables0 paragraphs and indexes work with when for"atting text in word, '1) TB is the largest unit of storage, '!) The operating syste" tells the co"puter how to use its co"ponents, '#) When cutting and pasting0 the ite" cut is te"porarily stored in clipboard, '') The blinking sy"bol on the co"puter screen is called the cursor, '() Magnetic tape is not practical for applications where data "ust be %uickly recalled because tape is a se%uential because tape is a se%uential access "ediu",

')) 8ows and colu"ns are used to organi:e data in a spread sheet, '*) When you are working on docu"entation on P50 the docu"ent te"porarily stored in flash "e"ory, '+) ;ne "egabyte e%uals approxi"ately 1 "illion bytes, '-) Infor"ation tra&els between co"ponents on the "otherboard through buses, (/) 8$M refers to the "e"ory in your co"puter, (1) 5o"puter connected to a <$= can share infor"ation and or share peripheral e%uip"ent (!) Microsoft office is an application suite (#) 7tilities can handle "ost syste" functions that aren.t handled directly by the operating syste" (') If you recei&e an e3"ail fro" so"eone you don.t know then you should delete it without opening it (() $ set of instructions telling the co"puter what to do is called progra" ()) <$= refers to a s"all single site network (*) $ collection of progra"s that controls how your co"puter syste" runs and processes infor"ation is called operating syste", (+) 2e&ice dri&ers are s"all0 special3purpose progra"s (-) Transfor"ation of input into output is perfor"ed by the 5P7 )/) 2ata going into the co"puter is called input, )1) Binary choice offer only two options )!) To indent the first paragraph of your report0 you should use tab key )#) >ields are distinct ite" that don.t ha&e "uch "eaning to you in a gi&en context )') $ website address is a uni%ue na"e that identifies a specific web site on the web )() Mode" is an exa"ple of a teleco""unications de&ice ))) $ set of co"puter progra"s used for a certain function such as word processing is the best definition of a software package )*) 4ou can start Microsoft word by using start button

)+) $ blinking sy"bol on the screen that shows where the next character will appear is a cursor )-) Highlight and delete is used to re"o&e a paragraph fro" a report you had written */) 2ata and ti"e are a&ailable on the desktop at taskbar *1) $ directory within a directory is called sub directory *!) Testing is the process of finding errors in software code *#) In 1xcel0 charts are created using chart wi:ard option *') Microco"puter hardware consists of three basic categories of physical e%uip"ent syste" unit0 input?output0 "e"ory *() Windows is not a co""on feature of software applications *)) $ tool bar contains buttons and "enus that pro&ide %uick access to co""only used co""ands **) >or creating a docu"ent0 you use new co""and at file "enu *+) Input de&ice is e%uip"ent used to capture infor"ation and co""ands *-) $ progra""ing language contains specific rules and words that express the logical steps of an algorith" +/) ;ne ad&antage of dial3up internet access is it utili:es existing telephone security +1) Protecting data by copying it fro" the original source is backup +!) =etwork co"ponents are connected to the sa"e cable in the star topology +#) Two or "ore co"puters connected to each other for sharing infor"ation for" a network +') $ co"pute checks the database of user na"e and passwords for a "atch before granting access +() 5o"puters that are portable and con&enient for users who tra&el are known as laptops +)) pa" is the ter" for unsolicited e3"ail +*) 7tility software type of progra" controls the &arious co"puter parts and allows the user to interact with the co"puter ++) 1ach cell in a Microsoft office excel docu"ent is referred to by its cell address0 which is the cell.s row and colu"n labels

+-) 1ight digit binary nu"ber is called a byte -/) ;ffice <$=s that are spread geographically apart on a large scale can be connected using a corporate W$= -1) torage is the process of copying software progra"s fro" secondary storage "edia to the hard disk -!) The code for a web page is written using Hyper Text Markup <anguage -#) "all application progra"s that run on a Web page and "ay ensure a for" is co"pleted properly or pro&ide ani"ation are known as flash -') In a relational database0 table is a data structure that organi:es the infor"ation about a single topic into rows and colu"ns -() The first co"puters were progra""ed using asse"bly language -)) When the pointer is positioned on a hyperlink it is shaped like a hand -*) Booting process checks to ensure the co"ponents of the co"puter are operating and connected properly -+) 5hecking the existing files sa&ed on the disk the user deter"ine what progra"s are a&ailable on a co"puter --) pecial effect used to introduce slides in a presentation are called ani"ation 1//) 5o"puters send and recei&e data in the for" of digital signals 1/1) Most World Wide Web pages contain HTM< co""ands in the language 1/!) Icons are graphical ob9ects used to represent co""only used application 1/#) 7=I@ is not owned and licensed by a co"pany 1/') In any window0 the "axi"i:e button0 the "ini"i:e button and the close buttons appear on the title bar 1/() 2ial3up er&ice is the slowest internet connection ser&ice 1/)) 1&ery co"ponent of your co"puter is either hardware or software 1/*) 5hecking that a pin code nu"ber is &alid before it is entered into the syste" is an exa"ple of data &alidation 1/+) $ co"piler translates higher le&el progra"s into a "achine language progra"0 which is called ob9ect code

1/-) The ability to find an indi&idual ite" in a file i""ediately direct access 11/) 5o"puters connected to a <$= can share infor"ation and?or share peripheral e%uip"ent 111) $ 5238W disk can be erased and rewritten 11!) The two "a9or categories of software include syste" and application 11#) Windows -(0 Windows -+ and Windows =T are known as operating syste"s 11') Infor"ation on a co"puter is stored as analog data 11() $ spread sheet that works like a calculator for keeping track of "oney and "aking budgets 11)) To take infor"ation fro" one source and bring it to your co"puter is referred to as download 11*) 1ach box in a spread sheet is called a cell 11+) =etwork co"ponents are connected to the sa"e cable in the bus topology 11-) Two or "ore co"puters connected to each other for sharing infor"ation for" a network 1!/) $ co"puter checks the database of user na"es and passwords for a "atch before granting access, 1!1) pa" is the other na"e for unsolicited e3"ail 1!!) ;perating syste" controls the &arious co"puter parts and allows the user to interact with the co"puter 1!#) 1ach cell in a Microsoft ;ffice 1xcel docu"ent is referred to by its cell address0 which is the cell.s row and colu"n labels 1!') 2ownload is the process of copying software progra"s fro" secondary storage "edia to the hard disk 1!() The code for a web page is written using Hypertext Markup <anguage 1!)) "all application progra"s that run on a web page and "ay ensure a for" is co"pleted properly or pro&ide ani"ation are known as >lash 1!*) $ file is a uni%ue na"e that you gi&e to a file of infor"ation 1!+) >or seeing the output0 you use "onitor 1!-) 52s are of round in shape

1#/) 5ontrol key is used in co"bination with another key to perfor" a specific task 1#1) canner will translate i"ages of text0 drawings and photos into digital for" 1#!) 5P7 is the brain of the co"puter 1##) o"ething which has easily understood instructions is said to be user friendly 1#') Infor"ation on a co"puter is stored as digital data 1#() >or creating a docu"ent0 you use new co""and at file "enu 1#)) The progra"s and data kept in "ain "e"ory while the processor is using the" 1#*) 5trl A $ co""and is used to select the whole docu"ent 1#+) ending an e3"ail is sa"e as writing a letter 1#-) $ Website address is a uni%ue na"e that identifies a specific website on the web 1'/) $nswer sheets in bank P;.s?5lerk.s exa"inations are checked by using ;ptical Mark 8eader 1'1) 1lectronic data exchange pro&ides strategic and operational business opportunity 1'!) 2igital signals used in I 2= ha&e whole nu"ber &alues 1'#) $sse"bler is language translation software 1'') Manual data can be put into co"puter by scanner 1'() In a bank0 after co"puteri:ation che%ues are taken care of by MI58 1')) The banks use MI58 de&ice to "ini"i:e con&ersion process 1'*) I"age can be sent o&er telephone lines by using scanner 1'+) Microchip ele"ents are uni%ue to a s"art card 1'-) M 32; is a single user operating syste" 1(/) Basic can be used for scientific and co""ercial purpose 1(1) $ll co"puters can execute "achine language progra"s 1(!) Progra"s stored in 8;M can.t be erased 1(#) 1thernet is used for high speed teleco""unications

1(') IP address can change e&en if the do"ain na"e re"ains sa"e 1(() 1ach directory entry can be of #! bytes 1()) With the help of 5ontrol A 2el a letter can be erased in a word 1(*) 2isk can keep "axi"u" data 1(+) >;8T8$= is a scientific co"puter language 1(-) 5o"puter language 5;B;< is useful for co""ercial work 1)/) 5;B;< is a high standard language like 1nglish 1)1) In co"puter the length of a word can be "easured by byte 1)!) Byte is the unit of storage "ediu" 1)#) 8;M is not a co"puter language 1)') ;racle is a database software 1)() e%uential circuit is full aid 1))) Processor is "ust for co"puter 1)*) 8;M keeps per"anent "e"ory 1)+) creen display is called by windows in lotus 1)-) Pascal is a co"puter language 1*/) 1xpanded for" of IBM is International business "achine 1*1) I5 chips are "ade of silicon 1*!) India.s ilicon 6alley situated at Bangalore 1*#) 8$M and 8;M are the storage de&ices of co"puter 1*') 2; is to create relation between hardware and software 1*() <;T7 13!3# is software 1*)) 6oice "ail is a personal security code for B M subscribers 1**) Tables holds actual data in the database 1*+) Tro9an is a &irus

1*-) tatic keys "ake W1B insecure 1+/) 6ideo signal needs highest bandwidth 1+1) 5onnecti&ity "eans co""unication between syste"s 1+!) 5ontrolling is not re%uired for high le&el language progra"s before it is executed 1+#) # out of three rollers are responsible for the "o&e"ent of cursor on screen 1+') Hardware that adds two nu"bers is arith"etic logical unit 1+() 2ata accuracy is not done by "ode" 1+)) <$= is used for networks setup within a building 1+*) $ data co""unication syste" re%uires ter"inal de&ice0 co""unication channel0 protocols 1++) Most co""on channel used by networks today is satellite 1+-) 8un Ti"e is not a type of error 1-/) $ fi&e3digit card attribute used for postal CIP codes it will be restored as a nu"eric data 1-1) 5o"puter &iruses can be attached to an executable progra" 1-!) M 32; was the first operating syste" 1-#) The s"allest space where infor"ation on a hard disk is kept in a cluster 1-') $n infor"ation is processed data 1-() Intelligence is not a characteristic of a co"puter 1-)) Pri&ate key is used to spend a digital signature 1-*) =egati&e nu"bers can be represented in binary 1-+) 627 is not an essential part of a co"puter 1--) The printers are line printer0 laser0 dot "atrix !//) peed of clock of 5P7 is "easured in "egahert: !/1) 5ache is not a secondary storage de&ice !/!) 2isk can be used to store se%uential files and rando" files

!/#) Windows is not an application !/') When taking the output infor"ation is produced in hardcopy and?or softcopy for" !/() 5ontrol unit.s function is to decode progra" instructions !/)) The "ost powerful type of co"puter a"ongst the following is superco"puter !/*) B; T; state"ent is used in 50 5AA0 basic language !/+) >ile "enu is selected to print !/-) The na"e a user assigns to a docu"ent is called a filena"e !1/) $ processor is an electronic de&ice that processes data0 con&erting it into infor"ation !11) 5ontrol words are words that a progra""ing language has set aside for its own use !1!) Monitor and printer are the two types of output de&ices !1#) To access properties of an ob9ect0 the "ouse techni%ue to use is right3clicking !1') $n operating syste" is a progra" that "akes the co"puter easier to use !1() 5onnections to the internet using a phone line and a "ode" are called dial3up connections !1)) To access a "ainfra"e or superco"puter0 users often use a ter"inal !1*) $ flaw in a progra" that causes it to produce incorrect or inappropriate results is called a bug !1+) $ web site address is a uni%ue na"e that identifies a specific web site on the web !1-) 1&ery co"ponent of your co"puter is either hardware or software !!/) To "ake the nu"ber pad act as directional arrows0 you press the nu" lock key !!1) When creating a word3processed docu"ent0 for"atting text in&ol&es the user changing how words on the page appear0 both on the screen and in printed for" !!!) The $<7 perfor"s si"ple "athe"atics for the 5P7 !!#) $ co"puter progra" is a set of keywords0 sy"bols0 and a syste" of rules for constructing state"ents by which hu"ans can co""unicate the instructions to be executed by a co"puter

!!') The another word for progra" is software !!() The na"e of the co"puter.s brain is 5P7 !!)) $ co"puter is a de&ice that electronically processes data0 con&erting it to infor"ation !!*) <aptops are co"puters that can be carried around easily !!+) The secret code that restricts entry to so"e progra"s is password !!-) The basic goal of co"puter process is to con&ert data into infor"ation !#/) The disk is placed in the 5P7 in a co"puter !#1) $ hard copy of a docu"ent is printed on the printer !#!) The na"e that the user gi&es to a docu"ent is referred to as file na"e !##) 8estarting a co"puter that is already on is referred to as war" booting !#') 13"ail is the trans"ission of "essages and files &ia a co"puter network !#() The person who writes and tests co"puter progra"s is called a progra""er !#)) The infor"ation you put into the co"puter is called data !#*) The output de&ices "ake it possible to &iew or print data !#+) $ chat is a typed con&ersation that takes place on a co"puter !#-) Hardware includes the co"puter and all the de&ices connected to it that are used to input and output data !'/) The "ost co""on "ethod of entering text and nu"erical data into a co"puter syste" is through the use of a keyboard !'1) Mouse0 keyboard0 plotter are the group consist of only input de&ices !'!) !() &alues can be represented by a single byte !'#) Transfor"ation of input into output is perfor"ed by the 5P7 !'') 6ertical3"arket applications can handle "ost syste" functions that aren.t handled directly by the operating syste" !'() 2e&ice dri&ers are s"all0 special3purpose progra"s !')) <$= refers to a s"all0 single3site network

!'*) $ set of instructions telling the co"puter what to do is called progra" !'+) 2ata going into the co"puter is called input !'-) If you recei&e an e3"ail fro" so"eone you don.t know0 then delete it without opening it !(/) Two options does a binary choice offer !(1) $ collection of progra"s that controls how you co"puter syste" runs and processes infor"ation is called operating syste" !(!) 8ows and colu"ns are data organi:ed in a spreadsheet !(#) When cutting and pasting0 the ite" cut is te"porarily stored in clipboard !(') When you are working on a docu"ent on a P50 the docu"ent is te"porarily stored in flash "e"ory !(() ;ne "egabyte e%uals approxi"ately 1 "illion bytes !))) $ cluster represents a group of sectors !)*) 2igital signals used in I 2= ha&e discrete &alues !)+) $sse"bler is language translation software !)-) Manual data can be put into co"puter by scanner !*/) Bandwidth "eans channel capacity a"ount of data following &ia cables and "easure of speed !*1) 5hip can keep "axi"u" data !*!) 2ebugging is the process of finding errors in software code !*#) Ti"e Bo"b are &iruses that are triggered by the passage of ti"e or on a certain data !*') <inux is an open source operating syste" !*() Boot sector &iruses are often trans"itted by a floppy disk left in the floppy dri&e !*)) ;perating syste" controls the way in which the co"puter syste" functions and pro&ides a "ediu" by which users can interact with the co"puter !**) er&ers are co"puters that pro&ide resources to other co"puters connected to a network !*+) >ield na"es describe what a data field is

!*-) 4ou "ust install router on a network if you want to share a broadband internet connection !+/) $ goal of nor"ali:ation is to "ini"i:e the nu"ber of redundancy !+1) Progra"s fro" the sa"e de&eloper0 sold0 bundled0 together0 that are pro&ide better integration and share co""on features0 tool box and "enus are known as software suits !+!) $ data ware house is one that organi:es i"portant sub9ect areas !+#) 78< ter" identifies a specific co"puter on the web and the "ain page of the entire site !+') $ proxy ser&er is used to process client re%uest for web pages !+() When data changes in "ultiple list and list are not updated0 this causes data inconsistency !+)) Branting an outside organi:ation access to internet web pages is often i"ple"ented using a extranet !+*) The code that relational database "anage"ent syste"s use to perfor" their database task is refer to as D< !++) 78< stands for 7nifor" resource locator !+-) $ data base "anage"ent syste" is a software syste" used to create0 "aintain and pro&ide controlled access to a database !-/) The two broad categories of software are syste" and application !-1) The "etal or plastic case that holds all the physical parts of the co"puter is known as syste" unit !-!) 2ata integrity "eans that the data contained in the database is accurate and reliable !-#) $ local area network is a pri&ate corporate network used exclusi&ely by co"pany categories !-') 1ight bits e%ual to one byte !-() $ byte can hold one character data !-)) $ characteristic of a file ser&er is "anages files operations and is shared on a network !-+) The de&elop"ent process of co"puter started in 1)1*

!--) The role of Bla:e Pascal in the de&elop"ent of co"puter is addition and subtraction of nu"bers #//) The in&entor of co"puter is 5harles Babbage #/1) The IBM "ade the first electronic co"puter in 1-(# #/!) The silicon based transistor started to "ade by Bordon Tin in 1-(' #/#) IBM is a co"pany #/') The personal co"puter in&ented in 1-+1 #/() 1 Eilobyte is e%ual to 1/!' bytes #/)) <52 "eans li%uid crystal display #/*) 7P con&erts 25 &oltage into $5 &oltage #/+) The word CIP "eans Cicxac Inline Pin #/-) With the help of Pal switch we can increase or decrease the speed of co"puter.s processing #1/) The full for" of MI58 is "agnetic ink character reader #11) wift networks are used between banks #1!) Panda is a &irus #1#) Boot sector is hardware #1') 2ebug searches the fault of any software #1() ;58 "eans optical character recognition #1)) The total printout of a progra" is called listing #1*) With the help of CIP we can decrease the si:e of any progra"s #1+) We can for"at the hard disk with the help of Booting #1-) 5$==12 is called as ready"ade software #!/) The process of creating third file by "ixing two files is called as "ail "erging #!1) The figures and lines etc, "ade by co"puter is called as graphics #!!) 1ach line represents )( letters in a Word tar

#!#) =okia3 *(// is not the exa"ple of Micro Processor #!') The first na"e of the digital co"puter is 7n&ake #!() The "odern co"puter was in&ented in 1-') #!)) The full for" of 2; is disk operating syste" #!*) The expanded for" of >;8T8$= is for"ula translation #!+) The great re&olution ca"e in co"puter sector in 1-)/ #!-) Magnetic tape is called as Input de&ice of co"puter ##/) The first "echanical co"puter of 5harles Babbage is known as punch card "achine ##1) The I5 chip used in co"puter is generally "ade in silicon ##!) Telephone broadcast is the exa"ple of si"plex trans"ission ###) ;ptical0 Mechanical are the kinds of "ouse ##') 5ontrol panel is used for increasing and decreasing the speed of the cursor of "ouse ##() The capacity of "odern "ain fra"e digital co"puter is 1/Fto the power of 31!) "bps ##)) With the help of "y co"puter we can know about the usage and a&ailability of space in co"puter ##*) We use both M 3Word and page "aker for "aking resu"e ##+) 1arliest co"puters that would work with >;8T8$= was second generation ##-) Back 7ps in database are "aintained for to restore the lost data #'/) I21$ is a encryption techni%ue #'1) 2B8M takes care of storage of data in a database #'!) The 9ob of 2BM is to decrease redundancy #'#) 2igital signatures use encryption for authenticating #'') ; acts as inter"ediary agency between user and hardware #'() Plotters gi&es the highest %uality output

#')) 8;M is built in "e"ory in co"puter #'*) ><$ H is a 8$M #'+) P8$M is not a 8$M #'-) ><$ H de&ice is used in cell phones #(/) Internal storage is sa"e as the pri"ary storage #(1) IM$5 is na"e of a "achine #(!) >irst generation co"puters could do batch processing #(#) The analytic engine was created by 5harles Babbage #(') 6oice"ail of B M ser&ice pro&ider has the personal security code for its subscribers #(() enior "anager decided about the di&ision of work with respect to IT security #()) 1ncrypting file syste" of window @P professional operating syste" protects the data of a user0 e&en if the co"puter is shared between users #(*) The ,"peg is the for"at of a "o&ie file #(+) 5ontrolling is =;T re%uired for high le&el language progra" before it is executed #(-) $ plotter is output de&ice #)/) +/!+) is a hardware part of "icroprocessor #)1) Top3botto" approach can not be the "easure of network traffic #)!) $ switching "ode power supply is used for con&erting raw input power to stabili:e 25 power #)#) pooler can "anage the whole printing process #)') 6alidity routines control procedures can be used to ensure co"pleteness of data #)() <ess expensi&e than leased line networks is not a characteristic of &irtual pri&ate networks FP6=) #))) Progra" policy fra"ework pro&ides strategic direction to an organi:ation #)*) 5ross bar switches ha&e co""on control

#)+) 8ow3le&el security is the "ost basic part for database security #)-) 6oice recognition software can not be used for con&erting text into &oice #*/) The user account can only be created by the network ad"inistrator #*1) IBM3*// belongs to second generation #*!) $llocating ade%uate bandwidth would help her in speeding up the data transfer o&er net #*#) B52 "eans binary coded deci"al #*') 1xtended syste" configuration data is sa"e as BI; #*() 2igiti:er is an input de&ice #*)) 5ara"el is the latest platfor" of Intel 5entrio "icroprocessor #**) 8I 5 is known as storage de&ice #*+) =;8T;= is an anti3&irus #*-) The syste" file of an operating syste" is 5;M #+/) $TMs of bank ha&e real currency #+1) $ progra" that con&erts high le&el language to "achine language is asse"bler #+!) G,txt. files can be "ade in notepad0 M word0 2; editor #+#) ,Cip is a co"pressed file #+') Internet is a W$= #+() MP# technology co"presses a sound se%uence to one3twelfth of its original si:e #+)) $t a ti"e only one operating syste" can be at work on a co"puter #+*) If "ultiple progra"s can be executed at the sa"e ti"e0 it is distributed operating syste" #++) If the operating syste" pro&ides %uick attention0 it is real ti"e operating syste" #+-) 2istributed operating syste" uses network facility #-/) >;8M$T co""and in M 32; is used for recreating disk infor"ation #-1) 5;P4 co""and in M 32; is used to copy one or "ore files in disk dri&e to another0 copy fro" one directory to another directory

#-!) 81= co""and is Internal co""and #-#) To" Burners3<i propounded the concept of HWorld wide webI #-') The "e"ory address sent fro" the 5P7 to the "ain "e"ory o&er a set of wires is called address bus #-() M;21M is an electronic de&ice re%uired the co"puter to connect to the I=T18=1T #-)) $ source progra" is a progra" which is to be Tran scripted in "achine language #-*) 6irus in co"puter relates to progra" #-+) >loppy is not a storage "ediu" in the co"puter related hardware #--) 2; floppy disk does not ha&e a boot record '//) The 5P7 in a co"puter co"prises of tore0 arith"etic and logical unit and control unit '/1) In co"puter parlor a "ouse is a screen sa&er '/!) 7=I6$ is the na"e of the co"puter which was first used for progra""ing and playing of "usic '/#) The I5 chips for co"puter is prepared fro" silicon '/') 2atabase "anage"ent syste"s are co"prised of tables that "ade up of rows called records and colu"ns called fields '/() =ano is e%ual to 1/Fto the power of 3-) '/)) In co"puters 8$M is a non3&olatile "e"ory '/*) 2isk and tape dri&es are co""only used as hard copy '/+) When co"puter is connected to <$= and data is sent across it for storage?processing is online processing '/-) The pri"ary storage unit is also referred to as internal storage '1/) ;racle is not an operating syste" '11) 2ata are raw facts and figures '1!) Holding of all data and instructions to be processed is one of the functions of storage unit

'1#) To select the entire row in 1xcel0 click "ouse at row heading '1') 2atabase is known as structured data '1() =or"al &iew and outline &iew notes pane appears in power point '1)) The user protection feature of an operating syste" is re%uired in "ulti3user syste" only '1*) In word0 5trl A 2el co"bination of keys press to delete an entire word '1+) In M 3Word double clicking a word selects the word '1-) Word docu"ent can be na&igated in web layout &iew '!/) In 1xcel0 addressing "odeFs) that can be used in a for"ula is?are only absolute and relati&e '!1) =ote page &iews can you use to show 9ust the slide and its contents '!!) Hardware that adds two nu"bers is arith"etic logical unit '!#) The co"puter as a "achine and all other physical e%uip"ent associated with it are ter"ed as hardware '!') Plotters are &ery useful in applications such as co"puter aided design '!() 5orel 28$W is a graphic package '!)) The print to file option creates ,prn file '!*) The enhanced keyboard contains 1/1 keys '!+) 2ata processing cycle consists of input cycle0 output cycle and processing cycle '!-) Page etup is not an option of 1dit "enu '#/) 8adar chart is used to show a correlation between two data series '#1) $ co"puteri:ed business infor"ation syste" includes hardware0 software and data facts '#!) Purchase order file is a transaction file '##) $ typical co"puteri:ed business application syste" will ha&e both "aster and transaction file '#') Proble" identification is taken first in designing a progra" '#() The purpose of the 1@IT co""and is to get out of a condition loop

'#)) 1"ployees details is a "aster file for the pay roll syste" '#*) $ slow "e"ory can be connected to +/+( by using 81$24 '#+) $ processor needs software interrupt to obtain syste" ser&ices which need execution of pri&ileged instructions '#-) $ 5P7 has two "odes3 pri&ileged and non3pri&ileged, In order to change the "ode fro" the pri&ileged to the non3pri&ileged0 a software interrupt is needed ''/) wap space resides at disk ''1) The process of assigning load addressed to the &arious parts of the progra" and ad9usting the code and data in the progra" to reflect the assigned address is called relocation ''!)1 ectorJ '/-) bytes ''#) Two stacks of si:e re%uired to i"ple"ent a %ueue of si:e n ''') 1 >loppy J )0 #/0*+' bytes or #/+ EB ''() 5onsider a "achine with )' MB physical "e"ory and a #!3bit &irtual address space, If the page si:e is ' EB0 then si:e of the page table is ! MB '')) 5onsider a &irtual "e"ory syste" with >I>; page replace"ent policy, >or an arbitrary page access pattern0 increasing the nu"ber of page fra"es in "ain "e"ory will always decrease the nu"ber of page faults ''*) 5onsider a sche"e 8F$0 B0 50 2) and functional dependencies $3KB and 53K 2, Then the deco"position of 8 into 81 F$B) and 8! F52) is dependency preser&ing and lossless 9oin ''+) Main "e"ory re%uires a de&ice dri&er ''-) 8$M can be di&ided into ! types '(/) Two friends suitably arrange ' blocks of different colors to exchange coded infor"ation between the", ' bits of infor"ation is one exchanging each ti"e '(1) 5ache "e"ory is a part of "ain "e"ory '(!) The nu"ber '# in !.s co"ple"ent representation is /1/1/1/1 '(#) The +/+( "icroprocessor responds to the presence of an interrupt by checking the T8$P pin for Ghigh. status at the end of each instruction fetch '(') $ll "achinery and apparatus of co"puter is called hardware

'(() The nu"ber 1/!' bytes is the co"ple"ent representation of 1 Eilo byte '()) yste" design specifications do not include blueprint showing the layout of hardware '(*) Web pages are uni%uely identified using 78< '(+) The results of arith"etic and logical operations are stored in an accu"ulator '(-) The input de&ice that is closely related to touch screen is the light pen (//) >! keys of control center specified below displays data0 toggles browse?edit (/1) $ co"piler breaks the source code into a unifor" strea" of tokens by lexical analysis (/!) The nu"ber of processes that "ay running at the sa"e ti"e in a large syste" can be thousands (/#) <1T,B$ files are related to Microsoft word utility (/') $ co""and in 7=I@ can ha&e one or "ore argu"ents (/() $ hard disk is logically organi:ed according to cylinders and sectors (/)) $ fra"e can include text L graphics0 tables L graphics0 graphics (/*) $ll the for"atting data for the paragraph is stored in the paragraph "ark (/+) The abbre&iation 5$2 stands for co"puter aided design (/-) We can define hypertext definition in notebooks using Macsy"a !,/ (1/) The addressing "odeFs) that can be used in a for"ula is?are3 absolute0 relati&e and "ixed (11) WI=2;W can work in enhanced and standard "odes (1!) The part of a "achine le&el instruction which tells the central processor what has to be done is an operation code (1#) ;3Matrix software packages do not ha&e ani"ation capabilities (1') In order to paste text for" the clipboard in the docu"ent being edited0 press the 5trl3$ key (1() $ progra" that con&erts a high le&el language progra" to a set of instructions that can run on a co"puter is called a co"piler (1)) >aster execution of progra"s is not an ad&antage of a subroutine

(1*) >irst generation of co"puter period is 1-'(31-(/ (1+) IBM built first P5 in the year 1-+1 (1-) $ s"all co"puter progra" e"bedded within an HTM< docu"ent when a user retrie&es the web page fro" a web ser&er is called an applet (!/) $nother na"e for syste"s i"ple"entation is transfor"ation (!1) The central host co"puter or file ser&er in a star network "aintains control with its connecting de&ices through polling (!!) 5AA does not check whether the index &alue is within scope (!#) The browser uses unifor" resource locator to connect to the location or address of internet resources (!') In the centrali:ed co"puting architecture0 the entire file is downloaded fro" the host co"puter to the user.s co"puter in response to a re%uest for data (!() $n expert syste" enables one or "ore users to "o&e and react to what their senses percei&e in a co"puter si"ulated en&iron"ent (!)) Popping or re"o&ing an ele"ent fro" an e"pty stack is called underflow (!*) The ability to co"bine data and operations on that data in a single unit is known as poly"orphis" (!+) $ router is a de&ice that sites between your internal network and the internet and li"its access into and out of your network based on your organi:ation.s access policy (!-) In 5AA0 pri&ate0 protected0 and public are reser&ed words and are called "e"ber access specifiers (#/) The integration of all kinds of "edia such as audio0 &ideo0 &oice0 graphics and text into one coherent presentation co"bined is called "ulti"edia (#1) The deri&ed class can redefine the public "e"ber functions of the base class (#!) $ techni%ue for searching special databases0 called data warehouses0 looking for related infor"ation and patterns is called data "ining (##) <ike the %uick sort the "erge sort uses the di&ide and con%uer techni%ue to sort a list (#') The use of expert syste"s technology can greatly reduce the nu"ber of calls routed to a custo"er ser&ice depart"ent

(#() Building a list in the backward "anner0 a new node is always inserted at the beginning of the list (#)) 5reating a web site is also called web authoring (#*) 7sing the opti"i:ation analysis approach0 the expert syste" starts with a conclusion and tries to &erify that the rules0 facts0 and conclusion all "atch, If not0 the expert syste" chooses another conclusion (#+) Both the application progra" and operating syste" progra" only describes the software (#-) 8oot is one of the ite"s gi&en below is not an ite" of the "enu bar ('/) B$5E7P is not an internal co""and ('1) In a disk0 each block of data is written into one sector ('!) Hard copy is a printed copy of "achine output ('#) $ boot strap is a s"all utili:ation co"puter progra" to start up in inacti&e co"puter ('') 5$2 is oriented towards software ('() Icons are picture co""ands (')) IBM co"pany for the first ti"e launched pocket co"puters ('*) P8;M is a co"puter part ('+) $lgorith"s can handle "ost syste" functions that aren.t handled directly by the operating syste" ('-) 2e&ice dri&ers are s"all0 special3purpose progra"s ((/) <$= refers to a s"all0 single site network ((1) $ collection of progra"s that controls how your co"puter syste" runs and processes infor"ation is called operating syste" ((!) When we are working on a docu"ent on a P5 the docu"ent is te"porarily stored in 8$M ((#) Infor"ation tra&els between co"ponents on the "otherboard through buses ((') Microsoft is a &ertical "arket application ((() 8$M refers to the "e"ory in your co"puter

(()) 5o"puters connected to a <$= can share infor"ation and ? or share e%uip"ent ((*) Magnetic tape is not practical for applications where data "ust be %uickly recalled because tape is a se%uential access "ediu" ((+) In <ate 1-++ co"puter &iruses land in India for the first ti"e ((-) $<7 is a part of the 5P7 ()/) In co"puter technology a co"piler "eans a progra"0 which translates source progra" into ob9ect progra" ()1) $"erican co"puter co"pany IBM is called big blue ()!) The first IBM P5 did not ha&e any 8;M ()#) The digital co"puter was de&eloped pri"arily in 7E ()') Progra"s which protect a disk fro" catching an infection are called antidotes ()() The first "o&ie with terrific co"puter ani"ation and graphics was released in 1-+! is Tron ())) $n integrated circuit is fabricated on a tiny silicon chip ()*) The word si:e of a "icroprocessor refers to the a"ount of infor"ation that can be stored in the byte ()+) 2aisy3wheel printer cannot print graphics ()-) In the IBM P53$T0 the word $T stands for ad&anced ter"inology (*/) 2edicated co"puter "eans which is assigned one and only one task (*1) 8eal ti"e progra""ing type of co"puters progra""ing is used for aero plane ticket reser&ation syste" (*!) 8$M "eans "e"ory which can be both read and written to (*#) <aser printer uses light bea" and electro statically sensiti&e black powder (*') The anta 5lara 6alley0 5alifornia is popularly known a ilicon 6alley of $"erica because "any silicon chip "anufacturing fir"s are located there (*() $ progra" written in "achine language is called asse"bler (*)) International business "achine was the first co"pany in the world to build co"puter for sale (**) P$8$M is a parallel co"puter

(*+) >or co""unications0 wide area networks use special purpose telephone wires and fiber optic cables and "icrowa&es (*-) 2ata transfer rate in "ode"s is "easured in bits per second (+/) $ co"piler cannot detect logical errors in source progra"s (+1) Throughput0 turnaround ti"e0 response ti"e are "easures of syste" perfor"ance (+!) ;<TP architecture can handle a li"ited nu"ber of di"ensions whereas ;<$P architecture does not ha&e any li"it on the nu"ber of di"ensions (+#) The binary e%ui&alent of F'/,1!() suffix 1/ is 1/1///,//1 (+') Eernel is the only art of an operating syste" that a user cannot replace or "odify (+() y"bol signifies a "agnetic disk (+)) 5;B;< progra""ing language was initially de&eloped for consu"er electronics goods (+*) 8unning0 blocked0 ready0 ter"inated are different states of a process (++) 8ational rose is an exa"ple of a "odeling language (+-) $ disk wor" is an exa"ple of optical de&ices (-/) $ 8$I2 is a disk array (-1) The first pri&ate internet ser&ice pro&ider in India was atya" infoway (-!) The "axi"u" and "ini"u" unsigned nu"ber which can be stored in a + bit word is / and !(( (-#) tack is a part of "e"ory (-') HIT 8$TI; is associated with cache perfor"ance (-() <aser printer is a page printer (-)) torage capacity of a disk syste" depends upon nu"ber of recording surfaces and nu"ber of sectors per track (-*) $bstraction is associated with ob9ect oriented technology and database technology (-+) The ter"s opcode and operand are associated with any high le&el language

(--) 2yna"ic binding is associated with ob9ect oriented progra""ing )//) The ter" 5HIP0 M1W1<<$84 "eans a processor with high capacity )/1) $ watch point is associated with debugger )/!) $ "ultithreaded progra" uses "ultiple processes )/#) Ti"e sharing is a "echanis" to pro&ide spontaneous interacti&e use of a co"puter syste" by "any users in such a way that each user is gi&en the i"pression that he?she has his?her own co"puter )/') The typical sche"e of "e"ory "anage"ent used in IBM; ?#)/ "ainfra"e syste" was that of "ultiprogra""ing with &ariable nu"ber of "e"ory partitions )/() The concepts used for reali:ation of &irtual "e"ory are swapping0 de"and paging and In3line secondary storage )/)) ;racle +i is an exa"ple of ;;82BM )/*) $<PH$0 8I; 0 P$85 are exa"ples of 8I 5 Processors )/+) The scope of an identifier refers to where in the progra" an identifier is accessible )/-) Hierarchy is not a co"ponent of relational database )1/) $ two3way selection in 5AA is the ifNelse )11) $ recursi&e function executes "ore efficiently than its iterati&e counterpart )1!) The body of the recursi&e function contains a state"ent that causes the sa"e function to execute before co"pleting the last call )1#) 6ariables that are created during progra" execution are called dyna"ic &ariables )1') When destroying a list0 we need a delete pointer to deallocate the "e"ory )1() The first character in the $ 5II character set is the null character0 which is nonprintable )1)) $ &ariable for which "e"ory is allocated at block entry and deallocated at block exit is called a static &ariable )1*) ignal to noise ratio co"pares signal strength to noise le&el )1+) The ability to create new ob9ects fro" existing ob9ects is known as inheritance )1-) oftware tools that pro&ide auto"ated support for the syste"s de&elop"ent process are ;<$P tools

)!/) $pplications?Web ser&er tier processes HTTP protocol0 scripting tasks0 perfor"s calculations0 and pro&ides access to data )!1) $ language used to describe the syntax rules is known as "eta language )!!) In a preorder tra&ersal0 the binary tree is tra&ersed as follows )!#) The general syntax of the function prototype of a &alue returning function is function na"e Fpara"eter list) )!') 5o"petiti&e intelligence is the process of gathering enough of the right infor"ation in a ti"ely "anner and usable for" and analy:ing it so that it can ha&e a positi&e i"pact )!() Tracing &alues through a se%uence is called a play out )!)) In a binary tree0 each co"parison is drawn as a circle0 called a node )!*) The ter" used as a "easure"ent of a co""unication channel.s data capacity is bandwidth )!+) In addition to the nature of the proble"0 the other key factor in deter"ining the best solution "ethod is function )!-) $n 138 data "odel sol&es the proble" of presenting huge infor"ation syste" data "odels is to users and de&elopers )#/) In 5AA0 predefined functions are organi:ed into separate libraries )#1) The standard protocol Fco""unication rules for exchange of data) of the internet is T5P?IP )#!) >or efficiency purposes0 where&er possible0 you should o&erload operators as "e"ber functions )##) Modifying algorith"s that change the order of the ele"ents0 not their &alues0 are also called "odifying algorith"s )#') $s long as the tables in a relational database share at least one co""on data attribute0 the tables in a relational database can be nor"ali:ed to pro&ide useful infor"ation and reports )#() 2BM is a si"ple0 fourth generation language used for data retrie&al )#)) $n occurrence of an undesirable situation that can be detected during progra" execution is known a exception )#*) $ photo of the co"pany head%uarters would be an exa"ple of the use of a static web page

)#+) The Pentiu" processor contains thousands of transistors )#-) ;I technology has been successful with reference to 8$M )'/) econdary storage de&ice is needed to print output results )'1) tatic rando" access "e"ory does not fall under the category of secondary storage de&ices )'!) >loppy disk is uni&ersal0 portable and inexpensi&e but has its own li"itation in ter"s of storage capacity and speed )'#) o"e physical property of the "icroscopic area of the disk surface is changed for recording in co""on for all types of disks )'') In a disk0 each block of data is written into two or "ore sectors )'() $ floppy disk rotates at 1//rp" )')) $ hard disk has (// to 1/// tracks or "ore )'*) The storage capacity of a cartridge tape is '// MB )'+) ingle density recording is also known as fre%uency "odulation )'-) Printer is not an input de&ice )(/) The input de&ice that is "ost closely related to a touch screen is the light pen )(1) <aser printer generates characters fro" a grid of pins )(!) The li%uid crystal display works on the basis of the relation between polaristion and electric field )(#) $ 5;B;< progra" in source code is not considered to be syste" software )(') >ir"ware stored in a hard disk )(() $ co"piler breaks the source code into a unifor" strea" of tokens by lexical analysis )()) orting of a file tasks is not perfor"ed by a file utility progra" )(*) >loppy disk does not generate a hardware interrupt )(+) $da language is associated with real ti"e processing )(-) M 2; is usually supplied on a cartridge tape

))/) B81$E is not an internal 2; co""and ))1) Eernel of M 32; software resides in 8;M ))!) The 7=I@ operating syste" Fa&ailable co""ercially) has been written in 5 language ))#) M 32; has better file security syste" as co"pared to 7=I@ ))') 7=I@ is only a "ultiprogra""ing syste" ))() The 7=I@ operating syste" uses three files to do the task "entioned )))) In 7=I@0 end3of3file is indicated by typing 5T8< 2 ))*) $bacus is said to be in&ented by 5hinese ))+) $n operating syste" is necessary to work on a co"puter ))-) The first 7=I@ operating syste"0 as it was in the de&elop"ent stage0 was written in the asse"bly language )*/) >$ T dri&ers scientific software packages was de&eloped under contract with =$ $ )*1) <1>T F) is not a date function )*!) >I> editor is a windows based application )*#) Braphics is inserted in fra"e )*') $ language translator is best described as a syste" software )*() The specification of a floppy is identified by TPI )*)) 2I 5 F) is not a database function )**) In opening "enu of word star 5 ;PTI;= should be selected for protecting a file )*+) The "ost ad&anced for" of 8;M is electronically erasable progra""able 8;M )*-) econdary storage de&ice is needed to store large &olu"es of data and progra"s that exceed the capacity of the "ain "e"ory )+/) M;81 sends contents of the screen to an output de&ice )+1) => stands for =?W file syste" )+!) Main protocol used in internet is T5P?IP

)+#) We can create a si"ple web page by using front page express )+') The first line?bar on the word window where the na"e of the docu"ent is displayed is called title bar )+() The clock fre%uency of a Pentiu" processor is (/ MH: )+)) The input de&ice that is "ost likely to be used to play co"puter ga"es is the 9oystick )+*) <inking the progra" library with "ain progra" is not perfor"ed by a file utility progra" )++) The 7=I@ operating syste" has been written in 5 language )+-) BI; of M 32; resides in 8;M )-/) The sector si:e of a floppy disk &aries fro" 1!+ bytes to 1/!' bytes )-1) $ progra" type of errors is flagged by co"pilers )-!) $ floppy diskette is organi:ed according to tracks and sectors )-#) In word star0 the "axi"u" per"issible length of search string is )( )-') 5 is a third generation high le&el language )-() $ 5P7 has a 1)3bit progra" counter, This "eans that the 5P7 can address )' E "e"ory locations )-)) T8 F) is used for con&erting a nu"eric into a character string )-*) B$ I5 language is nor"ally used along with an interpreter )-+) In 7=I@0 open files are shared between the parent and the child )--) In spite of the extra power needed for refreshing, 28$Ms are widely used in co"puters because of its lower cost relati&es to 8$Ms *//) PI> editor belongs to Main group */1) 7M F) is not a financial function */!) -+?/'?1! cannot be used to enter a date */#) Windows is popular because of its being expensi&e */') Personal co"puters currently sold in India ha&e "ain "e"ories at an entry le&el in the range of "egabytes

*/() The unit in 5P7 or processor0 which perfor"s arith"etic and logical operations is $<7 */)) 8$M is &olatile */*) The result of arith"etic and logical operations is stored in an accu"ulator */+) $ s"all a"ount of "e"ory included in the processor for high speed access is called cache */-) $ bus is an electronic track syste" *1/) $ co3processor is used to i"pro&e the speed of "athe"atical calculations *11) Intel +/!+) belongs to third generation "icroprocessors *1!) $ hexadigit can be represented by eight binary bits *1#) The nu"ber of processes that "ay running at the sa"e ti"e in a large syste" can be thousands *1') >;8T8$= is a #B< *1() 8oot is not an ite" of the Menu bar *1)) 2ifficult to do what it pro9ects is not considered to be a feature of the spreadsheet *1*) While starting the <otus 13!3#0 the current cell reference is shown at top left hand corner of the screen *1+) Bill gates is the chief of Microsoft *1-) 1xcel office assistant can be "ade to appear by using >1 key and help "enu *!/) - per page is the "ax no of showing positioning of per page handouts *!1) $lign"ent buttons are a&ailable on for"atting toolbar *!!) Pico second is 1/Fto the power of3-) *!#) <ogo refers to a co"puter language *!') The "ost appropriate co""and to per"anently re"o&e all records fro" the current table is Cap *!() The efficient and well designed co"puteri:ed payroll syste" would be on3line real ti"e syste" *!)) The scripts which are designed to recei&e &alue fro" Web users is 5BI script

*!*) W$I stands for O wide assu"ed infor"ation section *!+) Mode" is used for connecting P5 using telephone lines *!-) Token bus is the "ost popular <$= protocol for bus topology *#/) Manipulating data to create infor"ation is known as analysis *#1) $ separate docu"ent for" another progra" sent along with an 13"ail "essage is known as 13"ail attach"ent *#!) When you boot up a P5 P portions of the operating syste" are copied fro" disk into "e"ory *##) 5orrecting errors in a progra" is called debugging *#') $ word processor would "ost likely be used to type a biography *#() $ database is an organi:ed collection of data about a single entity *#)) >ire fox is a web browser *#*) Most of the co""only used personal co"puters?laptops do not ha&e a co""and key known as turno&er *#+) >ull for" of 7 B is known as 7ni&ersal serial bus *#-) The %uickest and easiest way in Word to locate a particular word or phrase in a docu"ent is to use the find co""and *'/) 5o"puter sends and recei&es data in the for" of digital signals *'1) Icons are graphical ob9ects used to represent co""only used application *'!) Most World Wide Web pages contain HTM< co""ands in the language *'#) In any window0 the "axi"i:e button0 the "ini"i:e button and the close buttons appear on the title bar *'') 5hecking that a pin code nu"ber is &alid before it is entered into the syste" in an exa"ple of data &alidation *'() Windows -( and windows -+ and Windows =T are known as operating syste"s *')) Infor"ation on a co"puter is stored as analog data *'*) $ progra" that works like a calculator for keeping track of "oney and "aking budgets is spreadsheet

*'+) To take infor"ation fro" one source and bring it to your co"puter is referred to as download *'-) Windows is not a co""on feature of software applications *(/) $ toolbar contains buttons and "enus that pro&ide %uick access to co""only used co""ands *(1) Input de&ice is an e%uip"ent used to capture infor"ation and co""ands *(!) Most of the co""only a&ailable personal co"puters?laptops ha&e a keyboard popularly known as DW18T4 *(#) 1diting a docu"ent consists of reading through the docu"ent you.&e created thenPcorrecting your errors *(') 6irtual Box is not a fa"ous operating syste" *(() Munk e3"ail is also called spa" *()) 2;5 is the default file extension for all word docu"ents *(*) ,bas0 ,doc and ,ht" are exa"ples of extensions *(+) 5odes consisting of bars or lines of &arying widths or lengths that are co"puter readable are known as a bar code *(-) 5on&enience0 speed of deli&ery0 generally and reliability are all considered as the ad&antages of e3"ail *)/) 13co""erce allows co"panies to conduct business o&er the internet *)1) The "ost i"portant or powerful co"puter in a typical network is network ser&er *)!) To "ake a notebook act as a desktop "odel0 the notebook can be connected to a docking station which is connected to a "onitor and other de&ices *)#) torage that retains its data after the power is turned off is referred to as non3 &olatile storage *)') 6irtual "e"ory is "e"ory on the hard disk that the 5P7 uses as an extended 8$M *)() To "o&e to the beginning of a line of text0 press the ho"e key *))) When sending and e3"ail0 the sub9ect line describes the contents of the "essage *)*) Microsoft is an application suite *)+) Infor"ation tra&els between co"ponents on the "otherboard through bays

*)-) ;ne ad&antage of dial3up internet access is it utili:es existing telephone security **/) =etwork co"ponents are connected to the sa"e cable in the star topology **1) Booting checks to ensure the co"ponents of the co"puter are operating and connected properly **!) 5ontrol key is used in co"bination with another key to perfor" a specific task **#) canner will translate i"ages of text0 drawings0 and photos into digital for" **') Infor"ation on a co"puter is stored as digital data **() The progra"s and data kept in "ain "e"ory while the processor is using the" **)) torage unit pro&ide storage for infor"ation and instruction ***) Help "enu button exist at start **+) Microsoft co"pany de&eloped M ;ffice !/// **-) 5harles Babbage is called the father of "odern co"puting *+/) 2ata link layer of ; I reference "odel pro&ides the ser&ice of error detection and control to the highest layer *+1) ;ptical fiber is not a network *+!) ;M8 is used to read choice filled up by the student in co""on entrance test *+#) $ network that spreads o&er cities is W$= *+') >ile Manager is not a part of a standard office suite *+() $ topology of co"puter network "eans cabling between P5s *+)) In 7=I@ co""and H5trl A CI is used to suspend current process or co""and *+*) Word is the word processor in M ;ffice *++) =etwork layer of an I ;3; I reference "odel is for networking support *+-) Telnet helps in re"ote login *-/) M Word allows creation of ,2;5 type of docu"ents by default *-1) In case of M 3access0 the rows of a table correspond to records *-!) 8ecord "aintenance in database is not a characteristic of 13"ail

*-#) In a ;=1T syste"0 an add?drop "ultipliers re"o&es noise fro" a signal and can also add?re"o&e headers *-') The WWW standard allows gra""ars on "any different co"puter platfor"s to show the infor"ation on a ser&er, uch progra""ers are called Web Browsers *-() ;ne of the oldest calculating de&ice was abacus *-)) Paint art is not a special progra" in M ;ffice *-*) ;utlook 1xpress is a e3"ail client0 scheduler0 address book *-+) The first generation co"puters had &acuu" tubes and "agnetic dru" *--) ;ffice $ssistant is an ani"ated character that gi&es help in M ;ffice +//) $lta 6ista has been created by research facility of 2igital 1lectronic corporation of 7 $ +/1) We are shifting towards co"puteri:ation because technologies help in "eeting the business ob9ecti&es +/!) piders search engines continuously send out that starts on a ho"epage of a ser&er and pursue all links stepwise +/#) tatic keys "ake a network insecure +/') Moy tick is an input de&ice that cannot be used to work in M ;ffice +/() $rtificial intelligence can be used in e&ery sphere of life because of its ability to think like hu"an beings +/)) To a&oid the wastage of "e"ory0 the instruction length should be of word si:e which is "ultiple of character si:e +/*) 1lectronic fund transfer is the exchange of "oney fro" one account to another +/+) >or"at "enu in M Word can be use to change page si:e and typeface +/-) $sse"bly language progra"s are written using Mne"onics +1/) 2M$ "odule can co""unicate with 5P7 through cycle stealing +11) $ stored link to a web page0 in order to ha&e a %uick and easy access to it later0 is called book"ark +1!) B!B type of co""erce is characteri:ed by low &olu"e and high &alue transactions in banking

+1#) $d&anced is not a standard M ;ffice edition +1') Workstation is single user co"puter with "any features and good processing power +1() History list is the na"e of list that stores the 78<.s of web pages and links &isited in past few days +1)) >22I access "echanis" is si"ilar to that of I111 +/!,( +1*) M ;ffice !/// included a full3fledged web designing software are called >rontPage !/// +1+) Macintosh is IBM.s "icroco"puter +1-) @,!1 is physical le&el standard for @,!( +!/) 1nter key should be pressed to start a new paragraph in M Word +!1) Main fra"e is "ost reliable0 robust and has a &ery high processing power, +!!) >or"atting of these toolbars allows changing of >onts and their si:es +!#) The CC co""and is used to %uit editor after sa&ing +!') The progra" supplied by 6 =< when you ask for internet connection for the e3 "ail access is pine +!() The con&enient place to store contact infor"ation for %uick0 retrie&al is address book +!)) 2igital cash is not a co"ponent of an e3wanet +!*) >or electronic banking0 we should ensure the existence and procedures with regard to identification of custo"ers who beco"e "e"bers electronically +!+) Mon 6on =eu"ann de&eloped stored3progra" concept +!-) Hardware and software are "andatory parts of co"plete P5 syste" +#/) >irewall is used in P5 for security +#1) Two rollers are actually responsible for "o&e"ent of the cursor in "ouse +#!) In case of a &irus getting into co"puter =;8T;= will help +##) Tour the ser&er roo" is to be done by the auditor while internet banking ser&ices audit +#') 2ocu"entation while de&eloping a software for a Bank is re%uired for auditing

+#() Water supply has not beco"e co"puteri:ed +#)) 5oncurrency control in distributed database supports "ulti3user access +#*) >ifth generation co"puters are knowledge processors +#+) Transistors were first used in !nd generation co"puters +#-) Intelligence is not a characteristic of a co"puter +'/) $ ca"era is an processing "achine +'1) To protect organi:ation fro" &irus or attacks all "ails sent and recei&ed should be "onitored0 all "essages should be encrypted0 13 "ails should be used only for official purpose +'!) Internet collects "illions of people all o&er the world +'#) $ co"puter based infor"ation syste" is a syste" in which a co"puter is used to process data to get infor"ation +'') The ti"e between progra" input and outputs is called execution ti"e +'() Third generations of co"puters ha&e ;n3line real ti"e syste"s +')) MIM1 is a co"pressor that packages different for"ats into MTP co"patible type +'*) The earliest software was de&eloped using the waterfall "odel +'+) 12I e3 co""erce syste" can handle non "onetary docu"ents +'-) 5ollection to tracks on a disk for"s spindle +(/) $ disk where nu"ber of sectors are fixed is called hard sectored +(1) Half duplex trans"ission techni%ues let co"puter to alternati&ely send and recei&e data +(!) Multiplexing co"bines signals fro" different sources into one and sends on a faster channel +(#) Message switcher chooses correct data path for an inco"ing "essage and forwards it to rele&ant line +(') peech recognition use ther"al sensors along with infrared rays for identification

+(() Tro9an horse are self replicating "alicious code independent of the action of the user0 but slow down the processor on entering a network +()) Beneration of PI= in bank $TM would re%uire PI= entered is encrypted +(*) $&ailability0 integrity0 confidentiality is "ost necessary for data to be useful +(+) Brid is a superco"puter created by networking "any s"all co"puters +(-) $ character that changes its &alue throughout the progra" is called &ariables +)/) $ progra" coded in progra""ing is done by asse"bling +)1) In write "ode of file existing text is replaced by new one +)!) When an organi:ation gi&es contract for de&elop"ent of a software0 it has to gi&e data to the ser&ice pro&ider, In such cases0 the ownership of data should be with the client?organi:ation that outsource ser&ices +)#) 7nder a centrali:ed organi:ation Intranet be an effecti&e networking tools +)') >or optical fiber used in point to point trans"ission0 the repeater spacing is 1/3 1// k" +)() >a&orites are accessible fro" the start "enu +))) Task pre3e"ption0 task priority and se"aphores are not needed by ser&er progra" fro" an operation syste" +)*) The ob9ecti&e of "ultiprogra""ing operating syste" is to "axi"i:e 5P7 utili:ation +)+) The en&iron"ent pro&ided to $ P is based on 5lient?ser&er +)-) H7B is layer1 de&ice0 central de&ice0 du"b de&ice +*/) The 7=I@0 echi co""and is used to display the "essage or &alue of any &ariable on the screen +*1) D$M is used in high speed "ode" +*!) >ra"e 8elay techni%ue uses connection oriented +*#) Bipolar always has a non3:ero a&erage a"plitude +*') In a ;=1T syste"0 an add?drop "ultipliers can re"o&e signals fro" a path +*() The ser&er on the internet is also known as Host +*)) >or "ultiple branching in G5. we use switch state"ent

+**) Web site is a collection of HTM< docu"ents0 graphic files0 audio and &ideo files +*+) The first network that initiated the internet was $8P$=1T +*-) In M;21M a digital signal changes so"e characteristic of a carrier wa&e ++/) The binary &alues are represented by two different fre%uencies in fre%uency shift keying ++1) Messenger "ailbox is present in =etscape co""unicator ++!) witching is a "ethod in which "ultiple co""unication de&ices are connected to one another efficiently ++#) $ bridge recogni:es addresses of layer # ++') 1P8;M is per"anent storage de&ice ++() H,TI>I extension na"e stands for tagged i"age for"at ++)) The o&erhead using B8I is 1/ percent of the total data rate ++*) In progra""ing languages the key word H6oidI "eans it does not return any &alue when finished +++) The keyboard shortcut to restart your co"puter is 5trl A $lt A 2el ++-) >;8T8$= is not a progra""ing language +-/) The instruction <;$2 $ is a one address instruction +-1) M 31xcel is also known as spread sheet +-!) Manchester encoding is used in 1thernet technology +-#) The instruction of a progra" which is currently being executed are stored in "ain "e"ory +-') In 2; en&iron"ent0 the co""and used to sa&e the file is QC +-() $ll high le&el language uses co"piler and interpreter +-)) In ht"l coding RpK NN R?pK tag is used to display a paragraph +-*) In HTM< coding0 the following attributes color0 si:e0 face used in font tag +-+) 2HTM< stands for dyna"ic hyper text "arkup language +--) >iber optics cable supports data rate up to 1// "bps to ! gbps

-//) In Photoshop software we can "odify0 delete0 and edit the i"age -/1) Most co""on channel used by networks today is telephone lines -/!) ybase D< ser&er and Microsoft D< ser&er *,/ is not an exa"ple of 82BM -/#) In progra""ing language0 =ull point is used to tell end of linked list -/') $ techni%ue which collects all deleted space onto free storage list is called garbage collection -/() =ode to node deli&ery of the data unit is the responsibility of the data link layer -/)) Insulating "aterial is the "a9or factor that "akes co axial cable less susceptible to noise than twisted pair cable -/*) $ data co""unication syste" co&ering an area the si:e of a town or city is M$= -/+) 6irtual "e"ory syste" allows the e"ploy"ent of the full address space -/-) The basic circuit of 15< supports the ;83=;8 logic -1/) Micro instructions are kept in control store -11) In HTM< coding no shade attribute of H8 tag suppresses the shading effect and fields a solid line -1!) Internet do"ains are classified by their functions, In that regard H,co"I represents co""ercial -1#) HTTP in 78< stands for hyper text transfer protocol -1') The H=y%uist theore"I specifies the "ini"u" sa"pling rate to be twice the bandwidth of a signal -1() Me"ory allocation at the routine is known as dyna"ic "e"ory allocation -1)) In HTM< loading0 RB8K tag is used for displaying a new line -1*) HTTP protocols are used by internet "ail -1+) $ policy on firewalls needs not ensure that it is logically secured -1-) The script which is designed to recei&e &alue fro" the web users is 9a&a script -!/) B1T "ethod and H1$2 "ethod is the 5-1 "ethod of in&ol&ing a 5-1 progra" -!1) $nalog switched line telephone ser&ice is least expensi&e

-!!) $ toll used to find a synony" or antony" for a particular word is thesaurus -!#) In 5AA coding0 5outRRItentIS is used to display character or strings or nu"eric screen -!') In this processing0 a nu"ber of 9obs are put together and executed as a group batch processing -!() The process of finding and correcting errors in a progra" is a process called debugging -!)) cn pass co""and is used to change your password in 7=I@ syste" -!*) HTM< code is always starts with Rht"lK R?ht"lK -!+) If there are ( routers and b networks in an internet work using link state routing0 there will be ( routing tables -!-) $ scripting language si"ilar to HTM< and which runs only on a browser is 9a&a script -#/) By 8$I2 techni%ue0 data is stored in se&eral disk units by breaking the" into s"aller pieces and storing each piece in separate disk -#1) The "ost popular network protocol whose routing capabilities pro&ide "axi"u" flexibility in an enterprise wide network is known as T5P?IP -#!) =ew group that enable you to co""unicate with other Microsoft windows user about issues and concerns with your co"puter -##) $nalog3digital con&ersion type needs sa"pling of a signal -#') In an optical fiber0 the inner core is less dense than the cladding -#() ix types of heading are a&ailable in HTM< -#)) 82BM is an acrony" for relational database "anage"ent syste" -#*) In M 3Word0 page layout &iew is also known as true W4 ?W4B -#+) In HTM< coding0 R7<K F7nordered list) is used to gi&e bullets in your docu"ent -#-) Trans"ission "edia are usually categori:ed as guided or unguided -'/) $ &irtual circuit is the physical connection between an end point and a switch or between two switches -'1) Passing of the fra"e to next station can happen at a token ring station

-'!) 835 coupling "ethod is suitable for &oltage a"plification -'#) =or"al is not a type of HTM< pages -'') In HTM< coding R<IK tag is used for denoting ite"s in a list of type R7<K -'() In M 3Word the keyboard shortcut >* used for spelling and gra""ar check -')) 2BM is not an operating syste" -'*) HTM< is basically used to design web3site -'+) In HTM< coding0 2yna"ic web3pages are created in ad&ance of the user.s re%uest -'-) In 2os0 pri"ary na"e of a file can ha&e a "axi"u" of 1/ characters -(/) du co""and is used to show file syste" disk usage in 7=I@ -(1) Maxi"u" length of a text file is !(( characters -(!) >ra"e for"at of 5 M$?52 and 1thernet protocol differ in the block error control -(#) ;n an 1thernet <$= i"ple"entation with 1/ base ( the "axi"u" nu"ber of seg"ents can be fi&e -(') ;&erflow condition in linked list "ay occur when atte"pting to create a node when linked list is e"pty -(() 5ode seg"ent register is where the "icroprocessor looks for instruction -()) Web3site is collection of web3pages and Ho"e3page is the &ery first page that we see on opening of a web3site -(*) The subsyste" of the kernel and hardware that cooperates to translate &irtual to physical addresses co"prises "e"ory "anage"ent subsyste" -(+) $ de&ice operating at the physical layer is called a repeater -(-) >;8T8$= is a "athe"atically oriented languages used for scientific proble"s -)/) If we want to con&ert the text which is in s"all letters to capital letters then select the re%uired text and press hift A># -)1) 2atagra" packet switching uses the entire capacity of a dedicated link -)!) In the datagra" approach to packet switching0 each packet of a "essage follows the sa"e path fro" sender to recei&er

-)#) >2M techni%ue trans"its analog signals -)') @,!1 protocol consists of only physical le&el -)() In a dedicated link0 the only traffic is between the two connected de&ices -))) In a start topology0 if there are n de&ices in network0 each de&ice has n31 -)*) $ uni%ue nu"ber assigned to a process when the process first starts running PI2 -)+) Mode"s is necessary for "ultiplexing -)-) In M 3Word W4 IW4B stands for what you see is where you get -*/) The pri"ary purpose of shutdown procedure in 7=I@ syste" is that all acti&e process "ay be properly closed -*1) In ti"e3 di&ision circuit switching0 deli&ery of data is delayed because data "ust be stored and retrie&ed fro" 8$M -*!) ubnet usually co"prises layers 1 L !0 layer 1 through # of ; I "odel -*#) $n i"age in a web3page can be aligned left and right using HTM< coding -*') 8>5 stands for re%uest for co""ent -*() Packet filtering firewall and proxy firewall is not a type of firewall -*)) Most news reader.s presents news groups articles in threads -**) The sharing of a "ediu" and its path by two or "ore de&ices is called "ultiplexing -*+) ending "essages0 &oice0 and &ideo and graphics files o&er digital co""unication link is done by the "ethod e3"ail -*-) In a co"puter network0 a co"puter that can control a group of other co"puters for sharing infor"ation as well as hardware utilities is known as ser&er -+/) Telephone nu"ber0 :ip code is defined as a nu"eric field -+1) In shell progra""ing0 tr co""and is used for character translation -+!) 5at textKKoutput would append a file called test to the end of a file called output -+#) In a network with !( co"puters0 "esh topology would re%uire the "ore extensi&e cabling -+') 2ialog control is a function of the presentation layer

-+() The progra" which takes user input0 interprets it and takes necessary action is shell -+)) Most appropriate data structure in 5 to represent linked list is array -+*) Menu bar is usually located below that title bar that pro&ides categori:ed options -++) <atest &ersion of Microsoft Word is Word @P -+-) 4ou sa&e your co"puter files on disc and in folders --/) when the text auto"atically goes onto the next line this is called word wrap --1) W4 IW4B is short for what you see is what you get --!) <eft 9ustify is the sa"e as align left --#) To put text on the right of the page use the align right button --') <otus 13!3# is a popular 2; based spreadsheet package --() )(0(#( characters can be typed in a single cell in excel --)) 5o""ents put in cells are called cell tip --*) Betting data fro" a cell located in a different sheet is called referencing --+) $ nu"eric &alue can be treated as a label &alue if it precedes with apostrophe ---) 2ata can be arranged in a worksheet in an easy to understand "anner using auto for"atting0 applying styles0 changing fonts 1///) $n excel workbook is a collection of worksheets and charts 1//1) Most "anufacturers setup their BI; to load into upper "e"ory during the boot process 1//!) 2e&ice dri&ers loaded in the config,sys file is loaded into the following "e"ory areaT 5on&entional "e"ory 1//#) '/ns "e"ory speeds is the fastest 1//') yste" software often uses the 8;M BI; 1//() In 5M; setup0 if you enable shadowing 8;M is copied to 8$M 1//)) tatic &ariables are local to the block in which they are declared, 1//*) 2uring the nor"al P5 boot process0 8;M BI; is acti&e first

1//+) 2uring boot3up0 the "e"ory test checks and &erifies that contiguous "e"ory is installed 1//-) )/1 error code identifies a floppy dri&e proble" 1/1/) If you get fre%uent general protection faults0 this could indicate poor %uality of "e"ory chips 1/11) 4ou are looking at a "e"ory "odule thought to be a 2IMM "odule, 1)+ pins would be on a 2IMM "odule 1/1!) The syste" BI; and 8;M chips are called fir"ware 1/1#) 1xtended located abo&e the first 1/!'E of "e"ory 1/1') W8$M type of 8$M is nor"ally the fastest 1/1() 8$M co"ponent is used for short3ter" data storage 1/1)) $ IMM has '/ pins 1/1*) 8$M pro&ides %uickest access to data 1/1+) =arrowcast linking is not a trans"ission technology 1/1-) The data flow diagra" is for analy:ing re%uire"ents of user 1/!/) The ele"ents of co"puter processing syste" are hardware0 data0 users and procedures 1/!1) ;n $ugust !#0 !//( an accounting clerk prepared an in&oice dated $ugust #10 !//(, 8ange check control can check this 1/!!) <ibrary "anage"ent software is for docu"enting the changes that are "ade to progra" and controlling the &ersion nu"bers of the progra"s 1/!#) teganography is hiding the data but not necessarily "aking it in&isible and not easily detectable 1/!') $ co"puter is an electronic de&ice 1/!() $n online transaction is transaction done &ia internet 1/!)) 7sing anti3&irus software is pre&enti&e "easure 1/!*) >or security we should consider local data reduction0 e&ent correction low resource utili:ation 1/!+) ; is not a peripheral of P5

1/!-) The "ost co""on input de&ice used today is keyboard 1/#/) The third generation of the co"puter were in 1-)(31-*1 1/#1) Bateways to allow a network to use the resources of another "ain fra"e is a co"ponent of internet 1/#!) Mouse cannot be shared 1/##) 12I "eans electronic data interface 1/#') Mainfra"es network where a huge co"pute does all co"puting and front end P5s are du"b ter"inals 1/#() $ "ode" that cannot be "o&ed fro" its position is called fixed "ode" 1/#)) $ de&ice that recei&es data fro" slow speed de&ices0 and trans"its it to different locations is called re"ote concentrator 1/#*) ;rgani:ation would prefer in house de&elop"ent of software to ensure that the de&elop"ent adhere to defined %uality 1/#+) $ctual intelligence is not a feature of P5 1/#-) =etwork that uses two ; I protocol layers as against three used in @,!( is a Hfra"e relayI 1/'/) Microsoft excel is &ersatile application and spread sheet progra" 1/'1) yste" flowcharts show relationship that link the input processing and output of the syste" 1/'!) To identifying the syste" to be tested the penetration testing is done 1/'#) Platfor" in co"puter world "eans co"puter hardware and operating syste"s 1/'') $ character that retains its &alue during progra" execution is constants 1/'() 2ata accuracy is not done by "ode" 1/')) ;M8 is used to read choice filled up by a student in co""on entrance tests 1/'*) The ter" re"ote with respect to network "eans "achine located far off 1/'+) In two3tier client ser&er architecture the client is usually fat client 1/'-) The senior "anage"ent pro&ides the go3ahead appro&al for the de&elop"ent of pro9ects

1/(/) Manual data can be put into co"puter by canner 1/(1) 13"ail address is "ade up of two parts 1/(!) The nor"al way to undo a co""and by pressing the following key co"binations together 5T8<3C 1/(#) The owner of a process is user that in&okes the process 1/(') In datagra" packet switching all the datagra".s of a "essage follow the sa"e channel of a path 1/(() @,!( <$PP uses a specific subset of H2<5 protocol 1/()) Presentation layer of the ; I reference "odel is concerned with the syntax of data exchanged between application entities 1/(*) 1dge3triggered 2 flip Oflop "e"ory ele"ents uses an P5 circuit at its input 1/(+) Progra"s that extend the capabilities of a ser&er are 5'1 scripts 1/(-) The pri"ary goal of I 2= is the integration of &oice ser&ices and non3&oice ser&ices 1/)/) >low control in ; I "odel is done by transport layer 1/)1) The optical links between any two ;=1T de&ices is called a section 1/)!) $ user can get files fro" another co"pute on the internet by using >TP 1/)#) The key fields which are tested by a packet filtering firewall are source IP address 0 T5P?72P source port0 destination IP address 1/)') The ser&er on the internet is also known as gateway 1/)() 6B cript can perfor" calculation of data 1/))) In M 3Word0 G"ail "erge. can be defined writing a letter once and dispatching it to a nu"ber of recipients 1/)*) 5oaxial cables are good for digital trans"ission and long distance trans"ission 1/)+) <87 is a page replace"ent policy used for "e"ory "anage"ent 1/)-) 5o""ercial T6 is an exa"ple of distributi&e ser&ices with user control 1/*/) The exact for"at of fra"e in case of synchronous trans"ission depends on whether trans"ission sche"e is either character oriented or bit oriented 1/*1) 8I=B topology is least affected by addition?re"o&e of a node

1/*!) 1@3;8 gates recogni:es only words that ha&e an odd nu"ber of 1 1/*#) To interconnect two ho"ogenous W$=.s we need a router 1/*') 5o3axial cables pro&ides data rates o&er (/ "bps 1/*() The outer"ost orbit of an ato" can ha&e a "axi"u" of + electrons 1/*)) The protocol for sharing hypertext infor"ation on the world wide web is HTTP 1/**) I 2=.s basic rate interface FB8I) is also known as ! 2 A B 1/*+) The "ode of data trans"ission of unshielded twisted pair cable is full duplex 1/*-) 2ata accuracy is not done by "ode" 1/+/) Duery is used to answer a %uestion about a database 1/+1) $M and >M are exa"ples of analog to analog "odulation 1/+!) 8edundancy is the concept of sending extra bits for use in error detection 1/+#) The physical layer is concerned with trans"ission of bits o&er the physical "ediu" 1/+') The nu"ber of input lines re%uired for a + to 1 "ultiplexes is + 1/+() The bar3code Frectangular pattern of lines of &arying width and spaces) used for auto"atic product identification by co"puter 1/+)) > E is "ost affected by noise 1/+*) tack is a <I>; structure 1/++) 5P7 is not an input de&ice of a co"puter 1/+-) Progra" of a co"puter presented as a se%uence of instructions in the for" of binary nu"bers is called "achine language 1/-/) Possible proble"s with 9a&a scrip can be security or li"ited graphics and "ulti"edia capabilities 1/-1) >or locating any docu"ent on the WWW, There is a uni%ue address known as 78< 1/-!) 2esign &iew would use to define a table and specify fields 1/-#) Tra&ersal process is faster for threaded trees co"pared with their unthreaded counterparts

1/-') The co""and used to display help on any particular co""and is "an 1/-() In 5AA progra""ing0 the extension of progra" is ,cpp 1/-)) $ generic tea" that refers to the co"bination of all co""ercial transactions executed o&er electronic "edia for the exchange of product and ser&ices 1/-*) In 2; 0 the co""and used to create a new file is called copy con 1/-+) Backup helps you to create a copy of the infor"ation on your hard disk and sa&es original data in case data on your co"puter got da"aged or corrupted due to "alfunctioning of hard3disk 1/--) <$= is usually pri&ately owned and links the de&ices in a single office0 building or ca"pus 11//) In 9ustified type of align"ent0 text gets aligned along both left and right "argins 11/1) The internal progra""ing language for a particular chip is called "achine language 11/!) The inner core of an optical fiber is glass and plastic in co"position 11/#) When a s"all a"ount of tri&alent i"purity is added to a pure3se"iconductor it is called P3type se"iconductor 11/') In M 3$ccess0 a table can ha&e one pri"ary key?keys 11/() In 2; 0 2eltree co""and is used to delete all the files as well as sub3 directories of a directory 11/)) =etscape na&igator is a web3browser 11/*) Multiplexing in&ol&es one path and one channel 11/+) Table0 for"0 %ueries0 reports0 "acros0 "odules are ob9ects in an access database 11/-) The clown co""and in 7=I@ changes ho"e directory of a user 111/) B52 stands for binary coded deci"al 1111) When we run a progra" in HTM< coding0 notepad is used as backend and internet3explorer works as front end 111!) If the M bit in @,!( standard is set to 10 it "eans that thee is "ore than one packet 111#) The "ode" is a de&ice that connects n input strea" outputs

111') $rray is linear data structure 111() $ T,6, broadcast is an exa"ple of si"plex trans"ission 111)) earch engine will search its database to find ite"s whose tent contains all or at least one of the words gi&en to it 111*) In 7=I@0 co""and HU VI is used to repeat entire less co""and line 111+) P5M is an exa"ple of analog to digital 111-) $ si"ple protocol used for fetching an e3"ail fro" a "ailbox is P;P # 11!/) >or a s"all web site0 one needs to buy space fro" the I P 11!1) $n operating syste" that acts as an inter"ediary between user and co"puter hardware 11!!) $ttair0 the world.s first personal co"puter0 was introduced in the year 1-*11!#) Half duplex data flows in both directions0 but any one direction at the ti"e 11!') 8ing re%uires a central controller or hub 11!() The ; I "odel consists of se&en layers 11!)) The "ain 9ob of one of the following is to allocate 5P7 to processes scheduler 11!*) 1/0(// &alid Min L Max :oo" si:es in M office 11!+) Before printing a docu"ent you should always use print pre&iew 11!-) 1xcel @P is the latest &ersion of excel 11#/) $ worksheet can ha&e a "axi"u" of !() nu"ber of rows 11#1) 5haracter is not a &alid data type in 1xcel 11#!) >or"ula bar in an 1xcel window allows entering &alues and for"ulas 11##) 2irect "e"ory access is a techni%ue for transferring data fro" "ain "e"ory to a de&ice without passing it through the 5P7 11#') ( #/3bit IMM are re%uired to populate a bank on a '+) syste" that has a #!3 bit data bus 11#() 8$M uses a clock to synchroni:e a "e"ory chip.s input and output signal 11#)) 5ycle3stealing type of 2M$ transfer will operate when a 5P7 is operating

11#*) $ series 1// P; T error code indicates a proble" with the syste" board 11#+) 4ou ha&e an old P5 that you decide to upgrade with a 1 gig I21 hard dri&e, 4ou find that you can.t configure 5M; to see the entire hard dri&e, The best you can do is ('/ "eg, Then use a de&ice dri&er that "akes the bios see the dri&e as 11#-) When H$2;WI=B is enabled in co"puters BI; Instructions stored in &arious 8;M chips are copied into 11'/) P; T stands for power on self test 11'1) 5hecking the hard disk while running Windows #,10 you disco&er a &ery large file called #-) P$8T,P$8, That file is windows per"anent swap file 11'!) 5M; contains the co"puter BI; and "aintains its data with the use of a battery for periods when the syste" is powered down 11'#) T 8 stands for ter"inate and stay 11'') <$= is not an inter network 11'() Me"ory is te"porary and storage is per"anent 11')) 1cho checking cannot assure data accuracy in an application 11'*) >ocus on "anual records is not necessary for co"puteri:ation syste" in a bank 11'+) Per"anent establish"ent0 residence3based0 Inco"e based classification are the approaches used to tax online transactions 11'-) 5o"puter of co"puter co""unication for business transactions is called 12I 11(/) 5lient3ser&er co"puting is used in =etwork "ulti3"edia 11(1) Back up of files is taken for security 11(!) ;perating syste" is not a software category 11(#) 5o"puter progra" looking Hnor"alI but containing har"ful code is infected by Tro9an horse 11(') Pri&ate key is used to append a digital signature 11(() Most dangerous risk in leaking of infor"ation is ignorance about the existence of risk 11()) IM$P FInternet "essage access protocol) takes care of 13"ail at client side 11(*) The 5P7 has control unit0 arith"etic3logic unit and pri"ary storage

11(+) 1st generation co"puter is the bulkiest P5 11(-) 138 diagra" represents relationship between entities of syste" 11)/) 7ser is technically least sound 11)1) Minico"puters is not there during fourth generation co"puter 11)!) Microchip is uni%ue to a s"artcard 11)#) Internet was started as network for defences forces of $"erica 11)') $ progra" per"anently stored in hardware is called fir"ware 11)() Taking back3up of a file against crash is a curati&e "easure 11))) i"plex trans"ission techni%ue per"its data flow in only one direction 11)*) >ront end processor relie&es the host co"puter fro" tedious 9obs and does the" itself 11)+) oftware can.t be touched 11)-) Physical access to a database can be altered by hiring procedure 11*/) The sound signal carried by telephone line is analog 11*1) $ll decisions for <$= are taken by the IT steering co""ittee 11*!) $n input de&ice gi&es data to a co"puter 11*#) 5orrection of progra" is done by debugging 11*') >ile transfer is the function of the application layer 11*() $ policy on firewalls need not ensure that is logically secured 11*)) $ "ode" perfor"s "odulation0 de"odulation0 data co"pression 11**) Personnel security does not fall under the category of operations to be perfor"ed during de&elop"ent of software 11*+) 5$ 1 tool cannot help with understanding re%uire"ents 11*-) 7P5 cannot be used for source of data auto"ation 11+/) The banks are MI58 de&ice to "ini"i:e con&ersion process 11+1) MP# files cannot be na&igated using 5lip$rt browser

11+!) 5lose option in >ile pull3down "enu is used to close a file in M Word 11+#) # W is the si:e of a standard floppy disc 11+') When entering in a lot of text in capitals you should use the caps lock key 11+() >iles created with <otus 13!3# ha&e an extension 1!# 11+)) 5ontents0 ob9ects0 cenarios of a worksheet can be protected fro" accidental "odification 11+*) 2e&ice dri&ers that are loaded in windows #,@ are loaded into the syte",ini file 11++) #/ pin IMM.s0 *! pin IMM.s0 1)+ pin 2IMM.s types of 8$M sockets can be seen on "other boards 11+-) The Power on self test deter"ines the a"ount of "e"ory present0 the date?ti"e0 and which co""unications ports and display adapters are installed in a "icroco"puter 11-/) 6irtual "e"ory refers to using a file on the hard disk to si"ulate 8$M 11-1) BI; F8;M) is considered fir"ware 11-!) $ population application of co"puter networking is the WWW of newsgroup called =etnews 11-#) a J 1/S export a is a &alid co""and se%uence in 7=I@ 11-') et date will you gi&e in 7=I@ to display syste" ti"e 11-() 5ircuit switched network networks re%uires that all channels in a "essage trans"ission path be of the sa"e speed 11-)) The 6i progra" a&ailable under 7=I@ can be created to open a &irtual ter"inal 11-*) $ '3bit ring counter is initially loaded with 1//1 11-+) The standard defined for fiber optics is +/!,+ 11--) 2igiti:ers can be con&erted fro" Hdu"bI to Hs"artI through the addition of a "icroprocessor 1!//) The extension of database file is gi&en by dbf 1!/1) 68M< code is based on 7nicode 1!/!) 7se net discussion groups ha&e their own syste" of organi:ation to help you find things 9ust as internet excel

1!/#) Http protocol is used for WWW 1!/') Protocol con&ersion can be handled by gateway 1!/() In I 2= teleser&ices0 the network can change or process the contents of data 1!/)) $ longer instruction length "ay be 31/!' to 1/!# 1!/*) $ "icroprocessor is a processor with a reduced instruction set and power re%uire"ent 1!/+) The ter" ser&er refers to any de&ice that offers a ser&ice to network users 1!/-) 7sing HTM<0 >ront page0 2HTM< we can "ake web3site 1!1/) 7sually security in a network is achie&ed by cryptography 1!11) P T= stands for public switched telephone network 1!1!) $ thyratron cannot be used as a a"plifier 1!1#) $n input de&ice conceptually si"ilar to "ouse is 9oystick 1!1') =etscape na&igator and other browsers such as the internet explorer are a&ailable free on the internet 1!1() In M 3logo Bye co""and is used to co"e out fro" that screen 1!1)) In 5AA progra""ing0 the co""and to sa&e the progra" file is ># 1!1*) 2ata lines which pro&ide path for "o&ing data between syste" "odules are known as data bus 1!1+) Bubble sort techni%ue does not use di&ide and con%uer "ethodology 1!1-) The ; I "odel shows how the network functions of co"puter to be organi:ed 1!!/) $ + bit "icroprocessor "ust ha&e + data lines 1!!1) $ protocol that per"its the transfer of files between co"puter on the network is >IP 1!!!) $ data structure0 in which an ele"ent is added and re"o&ed only fro" one end is known as stack 1!!#) In linked list0 the successi&e ele"ents "ust occupy contiguous space in "e"ory

1!!') In ; I "odel reference0 layer ! lies in between the physical layer and the network layer 1!!() In synchronous T2M0 for n signal sources0 each fra"e contains at least n slots 1!!)) Mouse and 9oystick are graphic input de&ices 1!!*) In linked list0 a node contains at least node nu"ber0 data field 1!!+) Bopher is not a web browser 1!!-) 2e&ice dri&ers controls the interaction between the hardware de&ices and operating syste"s 1!#/) The shortest path in routing can refer to the least expensi&e path 1!#1) $n ordinary pen which is used to indicate locations on the co"puter screen by sensing the ray of light being e"itted by the screen0 is called light pen 1!#!) =eti%uettes are so"e rules and regulations that ha&e to be followed by users 1!##) Bateway uses the greatest nu"ber of layers in the ; I "odel 1!#') $ set of standards by which ser&ers co""unicate with external progra"s is called co""on gateway interface 1!#() 7=I6$5 is a co"puter belonging to third generation 1!#)) $PI allows a client?ser&er relationship to be de&eloped between an existing host application and a P5 client 1!#*) e"i3insulator is a substance which has resisti&ity in between conductors and insulators 1!#+) Multi &ibrator is a two stage a"plifier with output of one feedback to the input of the other 1!#-) Macro is used to auto"ate a particular task or a series of tasks 1!'/) Internet is network of networks 1!'1) $ set of de&ices or co"bination of hardware and software that protects the syste"s on one side fro" syste" on the other side is firewall 1!'!) i"ple0 transparent0 "ulti post are bridge types 1!'#) When bandwidth of "ediu" exceeds the re%uired bandwidth of signals to be trans"itted we use fre%uency di&ision "ultiplexing 1!'') 2irect or rando" access of ele"ent is not possible in linked list

1!'() In 2os0 the H<abelI co""and is used to display the label of disk 1!')) $t the lower end of electro"agnetic spectru" we ha&e radio wa&e 1!'*) In Word0 5trl A 2el co"bination of keys is pressed to delete an entire word 1!'+) Plotters are &ery useful in applications such as co"puter aided design 1!'-) Web browser is a type of network application software 1!(/) )((#( characters can be typed in a single cell in 1xcel 1!(1) ;&erti"e analysis is useful for for"ulating personnel policies and deri&ed for" the payroll syste" 1!(!) Multiple worksheets can be created and used at a ti"e 1!(#) 7=I@ is both ti"e sharing and "ultiprogra""ing syste" 1!(') >loppy 2isk is uni&ersal portable and inexpensi&e but has its own li"itation in ter"s of storage capacity and speed 1!(() Personal co"puters currently sold in India ha&e "ain "e"ories at an entry le&el in the range of "egabytes 1!()) 7=I@ has better security for files relati&e to M 32; 1!(*) The 7=I@ operating syste" has been written in 5 language 1!(+) yntax errors is flagged by co"pilers 1!(-) P$8$M is an exa"ple of super co"puter 1!)/) Mother board holds the 8;M0 5P70 8$M and expansion cards 1!)1) 5238;M is as a "agnetic "e"ory 1!)!) The binary nu"ber syste" has a base ! 1!)#) B7I is used as an interface between software and user 1!)') 13"ail is transaction of letters0 "essages and "e"os o&er co""unications network 1!)() 2e&ice dri&ers are s"all 0 special purpose progra"s 1!))) <$= refers to a s"all0 single site network 1!)*) ;ne "egabyte e%uals approxi"ately 1 "illion bytes

1!)+) Magnetic tape is not practical for applications where data "ust be %uickly recalled because tape is a se%uential access "ediu" 1!)-) 7ser id0 78I and ti"e sta"p is not used by organi:ation when a user &isits its site 1!*/) 2B8M takes care of storage of data in a data base 1!*1) Plotters gi&e the highest %uality output 1!*!) 1ncrypting file syste" features of windows @P professional operating syste" protects the data of a user0 e&en if the co"puter is shared between users 1!*#) <oading is not re%uired for high le&el language progra" before it is executed 1!*') Top O botto" approach cannot be the "easure of network traffic 1!*() 2e&ices such as "agnetic disks0 hard disks0 and co"pact disks0 which are used to store infor"ation0 are secondary storage de&ices 1!*)) 6arious input and output de&ices ha&e a standard way of connecting to the 5P7 and Me"ory, These are called interface standards 1!**) The place where the standard interfaces are pro&ided to connect to the 5P7 and Me"ory is known as Port 1!*+) Binary nu"bers are positional nu"bers 1!*-) The base of the hexadeci"al syste" is sixteen 1!+/) 2isplay capabilities of "onitor are deter"ined by adapter card 1!+1) Mouse has a use in graphical user interface and applications as input de&ice 1!+!) 2ru" plotter0 flat bed plotter0 graphic display de&ice is an output de&ice 1!+#) The ti"e taken to write a word in a "e"ory is known as write na"e 1!+') 1 MB is e%ui&alent to ! Fto the power of !/ bytes) 1!+() $ "e"ory cell0 which does not loose the bit stored in it when no power is supplied to the cell0 is known as non3&olatile cell 1!+)) Magnetic surface recoding de&ices used in co"puters such as hard disks0 floppy disks0 5238;Ms are called secondary ? auxiliary storage de&ices 1!+*) The electronic circuits ? de&ices used in building the co"puter that executes the software is known as hardware

1!++) $sse"bler is a translator which translates asse"bly language progra" into a "achine language progra" 1!+-) Interpreter is a translator which translates high le&el language progra" into a "achine language progra" 1!-/) Machine language progra"s are "achine dependent 1!-1) The progra"s written in asse"bly language are "achine independent 1!-!) High le&el languages are de&eloped to allow application progra"s0 which are "achine independent 1!-#) The 6acuu" tubes are related to first generation co"puters 1!-') Mark I was the first co"puter that used "echanical switches 1!-() >irst generation co"puters relied on "achine language to perfor" operations0 and they only sol&e one proble" at a ti"e 1!-)) In first generation co"puters input was based on punched cards 1!-*) In second generation co"puters input was based on print outs 1!-+) 6acuu" tube generates "ore energy and consu"es "ore electricity 1!--) econd generation co"puters "o&ed fro" cryptic binary "achine language to sy"bolic0 or asse"bly languages which allowed progra""ers to specify instructions in words 1#//) Most electronic de&ices today use so"e for" of integrated circuits placed on printed circuit boards thin pieces of bakelite or fiberglass that ha&e electrical connections etched onto the" is called "other board 1#/1) The operating syste"0 which allowed the de&ice to run "any different applications at one ti"e with a central progra" that "onitored the "e"ory was introduced in third generation co"puters 1#/!) In third generation co"puters0 users interacted through keyboards and "onitors 1#/#) The fourth generation co"puters saw the de&elop"ent of B7Is0 the "ouse and handheld de&ices 1#/') >irst co"puters that stored instructions in "e"ory are second generation co"puters 1#/() In second generation co"puters transistors replaced &acuu" tubes 1#/)) The "icro processor was introduced in fourth generation co"puter

1#/*) Integrated 5ircuits FI5) are introduced and the replace"ent of transistors started in third generation co"puters 1#/+) >ifth generation co"puting is based on artificial intelligence 1#/-) $sse"bly language is low3le&el language 1#1/) In asse"bly language "ne"onics are used to code operations0 alphanu"eric sy"bols are used for address0 language lies between high3le&el language and "achine language 1#11) The co"puter.s secondary "e"ory is characteri:ed by low cost per bit stored 1#1!) $cknowledge"ent fro" a co"puter that a packet of data has been recei&ed and &erified is known as $5E 1#1#) $coustic coupler is a co""unications de&ice which allows an ordinary telephone to be used with a co"puter de&ice for data trans"ission 1#1') $<B;< is a high3le&el language 1#1() $ high le&el progra""ing language na"ed after $da $ugusta0 coworker with 5harles Babbage is $da 1#1)) $dder is a logic circuit capable of for"ing the su" of two or "ore %uantities 1#1*) To identify particular location in storage area one ha&e a address 1#1+) $ local storage register in the 5P7 which contains the address of the next instruction to be executed is referred as address register 1#1-) $ se%uence of precise and una"biguous instructions for sol&ing a proble" in a finite nu"ber of operations is referred as algorith" 1#!/) P5?$T is an exa"ple of Bi3directional keyboard interface 1#!1) 2IMM is not an I?; bus 1#!!) P5I bus is often called as "e::anine bus 1#!#) +/++ is an original IBM P5 inter 5P7 chip 1#!') +/#+) is a #!3bit processor 1#!() $ Pentiu" or Pentiu" pro board should run at )/ or )) MHC 1#!)) The "axi"u" bandwidth of 1I $ bus is ## M?sec 1#!*) $ co"puter syste" runs "illions of cycles per second so that speed is "easured in MH:

1#!+) Heat sink is the "etal de&ice that draws heat away fro" an electronic de&ice 1#!-) Pentiu" chip has )' bit L #! bit registers 1##/) $ "other board should contain at least ' "e"ory sockets 1##1) The 1,! MB dri&e spin at #)/ rp" 1##!) Intensity of sound is called a"plitude 1###) $ single :ero bit is called starting bit 1##') PnP stands for plug and play 1##() $ co"puters syste".s clock speed is "easured as fre%uency 1##)) Maxi"u" 8$M of @T type is 1 M 1##*) The data in + bit bus is sent along + wires si"ultaneously in parallel 1##+) The bus is si"ple series of connection that carry co""on signals 1##-) Mainly "e"ories are di&ided into two types they are logical "e"ories and physical "e"ories 1#'/) yste" based on the new Pentiu" II processor ha&e the extended "e"ory li"it of 'B 1#'1) >ull for" of 1M "e"ory is excluded "e"ory specification 1#'!) The !+) L #+) 5P7 ha&e !' address lines 1#'#) Bus has both the co""on "eaning and co"puter "eaning 1#'') 2ata on a floppy disk is recorded in rings called tracks 1#'() $ group of characters that ha&e a predefined "eaning database 1#')) In a spreadsheet a cell is defined as the intersection of a row and colu"n 1#'*) 2ocu"ent file is created by word processing progra"s 1#'+) 8eal ti"e is not a type of error 1#'-) The "ouse de&ice dri&ers0 if loaded in the config,sys file0 its typically called "ouse,sys 1#(/) Peer to peer "eans co"puter to co"puter

1#(1) 8<< refers to run length li"its 1#(!) The "ost i"portant aspect of 9ob scheduling is the ability to "ultiprogra""ing 1#(#) Mode" is a "odulator3de"odulator syste" 1#(') $ data co""unication syste" re%uires ter"inal de&ice0 co""unication channel0 protocols 1#(() The start button appears at the lower left of the screen 1#()) Windows is B7I 1#(*) TI> stands for tagged i"age for"at 1#(+) The first network that initiated the internet is $8P$=1T 1#(-) In "ode"s a digital signal changes so"e characteristic of a carrier wa&e 1#)/) >a&orites are accessible fro" the start "enu 1#)1) The &irus is a software progra" 1#)!) B$=E. is not "e"ory chip 1#)#) We use 8$M code to operate 1B$ 1#)') $ scanner is attached to <PT or 5 I host adapter port 1#)() 8$M bus is not a bus 1#))) Processor bus is the fastest speed bus in syste" 1#)*) 8esolution is the a"ount of detail that a "onitor can render 1#)+) ound blaster is a fa"ily of sound cards sold by creati&e labs 1#)-) MI2I is a fa"ily of sound cards sold by creati&e labs 1#*/) MI2I is a standard for connecting "usical instru"ents to P5.s 1#*1) By connecting a MI2I cable to the 9oystick port you can connect your P5 to a MI2I de&ice 1#*!) MP5 stands for "ulti"edia personal co"puter 1#*#) 6ideo cards0 &ideo and graphics card are exa"ple of &ideo L audio 1#*') The display technology used by "onitor is 58T

1#*() ;n a <$= each personal co"puter is called workstations 1#*)) The 5P7 is the next "ost i"portant file ser&er after the hard disk 1#**) It is best to use the ga"e adaptor interface on the sound card and disable any other on syste" 1#*+) Mouse port uses keyboard controller 1#*-) The nu"ber of sectors per track in 1,'' MB floppy disk is 1+ 1#+/) Pentiu" II syste" can address )! B "e"ory 1#+1) The "ouse was in&ented by 1nglebart 1#+!) The ser&er.s network adapter card is its link to all the work stations on <$= 1#+#) Magnetic dri&es such as floppy and hard disk dri&es operate by electro "agnetis" 1#+') 5lock ti"ing is used to deter"ine that start and end of each bit cell 1#+() Head designs are of ' types 1#+)) <atency is the a&erage ti"e that it takes for a sector to be a a&ailable after the heads 1#+*) 1ach sector is ha&ing (1! bytes 1#++) 222 "eans digital diagnostic disk 1#+-) P5 Technical is written in asse"bly language and has direct access to the syste".s hardware for testing 1#-/) 5heck it pro deluxe gi&es detailed infor"ation about the syste" hardware 1#-1) The last 1!+k of reser&ed "e"ory is used by "other board 1#-!) There are +/ cylinders are there for an 1,'' " floppy 1#-#) IBM changed 8;M on the syste" to support key boards 1#-') A1! 6 signal for disk dri&e is used for power supply 1#-() 52 8;M.s are single sided 1#-)) The storage capacity of a 528;M is )(/ MB 1#-*) @BB has !/'+ E graphic "e"ory

1#-+) Most sound boards generate sounds by using f" synthesis 1#--) Microscope helps you trouble shoot P ?! syste" 1'//) Beneral purpose of diagnostic progra" run in batch "ode 1'/1) The routing of data ele"ents are called bits 1'/!) ;perating syste" often called as kernel 1'/#) IP5 stands for inter process co""unication 1'/') Many progra""ing errors are detected by the hardware 1'/() When a process exists0 he operating syste" "ust free the disk space used by its "e"ory i"age 1'/)) Buffering atte"pts to keep both 5P7 and I?; de&ice busy all the ti"e 1'/*) oftware is not an exa"ple of file "apping 1'/+) The "ost i"portant aspect of 9ob scheduling is the ability to "ultiprogra""ing 1'/-) There are two types of floppy disks 1'1/) yste" calls can be grouped into three "a9or categories 1'11) H>I>;I stands for first in first out 1'1!) In the two3le&el directory structure0 each user has its own user file directory 1'1#) The nu"ber of bytes in a page is always a power of ! 1'1') $ process that does not deter"inate while the operating syste" is functionary is called dyna"ic 1'1() The three "ain types of co"puter progra""ing languages are "achine language0 asse"bly language0 high le&el language 1'1)) There are ! types of processor "odes 1'1*) $n input de&ice is an electro"echanical de&ice that generates data for a co"puter to read 1'1+) The first i"ple"entation of 7=I@ was de&eloped at Bell Telephone <aboratories in the early 1-*/ 1'1-) $ connection less protocol is "ore dyna"ic 1'!/) The throughput is a "easure of work for processor

1'!1) 5;B;< stands for co""on business oriented language 1'!!) 8eset button is used to do cool booting 1'!#) In M 31@51< the no of rows0 no of colu"ns are 1)#+'0!() 1'!') >;@P8; is a package and progra""ing language 1'!() Mostly used date for"at in co"puter is MM322344 1'!)) 8eser&ation of train ticket uses real ti"e "ode of processing 1'!*) $ floppy disk is a thin plastic disc coated with "agnetic oxide 1'!+) In binary addition 1A1 J 1 1'!-) 7ni&ersal building blocks of a co"puter syste" are =$=2 L =;8 1'#/) In 5;B;< progra""ing characters length per line is )' 1'#1) In >;@P8;0 the "axi"u" fields in a record are 1!+ 1'#!) D7IT co""and is used to co"e out of >;@P8; 1'##) 5ount co""and is used to count the specified records in a file with or without condition 1'#') >1 key is pressed for help in >;@P8; 1'#() ;ne Biga byte J 1/!' "ega bytes 1'#)) "all scale integration chip contains less than 1! gates 1'#*) The "ost co""on "onitor si:es are 1'0 1(0 1* 1'#+) IBM P5 and 2; has BI; support for # <PT ports 1'#-) 12; stands for external data organi:er 1''/) The nu"ber of wires in I21 Hard 2isk cable are 1) 1''1) If the data transfer rate is 1(/ k?sec then it is called single speed 1''!) $ typical buffer for a 5238;M dri&es 1() E 1''#) The !,++ M floppy dri&es ha&e #) no of sectors 1''') 1 MB is e%ual to ! Fto the power of 1/ EB)

1''() 8;M is a pri"ary storage de&ice 1'')) The process of loading and starting up 2; is called booting 1''*) The 2os Pro"pt is "ainly 5TXK 1''+) 5TXK&er is used for displaying current &ersion na"e 1''-) Intel ''/x H=ato"aI is an exa"ple for "other board chipset 1'(/) 2irect "e"ory access channels are used by "ediu" speed co""unication de&ices 1'(1) The '+) x chip is twice as fast as a #+) 2x with sa"e clock speed 1'(!) ;n a !+) or #+) sx syste"0 the extended "e"ory li"its 1)M 1'(#) The #+( 2x0 #+) 5P7 ha&e #! address lines 1'(') hared "e"ory does re%uire 1) E of 6M$ space 1'(() 2IMM.s are 1)+ pin "odules 1'()) The function of A1!6 power supple is to run disk dri&e "otors and also cooling fans 1'(*) P generally referred as rechargeable batteries 1'(+) Parallel interface is not the interfaces that can be used to connect the "ouse to the co"puter 1'(-) The "ouse interrupts usually occurs if the syste" uses a "ouse port 1')/) The &ideo adapter BI; handles co""unication between the 6ideo 5hipset L 6ideo 8a" 1')1) Pentiu" pro 5P7.s ha&e full of #!#0 they can track of '' B of "e"ory in address lines 1')!) The processor bus is the co""unications path way between 5P7 and i""ediate support chip 1')#) 6<3bus can "o&e data #! bit at a ti"e 1')') $ "ode" attached to syste" on 5;M ports 1')() Hori:ontal scan refers to the speed at which the electron bea" across the screen 1'))) 8BB "onitor display +/ colu"n text

1')*) When transition changes fro" negati&e to positi&e the head would detect positi&e &oltage spike 1')+) $ni"ation "eans to "ake still picture0 "o&e and talk like in cartoon pictures 1')-) $naloguesT The use of a syste" in which the data is of a continuously &ariable physical %uantity such as &oltage or angular person 1'*/) $ni"ationT $ si"ulation of "o&e"ent created by displaying a series of pictures or fra"es 1'*1) $pplication "eans a piece of software designed to "eet a specific purpose 1'*!) $cti&e @ is a "odel for writing progra"s, $cti&e @ technology is used to "ake interacti&e Web pages that look and beha&e like co"puter progra"s0 rather than static pages, With $cti&e @0 users can ask or answer %uestions0 use push buttons0 and interact in other ways with the web page 1'*#) Batch processing is a techni%ue in which a nu"ber of si"ilar ite"s or transactions are processed in groups or batches during a "achine run 1'*') BI T Bureau of Indian tandards, It is a national organi:ation of India to define standards 1'*() Browser is a link between the co"puter and the internet, It.s actually a progra" that pro&ides a way to look in the hand interact with all infor"ation on the internet, $ browser is a client progra" that uses the Hypertext Transfer Protocol Fhttp) to "ake re%uests of Web ser&ers throughout the Internet on behalf of the browser user, 1'*)) 5I; F5hief infor"ation officer) T The senior executi&e in a co"pany responsible for infor"ation "anage"ent and for deli&ering IT ser&ices 1'**) 5lient?ser&er architectureT $ type of network in which co"puter processing is distributed a"ong "any indi&idual P5s and a "ore powerful0 central co"puter clients can share files and retrie&e data stored on the ser&er 1'*+) 5ollaborati&e softwareT Broupware0 such as <otus =otes or Microsoft 1xchange 1'*-) 5o"puter3$ided designT 8efers to any co"puter3enabled "ethod of design also called co"puter3assisted design, 1'+/) 5o""uterT $ group of electronic de&ice used for perfor"ing "ultipurpose tasks 1'+1) 5hannelT It consists of controller card0 interface cable and power supply 1'+!) 5;8B$T 5;8B$ is the acrony" for 5o""on ;b9ect 8e%uest Broker $rchitecture

1'+#) 5BTT 5o"puter based training 1'+') 5ertificationT kills and knowledge assess"ent process 1'+() 5o"puter 5ri"eT The act of stealing0 cheating or otherwise defrauding an organi:ation with the use of a co"puter 1'+)) 5yber cafYT 5afY offering internet browsing facility 1'+*) 5ryptographyT Method used to protect pri&acy and security on the internet 1'++) 2BM T $n acrony" for the database "anage"ent syste", $ progra" that "aintains and controls the access to collection of related infor"ation in electronic files 1'+-) 2ataT >acts coded and structured for subse%uent processing0 generally using a co"puter syste" 1'-/) 2igital signatureT 1ncrypted signature used for pro&iding security for the "essages?data transferred through the internet 1'-1) 2igital co"puterT $ de&ice that "anipulates discrete data and perfor"s arith"etic and logic operations on these data 1'-!) 2ata trans"issionT The "o&e"ent of data fro" one location of storage to another, If the locations are geographically far away0 generally done &ia satellites, 1'-#) 2isk MirroringT The data is written on two or "ore hard disks si"ultaneously o&er the sa"e channel 1'-') 2isk 2uple @ingT The data is written on two or "ore hard disks si"ultaneously o&er the different channel 1'-() 2u"b Ter"inalsT Hardware configuration consisting of a keyboard and "onitor that is capable of sending and recei&ing infor"ation but has no "e"ory or processing capabilities, 1'-)) 2ownloadT Process of transferring a file syste" fro" one syste" to another 1'-*) 13co""erceT Business transactions conducted o&er extranets or the internet 1'-+) 1nterprise0 resource planningT $n integrated syste" of operation application co"bining logistics0 production0 contract and order "anage"ent0 sales forecasting and financial and H8 "anage"ent 1'--) 1lectronic data interchange F12I) T 1lectronic trans"ission or docu"ents through point to point connections using a set of standard for"s0 "essage and data ele"ents0 this can be &ia leased lines pri&ate networks or the internet

1(//) 2ata processingT It is a "ethod concerning with the syste"atic recording0 arranging0 filing0 processing and disse"ination of facts of business

You might also like