Preview

Basic Question and Answer on Computer, Internet and Information Technology

Satisfactory Essays
Open Document
Open Document
468 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Basic Question and Answer on Computer, Internet and Information Technology
Q.What is the most appropriate software for calculating in computer?

Ans :Microsoft Excel

What is meant by ‘LASER’?

Ans: Light Amplification by Stimulated Emission of Radiation.

A complete Microcomputer system includes ?

Ans: Microprocessor, memory, peripheral equipment.

What is Windows?

Ans: A personal computer operating system from Microsoft.

What is computer networking?

Ans: A system in which computers are connected to share information and resources.

What does ‘System Software’ Includes?

Ans: The operating system and all the utilities that enable the computer to function.

What is the other name of ‘Main Memory’?

Ans: Primary Memory

What is full form of BSIC?

Ans: Beginner’s All-purpose Symbolic Instruction Code.

What is Telemedicine?

Ans: A process of treatment through communication technologies.

Who is the inventor of punch card?

Ans: Joseph Marie Jacquard

What kind of device is Monitor?

Ans: Output device

What is ‘facebook’?

Ans: A popular Social networking site

What is ‘OCR’?

Ans: OCR (Optical Character Recognition) is a computer software designed to translate image of type written test.

What is Computer Virus?

Ans: One kind of program, which is harmful to computer operation.

Two types of commonly used printers are?

Ans: Dot Matrix printer and Laser printer

Write the name of different computer storage device.

Ans. Hard disk, Floppy disk, Compact disk

Who is the legend of computer world?

Ans: Bill Gates

What is the meaning of ‘CC’ in case of E-mail?

Ans: Carbon Copy

The word ‘Computer’ is derived from?

Ans: Compute

Adobe Photoshop is a – Graphics Software

What is the name of the first Computer Network?

Ans: ARPANET (Advanced Research Projects Administration Network)

What is the number of Computer Generation?

Ans: Five

BIOS is

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The history timeline was very interesting to review. I never really realized what it takes to make a computer run. After careful consideration I was able to think of the two hardware innovations and two software innovations that I believe to be the most important.…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Dr. Martin Luther King Jr. was an American Baptist minister, activist, humanist, and a leader in the African-American Civil Rights Movement. With MLK being such a strong leader for Civil Rights he had several speeches to give, each written with a different purpose but the same goal. MLK’s Letter from Birmingham Jail was written in response to those that accused him of being an extremist. Throughout his letter MLK used various forms of allusion, anaphora, and pathos in order to get his point across to the people that accused him of being an extremist and to the clergymen that called him unwise and untimely.…

    • 706 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    btec ict level 3

    • 870 Words
    • 4 Pages

    When changing the customer perspective involves with e-commerce sites, the media would warn the customers about e-commerce websites and online shopping, which is big issue. This is done by exploring scary stories about damagers with the e-commerce site, also stories about people who experience bad service with online shopping. Then showing the customer that they could becoming a next victim of their PC being harm and also there information in damage by hacker that would try to steal their identity theft or delivery issues (that product would come later than planned) and other reasons not to trust online buying.…

    • 870 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Btec Level 2 Ict

    • 786 Words
    • 4 Pages

    My products page allows users to browse through all my products that are on my website. I have created three other pages on different categories of people from men to women to children. I included shoe wear, t-shirts and hoodys. I used popular brands that customers would recognise such as Adidas, Nike and Puma. I tried my best to make the products that the company is trying to sell look professional with the price and size included. Again this meets the needs of my client as customers have a website when they can browse products.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Information Technology

    • 389 Words
    • 2 Pages

    Use the Microsoft Baseline Security Analyzer (MBSA) to detect the patches and updates that may be missing from your current installation. MBSA compares your installation to a list of currently available updates maintained in an XML file. MBSA can download the XML file when it scans your server or you can manually download the file to the server or make it available on a network server.…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Airmen Leadership School

    • 342 Words
    • 2 Pages

    upon subordinates and peers best defines the NCO that I want to see in myself and…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    General Internet Skills

    • 422 Words
    • 2 Pages

    • What are the three or more best practices you learned about using the Internet for academic purposes? How do you think you might use them?…

    • 422 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In this essay I will discuss what privacy and dignity of women and their families in the everyday work of a midwife means, and why it is so important. As an obligation of confidentiality set by the Nursing and Midwifery Council (NMC) (2008), names of trusts and individuals will not be mentioned in this essay. The NMC code of conduct (2008) states that as a midwife one must “make the care of people your first concern, treating them as individuals and respecting their dignity.” Without this, midwives are doing a disservice to the woman and compromising the strength of the midwife-woman relationship which, in turn leaves the woman’s care and wellbeing compromised. Furthermore, it is vital that midwives go about treating women and their families with the upmost respect in all aspects of their work as it is a standard of conduct they guaranteed to uphold when notifying the NMC of their intent to practise.…

    • 973 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Btec Ict Unit 10

    • 2563 Words
    • 11 Pages

    The aim of this unit is to ensure learners understand the communication principles of computer networks, know the elements of data communications systems and develop the skills to implement network communications.…

    • 2563 Words
    • 11 Pages
    Good Essays
  • Good Essays

    General Internet Skills

    • 1032 Words
    • 5 Pages

    As a student of University of Phoenix, it is important that I learned how to communicate with different audiences. I can do this by using formal communication. It is important that I communicate with the instructors in a formal way. Formal communication is very professional.…

    • 1032 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Information Security

    • 874 Words
    • 4 Pages

    A threat agent is the facilitator of an attack however; a threat is a constant danger to an asset.…

    • 874 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    A smart phone is definitely a mini computer that will do the same as a larger computer, as well as work as a phone and a camera. The smart phone processes information through aps to help a user to work, or just to be entertained, as well as surf the internet.…

    • 1161 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Information Security

    • 813 Words
    • 4 Pages

    Information security:is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction it has also be define as the protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats.…

    • 813 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    * First Generation (1940-1956) ENIAC (Electronic Numerical Integrator and Computer) build by Presper Eckert and Willian Mauchly that use vacuum tube instead of MARK 1 that use mechanical switches.…

    • 1939 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Any language, whether natural or artificial has lexemes (symbols) and a grammar. Example : void, ;…

    • 291 Words
    • 2 Pages
    Good Essays