Preview

Basic Question and Answer on Computer, Internet and Information Technology

Satisfactory Essays
Open Document
Open Document
468 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Basic Question and Answer on Computer, Internet and Information Technology
Q.What is the most appropriate software for calculating in computer?

Ans :Microsoft Excel

What is meant by ‘LASER’?

Ans: Light Amplification by Stimulated Emission of Radiation.

A complete Microcomputer system includes ?

Ans: Microprocessor, memory, peripheral equipment.

What is Windows?

Ans: A personal computer operating system from Microsoft.

What is computer networking?

Ans: A system in which computers are connected to share information and resources.

What does ‘System Software’ Includes?

Ans: The operating system and all the utilities that enable the computer to function.

What is the other name of ‘Main Memory’?

Ans: Primary Memory

What is full form of BSIC?

Ans: Beginner’s All-purpose Symbolic Instruction Code.

What is Telemedicine?

Ans: A process of treatment through communication technologies.

Who is the inventor of punch card?

Ans: Joseph Marie Jacquard

What kind of device is Monitor?

Ans: Output device

What is ‘facebook’?

Ans: A popular Social networking site

What is ‘OCR’?

Ans: OCR (Optical Character Recognition) is a computer software designed to translate image of type written test.

What is Computer Virus?

Ans: One kind of program, which is harmful to computer operation.

Two types of commonly used printers are?

Ans: Dot Matrix printer and Laser printer

Write the name of different computer storage device.

Ans. Hard disk, Floppy disk, Compact disk

Who is the legend of computer world?

Ans: Bill Gates

What is the meaning of ‘CC’ in case of E-mail?

Ans: Carbon Copy

The word ‘Computer’ is derived from?

Ans: Compute

Adobe Photoshop is a – Graphics Software

What is the name of the first Computer Network?

Ans: ARPANET (Advanced Research Projects Administration Network)

What is the number of Computer Generation?

Ans: Five

BIOS is

You May Also Find These Documents Helpful

  • Satisfactory Essays

    btec ict level 3

    • 870 Words
    • 4 Pages

    When changing the customer perspective involves with e-commerce sites, the media would warn the customers about e-commerce websites and online shopping, which is big issue. This is done by exploring scary stories about damagers with the e-commerce site, also stories about people who experience bad service with online shopping. Then showing the customer that they could becoming a next victim of their PC being harm and also there information in damage by hacker that would try to steal their identity theft or delivery issues (that product would come later than planned) and other reasons not to trust online buying.…

    • 870 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The history timeline was very interesting to review. I never really realized what it takes to make a computer run. After careful consideration I was able to think of the two hardware innovations and two software innovations that I believe to be the most important.…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Btec Level 2 Ict

    • 786 Words
    • 4 Pages

    My products page allows users to browse through all my products that are on my website. I have created three other pages on different categories of people from men to women to children. I included shoe wear, t-shirts and hoodys. I used popular brands that customers would recognise such as Adidas, Nike and Puma. I tried my best to make the products that the company is trying to sell look professional with the price and size included. Again this meets the needs of my client as customers have a website when they can browse products.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Information Technology

    • 389 Words
    • 2 Pages

    Use the Microsoft Baseline Security Analyzer (MBSA) to detect the patches and updates that may be missing from your current installation. MBSA compares your installation to a list of currently available updates maintained in an XML file. MBSA can download the XML file when it scans your server or you can manually download the file to the server or make it available on a network server.…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    General Internet Skills

    • 422 Words
    • 2 Pages

    • What are the three or more best practices you learned about using the Internet for academic purposes? How do you think you might use them?…

    • 422 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Btec Ict Unit 10

    • 2563 Words
    • 11 Pages

    The aim of this unit is to ensure learners understand the communication principles of computer networks, know the elements of data communications systems and develop the skills to implement network communications.…

    • 2563 Words
    • 11 Pages
    Good Essays
  • Good Essays

    General Internet Skills

    • 1032 Words
    • 5 Pages

    As a student of University of Phoenix, it is important that I learned how to communicate with different audiences. I can do this by using formal communication. It is important that I communicate with the instructors in a formal way. Formal communication is very professional.…

    • 1032 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Information Security

    • 874 Words
    • 4 Pages

    A threat agent is the facilitator of an attack however; a threat is a constant danger to an asset.…

    • 874 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    A smart phone is definitely a mini computer that will do the same as a larger computer, as well as work as a phone and a camera. The smart phone processes information through aps to help a user to work, or just to be entertained, as well as surf the internet.…

    • 1161 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Information Security

    • 813 Words
    • 4 Pages

    Information security:is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction it has also be define as the protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats.…

    • 813 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Information Security

    • 2381 Words
    • 10 Pages

    Cyber-Ark’s 2012 Trust, Security & Passwords survey is the sixth in a series of annual surveys focused on identifying key security trends amongst IT workers. The survey assesses the extent to which privileged accounts and passwords are being protected in organizations today, and also provides insight into the core threats that exist and the measures being taken to defend systems. The survey report is the result of interviews with 820 IT managers and C-level professionals across North America and EMEA, primarily from enterprise companies. The security landscape continues to evolve – businesses can no longer simply focus on securing the network perimeter in hopes of keeping attackers out. As the enterprise perimeter dissolves, and reports of internal and external threats increase, privileged access points have emerged as the primary target for enterprise attacks. Privileged…

    • 2381 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    information security

    • 528 Words
    • 3 Pages

    Information Security Attributes: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are composed in three main portions, hardware, software and communications with the purpose to help identify and apply information security industry standards, as mechanisms of protection and prevention, at three levels or layers: physical, personal and organizational. Essentially, procedures or policies are implemented to tell people (administrators, users and operators) how to use products to ensure information security within the organizations.…

    • 528 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Optical character recognition has been an active area of research for many decades. The fact that OCRs have the potential to simplify data entry in the future adds value to research in this area. OCRs use various pattern matching techniques for character recognition. Most OCRs typically use classifiers like SVM or neural networks for character recognition. The training process for these classifiers is time consuming. Moreover, with an increase in the number of classes, the comparisons made increases and consequently the time taken for character recognition increases. Hence, they cannot be easily extended to recognize characters from additional languages. The proposed system uses a structural approach as opposed to statistical approach for feature extraction. The strength of the structural method over the statistical one is its representation of a pattern that is similar to the way human perceive it. The structural features help…

    • 2858 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    * First Generation (1940-1956) ENIAC (Electronic Numerical Integrator and Computer) build by Presper Eckert and Willian Mauchly that use vacuum tube instead of MARK 1 that use mechanical switches.…

    • 1939 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Any language, whether natural or artificial has lexemes (symbols) and a grammar. Example : void, ;…

    • 291 Words
    • 2 Pages
    Good Essays