Electronic data interchange (EDI) : Electronic transmission or documents through point to point connections using a set of standard forms, message and data elements, this can be via leased lines private networks or the internet
Computer Crime: The act of stealing, cheating or otherwise defrauding an organization with the use of a computer
Browser is a link between the computer and the internet. It’s actually a program that provides a way to look in the hand interact with all information on the internet. A browser is a client program that uses the Hypertext Transfer Protocol (http)
Batch processing is a technique in which a number of similar items or transactions are processed in groups or batches during a machine run
A technique for searching special databases, called data warehouses, looking for related information and patterns is called data mining
The integration of all kinds of media such as audio, video, voice, graphics and text into one coherent presentation combined is called multimedia
The central host computer or file server in a star network maintains control with its connecting devices through polling
Cache memory is a part of main memory
The enhanced keyboard contains 101 keys
The memory address sent from the CPU to the main memory over a set of wires is called address bus
The .mpeg is the format of a movie file
Control panel is used for increasing and decreasing the speed of the cursor of mouse
The IBM made the first electronic computer in 1953
Data integrity means that the data contained in the database is accurate and reliable
The code that relational database management systems use to perform their database task is refer to as SQL
Granting an outside organization access to internet web pages is often implemented using a extranet
When data changes in multiple list and list are not updated, this causes data inconsistency
A proxy server is used to process client request for web pages
A goal of normalization is to minimize the number of redundancy
Boot sector viruses are often transmitted by a floppy disk left in the floppy drive
A cluster represents a group of sectors
Restarting a computer that is already on is referred to as warm booting
Connections to the internet using a phone line and a modem are called dial-up connections
FORTRAN is a scientific computer language
Ethernet is used for high speed telecommunications
MS-DOS is a single user operating system
Scanner will translate images of text, drawings and photos into digital form.
Network components are connected to the same cable in the bus topology.
Each box in a spread sheet is called a cell.
The ability to find an individual item in a file immediately Direct access .
A compiler translates higher level programs into a machine language program, which is called object code
When the pointer is positioned on a hyperlink it is shaped like a hand .
In a relational database, table is a data structure that organizes the information about a single topic into rows and columns.
A tool bar contains buttons and menus that provide quick access to commonly used commands telephone security
A tool bar contains buttons and menus that provide quick access to commonly used commands
Information travels between components on the motherboard through buses.
The windows key will launch the start buttons.
Changing an existing document is called the editing documentation
Syntax contains specific rules and words that express the logical steps of an algorithm.
Testing is the process of finding errors in software code.
Storage that retains its data after the power is turned off is referred to as non- volatile storage.
A collection of related files is called record.
You can use the tab key to move a cursor across the screen, indent a paragraph.
The process of a computer receiving information from a server on the internet is known as downloading
The rectangular area of the screen that displays a program, data, and or information is a window
Super computers refers to the fastest, biggest and most expensive computers
A series of instructions that tells a computer what to do and how to do it is called a program.
A filename is a unique name that you give to a file of information.
A computer framed to give various network services is called server.
The unwanted or non-requested emails are called "spam".
A website containing periodic posts is called blog.
'PARAM-8000' is a First supercomputer in India.
The first home computer (1977), which was sold in millions of units was Apple II.
The device which sends computer data using a phone line is called MODEM.
An error in software designing which can even cause a computer to crash is called bug.
A program used to browse the web is called Web browser.
A Pentium 4 (P-4) employs roughly 40 million transistors.
The Harvard student, who chose to write computer programs and dropped studies was Bill Gates.
The term 'micro' (extremely small) denotes 10-6m.
The first microprocessor was developed in 1971 by Intel.
The transformation from heavy computers to PCs was made possible using microprocessors.
IBM was provided software for PCs by Microsoft.
The 1st commercially produced and sold computer (1951) was UNIVAC.
Famous people, associated with the ENIAC, EDVAC, UNIVAC computers are Eckert & Mauchly.
The B-programming language was developed by Ken Thompson.
An improvement on the ENIAC, which pioneered 'stored program', was made possible with the help of the mathematician John von Neumann.
Early computing machines, like the ENIAC, were actually meant to assist the armed forces.
The earlier computers, which were massive in size, were based on vacuum tubes.
When you connect to the Internet your computer is communicating with a server at your Internet service provider (ISP)
The metal or plastic case that holds all the physical parts of the computer is the- system unit. Input devices are used to provide the steps and tasks the computer needs to process data, and these steps and tasks are called instructions.
The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called: A. instructions-the operating system.
Embedded computers are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
The operating system controls the way in which the computer system functions and provides a means by which users can interact with the computer.
A byte can hold one character of datA.
Nanotechnology is the science revolving around the use of nanostructures to build devices on an extremely small scale.
The difference between people with access to computers and the Internet and those without this access is known as the-digital dividE.
DSL is an example of a broadband connection.
Supercomputers are specially designed computers that perform complex calculations extremely rapidly.
Servers are computers that provide resources to other computers connected to a- network.
The PC (personal computer) and the Apple Macintosh are examples of two different-platforms.
Software is a set of computer programs used on a computer to help perform tasks.
Word processing, spreadsheet, and photo-editing are examples of-application softwarE.
The CPU and memory are located on the- motherboarD.
The components that process data are located in the- system unit
The term bit is short for- binary digit.
In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of-eight bits.
The name for the way that computers manipulate data into information is called:-processing.
Artificial intelligence (AI) is the science that attempts to produce machines that display the same type of intelligence that humans do.
Nano science is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
Technology no longer protected by copyright, available to everyone, is considered to be-proprietary.
Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as- robotics.
The ability to recover and read deleted or damaged files from a criminal computer is an example of a law enforcement specialty called- computer forensics.
Point-of-sale (POS) terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A process known as data mining is used by large retailers to study trends.
All of the following are examples of real security and privacy risks EXCEPT- spam.
A program that works like a calculator for keeping track of money and making budgets-spreadsheet
To move down a page in a document-scroll
A command to get a file you worked on from the memory where it was stored- open
A removable magnetic disc that holds information-hard drive
The command used to remove text or graphics from a document. The information is then stored on a clipboard so you can paste it- cut
Commands at the top of a screen such as: FILE-EDIT-FONT-TOOLS to operate and change things within programs- menu bar
A blinking indicator that shows you where your next action will happen-cursor
Start or restart the computer-boot
A place that a user can create to store files- folder
A program which helps create written documents and lets you go back and make corrections as necessary- word processor
Any letter, number, or symbol found on the keyboard that you can type into the computer- character
The different styles of lettering in a word processing program-font
A device that reads the information contained on a disk and transfers it to the computer’s memory- disk drive
Which is the part of a computer that one can touch and feel-Hardware
Which keys can be used together with other keys for special tasks - Ctrl, Shift
The capability of the operating system to enable two or more than two programs to execute simultaneously in a single computer system by using a single processor is-Multitasking
An assembler is used to translate a program written in- Assembly language
Correcting errors in a program is referred to as- debugging
‘Buy Now–Pay Now’ is commonly used for -Visa Cards
E-governance-Delivery of public services through internet
A MODEM is connected in between a telephone line and a—Computer
Smallest storage unit of a computer is-Bit
Modern Computers represent characters and numbers internally using one of the following number systems - Binary
‘MICR’ technology used for clearance of cheques by banks refers to— Magnetic Ink Character Recognition
The Mouse pointer becomes different shapes depending on the task you are performing.
In Excel, Charts are created using which option -Chart Wizard
Text in a column is generally aligned – Left
Reusable optical storage will typically have the acronym-RW
The term ‘user interface’ refers to—What the user sees on the screen and how they can interact with it.
To move to the beginning of a line of text, press the Home key.
A collection of interrelated records is called – Database
In page preview mode-You can see all pages of your document
Backup is - Protecting data by copying it from the original source to a different destination.
An error in a computer program is called as- Bug
Softcopy is the intangible output, so then what is hardcopy - The printed output
Computers use the binary number system to store data and perform calculations.
The secret code that restricts entry to some programs-Password
The simultaneous processing of two or more programs by multiple processors is Multiprocessing.
A programming language contains specific rules and words that express the logical steps of an algorithm.
A compiler translates a program written in a high-level language into Machine language.
A directory within a directory is called-Sub Directory.
The primary purpose of software is to turn data into Information.
In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the Details view.
Using Windows Explorer, a plus (+) sign in front of a folder indicates— the folder contains subfolders.
An additional BCC (blind carbon copy) field is available for hidden notification; recipients listed in the BCC field receive a copy of the message, but are not shown on any other recipient's copy (including other BCC recipients) power-on self-test (POST)
CC (Carbon Copy) in e – mail indicates those who are to receive a copy of a message addressed primarily to another. The list of CC recipients is visible to all other recipients of the message.
The World Wide Web (abbreviated as WWW or W3, commonly known as the Web) is a system of interlinked hypertext documents that are accessed via the Internet.
The memory resident portion of the operating system is called the— kernel.
The BIOS stored on a ROM chip, is responsible for loading the operating system from its permanent location on the hard drive into RAM.
Activate BIOS -> Perform POST -> Load operating system -> Check configuration settings
The correct sequence of actions that takes place during the boot-up process?
Verification of a login name and password is known as authentication.
The definition of thrashing is swapping data between virtual memory and RAM too frequently.
The purpose of a swap (or page) file is to hold a program’s data or instructions in virtual memory when it can’t fit in RAM.
Virtual memory is typically located on the hard drive.
A spooler is a program that coordinates the print jobs that are waiting to print.
An interrupt handler is a special numeric code that indicates the priority of a request.
The Uniform Resource Locator, abbreviated as URL is a specific character string that constitutes a reference to a resource. In most web browsers, the URL of a web page is displayed on top inside an address bar. An example of a typical URL would be " https://naukrifolio.com/".
A Hyperlink is a reference to data that the reader can directly follow either by clicking or by hovering or that is followed automatically
An Integrated Software is a single application that combines major features of several types of application.
Non – Impact Printers do not touch the paper when creating an image. Examples of Non - Impact Printers are Inkjet printers, Laser printers, Solid ink printers, Dye- sublimation, Thermal wax printers, Thermal auto chrome printers.
Impact printers create an image by using some mechanism to physically press an inked ribbon against the page, causing the ink to be deposited on the page in the shape desired. Examples of Impact Printers are Character Printers and Dot Matrix Printers.
The data on DRAM continues to move in and out of the memory as long as power is available and must be continually refreshed to maintain the data. DRAM stands for Dynamic Random Access Memory.
SRAM retains data as long as power is provided to the memory chip and need not be refreshed periodically. SRAM stands for Static Random Access Memory.
MS-DOS is a command-driven operating system.
The blocks of code, included in the operating system, that software applications interact with are known as: Application programming interfaces (APIs).
The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an- Interrupt.
Multitasking is the ability of an operating system to control the activities of multiple programs at the same timE.
During the boot process, the BIOS looks for the system files.
To delete an incorrect character in a document delete key to erase to the right of the insertion point.
The horizontal and vertical lines on a worksheet are called— gridlines
Merging cells involves creating a single cell by combining two or more selected cells.
A gigabyte represents approximately one billion memory locations.
The Undo button on the quick access Toolbar allows you to cancel your recent commands or actions.
Data processing: It is a method concerning with the systematic recording, arranging, filing, processing and dissemination of facts of business
Enterprise, resource planning: An integrated system of operation application combining logistics, production, contract and order management, sales forecasting and financial and HR management
E-commerce: Business transactions conducted over extranets or the internet
Download: Process of transferring a file system from one system to another
Dumb Terminals: Hardware configuration consisting of a keyboard and monitor that is capable of sending and receiving information but has no memory or processing capabilities.
Disk Duple Xing: The data is written on two or more hard disks simultaneously over the different channel
Disk Mirroring: The data is written on two or more hard disks simultaneously over the same channel
Data transmission: The movement of data from one location of storage to another. If the locations are geographically far away, generally done via satellites.
Digital computer: A device that manipulates discrete data and performs arithmetic and logic operations on these data.
Digital signature: Encrypted signature used for providing security for the messages/data transferred through the internet.
Data: Facts coded and structured for subsequent processing, generally using a computer system.
DBMS: An acronym for the database management system. A program that maintains and controls the access to collection of related information in electronic files.
Cryptography: Method used to protect privacy and security on the internet
Computer Crime: The act of stealing, cheating or otherwise defrauding an organization with the use of a Computer.
Certification: Skills and knowledge assessment process.
Collaborative software: Groupware, such as Lotus Notes or Microsoft Exchange
When communication in both directions and both the devices can simultaneously transmit the data known as-: Full duplex
You can use the Address bar to type a URL and display a web page, or type a keyword to display a list of related web pages.
A series of instructions that tells a computer what to do and how to do it is called a- Instruction
The first computers were programmed using- : Machine language.
In a relational database, this is a data structure that organizes the information about a single topic into rows (Tuple) and columns (Attributes) - Table
To combine two or more cells into a single cell is called – Merging
Character in table columns are usually - Left Alignment.
Numbers in table columns are usually - Right Alignment.
Booting is the process when the computer is turned on and the operating system is loading.
In order to tell Excel that we are entering a formula in a cell,we must begin the entry with an operator - = (Equal)
The particular field of a record that uniquely identifies each record is called the key field.
Fax machines and imaging systems are examples of - Scanning devices.
Which area in an Excel window allows entering values and formulas- Formula Bar
Different applications and documents of windows desktop are represented by Icon.
Most mail programs automatically complete the following two parts in an e-mail- From and To.
Editing a document consists of reading through the document you’ve created, then- Correcting your errors.
Executing is the process of carrying out commands.
Which device is used for dividing a network into segments - Switch
Unsolicited commercial email is commonly known as Spam.
The most common method of entering text and numerical data into a computer system is through the use of a keyboard.