Important Points for Computer section Related To IBPS 1) The - TopicsExpress



          

Important Points for Computer section Related To IBPS 1) The code for a Web page is written using Hypertext Markup language 2) The first computers were programmed using Machine language 3) A file name is a unique name that you give to a file of information 4) This can be another word for program software 5) Any data or instruction entered into the memory of a computer is considered as storage 6) Which part of the computer displays the work done monitor 7) A series of instructions that tells a computer what to do and how to do it is called a program 8) Hardware is the part of a computer that one can touch and feel . 9) The role of a computer sales representative generally is to determine a buyer’s needs and match it to the correct hardware and software. 10) Supercomputers refers to the fastest, biggest and most expensive computers 11) Executing is the process of carrying out commands 12) The rectangular area of the screen that displays a program, data, and or information is a window 13) The process of a computer receiving information from a server on the internet is known as downloading 14) Disk drive is the part of the computer helps to store information 15) Arithmetic operations include addition, subtraction, multiplication, and division 16) A keyboard is the king of input device 17) An error is known as bug 18) A collection of related information sorted and dealt with as a unit is a file 19) Sending an e-mail is similar to writing a letter 20) IT stands for information technology 21) A menu contains commands that can be selected 22) Plotter, printer, monitor are the group consists of output devices 23) Edit menu is selected to cut, copy and paste 24) The most important or powerful computer in a typical network is network server 25) The primary purpose of software is to turn data into information 26) The ability to find an individual item in a file immediately direct access is used. 27) To make a notebook act as a desktop model, the notebook can be connected to a docking station which is connected to a monitor and other devices 28) You can use the tab key to move a cursor across the screen, indent a paragraph. 29) A collection of related files is called record. 30) Storage that retains its data after the power is turned off is referred to as non- volatile storage. 31) Internet is an example of connectivity. 32) Testing is the process of finding errors in software code . 33) A syntax contains specific rules and words that express the logical steps of an algorithm. 34) Changing an existing document is called the editing documentation 35) Virtual memory is memory on the hard disk that the CPU uses as an extended RAM. 36) Computers use the binary number system to store data and perform calculations. 37) The windows key will launch the start buttons. 38) To move to the beginning of a line of text, press the home key. 39) When sending an e-mail, the subject lines describe the contents of the message. 40) Tables, paragraphs and indexes work with when formatting text in word. 41) TB is the largest unit of storage. 42) The operating system tells the computer how to use its components. 43) When cutting and pasting, the item cut is temporarily stored in clipboard. 44) The blinking symbol on the computer screen is called the cursor. 45) Magnetic tape is not practical for applications where data must be quickly recalled because tape is a sequential because tape is a sequential access medium. 46) Rows and columns are used to organize data in a spread sheet. 47) When you are working on documentation on PC, the document temporarily stored in flash memory. 48) One megabyte equals approximately 1 million bytes. 49) Information travels between components on the motherboard through buses. 50) RAM refers to the memory in your computer. 51) Computer connected to a LAN can share information and or share peripheral equipment 52) Microsoft office is an application suite 53) Utilities can handle most system functions that aren’t handled directly by the operating system 54) If you receive an e-mail from someone you don’t know then you should delete it without opening it 55) A set of instructions telling the computer what to do is called program 56) LAN refers to a small single site network 57) A collection of programs that controls how your computer system runs and processes information is called operating system. 58) Device drivers are small, special-purpose programs 59) Transformation of input into output is performed by the CPU 60) Data going into the computer is called input. 61) Binary choice offer only two options 62) To indent the first paragraph of your report, you should use tab key 63) Fields are distinct item that don’t have much meaning to you in a given context 64) A website address is a unique name that identifies a specific web site on the web 65) Modem is an example of a telecommunications device 66) A set of computer programs used for a certain function such as word processing is the best definition of a software package 67) You can start Microsoft word by using start button 68) A blinking symbol on the screen that shows where the next character will appear is a cursor 69) Highlight and delete is used to remove a paragraph from a report you had written 70) Data and time are available on the desktop at taskbar 71) A directory within a directory is called sub directory 72) Testing is the process of finding errors in software code 73) In Excel, charts are created using chart wizard option 74) Microcomputer hardware consists of three basic categories of physical equipment system unit, input/output, memory 75) Windows is not a common feature of software applications 76) A tool bar contains buttons and menus that provide quick access to commonly used commands 77) For creating a document, you use new command at file menu 78) Input device is equipment used to capture information and commands 79) A programming language contains specific rules and words that express the logical steps of an algorithm 80) One advantage of dial-up internet access is it utilizes existing telephone security 81) Protecting data by copying it from the original source is backup 82) Network components are connected to the same cable in the star topology 83) Two or more computers connected to each other for sharing information form a network 84) A compute checks the database of user name and passwords for a match before granting access 85) Computers that are portable and convenient for users who travel are known as laptops 86) Spam is the term for unsolicited e-mail 87) Utility software type of program controls the various computer parts and allows the user to interact with the computer 88) Each cell in a Microsoft office excel document is referred to by its cell address, which is the cell’s row and column labels 89) Eight digit binary number is called a byte 90) Office LANs that are spread geographically apart on a large scale can be connected using a corporate WAN 91) Storage is the process of copying software programs from secondary storage media to the hard disk 92) The code for a web page is written using Hyper Text Markup Language 93) Small application programs that run on a Web page and may ensure a form is completed properly or provide animation are known as flash 94) In a relational database, table is a data structure that organizes the information about a single topic into rows and columns 95) The first computers were programmed using assembly language 96) When the pointer is positioned on a hyperlink it is shaped like a hand 97) Booting process checks to ensure the components of the computer are operating and connectedproperly 98) Checking the existing files saved on the disk the user determine what programs are available on a computer 99) Special effect used to introduce slides in a presentation are called animation 100) Computers send and receive data in the form of digital signals 101) Most World Wide Web pages contain HTML commands in the language 102) Icons are graphical objects used to represent commonly used application 103) UNIX is not owned and licensed by a company 104) In any window, the maximize button, the minimize button and the close buttons appear on the title bar 105) Dial-up Service is the slowest internet connection service 106) Every component of your computer is either hardware or software 107) Checking that a pin code number is valid before it is entered into the system is an example of data validation 108) A compiler translates higher level programs into a machine language program, which is called object code 109) The ability to find an individual item in a file immediately direct access 110) Computers connected to a LAN can share information and/or share peripheral equipment 111) A CD-RW disk can be erased and rewritten 112) The two major categories of software include system and application 113) Windows 95, Windows 98 and Windows NT are known as operating systems 114) Information on a computer is stored as analog data 115) A spread sheet that works like a calculator for keeping track of money and making budgets 116) To take information from one source and bring it to your computer is referred to as download 117) Each box in a spread sheet is called a cell 118) Network components are connected to the same cable in the bus topology 119) Two or more computers connected to each other for sharing information form a network 120) A computer checks the database of user names and passwords for a match before granting access. 121) Spam is the other name for unsolicited e-mail 122) Operating system controls the various computer parts and allows the user to interact with the computer 123) Each cell in a Microsoft Office Excel document is referred to by its cell address, which is the cell’s row and column labels 124) Download is the process of copying software programs from secondary storage media to the hard disk 125) The code for a web page is written using Hypertext Markup Language 126) Small application programs that run on a web page and may ensure a form is completed properly or provide animation are known as Flash 127) A file is a unique name that you give to a file of information 128) For seeing the output, you use monitor 129) CDs are of round in shape 130) Control key is used in combination with another key to perform a specific task 131) Scanner will translate images of text, drawings and photos into digital form 132) CPU is the brain of the computer 133) Something which has easily understood instructions is said to be user friendly 134) Information on a computer is stored as digital data 135) For creating a document, you use new command at file menu 136) The programs and data kept in main memory while the processor is using them 137) Ctrl + A command is used to select the whole document 138) Sending an e-mail is same as writing a letter 139) A Website address is a unique name that identifies a specific website on the web 140) Answer sheets in bank PO’s/ Clerk’s examinations are checked by using Optical Mark Reader 141) Electronic data exchange provides strategic and operational business opportunity 142) Digital signals used in ISDN have whole number values 143) Assembler is language translation software 144) Manual data can be put into computer by scanner 145) In a bank, after computerization cheques are taken care of by MICR 146) The banks use MICR device to minimize conversion process 147) Image can be sent over telephone lines by using scanner 148) Microchip elements are unique to a smart card 149) MS-DOS is a single user operating system 150) Basic can be used for scientific and commercial purpose 151) All computers can execute machine language programs 152) Programs stored in ROM can’t be erased 153) Ethernet is used for high speed telecommunications 154) IP address can change even if the domain name remains same 155) Each directory entry can be of 32 bytes 156) With the help of Control + Del a letter can be erased in a word 157) Disk can keep maximum data 158) FORTRAN is a scientific computer language 159) Computer language COBOL is useful for commercial work 160) COBOL is a high standard language like English 161) In computer the length of a word can be measured by byte 162) Byte is the unit of storage medium 163) ROM is not a computer language 164) Oracle is a database software 165) Sequential circuit is full aid 166) Processor is must for computer 167) ROM keeps permanent memory 168) Screen display is called by windows in lotus 169) Pascal is a computer language 170) Expanded form of IBM is International business machine 171) IC chips are made of silicon 172) India’s Silicon Valley situated at Bangalore 173) RAM and ROM are the storage devices of computer 174) DOS is to create relation between hardware and software 175) LOTUS 1-2-3 is software 176) Voice mail is a personal security code for GSM subscribers 177) Tables holds actual data in the database 178) Trojan is a virus 179) Static keys make WEB insecure 180) Video signal needs highest bandwidth 181) Connectivity means communication between systems 182) Controlling is not required for high level language programs before it is executed 183) 3 out of three rollers are responsible for the movement of cursor on screen 184) Hardware that adds two numbers is arithmetic logical unit 185) Data accuracy is not done by modem 186) LAN is used for networks setup within a building 187) A data communication system requires terminal device, communication channel, protocols 188) Most common channel used by networks today is satellite 189) Run Time is not a type of error 190) A five-digit card attribute used for postal ZIP codes it will be restored as a numeric data 191) Computer viruses can be attached to an executable program 192) MS-DOS was the first operating system 193) The smallest space where information on a hard disk is kept in a cluster 194) An information is processed data 195) Intelligence is not a characteristic of a computer 196) Private key is used to spend a digital signature 197) Negative numbers can be represented in binary 198) VDU is not an essential part of a computer 199) The printers are line printer, laser, dot matrix 200) Speed of clock of CPU is measured in megahertz 201) Cache is not a secondary storage device 202) Disk can be used to store sequential files and random files 203) Windows is not an application 204) When taking the output information is produced in hardcopy and/or softcopy form 205) Control unit’s function is to decode program instructions 206) The most powerful type of computer amongst the following is supercomputer 207) GO TO statement is used in C, C++, basic language 208) File menu is selected to print 209) The name a user assigns to a document is called a filename 210) A processor is an electronic device that processes data, converting it into information 211) Control words are words that a programming language has set aside for its own use 212) Monitor and printer are the two types of output devices 213) To access properties of an object, the mouse technique to use is right- clicking 214) An operating system is a program that makes the computer easier to use 215) Connections to the internet using a phone line and a modem are called dial-up connections 216) To access a mainframe or supercomputer, users often use a terminal 217) A flaw in a program that causes it to produce incorrect or inappropriate results is called a bug 218) A web site address is a unique name that identifies a specific web site on the web 219) Every component of your computer is either hardware or software 220) To make the number pad act as directional arrows, you press the num lock key 221) When creating a word- processed document, formatting text involves the user changing how words on the page appear, both on the screen and in printed form 222) The ALU performs simple mathematics for the CPU 223) A computer program is a set of keywords, symbols, and a system of rules for constructing statements by which humans can communicate the instructions to be executed by a computer 224) The another word for program is software 225) The name of the computer’s brain is CPU 226) A computer is a device that electronically processes data, converting it to information 227) Laptops are computers that can be carried around easily 228) The secret code that restricts entry to some programs is password 229) The basic goal of computer process is to convert data into information 230) The disk is placed in the CPU in a computer 231) A hard copy of a document is printed on the printer 232) The name that the user gives to a document is referred to as file name 233) Restarting a computer that is already on is referred to as warm booting 234) E-mail is the transmission of messages and files via a computer network 235) The person who writes and tests computer programs is called a programmer 236) The information you put into the computer is called data 237) The output devices make it possible to view or print data 238) A chat is a typed conversation that takes place on a computer 239) Hardware includes the computer and all the devices connected to it that are used to input and output data 240) The most common method of entering text and numerical data into a computer system is through the use of a keyboard 241) Mouse, keyboard, plotter are the group consist of only input devices 242) 256 values can be represented by a single byte 243) Transformation of input into output is performed by the CPU 244) Vertical-market applications can handle most system functions that aren’t handled directly by the operating system 245) Device drivers are small, special-purpose programs 246) LAN refers to a small, single- site network 247) A set of instructions telling the computer what to do is called program 248) Data going into the computer is called input 249) If you receive an e-mail from someone you don’t know, then delete it without opening it 250) Two options does a binary choice offer 251) A collection of programs that controls how you computer system runs and processes information is called operating system
Posted on: Fri, 08 Aug 2014 17:50:24 +0000

Trending Topics



Recently Viewed Topics




© 2015