Computer - Sri Harsha Group

Download Report

Transcript Computer - Sri Harsha Group

Computer Awareness
SBI PO/Clerk WORKSHOP
Vijayawada
Computer
Computer Basics
A __________ is an electronic device that
process data, converting it into information.
•
•
•
•
•
Processor
Computer
Case
Stylus
Peripherals
Computer Basics
A(n)___is an electronic device, operating under the
control of instructions stored in its own memory, that
can accept data, process the data according to
specified rules, produce results, and store the results
for future use.
•
•
•
•
•
Computer
output device
storage device
input device
scanner
Computer Basics
____ is the procedure of feeding the data in a
computer.
•
•
•
•
•
Input
Output
Strage
Process
Execution
Computer Basics
Term
Meaning
Data
A set of basic facts & entities which itself has no meaning
Information Data which has some meaning or value
Instruction A statement given to computer to perform a task
Input
Data and instruction given to computer
Process
Manipulation of data
Output
Information obtained after processing of data
Computer Basics
Which of the following is the correct
sequential order of the four major functions
of a computer ?
•
•
•
•
•
Process, Output, Input, Storage
Storage, Output, Process, Input
Input, Output, Process, Storage
Input, Process, Output, Storage
Process, Storage, Input, Output
Computer Basics
Some people refer to the series of input,
process, output, and storage activities as the
___ processing cycle.
•
•
•
•
•
Input
Data
Interaction
Information
Output
Computer Basics
Which of the following is not considered as the
characteristic of Computer
•
•
•
•
•
Speed
Accuracy
Diligence
Multitasking
Intelligence
Main Characteristics of computer
•Speed
•Accuracy
•Storage
•Diligence
•Versatility
Computer Basics
A computer contains many electric,
electronic, and mechanical components
known as_____
•
•
•
•
•
Hardware
Input devices
Output
Software
Parts ware
Computer Basics
Physical Components of computer are called :
•
•
•
•
•
Software
Hardware
Humanware
All of these
None of these
Computer Basics
Which of the following directs the
processing of input to output ?
•
•
•
•
•
Printer
CD
Scanner
Software
Hardware
Computer Basics
• Hardware:
Physical component of computer is called
Hardware. Examples Monitor, Key-Board, Mouse, Printer
etc.
• Software: Collection of programs are called Software.
– Collection of instructions are called Programs
• Instruction is a command to the computer Hardware
• Humanware:
Group of users working on the
computer are called Humanware (or) Liveware (or)
Peopleware.
Computer Basics
The link between the CPU and the end users
is provided through________
•
•
•
•
•
Printer
storage device
Control unit
Software
Peripheral devices
Computer Basics
Devices, such as monitors and printers, that
are connected to the computer are called __.
•
•
•
•
•
Attachment devices
System devices
Peripheral devices
Processing devices
Input devices
Computer Basics
Types of Computers
Computers
Special
purpose
computers
Analog
computers
Digital
computers
Based on
Size and
Capacity
Based on
Purpose
Based on
Technology
Hybrid
computers
General
purpose
computers
Super
Computers
Mainframe
Computers
Mini
Computers
Micro
Computers
Types of Computers
__________ computers take physical quantities
as input and gives approximate results.
•
•
•
•
•
Analog
Digital
Precise
Mainframe
Minicomputer
The computer which provide us continuous information are called
Analog computers.
Types of Computers
In which type of computer, data are represented
as discrete signals?
•
•
•
•
•
Analog computer
Digital computer
Both
Hybrid Computer
None of these
The computers which represent data in the form of ON(1) and OFF(0) states. They
provide us Accurate results.
Types of Computers
Computers which takes analog data as input and
convert them into discrete numbers to get
accurate results
•
•
•
•
•
Analog
Digital
Hybrid
All of these
None of these
Medical Research
Types of Computers
Which of the following computers are particularly
designed to perform specific task
•
•
•
•
•
General Purpose Computers
Special Purpose Computers
Minicomputers
PC
None
Types of Computers
Which of the following computers designed for
different areas and for different applications
•
•
•
•
•
General Purpose Computers
Special Purpose Computers
Minicomputers
PC
None
Types of Computers
In world today, most of the computers are :
•
•
•
•
•
Digital
Hybrid
Analog
Complex
None of these
Types of Computers
Which of the following perform complex
mathematical calculations for applications like
weather forecasting and medical research ?
•
•
•
•
•
Handhelds
Supercomputers
Servers
Mainframe
Laptops
Types of Computers
Which of the following is the fastest and
typical computer?
•
•
•
•
•
PC
Mainframes
Minicomputers
Super computers
Hybrid computers
Seymour Cray ( the father of supercomputing)
Super Computers
• First super computer in the world?
- CRAY-I
• First super computer imported by India?
• First wireless super computer in the world?
• First multiprocessor super computer in the world?
Note: remember answer for all … CRAY mostly as
prefix
Computer Basics
• First super computer build by India?
- Param --------------> CDAC
(Centre for Development of Advanced Computing)
•
PACE
--------------> DRDO
– (Processor for Aerodynamic Computation and Evaluation)
•
ANURAG
--------------> DRDO
– Advanced Numerical Research and Analysis Group (ANURAG)
• ANUPAM
• ANNAPURNA
--------------> BARC
--------------> IMSC
– Institute of Mathematical Sciences (IMSc)
• SAGA
--------------> ISRO
Computer Basics
___are large, expensive, powerful computers
that can handle hundreds or thousands of
connected users simultaneously and store
tremendous amounts of data, instructions, and
information.
•
•
•
•
•
Mainframes
Mini computers
Embedded computers
Mobile devices
Laptops
Mainframe computers are Commercial
computers widely used in large scale
industries like Airlines Reservation,
Banking etc.
Computer Basics
IBM4381 is an example of
•
•
•
•
•
Mini Computer
Digital Computer
Super Computer
Mainframe Computer
None
Computer Basics
Minicomputers are also called ___ computers.
•
•
•
•
•
Mid range
Digital
Laptop
Smart
None
Minicomputer are also called as mid-range computers because It is less
powerful than a mainframe computer but more powerful than a PC.
Computer Basics
To access a mainframe or supercomputer,
users often use a __________.
•
•
•
•
•
Terminal
Node
Desktop
Handheld
None
Computer Basics
Users access mainframe by means of a _____,
which has a display screen and a keyboard.
•
•
•
•
•
Client.
Server.
Terminal.
Local area network.
None of these.
Terminal …
Terminal
Mainframe
server
Unix
server
Supercomputer
Users access supercomputer by means of a _____, which has a display
screen and a keyboard.
Terminal a computer, which has a display screen and a keyboard with
minimum or no processing unit
Computer Basics
A____consists of a keyboard, a monitor,
a video card, and memory, often housed
in a single unit
•
•
•
•
•
Magstripe
Teller machine
Network
Terminal
PC
Computer Basics
_______ terminals (formerly known as cash
registers) are often connected to complex
inventory and sales computer systems.
•
•
•
•
•
Data
Sales
Query
Point-of-sale (POS)
None
Computer Basics
Which of the following is available in the form
of a PC now?
•
•
•
•
•
Mainframe
Microcomputer
Minicomputer
Both (2) and (3)
None of these
Computer Basics
In a microcomputer system, the CPU is
contained on a single chip called the _______
•
•
•
•
•
Control unit
Semi-conductor
ALU
Folder
Microprocessor
A silicon chip that contains a CPU. In the world of personal computers,
the terms microprocessor and CPU are used interchangeably.
Computer Basics
In which of these systems, input and output
devices are located outside the system unit
•
•
•
•
•
Laptop Computer
Smartphone and PDAs
Desktop systems
PDAs
Smartphone
Computer Basics
Computers that are portable and convenient
for users who travel are known as_
•
•
•
•
•
Minicomputers
Planners
Supercomputers
Laptops
File servers
Computer Basics
An example of a handheld computer would
be _____
•
•
•
•
•
Thin Client
Server
Personal Digital Assistant
Desktop Computer
Mainframe
Computer Basics
A(n)______console Is a mobile computing
device designed for single-player or
multiplayer video games.
•
•
•
•
•
Entertainment
Video
Game
Mainframe
Multimedia
Computer Basics
The earliest calculating device is _____
•
•
•
•
•
Clock
Abacus
Difference engine
Calculalor
None
ABACUS
Computer Basics
A set of rods where numbers were
carved and used for multiplication and
division aids is known as
•
•
•
•
•
Napier’s bones
Pascal’s machine
Difference engine
Clocks
None
Napier's bones
Napier
Computer Basics
The man who built the first Mechanical
calculator was ________
•
•
•
•
•
John Mauchly
Howard Aiken
Blasie Pascal
John Mauchly
None
Pascaline
Blaise Pascal
Stepped Reckoner
Gottfried Wilhelm Leibniz
Computer Basics
Who invented punched cards?
•
•
•
•
•
Charles Babbage
Dr. Herman Hollerith
Howard Aikin
Joseph Jacquard
Blaise Pascal
Punched Cards
Joseph Marie Jacquard
Computer Basics
Which of the following is the first
mechanical computer _______
•
•
•
•
•
Mark-1
Difference Engine
Analytical Engine
Pascaline
Punch cards
Difference Engine
Charles Babbage
Computer Basics
The first machine which could be called the
prototype of the modern computer was
______
•
•
•
•
•
Digital engine
Slide rule
Analytic engine
Difference engine
None
Analytical Engine
Charles Babbage
Analytical Engine
Computer Basics
Who among the following is considered
as first programmer _____
•
•
•
•
•
Lady Augusta Ada
Charless Babbage
Hollerith
Pascal
None
First Programmer
Lady Augusta Ada
Computer Basics
Punched cards were first introduced by
•
•
•
•
•
Powers
Pascal
Jacquard
Herman Hollerith
Lady Augusta
Hollerith’s Desk
Hermann Hollerith
Hollerith started a company “Tabulating Machine Company” which latter renamed as
IBM (International Business Machines)
Atanastoff Berry Computer
Developed by professor John Vincent Atanasoff and Clifford Berry
Computer Basics
Which of the following is the first
Digital Electro-mechanical computer __
•
•
•
•
•
Mark-1
Difference Engine
Analytical Engine
Pascaline
Punch cards
Mark I
Also called IBM Automatic Sequence Controlled Calculator (ASCC)
Developed by Dr Howard Aiken
First Generation(1946-1959)
• First generation of computers started with using vacuum
tubes as the basic components for memory and circuitry
for CPU (Central Processing Unit).
• Punched cards, Paper tape, Magnetic tape Input & Output
device were used.
• There were machine codes and electric wired board
languages used.
• In this generation, mainly batch processing operating
systems were used.
ENIAC
• Full name- Electronic Numerical Integrator and Computer.
• Developed by John Presper Eckert and John W. Mauchly.
• First fully electronic general purpose computer.
EDVAC
• EDVAC (Electronic Discrete Variable Automatic Computer) was to be
a vast improvement upon ENIAC.
• Eckert and Mauchly teamed up with the mathematician John von Neumann
to design EDVAC, which pioneered the stored program.
UNIVAC
• Universal Automatic Computer, the UNIVAC -I, a first commercial computer
developed by J. Presper Eckert and John Mauchly.
Second Generation(1959-1965)
• This generation using the transistor were cheaper, consumed less
power, more compact in size, more reliable and faster than the first
generation Computers.
• In this generation, magnetic cores were used as primary memory and
magnetic tape and magnetic disks as secondary storage devices.
• In this generation, assembly language and high-level programming
language like FORTRAN, COBOL were used.
• Punched cards, Paper tape, Magnetic tape Input & Output device
were used.
• There were Batch processing and Multiprogramming Operating
system used.
NCR 304
•The NCR 304, introduced in 1957, was National Cash Register (NCR)'s
first transistor-based computer.
PDP-I
•The PDP-1 (Programmed Data Processor-1) was the first Minicomputer in
Digital Equipment Corporation's PDP series.
Third Generation(1965-1971)
• The third generation of computer is marked by the use of Integrated
Circuits (IC's) in place of transistors.
• A single IC has many transistors, resistors and capacitors along with
the associated circuitry. The IC was invented by Jack Kilby.
• This development made computers smaller in size, reliable and
efficient.
• High-level language (FORTRAN-II TO IV, COBOL, PASCAL PL/1,
BASIC, ALGOL-68, etc.) were used during this generation.
• In this generation, Remote processing, Time-sharing, Real-time,
Multi-programming Operating System were used.
IBM System/360
• The IBM System/360 (S/360) was a mainframe computer system family
announced by IBM on April 7, 1964, and delivered between 1965 and
1978.
PDP - 11
The PDP-11 was a series of 16-bit minicomputers sold by Digital Equipment
Corporation (DEC) from 1970 into the 1990s.
ICL 2900 Series
The ICL 2900 Series was a range of mainframe computer systems announced
by the UK manufacturer ICL on 9 October 1974.
Fourth Generation(1971-1980)
• The fourth generation of computers is marked by the use of Very
Large Scale Integrated (VLSI) circuits.
• VLSI circuits having about 5000 transistors and other circuit elements
and their associated circuits on a single chip made it possible to have
microcomputers of fourth generation. (MICRO PROCESSOR)
• In this generation, Time sharing, Real time, Networks, Distributed
Operating System were used.
• All the higher level languages like C and C++, DBASE, etc., were
used in this generation.
Cray - I
The Cray-1 was a supercomputer designed, manufactured and marketed
by Cray Research.
IBM PC
The IBM Personal Computer, commonly known as the IBM PC.
It is IBM model number 5150 having Intel 8088 memory chip, and was
introduced on August 12, 1981.
IBM 386SLC
The 386SLC was an Intel-licensed version of the 386SX
developed and manufactured by IBM.
Fifth Generation(1980-onwards)
• In the fifth generation, the VLSI technology became ULSI (Ultra Large
Scale Integration) technology
• This generation is based on parallel processing hardware and AI
(Artificial Intelligence) software.
• Implementation of Quantum mechanism and Nanotechnology into
computer field started.
• All the higher level languages like C++, Java, .Net, Prolog, LISP etc.,
are used in this generation.
V Generation Computers
•
•
•
•
•
Desktop
Laptop
NoteBook
UltraBook
ChromeBook
Generations of Computers
Which of the following is the first commercialpurpose computer ______
•
•
•
•
•
Mark -I
Difference Engine.
Analytical Engine.
for Universal Automatic Computer
UNIVAC
ENIAC
Note : UNIVAC-1 known as first business-oriented computer
Generations of Computers
II Generation Computers are made of :
•
•
•
•
•
Vacuum Tubes
Transistors
LSI
VLSI
None of these
Generations of Computers
Transistors are replaced by which of the
following in III generation
•
•
•
•
•
Integrated Circuits
Semi Conductors
Mother boards
Capacitors
None
Generations of Computers
VLSI in computer technology stands for
•
•
•
•
•
Very Large Stand-alone Integration
Very Large Scale Imitation
Very Large Scale Integration
Volatile Layer System Interface
Very Low Service Improvisation
Generations of Computers
Microprocessor was introduced in which
generation of computer?
•
•
•
•
•
Second Generation
Fourth Generation
Both (1) and (2)
Third Generation
All of the above
Generations of Computers
V Generation Computers are based on:
•
•
•
•
•
Artificial Intelligence
Programming Intelligence
System Knowledge
All of these
None of these
Summary
•
•
•
•
•
•
•
Mark-I 1st digital computer by Howard Aiken
Pascaline 1st Mechanical calculator by Blaise Pascal
Difference Engine. 1st Mech. Comp. Charles Babbage
Analytical Engine.1st to perform I/O operations
UNIVAC 1st commercial-purpose computer
st computer with stored programs
1
EDVAC
1st fully electronic computer
ENIAC
Computer Block Diagram
Computer Basics
The components that process data are located
in the:
•
•
•
•
•
Input devices
Output devices
System unit
Storage component
Integrated Board
Computer Basics
The ____________, also called the “brains” of
the computer, is responsible for processing
data.
•
•
•
•
•
Mother board
Memory
RAM
Central processing unit (CPU)
BUS
Computer Basics
A term associated with the comparison of
processing speeds of different computer
systems is:
•
•
•
•
•
EFTS
MPG
MIPS
CPS
None
Computer Basics
The PC (personal computer) and the Apple
Macintosh are examples of two different:
•
•
•
•
•
Platforms
Applications
Programs
Storage devices
None
Computer Basics
The type of operating system you use depends
on your computers__________
•
•
•
•
•
Platform
Operating system
Application software
Motherboard
None of these
Computer Basics
The type of CPU you use depends on your
computers__________
•
•
•
•
•
Platform
Operating system
Application software
Motherboard
None of these
Computer Basics
The combination of the operating system
and the processor is referred to as the
computer’s :
•
•
•
•
•
Platform
BIOS
CMOS
CPU
RMOS
Computer Basics
Platform depends on Operating system the
computer is using and also on its processor or
design.
So, if two different computers using different
operating systems and using different processors
we can call them.. they are in different platforms.
Computer Basics
Which of the following is a major component
inside the system unit in addition to CPU ?
•
•
•
•
•
Hard drive controller
Scanner
Printer
Expansion bus
motherboard
Computer Basics
Which of the following refers to the
main circuit board in a computer ?
•
•
•
•
Special-board
USB
memory
Port
• Motherboard
Computer Basics
Expansion cards are inserted into
•
•
•
•
•
Slots
Peripheral devices
The CPU
The back of the computer
None
Computer Basics
The standardized connection of computer
peripherals, “USB” stands for _____
•
•
•
•
•
Universal Service Backup
Universal Service Batch
Universal Service Bus
Universal Serial Bus
Universal Series Bus
Computer Basics
Verification process of confirming identity for
allowing access to a computer system is
_____
•
•
•
•
•
Restart
Authentication
Access
Login
Logout
Computer Basics
Which of the following relates to the
responsibility of those who have data to
control who is able to use that data ?
•
•
•
•
•
Access
Security
Property
Accuracy
Usability
Computer Basics
Removing and replacing devices without
turning off your computer
•
•
•
•
•
Hot swapping
Plug-n-play
Bay swap
USB swapping
None
Plug-and-Play, PnP is an ability of a computer to detect ad
configure a new piece of hardware automatically.
Computer Basics
___
is when the more power-hungry
components, such as the monitor and the hard
drive, are put in idle.
•
•
•
•
•
The shutdown procedure
Standby mode
Hibernation
The printing facility
Power down
Computer Basics
To make a notebook act as a desktop model,
the notebook can be connected to a ___ which
is connected to a monitor and other devices.
•
•
•
•
•
Bay
docking station
Port
network
Mainframe
Computer Basics
Computer ____ entails having the knowledge
and understanding of computers and their
uses.
•
•
•
•
•
Illiteracy
Literacy
Intimacy
Infancy
Legitimacy
Computer Basics
You interact with a program through
its_______, which controls how you enter
data and instructions and how information is
displayed on the screen.
•
•
•
•
•
Storage
Operating system
User interface
Programmer interface
Icon
User Interface
Most of the application software come with a
GUI interface. GUI stands for _____
•
•
•
•
•
Graphical User Interface
Grammatical User Interaction
General User interaction
Geographical Unique Interface
Generic Unusual interface
There are two types of interfaces
1.GUI (Graphical User Interface)
EX: Windows, linux etc
2. CUI (Command User Interface)
EX: MS-DOS, Unix etc
User Interface
What is an Icon in computing ?
• It is small graphical image which is used to represent an
application, command or a tool
• A character
• A file
• A folder
• It is some action performed when Menu button is clicked
User Interface
The steps and tasks needed to process data,
such as responses to questions or clicking
an icon, are called
•
•
•
•
•
The operating system
Application software
The system unit
Interactions
Instructions
User Interface
Which command invokes a task manager
(Windows) ?
•
•
•
•
•
Shift + Tab
Alt + Tab
Ctrl + Shift + Tab
Ctrl + Alt + Shift
Ctrl +Alt + Delete
User Interface
Which of the following refers to the rectangular
area for displaying information and running
programs ?
•
•
•
•
•
Icon
Menu
Dialog box
Desktop
Window
User Interface
An artist can create drawings and sketches
by using a pen or cursor on a(n)_tablet,
which is a flat. rectangular, electronic plastic
board.
•
•
•
•
•
Pointing
Graphics
Display
Multimedia
Sketch
User Interface
With a(n)_, users write on the screen or issue
instructions to a Tablet PC. for example, by
tapping on the screen
•
•
•
•
•
Graphic tool
Mouse
Keypad
Stylus
Digital pen
User Interface
A(n)_Is a digital representation of non-text
information such as a drawing, chart, or
photograph.
•
•
•
•
•
Applet
Keyframe
Paragraph
Graphic
Pic
User Interface
Which of the following is referred to as
the “desktop” of a computer ?
•
•
•
•
•
The visible screen
The top of the mouse pad
The inside of a folder
The area around the monitor
Accessories
User Interface
Which of the following refers to
reducing a window until it becomes a
button on the taskbar ?
•
•
•
•
•
diminishing
shrinking
Minimizing
contracting
collapsing
User Interface
A(n)_contains a list of commands from
which a user makes selections
•
•
•
•
•
Functionality
Menu
Window
Icon
Dialog box
User Interface
The_________is
a
small
symbol
displayed on the screen that moves as
a user moves the mouse.
•
•
•
•
•
Piercer
Button
Menu
Pointer
Icon
User Interface
A button that enlarges a document or
application to fill the screen is_
•
•
•
•
•
Online
Open file
Shareware
Enlarger
Maximize button
User Interface
What key in keyboard can be used to
access the START menu ?
•
•
•
•
•
CTRL+ESC
CTRL+ALT+DEL
ALT + TAB
lns + F5
ALT+F4
Input Devices
An Electromechanical Device that can be used to enter
data and instructions into a computer.
Keyboard
• A Keyboard is a human interface device which is represented
as a layout of buttons and keys.
• It as some features as
–
–
–
–
–
–
Typewriter keyboard with numeric keypad
Functions keys
Control keys
Special purpose keys
Modifier Keys
Toggle Keys
Keyboard
Input Devices
ctrl, shift and alt are called __________ keys.
•
•
•
•
•
Adjustment
Function
Modifier
Alphanumeric
None
Input Devices
To make the number pad act as directional
arrows, you press the __________ key.
•
•
•
•
•
Nums lock
Caps lock
Arrow lock
Shift
None
Input Devices
Which of the following is used to enter the
numbers for calculations quickly?
•
•
•
•
•
Nums lock
Caps lock
Numeric Keypad
Function keys
None
Input Devices
The __________ key will launch the Start
button.
•
•
•
•
•
Esc
Shift
Windows
Shortcut
None
Input Devices
Which of the following keys are used to perform
set of operations under single keystroke
•
•
•
•
•
Alphanumeric keys
Function keys
Control keys
Special purpose keys
None
Input Devices
The modern keyboard typically has ________
Function keys.
•
•
•
•
•
10
12
14
16
13
Input Devices
To move to the beginning of a line of text,
press the __________ key.
•
•
•
•
•
A
Pageup
Enter
Home
Alt + H
Pointing Devices
• A input Device used to control the pointer in the screen
– Mouse
• It is used to control and monitor the cursor movement on monitor
Mouse Types
(i) Mechanical
(ii) Optical
Some Pointing Devices are
•
•
•
•
•
•
Track ball
Pointing Stick
Joystick
Touch pad
Touch Screen
Light pen
Optical Input Devices
• Optical input devices that uses light as a
source of input. They eliminate the manual
entry of data, thus increases accuracy.
• Scanner
– Scanners can be used to copy the image or
text on paper into digital format that can be
used by the computer.
Character and mark recognition devices
• Scanners that recognize special characters
and marks
– Magnetic ink character recognition (MICR)
– Optical character recognition (OCR)
– Optical mark recognition (OMR)
MICR
MICR is an acronym for Magnetic Ink Character Recognition.
The MICR Code is a numeric code that uniquely identifies a bank-branch
participating in the ECS Credit scheme.
•First 3 digits represent the city
•Next 3 digits represent the bank
•Last 3 digits represent the branch
OCR
Optical character recognition refers to the branch of
computer science that involves reading text from paper and
translating the images into a form that the computer can
manipulate
OMR
optical mark recognition, the technology of electronically
extracting intended data from marked fields, such as
checkboxes and fill-infields, on printed forms.
Other optical devices are
Barcode:
Lines of different widths and sizes
representing data, that when read
determine what the scanned object is.
• Barcode readers
– A barcode reader is an
electronic device which is used
to reading printed barcodes.
This device directs a light beam
across the barcode while it
measures the amount of light
which is reflected back.
Audio Input Devices
• Audio input devices record the analog
sound and convert it into digital form
further processing”
• Some audio input devices are :
microphone
Musical Instrument Digital Interface
Video Input Devices
• Video input devices that can be used to
entering full motion recording into a
computer.
digital camera
webcam
video capture card
Input Devices
The traditional mechanical mouse uses a _____
to track the pointer position on the screen.
•
•
•
•
•
Light sensor
Wheel
Ball
Ruler
None
Input Devices
A(n)_mouse uses devices that emit and
sense light to detect movement.
•
•
•
•
•
direct
enhanced
optical
mechanical
tracking
Input Devices
To access properties of an object, the mouse
technique to use is __________.
•
•
•
•
•
Dragging
Dropping
Right-clicking
Shift-clicking
None
Input Devices
The __________ can be defined as an
upside down mouse.
•
•
•
•
•
Trackpad
Trackball
Trackpoint
Trackwell
None
Input Devices
______ can make it easier to play games.
•
•
•
•
•
Joystick
Mouse
Keyboard
Pen
Scanner
Input Devices
The pattern of printed lines on most products
are called __________
•
•
•
•
•
Prices
Barcodes
Scanners
OCR
OMR
Input Devices
To convert paper into an editable document, a
scanner would employ ________ technology.
•
•
•
•
•
UPC
Scanning
Conversion
OCR
None
Input Devices
Which input device detects presence or absences
of a mark on a paper used in questionnaire
corrections
•
•
•
•
•
Optical Character Reader
Barcode Reader
Joystick
Optical Mark Reader
Magnetic Ink Character Reader
Input Devices
Voice_is the process of entering data
by speaking into a microphone
•
•
•
•
•
output
outreach
Matter
input
storage
Input Devices
To place your image into a live video conference,
a __________ is usually used.
•
•
•
•
•
Webcam
Digital camera
Video camera
Scanner
None
Input Devices
Kiosks use __________ to simplify the
interface.
•
•
•
•
•
Track pads
Touch screens.
Trackballs
Voice input
None
Input Devices
Access control based on a person’s
fingerprints is an example of_
•
•
•
•
•
Fingerprint security
Characteristic identification
Logistics
Characteristic security
Biometric identification
OUTPUT Devices
• Output devices can be used to receive
information from the computer
• The output can be of two forms
– Soft copy
– Hard copy
Monitor
• A monitor is a peripheral device which displays
computer output on a screen. Screen output is
referred as “soft copy”.
• Features
–
–
–
–
–
Resolution(pixels)
Dot pitch
Color Depth
Refresh rate
Size
• Types of monitors
– CRT (Cathode ray tube)
– LCD (Liquid crystal display)
– LED (Light emitting diode)
Printers
• A printer is peripheral device that produces a
physical copy or hard copy of the computer’s
output
• Types of printers
– Impact Printers
• Character printers
– Daisy wheel printer
• Line printers
• Dot matrix printer
– Non Impact printers
• Inkjet printers
• Laser printers
• Thermal printers
Plotter
• A plotter is output device that draws
continuous lines and that is used to
produce high quality graphics in a variety
of colors.
Audio output devices
• Audio output devices can be used to
translate audio information from the
computer into sounds that people can
understand.
• Common audio output devices
– Speakers
– Headphones
Output Devices
This type of monitor is common on desktop
computers. It looks much like a standard
television.
•
•
•
•
•
Cathode-ray tube
Flat-panel
Monochrome
Projector
None
Output Devices
VGA means
•
•
•
•
•
Video Graphic Adapter
Video Graphic Array
Visual Graphic Adapter
Video Graphic Assembler
None
Output Devices
Super VGA can display
•
•
•
•
•
16 colors
256 colors
512 colors
8 colors
None
Output Devices
Printers use __________ colors to generate the
rainbow.
•
•
•
•
•
3
4
8
16
None
Output Devices
The __________ printer sprays ink onto the
page.
•
•
•
•
•
Laser
Dot-matrix
Non-impact
Ink jet
None
Output Devices
Which of the following measures the speed of
dot-matrix printers?
•
•
•
•
•
PPM
DPI
CPS
LPM
None
Output Devices
The resolution of a printer is measured
in
•
•
•
•
•
Inches (diagonal)
Dots per inch (DPI)
Hz
Centimeters (diagonal)
Megabits
Output Devices
Dot matrix and band printers are ____ printers.
•
•
•
•
•
Laser
Impact
Ink jet
Thermal
None
Output Devices
Which device can draw continuous lines?
•
•
•
•
•
Daisy wheel
Plotter
Chain printer
Impact printer
None
Output Devices
Which of the following printers uses light beam
and electro-statically sensitive black powder?
•
•
•
•
•
Dot matrix printer
Daisy wheel printer
Chain printer
Laser printer
Ink jet printer
Output Devices
Which of the following printers generates
character from a Grid of pins
•
•
•
•
•
Inkjet
Laser
Daisy wheel
Dot Matrix
None
Computer Basics
Which of the following device act as both
input and output device
•
•
•
•
•
Keyboard
Monitor
Modem
Joystick
Printer
Encoding and Decoding
• Computer codes are used for internal representation
of data in computer.
• Representation of data in binary can be
– Numeric data
– Alphanumeric data
• The group of bits used to represent a symbol or
Character.
Encoding and Decoding
• Commonly used codes are
– EBCDIC (Extended binary coded decimal interchange code)
• It uses 8 bits to represent a symbol or Character
• It can represent 256(28) different characters
– ASCII (American standard code for information interchange)
• It is of two types
– ASCII 7 and ASCII 8
– UNICODE (Universal code)
• It uses 16 bits to represent a symbol or character
• It can represent 65,536 (216) different characters
• It is mainly used for globalization.
Encoding and Decoding
Any letter, number or symbol found on the
keyboard that you can type into the Computer
is called:
•
•
•
•
•
Output
Character
Type
Print
String
Encoding and Decoding
Unicode in Computing is a _____
•
•
•
•
•
Software
Keyboard layout
Antivirus
Character encoding system
Standard font
Encoding and Decoding
Converting the computer language of 1’s and
0’s to characters that a person can understand
is called _____
•
•
•
•
•
generating
Highlighting
creating clip art
Selecting
decoding
Memory
MEMORY
PRIMARY
MEMORY
SECONDARY
MEMORY
Primary Memory
The contents of __________ are lost when the
computer turns off.
•
•
•
•
•
Storage
Input
Output
Memory
None
Primary Memory
Which of the following memory is volatile
•
•
•
•
•
RAM
ROM
Hard Disk
Floppy Disk
None
Primary Memory
RANDOM ACCESS MEMORY
RANDOM ACCESS MEMORY
Which of
refresh?
•
•
•
•
•
the
DRAM
SRAM
ROM
All of above
None of these
following memories needs
RANDOM ACCESS MEMORY
The number of partitions in main memory is based
on which of the following
•
•
•
•
•
Number of bits to represent Memory address
Word Count
Number of bits to represent Data
All of the above
None
RANDOM ACCESS MEMORY
The number of storage locations is always a
multiple of
•
•
•
•
•
Binary digits
Byte
K=1024
Megabyte
None
RANDOM ACCESS MEMORY
Which of the following refers to a name or
number used to identify a storage
location?
•
•
•
•
•
Program
A record
A bit
An address
A byte
RANDOM ACCESS MEMORY
Which of the following statements is correct
about RAM?
•
•
•
•
•
It retains data when PC is turned off
It is a type of read and write memory
It contains start-up instructions
It is peripheral
It means Read Access Memory
RANDOM ACCESS MEMORY
Time taken to fetch an instruction or data from
main memory for execution is called ___ .
•
•
•
•
•
Seek time
Access time
Response time
Ready time
Schedule time
RANDOM ACCESS MEMORY
A modern desktop computer will likely use
__________ chips to store RAM
•
•
•
•
•
SO-DIMM
SIMM
DIPP
DIMM
None
RANDOM ACCESS MEMORY
The most frequently used instructions of a
computer program are likely to be fetched from:
•
•
•
•
The hard disk
cache memory
RAM
Registers
• None of these
RANDOM ACCESS MEMORY
The OS. software, and data the computer
is currently using are stored in_______.
•
•
•
•
•
Scanner
USB
PCI
RAM
AGP
Primary Memory
The contents of __________ are will not be lost
when the computer turns off.
•
•
•
•
•
RAM
ROM
Output
Memory
None
ROM
Software stored on the ROM is called ___
•
•
•
•
•
Hardware
Firmware
Humanware
Liveware
None
Booting
What is the meaning of word “Booting’’ in
computer technology ?
•
•
•
•
•
Connecting the computer to the electric switch
The process of shutting down the computer
Connecting the computer to a printer
Process of starting the computer from power off mode
Increasing the memory of the computer
Booting
BIOS in a computer system is used for _______
•
•
•
•
•
Updating system information on network
It helps routing of packets
It is an output device
It takes inputs from input devices
Loading a boot loader or an operating system
Booting
• To load the first piece of software that starts a computer.
• The starting-up of a computer, which involves loading the
operating system and other basic software.
• A cold boot is when you turn the computer on from an off
position. A warm boot is when you reset a computer that
is already on.
BIOS
The four main functions of a PC BIOS
• POST - Test the computer hardware and make sure no errors
exist before loading the operating system.
• Bootstrap Loader - Locate the operating system. If a capable
operating system is located, the BIOS will pass control to it.
• BIOS drivers - Low level drivers that give the computer basic
operational control over your computer's hardware.
• CMOS Setup - Configuration program that allows you to
configure hardware settings including system settings such as
computer passwords, time, and date.
BIOS
A process run by BIOS to check peripheral devices,
identify, organize and select devices which are
available for booting when PC is turned ON, is
called _____
•
•
•
•
•
POST
DMA
CMOS
DMOS
RIP
ROM
Types of ROM:
• PROM (Programmable Read Only Memory)
• EPROM (Erasable Programmable Read Only
Memory)
• EEPROM (Electrically Erasable Programmable Read
Only Memory)
Memory Units
A BIT represents a
•
•
•
•
•
Decimal digit
Octal digit
Binary digit
Hexadecimal digit
None
Memory Units
___ is the smallest unit of data that a
computer can process.
•
•
•
•
•
Boot
Bug
Bit
Byte
Chip
Memory Units
A collection of eight bits is called:
•
•
•
•
•
Basic Measuring unit of Secondary Storage Devices
Byte
Word
Record
File
None of the above
Memory Units
Which of the following is the largest unit of
storage?
•
•
•
•
•
KB
MB
TB
GB
PB
MEMORY UNITS
Memory Units
One megabyte equals approximately
•
•
•
•
•
1000 bits
1000 bytes
1 million bytes
1 million bits
2000 bytes
Memory Units
T for Tera  Trillion.
 M for Mega  Million.
 but, exception Giga  Billion
Note: commonly known (K)Kilo  Thousand.

Secondary Storage
• Secondary Storage devices broadly classified into
– Magnetic Storage Devices
•
•
•
•
Hard Disk
Floppy Disk
Magnetic Tape
Zip Disk
– Optical Storage Devices
• CD
• DVD
• Bluray
– Flash Memory
Secondary storage
The most common type of storage devices are __
•
•
•
•
•
Magnetic
Optical
Flash
Persistent
None
Secondary storage
Floppy drives, hard drives and tape drives all
use a __________ to read data.
•
•
•
•
•
Laser
Sensor
Magnet
Pen
EPROM
Secondary storage
A file that is saved, is permanently
saved on the Computer’s _____
•
•
•
•
•
Hard disk
ROM
Monitor
RAM
Scanner
Secondary storage
_____ is the size of the Commonly used floppy
disk and its storage capacity is ___
•
•
•
•
•
5.25 inches, 300 KB
3.5 inches, 1.44 MB
8 inches, 320 KB
5.5 inches, 800 KB
4 inches, 1.44 MB
Secondary storage
• Floppy diskette was first created in 1967
by IBM with initial size of
8 inches as an alternative to
buying hard drives that were
extremely expensive at the time.
• Commonly used floppy size is 3.5”, and its storage
capacity is 1.44MB.
Floppy Disk Drive (FDD)
Secondary Storage
The storage device that uses rigid, permanently
installed magnetic disks to store data/information
•
•
•
•
•
Floppy diskette
Hard disk
Permanent disk
CD-ROM
Flash Device
Secondary Storage
Most ___ drives consist of a sealed case
containing platters or disks that rotate
at a high speed.
•
•
•
•
•
Temporary
Optical
Hard
solid state
flash
HDD
• For initial use of floppy and hard disk they have to
be formatted.
• Formatting is preparing tracks and sectors.
Secondary Storage
In hard disk there will more than one platters used for storage.
Secondary storage
A cluster represents





A group of tracks
A group of sectors
Total number of tracks present on the disk
Total number of sectors present on the disk
None
Secondary storage
• A sector is the smallest unit that can be accessed on
your disk.
• A cluster is a slightly larger unit that is used to
organize and identify files on the disk.
Secondary storage
• When the disk is formatted, the OS creates four
areas on its surface:
–
–
–
–
Boot Sector
File Allocation Table
Root Directory
Data Area
Secondary storage
The __________ lists the location of files on
the disk.
•
•
•
•
•
Boot sector
File Allocation Table
FAT
Root folder
Data area
None
Secondary storage
_____ is the code used to denote the root
directory
•
•
•
•
•
.
\
+
None
Secondary storage
FAT and NTFS are _____
• programs for managing and scheduling tasks on
the system.
• file management utility programs.
• file managers.
• file systems.
• part of the boot process.
Secondary storage
The time to move the read/write heads to a
spot on the medium is defined as the ______ of
the device.
•
•
•
•
•
Seek time
Read time
Average access time
Transfer time
None
Secondary storage
Each sector on a hard drive stores __________
bytes of data.
•
•
•
•
•
64
512
1,024
1 gigabyte
1024
Secondary Storage
Which command allows us to reduce fragments
of file and optimize the performance of disk ?
•
•
•
•
•
Disk comp
Defrag
Scandisk
Monitor
Chkdsak
Defragmentation is the process
of locating the noncontiguous
fragments and rearranging the
fragments and restoring them
into fewer fragments or into the
whole file.
Secondary storage
A tape drive offers __________ access to data.
•
•
•
•
•
random
Sporadic
Timely
Sequential
Direct
Optical Devices
Which storage device cannot be erased?
•
•
•
•
•
A CD-ROM
Magnetic tape storage
A floppy disk
All of the above
None of these
CD stands for Compact Disk and its Storage capacity is 700 MB
DVD means
•
•
•
•
•
Digital Video Disk
Digital Video Device
Digital Versatile Disk
Both (1) & (3)
None
Storage capacity of DVD is 4.7 GB
Secondary storage
Reusable optical storage will typically have the
acronym __________.
•
•
•
•
•
CD
RW
DVD
ROM
None
Some other acronyms associated
with optical storage devices are
ROM-Read Only Memory
R-Recordable
RW-Rewrittable
Secondary storage
• In Optical storage devices data is stored in
the form of Pits and Lands.
Secondary storage
A __________ is an example of a solid-state
memory device.
•
•
•
•
•
Flash memory drive
CD-RW
Floppy disk
Hard disk
None
Solid-state memory is a computer
memory that is stored within a hardware
device that contains no moving parts.
Processing
A computer system only recognizes
•
•
•
•
•
0s and 1s
ASCII code
Modem and coaxial cable signals
UNICODE
EBCDIC code
Processing
Computers use the __________ number
system to store data and perform calculations.
•
•
•
•
•
Decimal
Hexadecimal
Binary
Octal
None
Number system
Number system
What decimal number is equivalent to the
binary number 1011?
•
•
•
•
•
9
12
22
11
26
Number system
Each Octal digit is represented by _____ bits
•
•
•
•
•
8
4
3
16
6
Number system
Each Hexadecimal digit is represented by
_____ bits
•
•
•
•
•
8
4
3
16
6
Number system
The 9’s complement of the number is obtained
by
•
•
•
•
•
By adding each digit with 9
By subtracting each digit by 10
By subtracting each digit by 9
Adding all digits and subtracting with 9
None
Note : Adding 1 to the 9’s Complement gives 10’s Complement
Number system
1’s Complement of the binary number is
obtained by
•
•
•
•
•
Adding binary number with 1
Subtracting binary number with 1
Changing 1’s to 0’s and 0’s to 1’s
Adding each digit with 1
None
Note : Adding 1 to the 1’s Complement gives 2’s Complement
Logical Gates
Which of the following is considered as
Universal gate?
•
•
•
•
•
AND
OR
NAND
XOR
NOT
Logical Gates are the basic building blocks of the computer
Processor
_______ is a bi-stable circuit which can hold
either o or 1.
•
•
•
•
•
Register
Flip-flop
Resistor
Capacitor
None
Processor
Which of the following circuit is used to add to
two binary bits
•
•
•
•
•
Half Adder
Full Adder
Register
All of the above
None
Processor
Which of the following memory is associated
with the processor?
•
•
•
•
•
Main memory
Registers
Buffer
Cache memory
Hard disk
Processor
8
7
6
5
4
3
2
1
0
• The program counter (PC) holds the address of the next instruction
to be executed, while the instruction register (IR) holds the encoded
instruction.
• MDR: Hardware registers where data to be transferred to/from
memory are temporarily stored.
• MAR: A hardware register used to keep the address of a memory
location in which data are to be written or read.
• MBR: The register in the central processor that stores the data
being transferred to and from the immediate access store.
• Processor status word (PSW): A word that describes fully the
condition of a processor at each instant. It indicates which classes of
operations are allowed and which are forbidden, and the status of all
interrupts associated with the processor.
Processor
Which of the following Register holds the
address of next instruction to be executed
•
•
•
•
•
Memory Address Registers
Memory Data Register
Program Counter
Memory Buffer Register
Accumulator
Processor
The results after processing will be stored in
which of the following
•
•
•
•
•
Memory Address Registers
Memory Data Register
Program Counter
Memory Buffer Register
Accumulator
Processor
The part of machine level instruction, which tells
the central processor what has to be done, is
•
•
•
•
•
Operation Code
Address
Locator
Flip-flop
None
Processor
Which of the following parts of CPU coordinates
the activities of all other components of
computer?
•
•
•
•
•
Motherboard
Coordination Board
Control unit
ALU
Memory
Processor
Which of the following functions as the
administrative section of the computer
system ?
•
•
•
•
•
Memory Unit
Disk Drive
input Unit
Central Processing Unit
Control Unit
Processor
The __________ controls how often the computer
executes a task.
•
•
•
•
•
CPU
Bus
Clock
RAM
None
Processor
The speed of the processor is measured in
•
•
•
•
•
Hertz
BPS
CPS
LPM
None
Also called clock rate, the speed at which a
microprocessor executes instructions.
The CPU requires a fixed number of clock ticks
(or clock cycles) to execute each instruction.
The faster the clock, the more instructions the CPU can
execute per second.
Clock speeds are expressed in megahertz (MHz) or
gigahertz ((GHz).
BUS
Pathways that support communication among
the various electronic components on the
motherboard are called _______
•
•
•
•
•
Network lines
Gateways
Bus lines
Conductors
Logic paths
BUS
A bus is a / an
•
•
•
•
•
Electronic track system
Part of register
A bus is a communication system that
Special memory
transfers data between components inside
a Computer.
Part of a CPU
None
BUS
There are three types of Buses
 Address Bus
 Data Bus
Control Bus
Processor
The device that assembles groups of characters
into complete messages prior to their entering
the CPU is called
•
•
•
•
•
An Interpreter
A compiler
Communication processor
An Editor
A Translator
Processor
DMA means
•
•
•
•
•
Direct memory allocation
Direct memory access
Direct magnetic access
Direct magnetic allocation
None
Processor
Which of the following is the time required to
complete a single, continuous execution of an
object program?
•
•
•
•
•
Runtime
Response time
Random time
Development time
Access time
Smart cards
How are memory cards and smart cards different?
•
•
•
•
Both are the same – they have no difference
Memory cards have no processing power
Only smart cards can be used for ATM cards
Smart cards prove two-factor authentication whereas
memory don’t
• None
Smart Card
Software
• Set of programs is called Software.
• Set of Instructions is called a Program.
– Instruction is a command to the computer
Hardware.
• Softwares are broadly classified into
– System Software
– Application Software
System Software
Software designed for computer hardware.
Examples
•
•
•
•
•
•
•
Operating Systems
Protocols
Compliers & Interpreters
Assemblers
Device/Driver Software (printer, scanner etc)
Linker or Loader programs
Etc.
Application Software
Software designed to satisfy user requirements.
Examples
•
•
•
•
•
•
•
Ms-Office
Games
Music players.
Image-editing software's.
Video-editing software's.
Music/video/audio converting software's
Etc.
Software
Set of instructions used in a computer to
perform a task are called
•
•
•
•
•
Files
Folders
Programs
Source
None
Software
Software in the computer can be broadly
classified in to
•
•
•
•
•
Languages and Packages
Application and System
Application and Packages
Files and Folders
None
Software
____ controls the internal operations of the
computer.
•
•
•
•
•
System software
Application software
Utility software
All of these
None
Software
___consists of a series of instructions
that tells the computer what to do and
how to do it.
•
•
•
•
•
GUIs
Liveware
Software
Storage utilities
Sharing communities
Software
Software intended to satisfy user specific
needs are called
•
•
•
•
•
System software
Application software
Utility software
All of these
None
Software
A set of step-by-step procedures for
accomplishing a task is known as a(n)_
•
•
•
•
•
software bug
Algorithm
hardware program
firmware program
organizer
Graphical representation of Algorithm is Flow Chart
Software
• Software are of two types
– Languages (S/W with out limitations)
• C,C++,JAVA etc.
– Packages (S/W with limitations & are product
of Languages)
• OS, Ms-Office etc.
Software
• Programming Language Terms
– Tokens
– Keywords or Reserved words
– Syntax
Software
A _________ contains specific rules and words
that express the logical steps of an algorithm.
•
•
•
•
•
programming language
Syntax
programming structure
logic chart
None of these
Software
_____________ are words that a programming
language has set aside for its own use.
•
•
•
•
•
Control worlds
Reserved words
Control structures
Reserved keys
None of these
Software
The process of writing computer
instructions in a programming language
is known as____
•
•
•
•
•
Instructioning
Algorithming
Processing
Coding
File
LANGUAGES
Low level language
High level language
Interpreter
Converts line
by line and
execute them
Compiler
Machine language
(Assembly Language)
Assembler
Create a object file
Directly
understood by
computer
Software
Which of the following computer language is
used for artificial intelligence ?
•
•
•
•
•
PROLOG
BASIC
COBOL
C
FORTRAN
Software
C++ Is a_______
•
•
•
•
•
High-level language
Compiler
Low-level language
Programming mid-level language
Hardware device driver
Software
Computer programs are written in high-level
programming language. However, the human
readable version of a program is called _____
•
•
•
•
•
Cache
Word size
Instruction set
Source code
Shareware
Software
A compiler is used to translate a program
written in—
•
•
•
•
•
A low level language
A high level language
Assembly language
Machine language
None
Software Errors
• Errors occurred due to the violation of rules and
regulations in a programming language are called
Syntax errors
• Errors occurred at the time of execution are called
Runtime Errors
• Errors occurred due to improper understanding of
the problem are called Logical Errors.
Software Errors
Most of the errors blamed on computers are
actually due to
•
•
•
•
•
Programming errors
Hardware fatigue
Defects in floppy disks
Data entry errors.
None
Software Errors
Checking whether a program functions
correctly and then correcting errors, it
is known as_
•
•
•
•
•
Default error-checking
De-erroring
Decoding
Debugging
Error-proofing a program
Software
Linux is a (n) ____________ operating system.
•
•
•
•
•
Open source
Microsoft
Windows
Mac
None of these
Software Types
• Open source- any software may be modified by
anyone ( source code is open for changes).
• Freeware -Any software which is totally free of cost.
You can often download this software on the web.
• Proprietary is technology which is no longer
protected by copyright and known to everyone, is
usually identified by a name, edition name, version
number etc.
Software Types
• Shareware - Any software which is free of cost,
but after trial period expires the user is asked to
register/ buy or Uninstall.
• cripple ware - Any software which is free of cost,
but after trial period expires very important
functions or frequently used commands may not
work or used (disabled or crippled)
• Public domain software - Public domain
software is not copyrighted. It is released without
any conditions upon its use, and may be used
without restriction.
Software
Which of the following refers to the
minimum requirements needed to run
software and includes hardware and
software specifications ?
•
•
•
•
•
System Tools
Software requirements
Purchase agenda
Systems requirements
Utilities
SDLC(Software Development Life Cycle)
• SDLC provides a series of steps to be followed to
design and develop a software product efficiently.
• SDLC framework includes the following steps:
•
•
•
•
•
•
•
Gathering information
Feasibility Study
System analysis
Design
Coding
Testing
Deployment or Release of Product
Software
The process of finding errors in software is
called
•
•
•
•
•
Debugging
Testing
Compiling
Interpreting
None
Software
Checking whether a program functions
correctly and then correcting errors, it is
known as_
•
•
•
•
•
default error-checking
de-erroring
Decoding
debugging
error-proofing a program
Software
A repair for a known software bug. usually
available at no charge on the Internet, is called
a(n)_
•
•
•
•
•
Patch
Rectifier
FAQ
Version
Tutorial
Software
A piece of software to fix a known
software bug, usually available at no
charge on internet, is called a(n)
•
•
•
•
•
Patch
Thrash
Check
Tutorial
Version
Software
The _____ manual tells you how to use a
software program.
•
•
•
•
•
Documentation
Programming
Technical
User
None of these
Software
Which of the following is an electronic or
paper log used to track computer activity ?
•
•
•
•
•
Monitor
audit trail
trace route
weblog
Cookie
This is a review of procedure
used by the organization to
develop the software
Software
When a user purchases software ____ is actually
purchased.
• an open agreement allowing the user to copy the
software
• innumerable copies of the software to distribute
freely
• a set-up of CDs. therefore the software itself
• a license to use the software
• a software permit
Types of Software Licenses
• A Concurrent license that is based on the number of
simultaneous users accessing the program. It typically
deals with software running in the server where users
connect via the network.
• A volume license key (VLK) denotes the product key
used when installing software licensed in bulk, which
allows a single product key to be used for multiple
installations.
• Multi-licensing is the practice of distributing software
under two or more different sets of terms and
conditions. This may mean multiple different software
licenses or sets of licenses.
Software
• OEM (Original Equipment Manufacturers): License
type for software that is already installed in the
hardware.
• Named User License: License Type for a specific
user.
• Client Access License (CAL): License type that gives
a user the rights to access the services of the server.
• Enterprise : License Type that does not require
renewal and is for life long.
• Enterprise Subscription: License Type that requires
renewal for every specific period.
Software
A campus or a mid-size company may purchase
__so all users have legal access to the software.
• a standard software license
• volume licenses
• just a few licenses and copy to innumerable
machines
• simultaneous-user licenses
• just one license and copy it to all machines
Software
Which license specifies a group of people that
may use the software ?
•
•
•
•
•
single-user license
multiple-user license
site licenses
concurrent-use licenses
general software licenses
Software
An EULA stands for ___
•
•
•
•
•
Employee-Use Legal Arrangement
Environmental Use Licensing Agreement
Everyday User Learning Assistance
End-User License Agreement
End-Use License Arrangement
An End User License Agreement (EULA) is a legal
contract between a software application author or
publisher and the user of that application.
Software
______refers to the unauthorized copying and
distribution of software.
•
•
•
•
•
Plagiarism
Hacking
Cracking
Software literacy
Software piracy
Software
This system conversion involves running the
old and new systems simultaneously before
converting completely to the new system.
•
•
•
•
•
parallel conversion
direct conversion
phased conversion
convergent conversion
pilot conversion
Software
A phased system conversion in system
implementation _
• experiments with the new system on only a small
group within the organization
• Implements components of the new system one at a
time
• runs both the old and new systems simultaneously
• implements components of the new system all at the
same time
• begins the new system directly after stopping the old
one
Software Conversions
• A pilot conversion is a hardware or software
migration method that involves rolling out the
new system to a small group of users for testing
and evaluation.
• Big bang adoption is a hardware or software
migration method that involves getting rid of the
existing system and transferring all users to the
new system simultaneously.
Software Conversions
• Parallel adoption is a method of hardware
or software migration that involves using the
existing and new systems simultaneously
until the implementation is judged to be
complete and satisfactory.
• Phased adoption is a hardware or software
migration method that involves incremental
implementation of a new system.
Software
If you change Windows 98 operating system to
Windows XP, you are actually performing a(n)
•
•
•
•
•
Upgrade
Patch
Update
Pull down
Push up
Software
Program of which of the following storage
device is always virus free
•
•
•
•
•
hard disk
floppy disk
compact disk
any of these
None
Software
Software, such as viruses, worms and Trojan
horses, that has a malicious intent, is known as:
•
•
•
•
•
Spyware
Adware
Spam
Malware
None of these
Virus v/s Worm
• VIRUS stands for– Vital
Information Resource
Under Siege.
• Worm- generally
considered to be a
subset of virus.
• Virus-Attaches itself to
a program and
propagates copies of
itself to other
files/programs.
• Worm- A malicious
program that
propagates copies of
itself to other
computers and then
looks for a way to
spread to others.
Tip: Virus required file/Programs, but Worm require
just free space to attack
Trojan Horse v/s Logic Bombs
• Trojan Horse- A
• Triggers actions when
malicious-logic program
condition occurs or will
that hides within or looks
eventually be activated
like a legitimate program.
by some events.
• Trojan’s can’t spread by
themselves.
Tip: Trojan Horse are always hidden in a file / game /
download, but Logic Bombs works based on a condition
especially Date or Time
Malware
A difference between a worm and a virus
is that_
•
•
•
•
A virus must be attached to a carrier.
A worm cannot harm a computer like a virus can.
Viruses expand the Master Boot Record.
There is no difference at all.
• Worms run faster than viruses.
Malware
A______is a program that secretly attaches
itself to a carrier such as a document or
program and then executes when that
document is opened or program is launched.
•
•
•
•
•
worm
Trojan
Utility
rootkit
virus
Malware
______is a destructive program that
masquerades as a useful or benign
program ?
•
•
•
•
•
Virus
Network failure
Trojans
Destroyer
Worms
Software
Windows Explorer is the name of ______
•
•
•
•
•
A Web browser
A network
A drive
A file manager
an Internet browser
Operating System
• An operating System (OS) is an
intermediary between users and computer
hardware.
– It provides users an environment in which a
user can execute programs conveniently and
efficiently.
• It is a software which manages
hardware.
– So it is also known as Resource Manager.
Operating System
Operating System
• Functions of an operating System
•
•
•
•
•
•
Memory Management
Processor Management
Disk Management
I/O Management
File Management
Security
Operating System
Which of the following is responsible for the
management and coordination of activities
and the sharing of the resources of the
computer ?
•
•
•
•
•
Application Software
System Software
Motherboard
Operating System
RAM
Operating System
The __________ tells the computer how to use
its components.
•
•
•
•
•
Utility
Network
operating system
application program
None
Operating System
Operating system functions may include
•
•
•
•
•
Input/output control
Virtual storage
Multiprogramming
All of the above
None
Operating System
A computer cannot “boot” if it does not have
the _____
•
•
•
•
•
Compiler
Loader
Operating System
Assembler
None
Batch Processing OS
Multiprogramming OS
Timesharing OS
Multiprocessing OS
Real-time OS
• Real-time systems are used when there are rigid
time requirements on the operation of a processor
or the flow of data.
• Real-time operating system has well-defined, fixed
time constraints otherwise system will fail.
– Example Scientific experiments, medical imaging
systems, industrial control systems, weapon systems,
robots, and home-appliance controllers, Air traffic control
system etc
Operating System
Multiprogramming systems:
•
•
•
•
•
Are easier to develop than single programming systems
Execute each job faster
Execute more jobs in the same time period
Are used only one large mainframe computers
None
Operating System
___provides process and memory management
services that allow multiple jobs or programs to
run simultaneously.
•
•
•
•
•
Multitasking
Multithreading
Multiprocessing
Multi computing
None
Operating System
Real time computing is possible because of
the following characteristic of computer
•
•
•
•
•
Storage capability
High speed
Accuracy
Versatility
Automatic in execution
Operating System
A loaded program which is currently not
active is referred to as running in the
•
•
•
•
•
Kernel
sleep time
Foreground
Background
user session
Operating System
Signals that inform the OS that something
happened are called__
•
•
•
•
•
Interrupts
operating system diversions
Distracters
drivers
program defects
Operating System
1. Batch processing: grouping similar type of jobs and
executing them at once is called Batch Processing.
2. Multitasking: Ability of operating system to perform
multiple jobs at a time.
3. Embedded Systems: An embedded system is some
combination of computer hardware and software, either
fixed in capability or programmable, that is specifically
designed for a particular function.
4. Spool:
simultaneous
peripheral
operations
online, spooling refers to putting jobs in a buffer, a special
area in memory or on a disk where device can access them
when it is ready.
Operating System
According to the operating system's capabilities
• Single-tasking single-user operating system
– MS-DOS operating system etc.
• Multi-tasking single-user operating system
– Windows 95, XP, 7 operating system etc.
• Multi-tasking Multi-user operating system
– UNIX, Linux or Windows server platform etc.
• Network operating system
– Novell NetWare etc.
Operating System
The ability of an OS to run more than one
application at a time is called
•
•
•
•
•
Multitasking
Object -oriented programming
Multi–user computing
Time-sharing
None
Operating System
____are small programs stored on the
hard drive that tell the computer how to
communicate with a specific hardware
device such as a printer, network card, or
modem.
•
•
•
•
•
Hardware movers
Device drivers
input routines
Abstraction layer
BIOS
Operating System
A(n) __________ is a program that makes
the computer easier to use.
•
•
•
•
•
Utility
Network
operating system
application program
None
Operating System
An operating system feature that allows you
(while your computer is running) to unplug a
given device and plug in a new one without first
shutting down your computer is_
•
•
•
•
•
Hot swap
warm swap
interactive swap
On the fly swap
Secure swap
Files & DBMS
• File : Any information recorded on a secondary
storage device is called file.
Characteristics:
•Filename(Unique name)
•File type(based on the extension of the file)
•Size (amount of space occupied in storage)
•Path (location where the file have been saved)
•Permissions (all files has three permissions
–i.e.WRITE(W), READ(R) & EXECUTE(X))
•User ID & Date and Time of Creation of file
Files & DBMS
The name that the User gives to a document is
referred to as_
•
•
•
•
•
Name given
Document given
file name
Document identity
None
Files & DBMS
• File Types:
–
–
–
–
–
–
–
–
–
–
Executable files
Object files
Source files
Batch files
Text files
Word Processing files
Spreadsheet files
Image files
Multimedia files
Compressed files & etc.
Files & DBMS
Which of the following is contained at the end
of the file name and helps to determine the
type of file ?
•
•
•
•
•
file nomenclature
file extension
file property
file subname
file name
Files & DBMS
• Which of the following file name
extension suggests that the file is a
backup copy of another file ?
•
•
•
•
•
.BAK
.FAT
.COM
.BAS
.TXT
Files & DBMS
________store related documents
located on the computer
•
•
•
•
•
Programs
Folders
Indexes
Labels
Sections
Files & DBMS
RTF means
•
•
•
•
•
Rich Text File
Rich Text Format
Reach Text File
Rest Textual File
None
Files & DBMS
JPEG stand for
•
•
•
•
•
Join Pictures Experts Group
Joint Photographic Experts Group
Joint photo Emergency Group
All of the above
None
Files & DBMS
PDF means
•
•
•
•
•
Picture Development Format
Post Data File
Portable Document Format
Portable Device File
None
Files & DBMS
In computers ‘.TMP’ extension refers
usually to what Kind of file ?
•
•
•
•
•
Image file
Temporary file
Database file
Text file
video file
Files & DBMS
• FILE : File is collection of Records.
• Record: It is a collection of Fields.
– Fields are nothing but properties or attributes.
Files & DBMS
This set of related data items is known as
•
•
•
•
•
File
Record
Table
Layout
None
Files & DBMS
• Disadvantages of files:
– Data Redundancy
– Data Inconsistency
– Data Isolation
– Integrity Problems
– Atomicity Problem
– Concurrent Access Anomalies
– Security Problems
Files & DBMS
When data changes in multiple lists and all
lists are not updated, this causes:
•
•
•
•
•
data redundancy
information overload
duplicate data
data inconsistency
None of these
Files & DBMS
Data integrity refers to _____
•
•
•
•
•
Security of data
Retrieving of data
Centralization of data
Accuracy of data
Duplication of data
Files & DBMS
• DBMS is a collection of interrelated data and a
set of programs to access this data in a
convenient and efficient way.
• Architecture of DBMS- The architecture is
divided into three levels:
– External view or user view/View Level
– Conceptual view/Logical Level
– Internal view/Physical Level
Files & DBMS
The comprehensive software system that builds
maintains and provides access to a database
•
•
•
•
•
CPU
DASD
CAI
DBMS
None
Files & DBMS
• Data model: Data models define how the logical
structure of a database is modeled.
– Entity-Relationship Model
• ER Model is best used for the conceptual design of a
database.
• ER Model is based on
– Entities and their attributes.
– Relationships among entities.
• ER Model provides graphical representation called ER Diagrams
Files & DBMS
• Hierarchical model
Files & DBMS
• Network model
Files & DBMS
• Relational model
– A database based on the relational model developed by
E.F. Codd.
– A database the data and relations between them are
organized in tables.
Files & DBMS
A table in a relational database terminology Is
synonymous with______
•
•
•
•
•
A relation
A row
An attribute
A value
A column
Files & DBMS
In a database system, the smallest unit of
information in a record is called a(n) _____
•
•
•
•
•
cell
Table
Field
Row
Column
Files & DBMS
• Constraints:
– Row based Constraints (used at the time
of record updating)
– Column based Constraints ( used at the
time of data entry)
• Primary key ( does not allow NULL (empty) and
duplicate values)
• Foreign key (used for referential integrity)
Files & DBMS
The purpose of the primary key in a database
is to:
•
•
•
•
•
unlock the database
provide a map of the data
uniquely identify a record
establish constraints on database operations.
None of these
Files & DBMS
A goal of normalization is to ________
•
•
•
•
•
Minimize the number of relationships
Minimize the number of entities
Minimize the number of tables
minimize the number of redundancy
None of these
Files & DBMS
• SQL : Structured Query Language, which is a
computer language for storing, manipulating and
retrieving data stored in relational database.
• SQL is an ANSI (American National Standards
Institute) standard but there are many different versions
of the SQL language.
Files & DBMS
Which is the correct ascending order of a data
hierarchy?
•
•
•
•
•
Bit – byte – record –field – file - database
Byte – bit – field – record – file - database
Byte – bit – record – file – field – database
Bit – byte – field – record – file - database
NONE
Files & DBMS
Which of the following organization is connected
with database ?
•
•
•
•
•
AMD
Intel
Asus
Motorola
Oracle
Data Warehouse
Data Warehouse
A data warehouse is which of the following ?
• Can be updated by the end users
• Contains numerous naming conventions and
formats
• Organized around important subject areas
• Contains only current data
• None of these
Data mining
Which of the following is used study
the trends and patterns in the market?
•
•
•
•
•
Data marts
Data mining
Data warehouse
Database
None
Data Mining
A goal of data mining includes which of the
following?
•
•
•
•
•
To explain some observed event or condition
To confirm that data exists
To analyze data for expected relationships
To create a new data warehouse
None of these
Computer Networks
• Network is group of computers and other
devices Connected together.
Advantages:
- Sharing of Resources/information
- Communication
Computer Networks
• Network basic terms
– Host
– Protocol
– Packets
– Data Transfer Rate
Communication Types
REPEATER
HUB
SWITCH
ROUTER
BRIDGE
MULTIPLEXER
MULTIPLEXER
MODEM
Computer Networks
• DSL is acronym of Digital Subscriber Line. It is a form of
broadband connection as it provides connection over ordinary
telephone lines.
• ISDN is acronym of Integrated Services Digital Network. It
establishes the connection using the phone lines which carry
digital signals instead of analog signals.
• Dial-up connection uses telephone line to connect PC to the
internet. It requires a modem to setup dial-up connection. This
modem works as an interface between PC and the telephone
line.
Wired Medium
Wireless Network
Computer Networks
• GPRS - General Packet Radio Service
• GSM -The Global System for Mobile Communications
• CDMA - Code Division Multiple Access
• IVRS - Interactive Voice Response System
Computer Networks
• Network topology is the arrangement of the various elements
(links, nodes, etc.) of a computer network.
Computer Networks
Personal computers can be connected
together to form a __________.
•
•
•
•
•
Server
Supercomputer
Network
Enterprise
Client
Computer Networks
____ shares messages, reports, plans,
spreadsheets and databases etc.
•
•
•
•
•
Modem
Network
Fax machine
Scanner
Printer
Computer Networks
Data is transmitted from one computer to
another in the form of
•
•
•
•
•
Files
Packets
Chunks
Information
None
Computer Networks
Communication circuits that transmit data in
both directions but not at the same time are
operating in
•
•
•
•
•
Simplex mode
Half-duplex mode
Full-duplex mode
Asynchronous mode
None
Computer Networks
Which of the following combines signals from
different sources into one and sends on a
faster channel?
•
•
•
•
•
HUB
Switch
Full Duplex
Multiplexing
Encoding
Multiplexer is a network device which
has ‘n’ inputs and one output.
Computer Networks
In telecommunication and computer networks,
________ is a method by which multiple analog
signals or digital data streams are combined
into one signal over a shared medium.
•
•
•
•
•
Co-processing
Multiplexing
Multi-tasking
Multiple channeling
Broadband
Computer Networks
A network that spreads over cities is
•
•
•
•
•
WAN
MAN
LAN
WEB
None
Computer Networks
Which of the following is not a network ?
•
•
•
•
•
Local area network
Wide area network
Optical fiber
Personal area network
None
Computer Networks
The fastest cable type discussed in the text is
_______.
•
•
•
•
•
Coaxial
Fiber optic
Twisted pair
Wireless
None
Computer Networks
A device that connects to a network without
the use of cables is said to be__
•
•
•
•
•
open source
Wireless
Centralized
Distributed
Collaborative
Computer Networks
WIFI means
•
•
•
•
•
Wireless Fidelity
Wired Fidelity
Wire-Fire
Wire Network
None of these
Computer Networks
WiMAX stands for
• Wireless maximum communication
• Worldwide interoperability for microwave access
• worldwide international standard for microwave
access
• Worldwide minimum access
• None of the mentioned
Computer Networks
A wireless technology standard for
exchanging data over short distance, from
fixed and mobile devices, and building
personal area network is called _____
•
•
•
•
•
Bluetooth
USB
PCB
Microwave
DSL
Computer Networks
What does the acronym RFID stand for ?
•
•
•
•
•
Radioactive-Frequency Identification
Radial-Frequency Identification
Ready-Frequency identification
Random-Frequency Identification
Radio-Frequency Identification
Computer Networks
A set of rules that computer on a network use
to communicate with each other are called
•
•
•
•
•
Rules
Regulations
Protocol
Netiquettes
None
Computer Networks
Each IP packet must contain
•
•
•
•
•
Only Destination address
Source or Destination address
Source and Destination address
Only Source address
Any one address
Computer Networks
What is the meaning of Bandwidth in Network?
• Class of IP used in Network
• Connected Computers in the Network
• Transmission capacity of a communication
channels
• Range of the network
• None
Computer Networks
In Digital Communication ‘bps’ stands for
•
•
•
•
•
Bits per System
Bits per Season
Bytes per second
Bits per second
Bytes per system
In data communications, bits per second
(bps or bit/sec) is a common measure of data
speed for computer modems and transmission
carriers.
Computer Networks
A topology of computer network means:
•
•
•
•
•
Arrangement of PCs is certain pattern
Cabling between PCs All
Way the server connects to PCs
All
None
Computer Networks
In a ____ topology, if there are n devices in
network, each device has n-1 ports for cables.
•
•
•
•
•
Mesh
Bus
Star
Ring
Ethernet
Computer Networks
Which of the following is considered as single
cable network?
•
•
•
•
•
Mesh
Bus
Star
Ring
Ethernet
Ethernet is a Network that works on Bus Topology.
It works based on CSMA/CD concept.
Ethernet has been standardized by IEEE and given
802.3 standards.
Computer Networks
In a ring topology , the computer in possession
of the ______ can transmit data
•
•
•
•
•
Packet
Data
Access method
Token
None of these
Network Addressing
• Media Access Control address, a hardware add
ress that uniquely identifies each node of
a network.
– MAC address is represented by 48 bits
• Internet Protocol address, an IP or IP
address is an address of a computer or other
network device on a network using TCP/IP.
– In IPv4 the IP address is represented by 32 bits
– In IPv6 the IP address is represented by 128 bits
Computer Networks
Which of the following hardware’s address in
the computer is regarded as MAC address
•
•
•
•
•
NIC
MODEM
Hard Disk
Port
None
Computer Networks
• Each computer in network is uniquely identified by
•
•
•
•
•
IP Address
ID Address
Computer Name
Computer ID
None
Computer Networks
192 . 112. 252. 121 belongs to which class?
•
•
•
•
•
Class A
Class B
Class C
Class D
Class E
Computer Networks
DHCP is the abbreviation of
•
•
•
•
•
Dynamic Host Control Protocol
Dynamic Hyper Control Protocol
Dynamic Host Configuration Protocol
Dynamic Hyper Configuration Protocol
None
Computer Networks
A computer network tool used to detect
hosts /or to test the reachability of a host on
an IP, is called _____
•
•
•
•
•
Try
Check
View
Ping
Lookup
Ping is used diagnostically to ensure
that a host computer the user is trying
to reach is actually operating.
Ping works by sending an Internet
Control Message Protocol (ICMP) Echo
Request to a specified interface on the
network and waiting for a reply.
Computer Networks
• Types of Networks based on the implementing.
– INTERNET
• TCP/IP Protocol
– INTRANET
• TCP/IP Protocol
– EXTRANET
• Inter Company Communication
Computer Networks
Internet is a
•
•
•
•
•
Collection of computers
Collection of networks
Collection of files
Concept for transferring files
None
Computer Networks
The Internet was originally a project for this
government agency.
•
•
•
•
•
ARPA
NSF
NSA
FCC
ANSI
ARPANET was the network that became the basis for the Internet. Based on a
concept first published in 1967, ARPANET was developed under the direction of
the U.S. Advanced Research Projects Agency (ARPA).
Computer Networks
Internet works based on which of the
following protocol
•
•
•
•
•
HTTP
TCP/IP
FTP
SMTP
None
Computer Networks
You must install a (n) ____________ on a network
if you want to share a broadband internet
Connection
•
•
•
•
•
•
Internet connection.
Router
Modem
Node
Cable
None of these
Computer Networks
Which of the following best describes a private,
wide network, closed to public access?
•
•
•
•
•
Internet
Cloud Computing
Intranet
Extranet
Virtual private network
Computer Networks
Which of the following uses tunneling protocol
to securely send private network data over the
internet?
•
•
•
•
•
VPN
LAN
GPS
WAN
MAN
A virtual private network (VPN) is a technology that
creates an encrypted connection over a less secure
network.
Computer Networks
What is a Firewall in Computer Network?
•
•
•
•
•
A web browsing Software
The physical boundary of Network
An operating System of Computer Network
A system designed to prevent unauthorized access
None
Computer Networks
To protect yourself from computer hacker
intrusions you should install a ________
•
•
•
•
•
Firewall
Mailer
Macro
Script
None
Computer Networks
A Proxy server is used for which of the
following?
•
•
•
•
•
To provide security against unauthorized users
To process client requests for web pages
To process client requests for database access
To provide TCP/IP
None of these
Computer Networks
When two companies are linked together by
computers and they send business transactions
through these computers, they are probably
using
•
•
•
•
•
Digital wallets
Electronic data interchange
B2C
EDI (Electronic Data Interchange) is the transfer
of data from one computer system to another by
Smart cards
standardized message formatting, without the
None of these. need for human intervention.
Computer Networks
Performing business transaction over internet
is called
•
•
•
•
•
E-commerce
Marketing
DSP
Virtual business
Real time selling
Computer Networks
____ is framework to access million of
documents over internet
•
•
•
•
•
World wide web
Browsing
Accessing
Fetching
None
Computer Networks
____ is collection of web-pages and ____is the
very first page that we see on opening of a
website.
•
•
•
•
•
Home-page, Web-page
Web-site, Home-page
Web page-, Home-page
Webpage, Web-site
None
Computer Networks
A home page is ________
• a web page you eventually reach by clicking a
series of hyperlinks.
• a web page created by an individual home user,
as opposed to the one created by a corporation.
• the web page you like to visit the most.
• the last page of the web site.
• the web page that identifies a website.
Computer Networks
Which term identifies a specific computer on
the web and the main page of the entire Site
•
•
•
•
•
URL
Web site address
Hyperlink
Domain name
None of these
Computer Networks
A website’s own unique internet address the
no other website can use is its
•
•
•
•
•
WWW
URL
FTP
Search Engine
IPv6
URL is an acronym for Uniform Resource Locator
Computer Networks
A web facility that helps to find sites with the
information and/or services that is desired ___
•
•
•
•
•
A hyperlink
A search engine
A network access point
A blog
The top-level domain
Computer Networks
HTML in computing stands for _____
•
•
•
•
•
HyperTool Marking Language
HyperText Markup Language.
HyperType Markup Language.
HyperText Machine Language.
HyperTool Machine Language
Computer Networks
A word in a web page that, when clicked,
opens another document.
•
•
•
•
•
Anchor
URL
Hyperlink
Reference
All of above
Computer Networks
Surfing on the Net means to use a program
called a _______ to go from site to site in
search of information that is of one’s interest.
•
•
•
•
•
Tasker
Helper
Browser
Gopher
Dialer
Computer Networks
The programs used to view web pages are
called?
•
•
•
•
•
Clients
Server
Browser
Programmer
None of these
Computer Networks
An organization that provides individuals and
companies access to the Internet and other
related services such as Web site building and
virtual hosting____
•
•
•
•
•
SAP
Telnet
ASP
ISP
OSP
Computer Networks
The term ISP refers to
•
•
•
•
•
Internal software protocol
International shareware pool
Internet service provider
Interface standard protocol
None
Computer Networks
VoIP is a group of technologies for delivery of
voice communications. VoIP stands for ______
•
•
•
•
•
Voice on Internet Portal
Voice over Internet Protocol
Voice on Information Process
Voice on Internet Price
Voice over Information Portal
Computer Networks
For_______to work, both parties must
be online at the same time, and the
receiver of a message must be willing to
accept messages.
•
•
•
•
•
e-mail
FTP
Telnet
Telnet and FTP
Instant messaging
Computer Networks
Newsgroups use a special network of
computers called the
•
•
•
•
•
UseNet
MailNet
AddressNet
ChannelNet
None
Computer Networks
• Usenet is the part of the Internet which enables
users to participate in discussions and
newsgroups.
• Usenet newsgroups are organized into hierarchies
(categories) and subcategories.
• Subcategories include Standard, Alt, Biz, and
Local newsgroups.
Computer Networks
What the use of NNTP:
•
•
•
•
•
Mange the communication b/w client and server
Mange the components of computer
Mange the news posted on newsgroups
Manages the computers in a network
All of these
The Network News Transfer Protocol (NNTP) is an application
protocol used for transporting Usenet news articles between
news servers and for reading and posting articles by end user
client applications
Computer Networks
Most news readers presents newsgroups
articles in:
•
•
•
•
•
Mail
Threads
Column
Post
Ping
On the Internet in Usenet newsgroups and
similar forums, a thread is a sequence of
responses to an initial message posting.
Computer Networks
To exit a network without turning off the
computer so that a different user can log
on use_
•
•
•
•
•
Exit
sign off
stop task
Logoff
restart
Computer Networks
A_can be used to block access to
specific sites.
•
•
•
•
•
hardware block
censor
filter
Rubicon
trapper
Computer Networks
PSTN is a standard analog telephone lines,
available worldwide. What is the full form of
acronym PSTN
•
•
•
•
•
Public Services Telephone Network
Private Switched Telephone Network
Private Services Telephone Network
Public Switched Telephone Network
Public Services Telephone Network
Computer Networks
Example of telecommunication device is _____
•
•
•
•
•
Modem
Printer
Monitor
Mouse
Keyboard
Computer Networks
Which of the following devices sends and
receives data over telephone lines to and from
computers?
•
•
•
•
•
Speaker
Expansion slot
Modem
Router
Printer
Computer Networks
______takes place when the modem in
a computer uses a standard telephone
line to connect to the Internet.
•
•
•
•
•
FTTP
Convergence
Dial-up access
DSL
Complication
Computer Networks
Which technology allows users to shift their
desktop activities to computers on the
internet?
•
•
•
•
•
Centralized databases
Cloud computing
Distributed databases
Solid-state storage
Handheld computers
Practice of using a network of
remote servers hosted on the
Internet to store, manage, and
process data, rather than a
local server or a personal
computer.
Computer Networks
The ____ routes and manages communication on
the network and coordinates network resources.
•
•
•
•
•
VAN
Broadband
NOS
Frame relay
DOS
A network operating system (NOS) is a computer
operating system that is designed primarily to
support workstation, personal computer, and, in
some instances, older terminal that are connected
on a local area network (LAN).
Computer Networks
• Client-server architecture (client/server) is a network
architecture in which each computer or process on the
network is either a client or a server.
• Servers are powerful computers or processes dedicated to
managing disk drives (file servers), printers (print servers), or
network traffic (network servers ).
•
Clients are PCs or workstations on which users run
applications. Clients rely on servers for resources, such
as files, devices, and even processing power.
Computer Networks
• A Windows domain is a type of ____
network, where resources are managed
by a centralized computer.
•
•
•
•
•
Virtual server
server
client/server
Peer
time-sharing
Computer Networks
The most important or powerful computer in a
typical network.
•
•
•
•
•
Desktop
Network client
Network server
Network station
Channel
Computer Networks
Computer Networks
Computer Networks
Computer Networks
Which of the following layers of OSI reference
model provides the service of error detection
and control to the highest layer ?
•
•
•
•
•
Data Link
Application
Presentation
Session
None
Computer Networks
Which is the main function of transport layer?
•
•
•
•
•
Node to node delivery
End to end delivery
Synchronization
Updating and maintaining routing tables
None
Computer Networks
__________ is the protocol that supports
linking from one web page to another page.
•
•
•
•
•
HTML
IP
HTTP
FTP
All of above
Hypertext Transfer Protocol
Computer Networks
__________ servers store and manages files
for network users.
•
•
•
•
•
Authentication
Main
Web
File
None of these
It works based on File Transfer Protocol
Computer Networks
Telnet helps in
•
•
•
•
•
Remote login
Connecting to television
Transferring files across net
All of these
None
Circuit Switching
Packet Switching
Virtual circuit packet switching
Message Switching
Computer Networks
E-mail addresses separate the user name from
the ISP using the __ symbol.
•
•
•
•
•
&
@
%
*
None of these
E-MAIL
To contact people using the Internet, you most
often use their_.
•
•
•
•
•
E-mail addresses
Passwords
Usernames
Domain names
None
E-MAIL
Computer Networks
What Is E- mail attachment?
• A receipt sent by the recipient
• A malicious parasite that feeds off of your messages
and destroys the contents
• A computer file sent along with an email message
• Confirmation of received E-mail
• None of these
Computer Networks
• Simple Mail Transfer Protocol (SMTP) is an Internet
standard for electronic mail (email) transmission.
• Post Office Protocol (POP) is an application-layer Internet
standard protocol used by local e-mail clients to retrieve email from a remote server over a TCP/IP connection.
• Internet Message Access Protocol (IMAP) is an Application
Layer Internet protocol that allows an e-mail client to access
e-mail on a remote mail server.
• Multipurpose Internet Mail Extensions (MIME) is
an Internet standard that extends the format of email to
support: Text in character sets other than ASCII. Non-text
attachments: audio, video, images, application programs etc.
Computer Networks
The_protocol handles outgoing mail.
•
•
•
•
•
Post Office Protocol (POP3)
IMAPI-3
File Transfer Protocol (FTP)
Simple Mail Transfer Protocol (SMTP)
Transmission Hypertext Mail System (THMS)
Computer Networks
The Process of attempting to gain or successfully
gaining, unauthorized access to computer
resources is called Hacking.
Hacker is someone who seeks and exploits
weaknesses in a computer system or computer
network.
Computer Networks
• HACKING TECHNIQUES
–
–
–
–
–
–
–
Sniffing
Key logging
Phishing
Identity Theft
Spoofing
Spyware
Wi-Fi Eavesdropping
Computer Networks
Which of the following refers to a technique for
intercepting computer communications ?
•
•
•
•
•
Sniffing
Spoofing
Phishing
Pretexting
Hacking
Sniffing
Computer Networks
What is a common medium used for thieves to
steal others' identities?
•
•
•
•
•
Telephone
Pick pocketing
Burglary
Email
none of these
Computer Networks
One of the more recent e-mail scams, which
lures internet users into revealing personal
information is referred to as :
•
•
•
•
•
Phishing
Flaming
Blogging
Pop- ups
None of these
PHISHING
Computer Networks
Using someone else’s personal information,
such as a Social Security number, to establish
bank or credit card accounts that are then left
unpaid is known as_.
•
•
•
•
•
personal impersonation attacks (PIA)
accountability theft
identity theft
asset theft
debit fraud
IDENTITY THEFT
IP SPOOFING
SPYWARE
Spyware is software that aims to gather information about a person or
organization without their knowledge.
Wi-Fi Eavesdropping
Computer Networks
What network security feature prevents users on
a network from using programs and information
that they need to access?
•
•
•
•
•
Access Rights
Protocol Rights
Right to Entry
Password Rights
Protocol Access
Access Rights
Computer Networks
All of the following are examples of real
security and privacy risks Except _____
•
•
•
•
•
hackers
spam
viruses
identify theft
None of these
SPAM
Computer Networks
What type of technology scrambles the
contents of files sent via the Internet?
•
•
•
•
•
Encryption
Secured data interchange
Cryptogram
Regulated code
None of these
Computer Networks
The result after applying an encryption key and
algorithm to a message
•
•
•
•
•
Plain text
Cyber text
Cipher text
Decryption
Anti-Cipher
Encryption & Decryption
Microsoft Office
• Microsoft Office is an office suite of desktop
applications, servers and services for the
Microsoft Windows and OS X operating
systems.
• It was first announced by Bill Gates of
Microsoft on August 1, 1988 in Las Vegas.
• MS office primarily includes Word, Excel,
PowerPoint, Access and Outlook.
• It also includes OneNote, Groove, InfoPath and
Publisher.
Microsoft Word
• Microsoft Word is a word processor developed
by Microsoft.
• It is used for creating, editing, formatting, storing,
retrieving and printing of a text document.
• Microsoft Word's native file formats are denoted
either by a .doc or .docx file extension
Microsoft Word
• A Cursor is an indicator used to show the position on a
computer monitor to input from a text or pointing
device.
• To create a document, we use New command at the
menu.
• Save as is used to save a document for the first time. It
is also used to change the destination of the saved file
in the computer.
• Print Preview is used to see the document before the
printout is taken.
• Cut and Paste options are used to move the data from
one part of the document to another.
Microsoft Word
• Portrait and Landscape options are
available in Orientation category of Page
Setup.
• Alignment refers to the position of text
between the margins.
• Auto complete is a feature in word that
automatically completes the spelling of
days of the week and months of the year
that have more than five letters in their
names.
Microsoft Word
• Header and Footer option is used to
display information such as title and page
number of the document.
• The bar at the top of the window that
bears the name of the window, is known
as Title Bar.
• A screen element of MS Word that is
usually located below the title bar that
provides categorized option, is called
Menu Bar.
Microsoft Word
• Auto Correct in word automatically
corrects certain spelling, typing,
capitalization or grammar errors.
• Thesaurus is used for finding a synonym
for a word in the document.
Microsoft Word
• WordArt enables drawing text in a Microsoft
Word document such as a title, watermark,
or other text, with graphical effects such as
skewing, shadowing, rotating, stretching in a
variety of shapes and colors.
• Word has extensive lists of bullets and
numbering features used for tables, lists,
pages, chapters, headers, footnotes, and
tables of content.
Microsoft Excel
• Microsoft Excel is a spreadsheet application
developed by Microsoft for Microsoft Windows
and Mac OS.
– It features calculation, graphing tools, pivot
tables, and a macro programming language
called Visual Basic for Applications.
– The intersection of a row and column is called a
Cell.
Microsoft Excel
– The cell in which we are currently
working is known as Active Cell.
– Microsoft Excel's native file formats are
denoted either by a .xls or .xlsx file
extension.
– A Worksheet is made of columns and
rows, wherein columns run Vertically
and rows run Horizontally.
Microsoft Excel
• Up to Excel 2003, the standard amount of columns
has been 256 and 65,536 rows.
• Excel 2007 onwards, the maximum number of rows
per worksheet increased to 1,048,576 and the number
of columns increased to 16,384.
• Total number of characters that a cell can contain
32,767 characters.
• 32 fields in a Data Form.
• Microsoft Excel has the basic features of all
spreadsheets, using a grid of cells arranged in
numbered rows and letter-named columns to organize
data manipulations like arithmetic operations.
Microsoft Excel
• The letter and number of the intersecting column
and row is the Cell Address.
• Short cut key to insert a new worksheet in MSExcel is ALT + Shift + F1 .
• Short cut key to insert a new chart in ms excel is
F11.
• Sheet tab is the tab at the bottom of the worksheet
window that displays the name of the worksheet.
• A Microsoft office document that contains one or
more worksheets is known as a Workbook.
MS-OFFICE
Which file starts MS Word?
•
•
•
•
•
Winword.exe
Word.exe
Msword.exe
Word2003.exe
None
MS-OFFICE
How will MS Word respond in case of a
repeated word in a document ?
•
•
•
•
A Yellow wavy line under the repeated word
A Red wavy line under the repeated word
A Green wavy line under the repeated word
It will ignore the repeated word
• A Blue wavy line under the repeated word
MS-OFFICE
• Red underline: This indicates either a possible
spelling error or that Word doesn't recognize a word. If
you type a word that is correctly spelled, but Word
doesn't recognize it, you can add it to Word's
dictionary so that it is not underlined in the future.
• Green underline Word thinks that grammar should be
revised.
• Blue underline A word is spelled correctly but does
not seem to be the correct word for the sentence. For
example, you type "too," but the word should be "to."
MS-OFFICE
What is the smallest and the largest font
size available in font size tool on
formatting toolbar in MS WORD ?
•
•
•
•
•
12 to 64
8 to 64
8 to 72
12 to 72
8 to 48
MS-OFFICE
Thesaurus tool in MS Word is used for
•
•
•
•
•
Spelling suggestions
Grammar options
Synonyms and Antonyms words
All of the above
None
MS-OFFICE
• Why Drop Caps are used in documents?
• To drop all capital letters
• To automatically begin each paragraph with
Capital letter
• To begin a paragraph with a large dropped
initial Capital letter
• To drop all first letters of a word in a
sentence
• None
MS-OFFICE
• The key F12 opens a
•
•
•
•
•
Save As dialog box
Open dialog box
Save dialog box
Close dialog box
None
MS-OFFICE
• FUNCTION KEYS
– F1: Displays the Help task pane
– F2: Moves text or graphics
– F3: Inserts an AutoText entry (if pressed
after Microsoft Word displays the entry)
– F4: Repeats the last command or action
(if possible)
– F5: Displays the Go To dialog box
MS-OFFICE
– F6: Switches between the Help task pane and the
program window.
– F7: Checks spelling
– F8: Turns on Extend mode
Extends a selection
– F9: Updates selected fields
– F10: Selects the Menu Bar.
Closes an open menu & submenu same time.
– F11: Goes to the next field
– F12: Opens the Save As dialog box
MS-OFFICE
What is a ‘template’ in Microsoft word ?
• It is a type of fonts
• It is a list of styles and headings
• It is a long document which contains several
subdocuments
• It is a picture manager
• It is a structure for a particular type of
document
MS-OFFICE
Printing orientation that is taller than it is
wider is_
•
•
•
•
•
page set
landscape orientation
longitudinal
Icon
Portrait orientation
MS-OFFICE
The best way to move some text to another
part of a Word document would be to_
• Highlight the text, right-click, and use the “Copy” and
“Paste” functions
• Highlight the text, and press the up or down arrows to
move it.
• Highlight the text, and then drag it into place with the
mouse.
• Highlight the text, right-click, and use the “Cut” and
“Paste” functions.
• Delete the text and then re-type it.
MS-OFFICE
If you accidentally deleted some text from a
document, and you want it back, you
should_
•
•
•
•
•
Restart the computer
Select “Redo”
select “Redo” or press Ctrl + Y.
immediately close the document and reopen It.
Select “Undo” or press Ctrl + Z
MS-OFFICE
In Microsoft Office, which command can
be used to check how a document will
look before it is printed ?
•
•
•
•
•
Pre-Print
standard Preview
print Preview
File Preview
None
MS-OFFICE
When would you use the “Save As” function?
•
•
•
•
•
Only when working with a Microsoft Word document.
only when working with Microsoft Excel.
only when you want to burn the file onto a CD.
Every time you want to save something.
When you are saving a document for the first time and
you need to choose a folder for the document and
create a file name for it.
MS-OFFICE
____deletes the character just to the left
of the cursor (or insertion point) and
moves the cursor to that position.
•
•
•
•
•
Esc Key
Arrow Keys
Backspace Key
Delete Key
F12 key
MS-OFFICE
The Windows shortcut for Bold is_
•
•
•
•
•
CTRL+A
CTRL+Z
CTRL+Y
CTRL+X
CTRL+B
MS-OFFICE
The Windows shortcut to Cut is_
•
•
•
•
•
CTRL+X
CTRL+Z
CTRL+B
CTRL+Y
CTRL+A
MS-OFFICE
What is the shortcut key of printing a
document for computer having Windows ?
•
•
•
•
•
Ctrl + P
Alt + P
Shift+ P
Fn + P
Shift+ PP
MS-OFFICE
• Ctrl + 0 : Toggles 6pts of spacing before a
paragraph.
• Ctrl + A : Select all contents of the page.
• Ctrl + B : Bold highlighted selection.
• Ctrl + C : Copy selected text.
• Ctrl + D : Open the font preferences
window.
• Ctrl + E : Aligns the line or selected text to
the center of the screen.
MS-OFFICE
• Ctrl + F : Open find box.
• Ctrl + I : Italic highlighted selection.
• Ctrl + J : Aligns the selected text or line to
justify the screen.
• Ctrl + K : Insert a hyperlink.
• Ctrl + L : Aligns the line or selected text to the
left of the screen.
• Ctrl + M : Indent the paragraph.
• Ctrl + N : Opens new, blank document window.
MS-OFFICE
• Ctrl + O : Opens the dialog box or page
for selecting a file to open.
• Ctrl + P : Open the print window.
• Ctrl + R : Aligns the line or selected text to
the right of the screen.
• Ctrl + S : Save the open document. Just
like Shift + F12.
• Ctrl + T : Create a hanging indent.
• Ctrl + U : Underline the selected text.
MS-OFFICE
• Ctrl + V : Paste.
• Ctrl + W : Close the currently open
document.
• Ctrl + X : Cut selected text.
• Ctrl + Y : Redo the last action performed.
• Ctrl + Z : Undo last action.
MS-OFFICE
Character size, such as 12-point and 28point indicates the size of characters in
a particular_
•
•
•
•
•
Textual
Font
Graph
Finish
Data
MS-OFFICE
A(n)_______, such as Cambria and Calibri
is a name assigned to a specific design
of characters.
•
•
•
•
•
Font
Point
Finish
Text set
Iconography
MS-OFFICE
• The_______of the document window
usually displays a document’s file
name
•
•
•
•
•
command box
shortcut menu
special bar
submenu
title bar
MS-OFFICE
_____is a collection of electronic drawings,
photos, and other images that can be
inserted into documents.
•
•
•
•
•
Image repositories
Clip art
Glossaries
Graphics checkers
Special art
MS-OFFICE
Word processing software includes
a(n)____. which reviews the spelling of
individual words, sections of a document,
or the entire document.
•
•
•
•
•
dictionary
table of contents
Glossary
content verifier
spelling checker
MS-OFFICE
_______ is used to covert from upper
case to lower case and vice versa.
•
•
•
•
•
Toggle case
Sentence case
Lower case
Upper case
None
MS-OFFICE
In Office 2007. the keyboard shortcut to
delete the word to the right of the
insertion point is___________
•
•
•
•
•
CTRL+BACKSPACE
CTRL+DELETE
DELETE
SHIFT + DELETE
BACKSPACE
MS-OFFICE
• What is the shortcut to open the Open
dialog box?
•
•
•
•
•
F12
Shift F12
Alt + F12
Ctrl + F12
Alt + Ctrl + F12
MS-OFFICE
• Bullets and Numbering is in ____ tab
•
•
•
•
•
Home tab
Insert tab
Pagelayout tab
View tab
None
MS-OFFICE
• Cut, Copy and Paste is in ___ Group in
the Home tab.
•
•
•
•
•
Font
Page setup
Clipboard
Editing
None
MS-OFFICE
• What is the shortcut key you can press
to crate a copyright symbol?
•
•
•
•
•
Alt + Ctrl + C
Alt + C
Ctrl + C
Ctrl + Shift + C
None
MS-OFFICE
______applications, such as Microsoft
Excel, create electronic worksheets
composed of rows and columns.
•
•
•
•
•
Spreadsheet
Presentation
Desktop publishing
Database
Word processor
MS-OFFICE
An excel workbook is a collection of
•
•
•
•
•
Workbooks
Worksheets
Charts
Worksheets and charts
None
MS-OFFICE
In its default setting, an Excel workbook is
made up of sheets and the default number
is
•
•
•
•
•
1
2
3
4
5
MS-OFFICE
Which command is used to closed the
window of Excel?
•
•
•
•
•
Alt + F4
Ctrl + W
Ctrl + R
Ctrl + C
None
MS-OFFICE
Ctrl + PgUp will take you to
•
•
•
•
•
Previous Sheet
Next Sheet
Last cell in the column
First cell in the column
None
MS-OFFICE
Name the shortcut key to fill the value of
just above cell
•
•
•
•
•
Ctrl + D
Ctrl + E
Ctrl + T
Ctrl + O
None
MS-OFFICE
•
•
•
•
F2 : Edit the selected cell.
F4 : Repeat last action.
F5 : Go to a specific cell. For example, C6.
F7 : Spell check selected text or
document.
• F11 : Create chart from selected data.
MS-OFFICE
•
•
•
•
•
•
•
•
Ctrl + Shift + ; :Enter the current time.
Ctrl + ; : Enter the current date.
Alt + Shift + F1 : Insert New Worksheet.
Ctrl + 1 : Open the Format Cells window.
Ctrl + A :Select all contents of the worksheet.
Ctrl + B : Bold highlighted selection.
Ctrl + I : Italic highlighted selection.
Ctrl + K : Insert link.
MS-OFFICE
•
•
•
•
•
Ctrl + S : Save the open worksheet.
Ctrl + U : Underline highlighted selection.
Ctrl + 1 : Change the format of selected cells.
Ctrl + 5 : Strikethrough highlighted selection.
Ctrl + P : Bring up the print dialog box to begin
the printing process.
• Ctrl + Z : Undo last action.
MS-OFFICE
What is the first sign or symbol used in
an Excel formula/function ?
•
•
•
•
•
Percentage “%”
The equals sign “=”
Left parenthesis “(“
The right parenthesis “)”
The dollar sign “S”
MS-OFFICE
The effect of an accidental click on the
Undo button, in Excel 2007 can be
reversed by clicking_.
•
•
•
•
•
Bold
Copy
Redo
Paste
Save
MS-OFFICE
Many worksheet cells contain a number
that can be used in a calculation, called
a(n)_
•
•
•
•
•
chart
index
function
formula
value
MS-OFFICE
A(n)__________is the intersection of a
column and row in a worksheet
•
•
•
•
•
Nexus
store
Grid
Cell
link
MS-OFFICE
Getting data from a cell located in
different sheet is called____
•
•
•
•
•
Accessing
Referencing
Updating
Functioning
None
MS-OFFICE
You can activate a cell by
•
•
•
•
•
Pressing the Tab key
Clicking the cell
Pressing an arrow key
All of above
None
MS-OFFICE
• Which of the following is not a valid
Zoom percentage in Excel?
•
•
•
•
•
10
100
300
500
None
MS-OFFICE
• Comments put in cells are called
•
•
•
•
•
Smart Tip
Cell Tip
Web Tip
Soft Tip
None
MS-OFFICE
A numeric value can be treated as label if
___ precedes before it
•
•
•
•
•
Apostrophe (‘)
Exclamation (!)
Hash(#)
Ampersand (&)
Dollar ($)
MS-OFFICE
• Which area in an excel window entering
values and formulas
•
•
•
•
•
Title bar
Menu bar
Formula bar
Standard toolbar
None
MS-OFFICE
• Which function will you use to enter
current time in a worksheet Cell?
•
•
•
•
•
=today()
=now()
=time()
=CurrentTime()
None
MS-OFFICE
• To drag a selected range of data to
another worksheet in the same
workbook, use the
•
•
•
•
•
Tab key
Alt Key
Shift Key
Ctrl Key
None
MS-OFFICE
• Merge cells option can be applied from
•
•
•
•
•
Format cells dialog box Alignment Tab
Formatting toolbar
Format cells dialog box Inset Tab
Both of above
None
MS-OFFICE
Which one among the following is an
example of formula in MS Excel ?
•
•
•
•
•
SUM(A1:A2)
=add(A1 :A2)
A1+A2
A1&A2
=A1+A2
MS-OFFICE
The chart must be created as part of
•
•
•
•
•
Table
Forms
Reports
2&3
None
MS-OFFICE
If you wanted to create an animated
presentation, what would be the best
application program to use ?
•
•
•
•
•
word
Power Point
Excel
Access
Outlook
MS-OFFICE
A file that includes predefined settings that
can be used to create many common
types of presentations is called a_
•
•
•
•
•
Pattern
Prototype
Template
Blueprint
Model
MS-OFFICE
The maximum Zoom percentage in MSPowerPoint is:
•
•
•
•
•
100%
200%
400%
500%
None
• The arrangement of elements such as
Title and subtitle text, pictures, tables
etc. is called:
•
•
•
•
•
Layout
Presentation
Design
Scheme
None
MS-OFFICE
What is the keyboard short-cut for new
slide ?
•
•
•
•
•
Ctrl + M
Ctrl + N
Ctrl + Shift + N
Ctrl + S
None
MS-OFFICE
• F1 : Display Help or the Office Assistant
• F2 : Select the text box containing an
object or text
• F4 : Repeats the last presentation
action (Edit > Repeat) (not Format
Autoshape dialog)
• F5 : Runs the presentation (View > Slide
Show)
MS-OFFICE
• F6 : Moves to the next pane in the
presentation (clockwise)
• F7 : Displays the (Tools > Spelling) dialog
box
• F10 : Toggles the activation of the Menu Bar
• F12 : Displays the (File > Save As) dialog
box
MS-OFFICE
• ctrl + F4 : Closes the active presentation
or window (File > Close)
• Ctrl + F5 : Restore the size of the active
presentation or window
• Ctrl + F6 : Moves to the next presentation
window
• Ctrl + F7 : Activates the Move window
command
MS-OFFICE
• Ctrl + F8 : Activates the Resize window
command
• Ctrl + F9 : Minimises the size of the active
presentation or window
• Ctrl + F10 : Maximise the size of the
active presentation or window
• Ctrl + F12 : Displays the (File >
Open) dialog box
MS-OFFICE
• Ctrl + A : Selects all the objects on the
active slide
• Ctrl + B : Toggles bold on the current
selection
• Ctrl + C : Copies the current selection to
the clipboard (Edit > Copy)
• Ctrl + D : Make a duplicate of the selected
slide (Edit > Duplicate)
• Ctrl + E :Centre aligns the current selection
MS-OFFICE
• Ctrl + F : Displays the (Edit > Find) dialog box
• Ctrl + G : Displays the (View > Grid and
Guides) dialog box
• Ctrl + H : Displays the (Edit > Replace) dialog
box
• Ctrl + I : Toggles italics on the current selection
• Ctrl + J : Justifies the current selection
• Ctrl + K : Displays the (Insert >
Hyperlink) dialog box (in a textbox)
• Ctrl + L : Left aligns the current selection
MS-OFFICE
• Ctrl + M : Inserts a new slide (Insert > New
Slide)
• Ctrl + N : Creates a new presentation (File >
New)
• Ctrl + O : Displays the (File > Open) dialog
box
• Ctrl + P : Displays the (File > Print) dialog
box
• Ctrl + R : Right aligns the current Selection
MS-OFFICE
• Ctrl + S : Saves, Displays the (File > Save
As) dialog box if a new presentation
• Ctrl + T : Displays the (Format > Font) dialog
box
• Ctrl + V : Pastes the entry from the
clipboard (Edit > Paste)
• Ctrl + W : Closes the active presentation or
window (File > Close)
MS-OFFICE
• Ctrl + X : Cuts the current selection to the
clipboard (Edit > Cut)
• Ctrl + Y : Repeats the last Presentation
action (Edit > Repeat)
• Ctrl + Z : Undo the last Presentation
action (Edit > Undo)