Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
104 views46 pages

Computer Top 900 One-Liners

The document is a compilation of computer-related one-liners covering various topics such as software types, computer generations, networking, and hardware components. It includes definitions, historical facts, and technical terms relevant to computer science and information technology. Key concepts include operating systems, programming languages, data storage, and internet protocols.

Uploaded by

monyutahkaishu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
104 views46 pages

Computer Top 900 One-Liners

The document is a compilation of computer-related one-liners covering various topics such as software types, computer generations, networking, and hardware components. It includes definitions, historical facts, and technical terms relevant to computer science and information technology. Key concepts include operating systems, programming languages, data storage, and internet protocols.

Uploaded by

monyutahkaishu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 46

Target NSSB

Computer Top 900 One-liners

 By default, your documents print in mode – Portrait

 are attempts by individuals to obtain confidential information from you by


falsifying their identity - Phishing scams

 Microsoft Office is an example of a - Horizontal market software

 Junk e-mail is also called - Spam (Sending irrelevant messages or the same message
to a large number of users over the internet for the purpose of advertisement or
malicious intent is called as spamming)

 _ is the process of dividing the disk into tracks and sectors – Formatting

 A computer cannot "boot" if it does not have the - Operating system

 An operating system is the system software that handles the software and hardware
resources and provides services for the computer programs.

 Modifier keys - include Alt, Ctrl, Shift and the Windows key

 MS-Word is an example of - Application software (developed by the company


Microsoft)

 What is the Full Form of INTERNET - 'Internet' is the shortened form of 'INTERnational-
NETwork' which is the interconnected network of all the Web Servers worldwide. It is
often called the 'World Wide Web

 Binary digits are known by another name called: - Bits (which utilizes just two symbols,
commonly 0 (zero) and 1. A bit is used to describe each digit.)

 The standard floppy disk has the following size: - ”. (The dimensions of the floppy
disk are 8.9 cm in width and 9.3 cm in height)

 The components of the computer IC (integrated circuit) chip are: - Silicon

 The term for the processor that executes mathematical and logical operations is- ALU

 Which mainframe computer was the first – ENIAC ((Electronic Numerical Integrator and
Computer))
Target NSSB

 4004 is the first Intel processor launched by Intel corporation.

 Windows preferences are saved in: - WIN.INI

 When an Email is sent it is transferred over the internet from one server to another
using - SMTP.

 Simple Mail Transfer Protocol is known as SMTP. To relay outgoing mail between the
sender and the receiver is SMTP network protocol.

 When was the first email sent – 1971

 Mini computers and micro computers are from which generation of computers - fourth

 Ray Tomlinson was the first Engineer who had sent the first Email.

 Storage capacity of magnetic disk depends on - disk pack in disk surface, bits per inch of
tracks, tracks per inch of surface

 Which of the following is a popular programming language for developing multimedia


webpages – Java

 The computer's processor consists of the following parts - Control Unit and ALU

 A _ is a software program used to view Web pages – browser

 What was the name of the first commercially available microprocessor chip - Intel 4004

 The first computer was programmed using ..... Machine language

 Where is RAM located - Mother Board (RAM is located in The central processing unit
(CPU), also called a processor, is located inside the computer case on the motherboard.)

 Several computers linked to a server to share programs and storage space - Network

 RAM chips are used to - temporary storage for the data in the computer system itself

 Supercomputers come in handy for - Scientific applications and Mathematical


operations

 A kilobyte, sometimes known as KB, is equal to: - 1024 bytes


Target NSSB

 For storing an initial program in ROM we need something called: - Bootstrap Loader

 A computer virus is a: - Software

 The box that contains the central electronic components of the computer is the .....
System Unit

 The First Mechanical Computer Designed by Charles Babbage was called - Analytical
Engine which resembles today's modern machines between 1833 and 1871.

 In MICR, C stands for ..... Character (Magnetic Ink Character Recognition)

 Which key is used in combination with another key to perform a specific task – Control

 Which of the following refers to a small, single-site network – LAN (Local Area Network)

 A ........ is approximately one billion bytes – Gigabyte

Inventor Name of Machine


John Napier Napier‟s Bones
Blaise Pascal Adding Machine
G.V. Leibnitz Leibnitz Calculator
Joseph Jacquard Punch Card Loom
Charles Babbage Analytical Engine
Herman Hollerith Card Reading Machine
 Who is the father of personal computer - Edward Robert

 The development of the basic architecture of the computer was done by - John Von
Neumann

 Excel requires an operator to indicate that a formula is being entered in a cell, such as:
- start with the equal sign (=).

 In how many generations can a computer be categorized - There are currently 5


generations of computers available

 The Initial Generation of computers was produced between 1946 – 1959. based on
vacuum tubes

 The second generation of computers was produced between 1959 and 1965. based on
transistors
Target NSSB

 The third generation of computers was produced between 1965–1971. based on


integrated circuits

 The fourth generation of computers was produced between1971 to 1980. Based on a


VLSI microprocessor.

 Computers in their fifth generation began to appear about 1980. Based on a ULSI
microprocessor

 The foundation of fifth-generation computers is: - Artificial Intelligence


(Superconductors and parallel processing are two technologies that are making
artificial intelligence a reality.)

 Which computer generation saw the introduction of the microprocessor - Fourth


Generation

 Any information or instruction put into a computer’s memory is regarded as – Input

 Read-only memory (ROM) is a type of non-volatile memory that includes flash memory,
ferroelectric memory, and the majority of magnetic computer storage systems

 The period of time that a computer spends processing a job is: - Execution Time

 Mainframe and high-tech computers’ memory sizes are stated as – Megabytes

 Another name for an error is – Bug (debugging must be done if we receive any bug in
the system.)

 Seymour Cray unveiled the CRAY-1 in 1976, considered the first supercomputer

 Graphical representations of objects like files, folders, etc. include: - Icons

 In Microsoft Excel, which one of the following tools allows extracting the significance
from a large detailed data set - Pivot Table

 In a computer with Windows operating systems, files are stored in locations called –
Directories

 Which of the following is the fastest memory- Cache Memory


Target NSSB
 Which is the correct arrangement of memories types from highest to lowest speed -
registers, cache, main memory, secondary storage

 In the Internet business, ISP stands for - Internet Service Provider

 In MS-Word, what is the smallest font size generally that we can use to text in Word – 8

 In Microsoft PowerPoint, the best way to insert a new slide in a presentation is to use
- Slide Sorter View

 In MS Word, Thesaurus tool has made for the Purpose of - Synonyms and Antonyms
words

 Dot Matrix Printer is an example of: - Output Device

 The virus attacks on the computer can be stopped or prevented with the help of -
Antivirus Software

 Network Interface Card is a(n) _ device - Input/Output

 Speed of CPU is measured in – GHz

 The most popular technique used to automate sending of a customized letter to


different recipients where most of the content is the same except the customer address
of MS Word - Mail Merge

 The term HTTP stands for Hypertext Transfer Protocol. Who has developed this protocol
to transfer information over the internet - Tim Berners Lee

 Which of the following is the extension of A Microsoft Word file - .doc

 the Linux operating system family is free and open-source software.

 DOS offered a mechanism called Terminate and Stay Resident (TSR) that allowed
programs to continue running in memory

 Which of the following displays the name of the user on the computer - Welcome
screen

 The type of software that is best suited for managing the layout and design of intricate
documents like newsletters and brochures is - Word processing
Target NSSB
 What is the name of the RAM that DOS and applications are allocated to - Conventional
memory

 C, BASIC, COBOL, and Java are examples of............ language - high-level

 CD-ROM - Compact Disc-Read-Only Memory, a type of optical disk capable of storing


large amounts of data -- up to 1GB,

 The term designates equipment that might be added to a computer system to


enhance its functionality - peripheral device

 Merge cells option can be applied from - Format Cells dialog box Alignment Tab

 The smallest unit in a digital system is a ........ Bit

 Which of the following software applications would be the most appropriate for
performing numerical and statistical calculations - Spread Sheet

 The ______ operating system serves as the foundation for the most recent iteration of
the MAC OS. – Unix

 The drive storing the files to be duplicated is known as the__ - Source drive

 Storage which stores or retains data after power off is called - Non-volatile storage

 Vendor-created program modifications are called - patches

 USB(Universal Serial Bus) is which type of storage device – Secondary

 USB is a plug-and-play portable storage device that uses flash memory and is lightweight
enough to attach to a keychain

 Microcomputer hardware consists of three basic categories of physical equipment _ -


system unit, input/output, secondary storage

 Windows 95, Windows 98, and Windows NT are known as what - operating systems

 Which code is used in Cheque – MICR stands for Magnetic ink character recognition

 To run thesaurus which key will be pressed - Shift + F7

 The key used to restart a computer is - Ctrl + Alt + Del


Target NSSB

 Adobe developed , which allows the document to be transmitted and stored


without loss of formatting - Portable Document Format

 In MS Word, you can move and copy text : - Within a word document, Between word
document, Between office application

 Bandwidth refers to - The amount of data that can be transmitted through a


communication channel.

 The secondary storage device is needed to - Store large volumes of data that exceed the
capacity of the main memory.

 What is the language used by most of the DBMSs for helping their users to access data -
Query Language

 If you need to duplicate the entire disk , which command will you use – Diskcopy

 _ Systems use a light beam to scan input data and convert it into electrical signals,
which are sent to the computer for processing - Optical recognition

 The binary equivalent of decimal number 99 is – 1100011

 Header is - Any text or graphics printed at the top of every page

 Data representation in a computer uses the number system – Binary

 This case converts first character of first word of selected sentence to capital – sentence

 Multitasking system specifically refers to - More than one process

 An example of Full Duplex communication channel. - Telephone conversation

 Name the device used to connect computers for communication via telephone lines.. –
MODEM

 In Microsoft Word, provides options to switch between Normal, Web Layout,


Print Layout, Outline and Reading Views - View Buttons

 A serial port can - transfer information both to and from a hard drive

 IP address refers to - A numerical network label


Target NSSB

 A worksheet range is a - A group of cells

 Debugging is the process of - Checking errors in a software program

 In Microsoft Word, view enables us to view our document as it would


appear in a web browser such as the Internet Explorer - Web Layout

 On the basis of memory size & performance, which type of computer is known as "Big
Iron" - Main Frame

 Which among the following is the brain of the computer – CPU (Central processing Unit)

 In HTML, attribute is used for merging of two or more adjacent rows –


ROWSPAN

 In Microsoft Word, can be used to decide on the spacing between lines of


a paragraph. - Line spacing

 _ is a collection of data values of same types having a common name. – Array

 Who designed the first electronic computer – ENIAC - J presper Eckert and John W
Mauchly

 The process when the computer is switched on and the operating system gets loaded
from hard disk to main memory is called – Booting

 A personal computer’s primary memory, commonly known as its main memory, consists
of - Both RAM and ROM

 Which computer’s memory contains the system’s Boot sector files – ROM

 RAM is volatile, when a device is shut off, its data are gone. It is temporary memory

 Where is the buffer between the CPU and main memory located – RAM

 Buffers are the disk block representation of the data that is located in the cache
memory.

 What is the process of mapping a virtual address of a variable length onto a physical
memory – Segmentation
Target NSSB
 By default the top margin in the word document is - 1 inch

 By default the right margin in the word document is - 1 ¼ inch

 The Name box on to the left of formula bar - shows the name of cell address or range
currently working on

 Which command lists the contents of current directory of a disk – Dir

 When a customer makes an online hotel booking, the data base is update in - Pseudo
real- time

 Special set of characters that computer associates with specific user identification is
classified as – password

 It run on computer hardware and serve as platform for the others software to run on -
Operating system

 Each individual data items of record is called a – Field

 The primary purpose of the operating system is - to make the most efficient use of
computer hardware

 Which command can be used to create the disk track and sectors – FORMAT

 To select one hyperlink after another during a slide presentation, what do you press –
Tab

 in the context of animations, what is a trigger - An item on the slide that performs an
action when clicked

 How many bits are there in ExASCII and EBCDIC codes respectively – 8, 8

 Which of the following device was developed by Jack Kilby & Robert Noyce - IC chip

 The address uniquely defines a host on the Internet – Logical

 What term is used to describe software that monitors your online computer activities –
Spyware

 The two major components of system software are - The operating system and system
utilities
Target NSSB

 The layer links the network support layers and the user support layers –
transport

 The layer coordinates the functions required to transmit a bit stream over a
physical medium – physical

 The physical, data link, and network layers are the support layers. – network

 Which of the following may be necessary for you to do after you install new application
software - Do a warm boot

 The power-on self-test ---- Verifies that the computer hardware is working properly

 The session, presentation, and application layers are the support layers. – user

 In Excel, this is a prerecorded formula that provides a shortcut for complex calculations –
Function

 Which of the following is a circuit that issue signals at regular intervals.. – Clock

 This printer places an image on a page without physically touching the page. - Non-
impact printer

 is the key we use to run the selected command. – ENTER

 Which one of the following was world’s first commercial compute – UNIVAC

 Which of the following displays the contents of the active cell - Formula bar

 The purpose of the primary key in a database is to - uniquely identify a record

 The data kept in dynamic RAM must be: - Refreshed periodically dynamic RAM functions
like a capacitor

 Computer accumulator registers have a size of- 4 bytes

 Which of the following memories is used in Digital Camera - Flash Memory

 What kind of ROM is just used for erasing - EPROM (electrically erasable programmable
read-only memory)
Target NSSB
 Which form of memory allows for the permanent storage of programs and data once
they have been created – PROM (Programmable Read-Only Memory)

 Windows 10 is - an operating system

 A computer language that expresses the presentation of structured documents, such as


CSS, is called - Style Sheet Language

 What is the technology used in a compact disc – Laser

 You can group noncontiguous worksheets with - The ctrl key and mouse

 The combination of two or more interconnected networks is called – LAN

 ISP stands for - Internet Service Provider

 National Internet Service Provider (ISP) networks are connected to one another by
private switching network is called - Network Access Points

 LAN covers small site areas such as a single building or campus of up to a few km range

 MAN covers city or group of corporate offices

 WAN covers a large area such as city, state, country, or world.

 A protocol is - a set of rules on how communication components and DTE’S are to


communicate

 The method of communication in which transmission of data takes place in both


directions but in one direction at a time is - Half-duplex

 GUI Stands for - A Graphical User Interface is a computer interface that allows users to
interact with a device through graphical elements such as pictures and animations

 Keyboard and Monitor is a good example of – Simplex (Simplex is a unidirectional


communication)

 A set of devices connected by communication links is called – Network

 Nodes are another name of – Devices


Target NSSB
 A node can be a computer, printer, or any other device that sends and/or receives data
generated by other nodes on the network.

 A connection that provides a dedicated link between two devices is called - Point-to-
Point

 The geometric arrangement of devices on the network is called – Topology

 A topology in which every node has a dedicated point to point link to all nodes (devices)
within the network is called – Mesh

 A topology that consists of a number of devices connected by point to point links to a


central hub is called – Star

 A topology that consists of multiple devices connected by connectors or the main cable is
called – Bus

 A communication pathway that sends data from one point to another is called – Link

 The OSI model is composed of how many layers – 7

 A set of internetworking protocol that allows communication across multiple diverse


networks is known as - TCP/IP

 TCP/IP stands for - Transmission Control Protocol/ Internet Protocol

 Which is the lowest layer of the OSI model – Physical

 Which of the following is the top layer of OSI model – Application

 Which layer of OSI model provides hop-to-hop (node-to-node) delivery – Physical

 Which layer of OSI model is responsible for the delivery of individual packets from the
source host to the destination host – Network

 Which layer of OSI model is responsible for detection and correction of transmission
errors using error correction method - Data Link

 Any physical components of a computer system that we can see and touch is – hardware

 The system unit that contains the most vital part of the personal computer is called –
Motherboard
Target NSSB

 Motherboard is the main printed circuit board that is also known as main board or system
board

 Which of the following is primarily responsible for converting input (data) into
meaningful output (information) - Central Processing Unit

 CPU in a computer consists of the control unit, arithmetic logic unit, and memory unit.
ALU and CU together are known as CPU.

 the function of Control Unit is to coordinate all its functions.

 Data moves in and out of the CPU through embedded wires called – Bus

 Bus is the communication line between CPU, memory, and peripheral devices

 The most common buses inside the microcomputer are - Address bus, Data bus, and
Control bus

 Which register holds the address of the current instruction being executed - Program
counter

 Which register holds the address of a memory location - Memory address register

 A uniform interval of CPU time allocated for performing a task is called – real time

 A function inside another function is called a ….. Function. – Nested

 Which of the following refers to too much electricity and may cause a voltage surge –
Spike

 Language lies between high-level language and machine language - Assembly language

 In Assembly language - Mnemonics are used to code operations, Alphanumeric symbols


are used for addresses

 Languages which can easily interact with the hardware are - low level language

 Grouping and processing all of a firm's transactions at one time is called– batch
processing

 A spiral shape track formatting is present in - Optical Disk


Target NSSB

 A storage device or medium where the access time is dependent upon the location of the
data is called - Parallel access & Serial access

 ……processing is used when a large mail-order company accumulates orders and


processes them together in one large set – Batch

 Which of the following memories can be read directly by the computer processor – main
Memory

 What is the difference between a check box and Radio button - In check boxes multiple
options can be selected whereas in radio buttons only single option can be selected

 Technique of using fixed words for machine code functions is classified as – mnemonics

 A _ card connects each computer to the wiring in the network. - network


interface

 To execute a given DOS program, you must type a(n) – command

 You can add a hyperlink to your worksheet by pressing - Ctrl + K

 The _ layer enables the users to access the network – application

 When you insert an Excel file into a Word document, the data are - Placed in a word
table

 When data changes in multiple lists and all lists are not updated, this causes - data
inconsistency

 The technique where digital signals are converted to its analog form for transmission
over an analog facility is called– Modulation

 A………is a collection of data that is stored electronically as a series of records in a table –


Database

 What happens if you press Ctrl + Shift + F8 - It activates the rectangular selection

 What is the correct syntax for typing a function into a cell - Equal sign, Function Name,
Matching brackets
Target NSSB
 Which of the following keyboard shortcuts is used to view the properties of a selected
object - Alt + Enter

 What is the keyboard shortcut for creating a chart from the selected cells - F11

 Which of the following device provides surge protection and battery backup power
during a power outage – UPS

 Which key is used to indent a paragraph - Tab key is used to move the cursor over to the
right to a pre-set point.

 Which keys are also known as toggle keys - Caps lock, Num lock

 ASP in computer science stands for - Application Service Provider

 In Microsoft Word, to alter the page set up, page set up is clicked under - File
menu

 In Microsoft Word, contains tools for standard tasks like saving, printing,
cutting, copying, pasting etc - Standard tool bar

 UDP is a - connectionless protocol

 The designers of the Internet Protocol defined an IP address as a bit number. – 32

 (HHDD) is a technology where the conventional disk drive is combined with non-
volatile flash memory, of typically 128 MB or more to cache data during normal use -
Hybrid Hard Disk Drive

 Firewall can be a combination of software & hardware

 Raymond Samuel Tomilson is famous for developing which of the following - E-Mail

 In networks, a small message used to pass between one station to another is known as
Token

 Computer system which do not not require any storage device – Analog

 Software that helps run the computer hardware - system software

 perform Internet Protocol blocking to protect networks from unauthorized


access – Firewalls
Target NSSB

 HTTP in computer science stands for - HyperText Transfer Protocol

 Which company developed 'Swift' Programming Language – Apple

 The web uses the _ to request and serve web pages and programs. - Hyper
Text Markup Language

 In the following list of devices, which device is used in datalink layer – Bridge

 Two versions of the Internet Protocol (IP) are in use - IP Version 4 & IP Version 6

 Which programming language is developed by James A Gosling – Java

 C Programming language was developed by - Dennis Ritchie

 Syntax Errors are determined by - Control Unit

 software are freely available and can be edited and customized by anyone - Open
Source

 A collection of computer applications used on a computer to carry out various activities


is referred to as: - software

 An algorithmic error is defined as one that results in inaccurate output or outcomes: -


logical error

 The command that merges the contents of one file to another is – APPEND

 The uses an addressing scheme known as URL to indicate the location of


files on the web - World Wide Web

 Gutter margin: What is it - Margin that is added to the binding side of the page when
printing

 Which menu will include a typeface option – Format

 A document’s background colour cannot be seen in - Print Preview

 Which of the following options is absent from the MS Word Ruler screen - Center Indent

 Which of the following positions can be set in the Gutter position - Left & Top
Target NSSB

 What shortcut key is used for line breaks- Shift + Enter

 What key will activate the “Open” dialogue box - Ctrl + O

Shortcuts Uses of Shortcut Keys

F1 It displays help.

F2 It renames the selected item.

F3 This is used to search for a file or folder.

F4 It shows the address bar.

F5 This is used to Refresh the windows.

F6 It moves the cursor in the address bar of different browsers

F10 It activates the menu bar in the active application.

F11 Used to enable and disable the fullscreen.

F12 This shortcut is used to save a file as save as.

 The full form of WiMAX is - Worldwide Interoperability for Microwave Access

 WORM is the abbreviation for - Write Once Read Many

 The full form of DDL is: - Data Description Language

 The full form of VIRUS will be: - Vital Information Resource Under Seize

 The full form of the abbreviation ODBC will be: - Open Database Connectivity,

 EBCDIC full form is:- Extended binary coded decimal Interchange code

 CAD stands for _- Computer-Aided Design


Target NSSB

 Father of Modern Computer Science - Alan Tuning

 First Non-programmable Electronic Digital Computer - Atanasoff Berry Computer (ABC)

 A Hybrid computer is a combined feature of Analog and Digital computers

 Microcomputers are small, inexpensive computer for personal use. They are popularly
used at homes for playing games and surfing the Internet

 First Super Computer of India - PARAM 8000

 Fastest Super Computer in India - Pratyush

 Workstation (WS) is faster than Personal Computer. It is designed for a user or group of
users with better multitasking capability

 Data – It is a set of facts, which the computer stores and reads in the form of numbers.

 A device driver or hardware driver is a group of files that enable one or more hardware
devices to communicate with the computer's operating system

 Zip disks are available in 100 and 250-MB and 750 MB capacities and they are used to
store, share and back up large amounts of data.

 Magnetic Memory are - Hard Disk Drive (HDD), Floppy Disk Drive (FDD)

 Scanner – It captures images from printed material and converts it into a digital format
that can be stored within the PC

 Optical Character Recognition (OCR) - It is a technology that recognizes text within a


digital image. It converts the document to an editable text file

 Non-Impact Printers - Non-impact printers print the characters on the paper without
using ribbon. These printers print a complete page at a time

 Inkjet Printers - Inkjet printers work by spraying ink on a sheet of paper. The type of ink
used in an inkjet printer is wet.

 A plotter is an output device used to produce hard copies of large graphs and designs on
paper, such as construction drawings, architectural plans, and business charts
Target NSSB
 Keyboards convert characters to code. – ASCII

 Which among the following options specifies this action: Holding the mouse button down
while moving an object of text – Dragging

 Daisy-wheel printers cannot print graphics, and in general they are noisy and slow,
printing from 10 to about 75 characters per second

 Distributed Operating System allows multiple users on different computers or terminals


to access a single system with one Operating System on it.

 Single User Operating System – This type of operating system supports a single user at
any given time. Single keyboard and Single monitor are used for interaction

 Warm Boot - A computer system starts up/reset from a complete powerless state is called
Warm Booting

 Firmware - Firmware is a software program that is written to a hardware device. It


allows the hardware to be updated

 The feature that opens a window on your desktop where you can browse for file stored
on your computer is called as - File Explorer

 Utility Programs help to manage, maintain and control computer resources.

 Examples of utility programs are antivirus software, backup software, disk defragment,
backup, disk clean etc.

 Language Translator translates the high-level language program (input) into an


equivalent machine language program (output)

 Assembler – It converts assembly language program into machine language

 Compiler – It converts the program in a high-level language into low-level language and
reports all the errors of the program along with the line numbers. C, C++ use compilers

 Interpreter – It converts the programs in a high-level language to low-level language. It


translates line by line and reports the error once after completing the translation
process

 FORTRAN - It is a programming language designed for numeric computation and scientific


computing. FORmula TRANslation is an acronym of FORTRAN
Target NSSB

 COBOL - Common Business Oriented Language is the full form of COBOL. It is used for
business and administrative purposes. It can be read like regular English

 PHP - PHP stands for Hypertext Pre-processor. It is a scripting language used for the
development of web applications

 Semiconductor Memory - RAM, ROM


 Optical Memory - CD-ROM, CD-R, DVD, HVD, Blu-ray Disc
 Magnetic Memory - Hard Disk Drive (HDD), Floppy Disk Drive (FDD)
 Flash Memory - Pen drive, Memory card etc (EEPROM Technology devices

Nibble 4 Bits
Byte 8 Bits
KB (Kilobyte) 1024 Bits
MB (Megabyte) 1024 KB
GB (Gigabyte) 1024 MB
TB (Terabyte) 1024 GB
PB (Petabyte) 1024 TB
EB (Exabyte) 1024 PB

 The basic input/output system (BIOS)is stored in – ROM

 Generally, web address is located by – URL

 Decimal Binary Octal Hexadecimal


0 0000 0 0
1 0001 1 1
2 0010 2 2
3 0011 3 3
4 0100 4 4
5 0101 5 5
6 0110 6 6
7 0111 7 7
8 1000 10 8
9 1001 11 9
10 1010 12 A
11 1011 13 B

 Foreign key points to the primary key of another table. It acts as a reference between
tables. It can accept the null and duplicate value
Target NSSB
 Which language among these is related to Artificial Intelligence – Prolog

 The concept of SQL is related to which generation of language - Fourth Generation


Language

 Which of the following application software suite will be best suited for basic data
calculation and analysis - DTP Software

 The moving text that appears on websites are known as – marquee

 Which of the following is the correct binary representation of decimal number 23 –


10111

 When an Intranet can be accessed by outside users for the purpose of information
exchange then It is known as – Extranet

 The term Large scale integration is related with – Chip

 Which of the following is used to connect a computer to computer network - Network


Interface Card

 When a computer is booted, BIOS retrieves its information from - CMOS chip

 Unauthorized copying and distribution of copyright material in computer world is known


as - Piracy

 The principle that Internet service providers should enable access to all content and
applications equally regardless of the source is known as - Net Neutrality

 The measure of the degree of sharpness of a displayed image is known as – Resolution

 The device used to connect two networks having different architecture and model is –
Gateway

 is the file system used by the operating system to identify the physical
locations of files on the hard drive – FAT

 Setting fonts for the text in your document is an example of – Formatting

 A situation when a computer software stops working and encounters an error is known
as – Crash
Target NSSB
 A server uses applications software to support its client computers - back-end

 A connection from one HTML document to another HTML document is called - Hyper
Link

 The records the name and exact location of every file on a disk - file
allocation table

 A computer on the network that utilizes the service of server computer is known as –
Client

 The pre-defined configuration or setting of a system or an application is known as -


default setting

 Web Address is also known as – URL

 The medium used for communication in in a network is also known as – Channel

 In respect to display technology what does “F” stands for in TFT – Film

 The process of encoding an information in such a way that it cannot be read without
proper authorization is known as _ - Encryption

 website for discussion or an informational site published on the world wide web is known
as - Blog

 What is the shortcut key for the central alignment of a line or text in MS Office software
- Ctrl+E

 is the central server in computer network which lets the concerned user utilise the
storage capacity of the server - File Server

 A file server is a central server in a computer network that provides file systems or at
least parts of a file system to connected clients.

 is the fastest to read from and write to than the other kinds of storage in a computer
– RAM

 A random-access memory device allows data items to be read or written in almost the
same amount of time irrespective of the physical location of data inside the memory
Target NSSB
 Which of the following is/are characteristics of Computer – Diligence, Versatility,
Reliability

 Faulty inputs lead to faulty results. It is known as – GIGO

 GIGO stands for - Garbage In Garbage Out

 The capacity to perform multiple tasks simultaneously is termed as – Versatility

 A computer does not suffer from tiredness and lack of concentration. It is known as
- Diligence

 First Generation computers used for Circuitry and for memory -


Vacuum tubes and Magnetic drum

 is a diagrammatic representation of a program logic. – Flowchart

 ENIAC stands for Electronic Numerical Integrator and Computer. It was the first
programmable, electronic, general-purpose digital computer. It was Turing-complete and
able to solve a large class of numerical problems through reprogramming.

 The speed of the Central Processing Unit (CPU) is measured in _, which


represents a CPU cycle - Hertz (Hz)

 In 1999, the Melissa virus was a widely publicised: - E-mail virus

 What type of virus uses computer hosts to reproduce itself – Worn

 The thing that eventually terminates a worm virus is a lack of: - Memory or disk space

 What is the name of an application program that gathers user information and sends it to
someone through the Internet – Spyware

 is the measurement of things such as fingerprints and retinal scans used for security
access – Biometrics

 refers to electronic trespassing or criminal hacking – Cracking

 Which of the following is an input device that utilises a light-sensitive detector to select
objects on a display screen - Light pen

 In the field of information and communication technology, what is the full form of FDD -
Floppy Disk Drive

 What is ' Roadeo' - A robot that helps maintain traffic


Target NSSB

 Who designed the first analog computer in India - Samarendra Kumar Mitra

 Desktop Computers, Laptop Computers, tablets and smartphones are different types of
- Microcomputers

 Who among the following pioneered Binary Logic and Arithmetic in Computers
Programming - Claude Shannon

 AIX (Advanced Interactive executive) is “an open operating system from IBM that is
based on a version of UNIX. AIX/ESA was designed for IBM's System/390 or large server
hardware platform

 In computing, _ is a network security system that monitors and controls incoming


and outgoing network traffic based on predetermined security rules. – firewall

 Param yuva 2 is a supercomputer developed by India. It has a memory of 14144GB and is


one the oldest supercomputers of India

 A database used by Microsoft Windows for storing configuration information is known as –


Registry

 Pivot Table’ is a feature of Microsoft Excel. A pivot table is a data summarization tool
that is used in the context of data processing

 Which of the following is a lever that can be moved in several directions to control the
movement of an image on a computer monitor or similar display screen – Joystick

 Joystick is an input device

 Which of the following is a type of memory and is similar to RAM? It is used by computers
to move data between the RAM and the CPU – Cache

 Cache Memory is a very high-speed memory and is used to speed up and synchronize
with high-speed CPU

 What does HLL stand for in computing - High Level Language

 A High Level Language (HLL) is a programming language such as C, FORTRAN or PASCAL


that enables a programmer to write programs that are more or less independent of a
particular type of computer.

 was a web browser developed by the National Centre for Supercomputing Application
(NCSA) – Mosaic
Target NSSB
 Which of the following is used to receive and send computer files over telephone lines –
Modem

 Modulator Demodulator (Modem) is a hardware component that allows a computer or


another device, such as a router or switch, to connect to the Internet

 The first barcode system was developed by: - Norman Joseph Woodland

 Who among the following invented the Computer language, COBOL - Grace Murray
Hopper

 Which one is the default „word Processor‟ for Microsoft Windows – MS Word

 Which mode loads minimal set of drivers when starting Windows – safe mode

 Which key combination is used to minimize all open windows and displays in the screen
– windows key + D

 How many users can access a share folder simultaneously from a Windows XP machine –
10

 Which of the following windows do not have start button - Windows 8

 FLOPS stands for - Floating Point Operation Per Second

 Which language was used to program Second Generation computers - Assembly language

 Instructions and data can be stored in the memory of Computer for automatically
directing the flow of operations. It is called _ concept. - Stored program

 “Stored Program” concept was developed by _ Von Neumann

 Electronic Discrete Variable Automatic Computer(EDVAC) was designed on


concept - Stored program

 Which of the following was a small experimental machine based on Neumann’s stored
program concept - Manchester Mark I

 Which of the following uses a handheld Operating Systems – PDA

 The word length of Micro computers lies in the range between - 8 and 32 bits
Target NSSB
 A terminal does not process or store data – dumb

 The user generally applies to access mainframe or super computer – terminal

 Graphical terminals are divided into two types. They are - vector mode and raster mode

 Which of the following program is the closest to the machine code – Assembler

 The layer is responsible for the source-to-destination delivery of a packet across


multiple network links. – network

 Which of the following process is used by the computer to ensure that all the devices
connect to it is in working condition – Booting

 The output shown on the computer monitor is called - Soft Copy

 These devices provide a means of communication between a computer and outer world –
I/O

 Machine Language is written in binary codes only. It can be easily understood by the
computer and is very difficult for us to understand

 Which of the following language does the computer understand - Computer understands
only Binary Language which is written in the form of 0s & 1s

 A computer can understand assembly language but an assembler is required which


convert the assembly language to binary language Similarly, for understanding high level
languages, compilers/interpreters are required.

 Rows and columns are used to organize data in a spread sheet.

 When you are working on documentation on PC, the document temporarily stored in
flash memory.

 Information travels between components on the motherboard through buses.

 The rectangular area of the screen that displays a program, data, and or information is a
- window
Target NSSB

 A collection of related information sorted and dealt with as a unit is a - file

 Plotter, printer, monitor are the group consists of output device

 Digital computer: A device that manipulates discrete data and performs arithmetic and
logic operations on these data

 Most manufacturers setup their BIOS to load into upper memory during the boot process

 Device drivers loaded in the config.sys file is loaded into the following memory area:
Conventional memory

 ARPANET was the world's first fully operational packet switching computer network

 A MAN (metropolitan area network) is a larger network that usually spans several
buildings in the same city or town

 Campus Area Network or corporate area network is a computer network made up of an


interconnection of local area networks (LANs) within a limited geographical area

 World Wide Web - WWW is one of the services interconnected over the internet. It is a
collection of all information, resources, pictures, sounds, multimedia on the internet
which is formatted in HTML and accessed through HTTP

 IPv4 - 32 bits numeric address, It is written in decimal and separated by periods

 IPv6 - 128 bits hexadecimal address IPv6 does not use broadcast messages

 Hub: It works at the Physical layer. It just acts like a connector of several computers i.e.
simply connects all the devices on its ports together.

 Web Server – A web server stores, processes and delivers web pages to the users.

 The intercommunication between users and servers is done using Hypertext Transfer
Protocol (HTTP).

 Switch: It works at the Data Link Layer. It is used for dividing a network into segments
called subnets. It provides filtering of data packets and prevents network traffic also
Target NSSB
 Web Page – It is a document was written in HTML that can be accessed through the
internet by using the web browser. It is identified by Uniform Resource Locator

 A LAN (local area network) is a group of computers and network devices connected
together, usually within the same building.

 Data Communication deals with the transmission of digital data from one device to
another

 Web Browser - It is a software application that allows users to access the websites

 Internet Explorer, Google Chrome, Opera, Mozilla Firefox, UC Browser, Apple Safari are
some examples of a web browser

 Home Page – Homepage is the default page of the website

 Transmission Control Protocol/Internet Protocol (TCP/IP) – It is a set of communication


protocols which is used to access the internet

 Simplex: This, communication is unidirectional i.e. one of the two devices can transmit
the data and the other can only receive the data.

 Radio broadcasting, television broadcasting etc. are the example of the Simplex
Communication

 TCP/IP was developed by Bob Kahn and Vint Cerf in 1978.

 Internet Host – Host is a computer or application which is used to transfer the data on
the internet Each host has a unique IP address called Hostname

 Internet Protocol Address (IP Address) – It is a logical numeric address that is used to
identify the host over the internet network.

 Half duplex: This communication is bidirectional. Either of the devices can act as
transmitter or receiver but only one device can transmit the data at one time

 Example of the half duplex communication - Walkie- Talkie.

 Repeater: It operates at the Physical Layer. It is used to amplify a signal that has lost its
original strength so as to enable them to travel long distances

 Router: It works at the Network Layer and is used to connect different networks that
have different architectures and protocols

 Router can be used to sends the data packets to desired destination by choosing the best
path available thus reducing network traffic.
Target NSSB

 Gateway: can be used to connect two different networks having different architectures,
environment and even models

 Uniform Resource Locator (URL) - A uniform resource locator (URL) is used to locate the
address of a resource and protocol.

 Which language is used for Artificial Intelligence (AI) – PROLOG

 Who coined the term “Artificial Intelligence” - John McCarthy

 _ is a computational model based on the structure of biological neural


networks - Artificial Neural Network

 _ is an artificial neural network with multiple hidden layers between the input
and output layers - Deep neural network

 The first computer spreadsheet program was _ Visicalc

 Which of the following is an example for fourth generation language(4GL) – PowerBuilder

 VDU stands for _ Visual Display Unit

 Herman Hollerith developed a machine called Tabulating Machine

 Electronic Delay Storage Automatic Computer(EDSAC) was invented by _ John


Von Neumann

 Which registers can interact with secondary memory - Memory Address Register(MAR)

 The most frequently used instructions of a computer program are likely to be fetched
from _ Cache

 The primary aim of computer process is to convert the data into – information

 ALU and Control Unit have special purpose locations called – Registers

 The communication line between CPU memory and Peripherals is called a - Bus

 The basic unit of a worksheet into which you enter data in Excel is called – Cell

 _ is the file system used by the operating system to identify the physical
locations of files on the hard drive – FAT

 Which input device is used to read information on a credit card - Magnetic Stripe reader
Target NSSB

 In OCR processing, when a character is recognized, it is converted into _ code –


ASCII

 Which input device is used for inserting pin numbers for credit cards - Numeric pad

 _ is a protocol designed for recording and playing back music on digital


synthesizers – MIDI

 Which is an interactive device that facilitates touch sensation and fine-motion control in
Robotics and Virtual reality - Data Glove

 Which device typically attachable to computer keyboard that allows a blind people to
read - Braille display

 Which is an escape code language used to send commands to the printer for printing
documents - PCL (Printer Command Language)

 _ is a device which recognizes physical or behavioral traits of the individual -


Biometric Sensor

 What is the ultimate purpose of Defragmentation - Create More Free Space

 The term refers to data storage systems that make it possible for a computer
or electronic device to store and retrieve data - storage technology

 What's considered the 'backbone' of the World Wide Web – HTTP

 Small application programs that run on a Web page and provide animation are known as
_ - flash

 A Proxy server is used for - To process client requests for web pages

 The operating system that is self contained in a device and resident in the ROM is
_- Embedded Operating System

 What is the correct way to refer the cell A10 on sheet3 from sheet1 - sheet3!A10

 Which language is used to create macros in Excel - Visual Basic

 _ are specially designed computer chips that reside inside other devices, such
as your car or your electronic thermostat - Embedded computers

 The F7 key is commonly used in Microsoft programs such as Microsoft Word, Outlook,
etc. for - checking spellings and grammar
Target NSSB
 In which year did the JavaScript Programming language come into existence – 1995

 A graphics tablet is a computer input device that enables a user to hand-draw images,
animations and graphics, with a special pen like stylus, similar to the way a person
draws images with a pencil and paper

 What is the full form of BASIC in context of the BASIC computer language - Beginner’s
All-purpose Symbolic Instruction Cod

 BASIC It is a computer programming language that was developed to provide a way for
students to write simple computer programs.

 Who has created LISP, the Programming Language for Artificial Intelligence - John
McCarthy

 A computer used at supermarkets, departmental stores and restaurant etc is called


_ terminal - Point-of-Sale (POS) terminal

 Which view in PowerPoint can be used to enter speaker comments - Notes page view

 PowerPoint can display data from which of the following add-in software of MS-Office -
Organization chart

 You can create and edit organization charts directly within PowerPoint using the
"SmartArt" feature

 To prepare a presentation/slide show which application is commonly used – Powerpoint

 The best way to insert a new slide in a presentation is to use the - Slide sorter view

 Which key on the keyboard can be used to view slide show – F5

 A word processor is a software application designed for creating, editing, and formatting
text-based documents

 A saved document is referred to as a file

 In order to save a Word document as a web page you need to - Save as HTML

 Graphics for word processor - Clip art

 Changing an existing document is called _ the document – editing

 Which of the following are valid Min. & Max. zoom sizes in MS Office - 10, 500
Target NSSB
 The quickest and easiest way in Word, to locate a particular word or phrase in a
document is to use the command – Find

 Special effects used to introduce slides in a presentation are called -


Transitions Transitions in PowerPoint refer to the visual effects that occur when moving
from one slide to another during a presentation

 Animation schemes are built-in animation effects and transitions that can be applied to
individual objects or entire slides in a presentation

 We can replace a font on all slides with another font using the …........ option - Format,
Replace Fonts

 Which of the following displays the buttons for changing text style, alignment and size -
Formatting toolbar

 Why are headers and footers used in document - To allow page headers and footers to
appear on document when it is printed

 Word processing, spreadsheet, and photo-editing are examples of application


software

 The word processing task associated with changing the appearance of documents is -
Formatting

 In order to save an existing document with a different name you need to - use the Save
as command

 The button on the Quick Access Tollbar allows you to cancel your recent
commands or actions – Undo

 The "Undo" feature helps you to quickly correct mistakes or revert changes in your
document.

 Editing a document consists of reading through the document you've created, then -
Correcting your errors

 The boxes that are displayed to indicate that the text, pictures or objects are placed in
it is called – Placeholder

 What is the minimum number of rows and columns that a word table can have - 1 row
and 1 column

 Text and graphics that have been cut or copied are stored in an area called the –
Clipboard
Target NSSB
 The blinking symbol on the computer screen is called the – cursor

 Malware, short for malicious software, is any software used to disrupt computer
operation, gather sensitive information, or gain access to private computer systems

 Antivirus Software is used to scan the hard disk to remove the virus from them. Some of
the famous anti – viruses available are Avast, Norton, Avira, Kaspersky, AVG, etc.

 Spoofing attack is a situation in which one person or program successfully represents


oneself as another by falsifying data and thereby gaining an illegitimate advantage

 CC (Carbon Copy) in e – mail indicates those who are to receive a copy of a message
addressed primarily to another

 BCC (blind carbon copy) field is available for hidden notification; recipients listed in the
BCC field receive a copy of the message, but are not shown on any other recipient's
copy (including other BCC recipients)

 Uploading refers to the sending of data from a local system to a remote system such as a
server or another client

 Super Key - It is a set of one or more attributes whose values uniquely determine each
entity in the database table. It is a subset of a candidate key

 Foreign Key - Foreign key points to the primary key of another table. It acts as a
reference between tables. It can accept the null and duplicate value

 Composite Key - It is a combination of more than one column in the table that can be
used to uniquely identify each record. It is also known as a Compound key

 Paste Special - Paste Special is used to paste an item from the clipboard with custom
formatting.

 AutoCorrect - AutoCorrect is a software feature in MS Word. It automatically corrects


misspellings and common errors.

 Workbook – It is an Excel file which contains worksheets of rows and columns

 Cell Address – The location of a cell is known as Cell Address. Example: C10 (Column:
Row)

 Autofill – Autofill fills the values in the cell according to a given pattern. (i.e. Months &
Days, Even Numbers, Odd Numbers, tens, etc) This is done through the Fill Handle.

 Macro – It is a sequence of instructions that replace a repetitive series of keyboard and


mouse actions to execute. It is used in MS Word and MS Excel
Target NSSB

 Master Slide – A slide that controls the properties such as theme, layout, background,
colour, fonts, and positioning of all other slides in a presentation

 Slides Pane – Slide Pane displays the slides thumbnails. It allows the user to view and
edit the slides

 Task Pane – It allows to access commands like getting started, PowerPoint help, slide,
new presentation etc related to a specific task.

 .apk - Android Package file

 .txt - Plain text file

 .wks / .wps - Microsoft Works Word Processor Document file

 .xlr - Microsoft Works spreadsheet file

 .xls - Microsoft Excel File

 .xlsx - MS Excel Open XML spreadsheet file

 .wma - Windows media audio file

 .pptx - PowerPoint Open XML presentation

 .wpl - Windows Media PlayerPlaylist

 .ppt - PowerPoint presentation

 .mpg/.mpeg - MPEG Video file

 .db/.dbf - Database file

 .avi - Audio Video Interleave file

 .sql - SQL Database file

 .flv - Adobe Flash video file

 .tar - Linux / Unix tarball file archive

 .mp4 - MPEG-4 video file

 .bak - Backup file

 .odt - Open office writer doc file


Target NSSB

 .tmp - Temporary file

 .pdf - PDF file

 .htm/.html - HTML/Hypertext Markup Language file

 .js - JavaScript file

 .exe - Executable file

 .bin - Binary file

 Ethernet - Ethernet is the most widely used LAN technology that defines wiring and
signalling standards for the physical layer of TCP/IP. Ethernet was standardized as IEEE
802.3

 Fiber distributed data interface (FDDI) - FDDI is an optical data communication standard
used for long distance networks provides communication with fiber optic lines. This
protocol is based on the token ring protocol

 Transport Layer – It is like as transport layer in the OSI model. Two end-to-end transport
protocols are used. Transmission Control Protocol (TCP) and Use Datagram Protocol
(UDP).

 Application Layer – It contains high-level protocols. TELNET, FTP, SMTP, DNS, HTTP,
NNTP, DHCP are used.

 Internet Host – Host is a computer or application which is used to transfer the data on
the internet Each host has a unique IP address called Hostname

 Domain names are used to identify one or more IP addresses domain name serves as an
address which is used to access the website. It can be universally understood by Web
servers and online organizations

 Domain Name Description


.com Commercial
.net Network-oriented
.org Non-Profit Organization
.edu Education
.gov Government
.mil Military
.int International Treaties
Target NSSB
 Ransomware - Ransomware is a type of malware program that infects and takes control
of a system. It infects a computer with the intention of extorting money from its owner

 What is the default extension of Microsoft Word 2013 - .docx

 Which unit is a combinational digital electronic circuit that performs arithmetic and
bitwise operations on integer binary numbers - ALU

 Which button is called as middle button used as third mouse button by pressing on it. -
scroll wheel

 Which bus connects all the internal components of a computer such as CPU and memory
to the main board(motherboard) - Internal Bus

 A bus that connects a computer to Peripheral devices is called - External Bus

 External Bus is also referred as Expansion Bus

 The Command to access the memory or the I/O device is carried by Control Bus

 A computer bus that is used to specify a Physical address - Address Bus

 A bus that transfer data from one component to another or between computers is called
- Data Bus

 RISC stands for Reduced Instruction Set Computer

 is a register for Short-term, intermediate storage of arithmetic and logic data


in a Computer’s CPU – Accumulator

 _ is a group of commands for a CPU in machine language. - Instruction Set

 Von Neumann Architecture is a - Single Instruction Single Data(SISD)

 Programming that actually controls the path of signals or data within computer is
called - Micro Programming

 CISC stands for - Complex Instruction Set Computer

 The register which holds the address of the location to or from which data are to be
transferred is known as - Memory Address Register

 An interrupt can be temporarily ignored by the counter is called - Maskable Interrupt


Target NSSB
 Which of the following Unit can be used to measure the speed of a computer – MIPS

 The circuit used to store one bit of data is known as Flip Flop

 The control unit controls other units by generating control and Timing signals

Basic Computer Keyboard Shortcut Keys A to Z

Shortcuts Uses of Shortcut keys

Alt + E It Edits options in the current program.

Alt+Tab this is used to switch between the open windows.

Alt + F Shows file menu options in the current program.

Alt + F4 This closes the current window.

Alt + Page Up It scrolls up the Entire Screen.

Alt + Page Down It scrolls down the Entire Screen.

Alt + Left Arrow It shows the previous history if it is present in Bowser.

Alt + Right Arrow Go forward in the browser window.

Alt + Enter It shows the property of the selected item.

Ctrl + A It is used to select all text.

Ctrl + X It cuts the selected item.

Ctrl + Del It deletes selected items.

Ctrl + C / Ctrl+Ins Used to copy the selected item.


Target NSSB
Basic Computer Keyboard Shortcut Keys A to Z

Ctrl + V / Shift + Ins Used to paste the selected item.

Ctrl + Home It is used to go to the beginning of the document.

Ctrl + End Go to the end of a document

Ctrl + S Open the save as a dialogue box.

Ctrl + Z Undo the last action.

Ctrl + Alt + Del Opens Windows task manager.

Ctrl+N Open a new window/document.

Ctrl+H Open the history tab/bar.

Ctrl+J Open the download tab/bar.

Ctrl+F It starts the find utility.

Ctrl+P Open the print dialogue box.

Ctrl+Esc Open the Windows start menu.

Ctrl + “+” Increases the zoom level.

Ctrl + “–” Decreases the zoom level.

Ctrl + W / Ctrl + F4 Closes the current tab.

Ctrl+T Open a new tab.

Home Takes the user to the start of the current line.

End This is used to go to the end of the current line


Target NSSB
Basic Computer Keyboard Shortcut Keys A to Z

Shift + Delete files will be deleted permanently.

Ctrl + Y This redo the last action.

Ctrl + K It insert hyperlink for the selected text.

This lock the computer, requiring password entry to access


Windows key + L
again.

Access the Power User Tasks Menu in Windows 8 and Windows


Windows key + X
10.

Windows key + Down


It Minimize the active program window.
arrow

Windows key + Up arrow It Maximize the active program window.

Ctrl + Left arrow This key used to move one word to the left at a time.

Ctrl + Right arrow This is used for move one word to the right at a time.

Ctrl + Y Redo the last action.

Ctrl + K Insert hyperlink for the selected text.

Access the Power User Tasks Menu in Windows 8 and Windows


Windows key + X
10.

Minimize the active program window. (That format Should be


Windows key + ↓
used)

Windows key + L Lock the computer, requiring password entry to access again.

Windows key + ↑ Maximize the active program window.

Ctrl + ← Move one word to the left at a time.


Target NSSB
Basic Computer Keyboard Shortcut Keys A to Z

Ctrl + → Move one word to the right at a time.

Ctrl + Home Go to the beginning of the document.

Ctrl + End Go to the end of the document.

Ctrl + Shift + Esc Open Windows Task Manager.

Shift + Home Highlight from the current position to the beginning of the line.

Shift + End Highlight from the current position to the end of the line.

Shortcuts Uses of Shortcut keys

F2 Used to rename the selected icon.

F3 This Find anything from our desktop.

F4 This is used in Windows 95 to XP to open the locate window.

F5 It is used to refresh the contents of your Windows system.

Alt + F4 Used to close the ongoing program.

Ctrl + F4 This shortcut is used to swiftly close a document.

This adjusts the widths of all columns automatically, in


Ctrl + Plus Key
Windows Explorer.

Alt + Print Screen /


It is used to take a screenshot of the current page.
Win+PrtScn

Ctrl + Alt + Del Used to Reboot/Windows task manager.

Ctrl + Esc It activates the start menu.


Target NSSB
Basic Computer Keyboard Shortcut Keys A to Z

It is used to open the properties window for the selected icon


Alt + Enter
or program.

Win + X It shows shutdown options.

Win + L It Locks the computer screen.

Win This display or hide the Start screen.

Win + D Used to show/hide the desktop.

Win + E This open file explorer.

Win + M It minimizes all open windows.

Win + Shift + M This shortcut restores all minimized windows.

Win + P Select a presentation display mode.

Win + Q It opens the search for the menu.

Win + R It opens the Run dialogue box.

Win + Z This display the commands used in the current open window.

It minimizes the desktop window or clear the current


Win + Down Arrow
application from the screen.

Win + Up Arrow It is used to maximize the window.

This shortcut maximizes the window to the left side of the


Win + Left Arrow
screen.

Win + Right Arrow It maximizes the window to the right side of the screen.

Win+ This is used to zoom in using a magnifier.


Target NSSB
Basic Computer Keyboard Shortcut Keys A to Z

Win- It zooms out using a magnifier.

Ctrl + Shift + Esc This is used to open Windows Task Manager.

Ctrl + Home This key is used to go to the beginning of the document.

Ctrl + End This key is used to go to the end of the document.

It highlight from the current position to the beginning of the


Shift + Home
line.

Shift + End It highlight from the current position to the end of the line.

 AI ———– Artificial Intelligence


 ALGOL ———– Algorithmic Language
 ALU ———– Arithmetic Logic Unit
 ASCII ———– American Standard Code for Information Interchange
 BINAC ———– Binary Automatic Computer
 BASIC ———– Beginner’s All-purpose Symbolic Instruction Code
 BIOS ———– Basic Input Output System
 CAD ———– Computer-Aided Design
 CLASS ———– Computer Literacy and Studies in School
 COBOL ———– Common Business Oriented Language
 CPU ———— Central Processing Unit
 CU ———– Control Unit
 CD-R ———– Compact Disc Recordable
 CD-ROM ———– Compact Disc Read-Only Memory
 CD-RW ———– Compact Disc Rewritable
 CGI ———– Common Gateway Interface
 CDMA ———– Code Division Multiple Access
 DB ———– Database
 DBMS ———– Database Management System
 DPI ———– Dots Per Inch
 DRAM ———– Dynamic Random Access Memory
 DTP ———– Desktop Publishing
 DVD ———– Digital Video Disc/Digital Versatile Disc
 DVR ———– Digital Video Recorder
 DOS ———– Disk Operating System
 EBCDIC ———– Extended Binary Coded Decimal Interchange Code
 E-Commerce ———– Electronic Commerce
 EDSAC ———– Electronic Delay Storage Automatic Calculator
 EEPROM ———– Electrically Erasable Programmable Read-Only Memory
Target NSSB
 E-Mail ———– Electronic Mail
 ENIAC ———– Electronic Numerical Integrator And Compiler
 EPROM ———– Erasable Programmable Read-Only Memory
 EXE ———– Executable
 EDL ———– Electronic Data Interchange
 FAP ———– Fortran Assembly Program
 FAX ———– Far Away Xerox
 FDC ———– Floppy Disk Controller
 FDD ———– Floppy Disk Drive
 FORTRAN ———– Formula Translation
 FS ———– File System
 FTP ———– File Transfer Protocol
 Gb ———– Gigabits
 GB ———– GigaByte
 GIF ———– Graphics Interchange Format
 GPU ———– Graphics Processing Unit
 GSM ———– Global System for Mobile communication
 GUI ———– Graphical User Interface
 HLL ———– High-Level Language
 HDD ———– Dard Disk Drive
 HTML ———– HyperText Markup Language
 HTTP ———– HyperText Transfer Protocol
 IBM ———– International Business Machine
 IMAP ———– Internet Message Access Protocol
 iOS ———– iPhone Operating System
 IP ———– Internet Protocol
 ISDN ———– International Services Digital Network
 ISP ———- Internet Service Provider
 IT ———– Information Technology
 JPEG ———– Joint Photographic Experts Group
 JS ———– Java Scrip
 Kb ———– Kilobit
 KB ———– KiloByte
 KHz ———– KiloHertz
 Kbps ———– Kilobit per second
 LAN ———– Local Area Network
 LCD ———– Liquid Crystal Display
 LED ———– Light Emitting Diode
 LLL ———– Low-Level Language
 Mb ———– Megabit
 MB ———– MegaByte
 MODEM ———– Modulator Demodulator
 MPEG ———– Moving Picture Experts Group
 MMS ———– Multimedia Messaging Service
 MICR ———– Magnetic Ink Character Recognition
 NFS ———– Network File System
 OCR ———– Optical Character Reader
 OMR ———– Optical Mark Reader
Target NSSB
 OS ———– Operating System
 OSI ———- Open Source Interconnection
 OSS ———– Open Source Software
 PAN ———– Personal Area Network
 PC ———– Personal Computer
 PDF ———– Portable Document Format
 PROM ———– Programmable Read-Only Memory
 RAM ———– Random Access Memory
 RIP ———– Routing Information Protocol
 ROM ———– Read-Only Memory
 SQL ———– Structured Query Language
 SIM ———– Subscriber Identification Module
 SRAM ———– Static Random Access Memory
 SNOBOL ———– StriNg Oriented and SymBOlic Language
 TB ———– Tera Bytes
 UI ———– User Interface
 UPS ———– Uninterrupted Power Supply
 URL ———– Uniform Resource Locator
 USB ———– Universal Serial Bus
 VDU ———– Video Display Unit
 VLAN ———– Virtual Local Area Network
 VRAM ———– Video Random Access Memory
 WAN ———– Wide Area Network
 Wi-Fi ———– Wireless Fidelity
 WiMax ———– Worldwide Interoperability for Microwave Access
 WLAN ———– Wireless Local Area Network
 WWW ———– World Wide Web
 WORM ———– Write Once Read Many
 ZIP ———– Zone Information Protocol
 ZB ———– Zeta Byte

Subject 1st 2nd 3rd 4th 5th


generation generation generation generation generation
Period 1940-1956 1956-1963 1964-1971 1971-present present &
beyond
Circuitry Vacuum tube Transistor Integrated Microprocess ULSI (Ultra
chips (IC) or (VLSI) Large Scale
Integration)
technology
Memory 20 KB 128KB 1MB Semiconducto VLSI and ULSI
Capacity r type and
very high
Processing 300 IPS inst. 300 IPS 1MIPS(1 Faster than Very fast
Speed Per sec. million inst. 3rd
Per sec.) generation
Target NSSB
Programming Assembly High level C,C++ C,C++,Java All the Higher
Language Language language level
(FORTRAN, languages,
COBOL, Neural
ALGOL) networks,
Example of UNIVAC, IBM 1401, IBM IBM 360 Pentium Artificial
computers EDVAC 7094, CDC series, series Intelligence,
3600,D 1900 series Multimedia, Robotics
UNIVAC 1108 Stimulation
Target NSSB

You might also like