Computer Top 900 One-Liners
Computer Top 900 One-Liners
Junk e-mail is also called - Spam (Sending irrelevant messages or the same message
to a large number of users over the internet for the purpose of advertisement or
malicious intent is called as spamming)
_ is the process of dividing the disk into tracks and sectors – Formatting
An operating system is the system software that handles the software and hardware
resources and provides services for the computer programs.
Modifier keys - include Alt, Ctrl, Shift and the Windows key
What is the Full Form of INTERNET - 'Internet' is the shortened form of 'INTERnational-
NETwork' which is the interconnected network of all the Web Servers worldwide. It is
often called the 'World Wide Web
Binary digits are known by another name called: - Bits (which utilizes just two symbols,
commonly 0 (zero) and 1. A bit is used to describe each digit.)
The standard floppy disk has the following size: - ”. (The dimensions of the floppy
disk are 8.9 cm in width and 9.3 cm in height)
The term for the processor that executes mathematical and logical operations is- ALU
Which mainframe computer was the first – ENIAC ((Electronic Numerical Integrator and
Computer))
Target NSSB
When an Email is sent it is transferred over the internet from one server to another
using - SMTP.
Simple Mail Transfer Protocol is known as SMTP. To relay outgoing mail between the
sender and the receiver is SMTP network protocol.
Mini computers and micro computers are from which generation of computers - fourth
Ray Tomlinson was the first Engineer who had sent the first Email.
Storage capacity of magnetic disk depends on - disk pack in disk surface, bits per inch of
tracks, tracks per inch of surface
The computer's processor consists of the following parts - Control Unit and ALU
What was the name of the first commercially available microprocessor chip - Intel 4004
Where is RAM located - Mother Board (RAM is located in The central processing unit
(CPU), also called a processor, is located inside the computer case on the motherboard.)
Several computers linked to a server to share programs and storage space - Network
RAM chips are used to - temporary storage for the data in the computer system itself
For storing an initial program in ROM we need something called: - Bootstrap Loader
The box that contains the central electronic components of the computer is the .....
System Unit
The First Mechanical Computer Designed by Charles Babbage was called - Analytical
Engine which resembles today's modern machines between 1833 and 1871.
Which key is used in combination with another key to perform a specific task – Control
Which of the following refers to a small, single-site network – LAN (Local Area Network)
The development of the basic architecture of the computer was done by - John Von
Neumann
Excel requires an operator to indicate that a formula is being entered in a cell, such as:
- start with the equal sign (=).
The Initial Generation of computers was produced between 1946 – 1959. based on
vacuum tubes
The second generation of computers was produced between 1959 and 1965. based on
transistors
Target NSSB
Computers in their fifth generation began to appear about 1980. Based on a ULSI
microprocessor
Read-only memory (ROM) is a type of non-volatile memory that includes flash memory,
ferroelectric memory, and the majority of magnetic computer storage systems
The period of time that a computer spends processing a job is: - Execution Time
Another name for an error is – Bug (debugging must be done if we receive any bug in
the system.)
Seymour Cray unveiled the CRAY-1 in 1976, considered the first supercomputer
In Microsoft Excel, which one of the following tools allows extracting the significance
from a large detailed data set - Pivot Table
In a computer with Windows operating systems, files are stored in locations called –
Directories
In MS-Word, what is the smallest font size generally that we can use to text in Word – 8
In Microsoft PowerPoint, the best way to insert a new slide in a presentation is to use
- Slide Sorter View
In MS Word, Thesaurus tool has made for the Purpose of - Synonyms and Antonyms
words
The virus attacks on the computer can be stopped or prevented with the help of -
Antivirus Software
The term HTTP stands for Hypertext Transfer Protocol. Who has developed this protocol
to transfer information over the internet - Tim Berners Lee
DOS offered a mechanism called Terminate and Stay Resident (TSR) that allowed
programs to continue running in memory
Which of the following displays the name of the user on the computer - Welcome
screen
The type of software that is best suited for managing the layout and design of intricate
documents like newsletters and brochures is - Word processing
Target NSSB
What is the name of the RAM that DOS and applications are allocated to - Conventional
memory
Merge cells option can be applied from - Format Cells dialog box Alignment Tab
Which of the following software applications would be the most appropriate for
performing numerical and statistical calculations - Spread Sheet
The ______ operating system serves as the foundation for the most recent iteration of
the MAC OS. – Unix
The drive storing the files to be duplicated is known as the__ - Source drive
Storage which stores or retains data after power off is called - Non-volatile storage
USB is a plug-and-play portable storage device that uses flash memory and is lightweight
enough to attach to a keychain
Windows 95, Windows 98, and Windows NT are known as what - operating systems
Which code is used in Cheque – MICR stands for Magnetic ink character recognition
In MS Word, you can move and copy text : - Within a word document, Between word
document, Between office application
The secondary storage device is needed to - Store large volumes of data that exceed the
capacity of the main memory.
What is the language used by most of the DBMSs for helping their users to access data -
Query Language
If you need to duplicate the entire disk , which command will you use – Diskcopy
_ Systems use a light beam to scan input data and convert it into electrical signals,
which are sent to the computer for processing - Optical recognition
This case converts first character of first word of selected sentence to capital – sentence
Name the device used to connect computers for communication via telephone lines.. –
MODEM
A serial port can - transfer information both to and from a hard drive
On the basis of memory size & performance, which type of computer is known as "Big
Iron" - Main Frame
Which among the following is the brain of the computer – CPU (Central processing Unit)
Who designed the first electronic computer – ENIAC - J presper Eckert and John W
Mauchly
The process when the computer is switched on and the operating system gets loaded
from hard disk to main memory is called – Booting
A personal computer’s primary memory, commonly known as its main memory, consists
of - Both RAM and ROM
Which computer’s memory contains the system’s Boot sector files – ROM
RAM is volatile, when a device is shut off, its data are gone. It is temporary memory
Where is the buffer between the CPU and main memory located – RAM
Buffers are the disk block representation of the data that is located in the cache
memory.
What is the process of mapping a virtual address of a variable length onto a physical
memory – Segmentation
Target NSSB
By default the top margin in the word document is - 1 inch
The Name box on to the left of formula bar - shows the name of cell address or range
currently working on
When a customer makes an online hotel booking, the data base is update in - Pseudo
real- time
Special set of characters that computer associates with specific user identification is
classified as – password
It run on computer hardware and serve as platform for the others software to run on -
Operating system
The primary purpose of the operating system is - to make the most efficient use of
computer hardware
Which command can be used to create the disk track and sectors – FORMAT
To select one hyperlink after another during a slide presentation, what do you press –
Tab
in the context of animations, what is a trigger - An item on the slide that performs an
action when clicked
How many bits are there in ExASCII and EBCDIC codes respectively – 8, 8
Which of the following device was developed by Jack Kilby & Robert Noyce - IC chip
What term is used to describe software that monitors your online computer activities –
Spyware
The two major components of system software are - The operating system and system
utilities
Target NSSB
The layer links the network support layers and the user support layers –
transport
The layer coordinates the functions required to transmit a bit stream over a
physical medium – physical
The physical, data link, and network layers are the support layers. – network
Which of the following may be necessary for you to do after you install new application
software - Do a warm boot
The power-on self-test ---- Verifies that the computer hardware is working properly
The session, presentation, and application layers are the support layers. – user
In Excel, this is a prerecorded formula that provides a shortcut for complex calculations –
Function
Which of the following is a circuit that issue signals at regular intervals.. – Clock
This printer places an image on a page without physically touching the page. - Non-
impact printer
Which one of the following was world’s first commercial compute – UNIVAC
Which of the following displays the contents of the active cell - Formula bar
The data kept in dynamic RAM must be: - Refreshed periodically dynamic RAM functions
like a capacitor
What kind of ROM is just used for erasing - EPROM (electrically erasable programmable
read-only memory)
Target NSSB
Which form of memory allows for the permanent storage of programs and data once
they have been created – PROM (Programmable Read-Only Memory)
You can group noncontiguous worksheets with - The ctrl key and mouse
National Internet Service Provider (ISP) networks are connected to one another by
private switching network is called - Network Access Points
LAN covers small site areas such as a single building or campus of up to a few km range
GUI Stands for - A Graphical User Interface is a computer interface that allows users to
interact with a device through graphical elements such as pictures and animations
A connection that provides a dedicated link between two devices is called - Point-to-
Point
A topology in which every node has a dedicated point to point link to all nodes (devices)
within the network is called – Mesh
A topology that consists of multiple devices connected by connectors or the main cable is
called – Bus
A communication pathway that sends data from one point to another is called – Link
Which layer of OSI model is responsible for the delivery of individual packets from the
source host to the destination host – Network
Which layer of OSI model is responsible for detection and correction of transmission
errors using error correction method - Data Link
Any physical components of a computer system that we can see and touch is – hardware
The system unit that contains the most vital part of the personal computer is called –
Motherboard
Target NSSB
Motherboard is the main printed circuit board that is also known as main board or system
board
Which of the following is primarily responsible for converting input (data) into
meaningful output (information) - Central Processing Unit
CPU in a computer consists of the control unit, arithmetic logic unit, and memory unit.
ALU and CU together are known as CPU.
Data moves in and out of the CPU through embedded wires called – Bus
Bus is the communication line between CPU, memory, and peripheral devices
The most common buses inside the microcomputer are - Address bus, Data bus, and
Control bus
Which register holds the address of the current instruction being executed - Program
counter
Which register holds the address of a memory location - Memory address register
A uniform interval of CPU time allocated for performing a task is called – real time
Which of the following refers to too much electricity and may cause a voltage surge –
Spike
Language lies between high-level language and machine language - Assembly language
Languages which can easily interact with the hardware are - low level language
Grouping and processing all of a firm's transactions at one time is called– batch
processing
A storage device or medium where the access time is dependent upon the location of the
data is called - Parallel access & Serial access
Which of the following memories can be read directly by the computer processor – main
Memory
What is the difference between a check box and Radio button - In check boxes multiple
options can be selected whereas in radio buttons only single option can be selected
Technique of using fixed words for machine code functions is classified as – mnemonics
When you insert an Excel file into a Word document, the data are - Placed in a word
table
When data changes in multiple lists and all lists are not updated, this causes - data
inconsistency
The technique where digital signals are converted to its analog form for transmission
over an analog facility is called– Modulation
What happens if you press Ctrl + Shift + F8 - It activates the rectangular selection
What is the correct syntax for typing a function into a cell - Equal sign, Function Name,
Matching brackets
Target NSSB
Which of the following keyboard shortcuts is used to view the properties of a selected
object - Alt + Enter
What is the keyboard shortcut for creating a chart from the selected cells - F11
Which of the following device provides surge protection and battery backup power
during a power outage – UPS
Which key is used to indent a paragraph - Tab key is used to move the cursor over to the
right to a pre-set point.
Which keys are also known as toggle keys - Caps lock, Num lock
In Microsoft Word, to alter the page set up, page set up is clicked under - File
menu
In Microsoft Word, contains tools for standard tasks like saving, printing,
cutting, copying, pasting etc - Standard tool bar
(HHDD) is a technology where the conventional disk drive is combined with non-
volatile flash memory, of typically 128 MB or more to cache data during normal use -
Hybrid Hard Disk Drive
Raymond Samuel Tomilson is famous for developing which of the following - E-Mail
In networks, a small message used to pass between one station to another is known as
Token
Computer system which do not not require any storage device – Analog
The web uses the _ to request and serve web pages and programs. - Hyper
Text Markup Language
In the following list of devices, which device is used in datalink layer – Bridge
Two versions of the Internet Protocol (IP) are in use - IP Version 4 & IP Version 6
software are freely available and can be edited and customized by anyone - Open
Source
The command that merges the contents of one file to another is – APPEND
Gutter margin: What is it - Margin that is added to the binding side of the page when
printing
Which of the following options is absent from the MS Word Ruler screen - Center Indent
Which of the following positions can be set in the Gutter position - Left & Top
Target NSSB
F1 It displays help.
The full form of VIRUS will be: - Vital Information Resource Under Seize
The full form of the abbreviation ODBC will be: - Open Database Connectivity,
EBCDIC full form is:- Extended binary coded decimal Interchange code
Microcomputers are small, inexpensive computer for personal use. They are popularly
used at homes for playing games and surfing the Internet
Workstation (WS) is faster than Personal Computer. It is designed for a user or group of
users with better multitasking capability
Data – It is a set of facts, which the computer stores and reads in the form of numbers.
A device driver or hardware driver is a group of files that enable one or more hardware
devices to communicate with the computer's operating system
Zip disks are available in 100 and 250-MB and 750 MB capacities and they are used to
store, share and back up large amounts of data.
Magnetic Memory are - Hard Disk Drive (HDD), Floppy Disk Drive (FDD)
Scanner – It captures images from printed material and converts it into a digital format
that can be stored within the PC
Non-Impact Printers - Non-impact printers print the characters on the paper without
using ribbon. These printers print a complete page at a time
Inkjet Printers - Inkjet printers work by spraying ink on a sheet of paper. The type of ink
used in an inkjet printer is wet.
A plotter is an output device used to produce hard copies of large graphs and designs on
paper, such as construction drawings, architectural plans, and business charts
Target NSSB
Keyboards convert characters to code. – ASCII
Which among the following options specifies this action: Holding the mouse button down
while moving an object of text – Dragging
Daisy-wheel printers cannot print graphics, and in general they are noisy and slow,
printing from 10 to about 75 characters per second
Single User Operating System – This type of operating system supports a single user at
any given time. Single keyboard and Single monitor are used for interaction
Warm Boot - A computer system starts up/reset from a complete powerless state is called
Warm Booting
The feature that opens a window on your desktop where you can browse for file stored
on your computer is called as - File Explorer
Examples of utility programs are antivirus software, backup software, disk defragment,
backup, disk clean etc.
Compiler – It converts the program in a high-level language into low-level language and
reports all the errors of the program along with the line numbers. C, C++ use compilers
COBOL - Common Business Oriented Language is the full form of COBOL. It is used for
business and administrative purposes. It can be read like regular English
PHP - PHP stands for Hypertext Pre-processor. It is a scripting language used for the
development of web applications
Nibble 4 Bits
Byte 8 Bits
KB (Kilobyte) 1024 Bits
MB (Megabyte) 1024 KB
GB (Gigabyte) 1024 MB
TB (Terabyte) 1024 GB
PB (Petabyte) 1024 TB
EB (Exabyte) 1024 PB
Foreign key points to the primary key of another table. It acts as a reference between
tables. It can accept the null and duplicate value
Target NSSB
Which language among these is related to Artificial Intelligence – Prolog
Which of the following application software suite will be best suited for basic data
calculation and analysis - DTP Software
When an Intranet can be accessed by outside users for the purpose of information
exchange then It is known as – Extranet
When a computer is booted, BIOS retrieves its information from - CMOS chip
The principle that Internet service providers should enable access to all content and
applications equally regardless of the source is known as - Net Neutrality
The device used to connect two networks having different architecture and model is –
Gateway
is the file system used by the operating system to identify the physical
locations of files on the hard drive – FAT
A situation when a computer software stops working and encounters an error is known
as – Crash
Target NSSB
A server uses applications software to support its client computers - back-end
A connection from one HTML document to another HTML document is called - Hyper
Link
The records the name and exact location of every file on a disk - file
allocation table
A computer on the network that utilizes the service of server computer is known as –
Client
In respect to display technology what does “F” stands for in TFT – Film
The process of encoding an information in such a way that it cannot be read without
proper authorization is known as _ - Encryption
website for discussion or an informational site published on the world wide web is known
as - Blog
What is the shortcut key for the central alignment of a line or text in MS Office software
- Ctrl+E
is the central server in computer network which lets the concerned user utilise the
storage capacity of the server - File Server
A file server is a central server in a computer network that provides file systems or at
least parts of a file system to connected clients.
is the fastest to read from and write to than the other kinds of storage in a computer
– RAM
A random-access memory device allows data items to be read or written in almost the
same amount of time irrespective of the physical location of data inside the memory
Target NSSB
Which of the following is/are characteristics of Computer – Diligence, Versatility,
Reliability
A computer does not suffer from tiredness and lack of concentration. It is known as
- Diligence
ENIAC stands for Electronic Numerical Integrator and Computer. It was the first
programmable, electronic, general-purpose digital computer. It was Turing-complete and
able to solve a large class of numerical problems through reprogramming.
The thing that eventually terminates a worm virus is a lack of: - Memory or disk space
What is the name of an application program that gathers user information and sends it to
someone through the Internet – Spyware
is the measurement of things such as fingerprints and retinal scans used for security
access – Biometrics
Which of the following is an input device that utilises a light-sensitive detector to select
objects on a display screen - Light pen
In the field of information and communication technology, what is the full form of FDD -
Floppy Disk Drive
Who designed the first analog computer in India - Samarendra Kumar Mitra
Desktop Computers, Laptop Computers, tablets and smartphones are different types of
- Microcomputers
Who among the following pioneered Binary Logic and Arithmetic in Computers
Programming - Claude Shannon
AIX (Advanced Interactive executive) is “an open operating system from IBM that is
based on a version of UNIX. AIX/ESA was designed for IBM's System/390 or large server
hardware platform
Pivot Table’ is a feature of Microsoft Excel. A pivot table is a data summarization tool
that is used in the context of data processing
Which of the following is a lever that can be moved in several directions to control the
movement of an image on a computer monitor or similar display screen – Joystick
Which of the following is a type of memory and is similar to RAM? It is used by computers
to move data between the RAM and the CPU – Cache
Cache Memory is a very high-speed memory and is used to speed up and synchronize
with high-speed CPU
was a web browser developed by the National Centre for Supercomputing Application
(NCSA) – Mosaic
Target NSSB
Which of the following is used to receive and send computer files over telephone lines –
Modem
The first barcode system was developed by: - Norman Joseph Woodland
Who among the following invented the Computer language, COBOL - Grace Murray
Hopper
Which one is the default „word Processor‟ for Microsoft Windows – MS Word
Which mode loads minimal set of drivers when starting Windows – safe mode
Which key combination is used to minimize all open windows and displays in the screen
– windows key + D
How many users can access a share folder simultaneously from a Windows XP machine –
10
Which language was used to program Second Generation computers - Assembly language
Instructions and data can be stored in the memory of Computer for automatically
directing the flow of operations. It is called _ concept. - Stored program
Which of the following was a small experimental machine based on Neumann’s stored
program concept - Manchester Mark I
The word length of Micro computers lies in the range between - 8 and 32 bits
Target NSSB
A terminal does not process or store data – dumb
Graphical terminals are divided into two types. They are - vector mode and raster mode
Which of the following program is the closest to the machine code – Assembler
Which of the following process is used by the computer to ensure that all the devices
connect to it is in working condition – Booting
These devices provide a means of communication between a computer and outer world –
I/O
Machine Language is written in binary codes only. It can be easily understood by the
computer and is very difficult for us to understand
Which of the following language does the computer understand - Computer understands
only Binary Language which is written in the form of 0s & 1s
When you are working on documentation on PC, the document temporarily stored in
flash memory.
The rectangular area of the screen that displays a program, data, and or information is a
- window
Target NSSB
Digital computer: A device that manipulates discrete data and performs arithmetic and
logic operations on these data
Most manufacturers setup their BIOS to load into upper memory during the boot process
Device drivers loaded in the config.sys file is loaded into the following memory area:
Conventional memory
ARPANET was the world's first fully operational packet switching computer network
A MAN (metropolitan area network) is a larger network that usually spans several
buildings in the same city or town
World Wide Web - WWW is one of the services interconnected over the internet. It is a
collection of all information, resources, pictures, sounds, multimedia on the internet
which is formatted in HTML and accessed through HTTP
IPv6 - 128 bits hexadecimal address IPv6 does not use broadcast messages
Hub: It works at the Physical layer. It just acts like a connector of several computers i.e.
simply connects all the devices on its ports together.
Web Server – A web server stores, processes and delivers web pages to the users.
The intercommunication between users and servers is done using Hypertext Transfer
Protocol (HTTP).
Switch: It works at the Data Link Layer. It is used for dividing a network into segments
called subnets. It provides filtering of data packets and prevents network traffic also
Target NSSB
Web Page – It is a document was written in HTML that can be accessed through the
internet by using the web browser. It is identified by Uniform Resource Locator
A LAN (local area network) is a group of computers and network devices connected
together, usually within the same building.
Data Communication deals with the transmission of digital data from one device to
another
Web Browser - It is a software application that allows users to access the websites
Internet Explorer, Google Chrome, Opera, Mozilla Firefox, UC Browser, Apple Safari are
some examples of a web browser
Simplex: This, communication is unidirectional i.e. one of the two devices can transmit
the data and the other can only receive the data.
Radio broadcasting, television broadcasting etc. are the example of the Simplex
Communication
Internet Host – Host is a computer or application which is used to transfer the data on
the internet Each host has a unique IP address called Hostname
Internet Protocol Address (IP Address) – It is a logical numeric address that is used to
identify the host over the internet network.
Half duplex: This communication is bidirectional. Either of the devices can act as
transmitter or receiver but only one device can transmit the data at one time
Repeater: It operates at the Physical Layer. It is used to amplify a signal that has lost its
original strength so as to enable them to travel long distances
Router: It works at the Network Layer and is used to connect different networks that
have different architectures and protocols
Router can be used to sends the data packets to desired destination by choosing the best
path available thus reducing network traffic.
Target NSSB
Gateway: can be used to connect two different networks having different architectures,
environment and even models
Uniform Resource Locator (URL) - A uniform resource locator (URL) is used to locate the
address of a resource and protocol.
_ is an artificial neural network with multiple hidden layers between the input
and output layers - Deep neural network
Which registers can interact with secondary memory - Memory Address Register(MAR)
The most frequently used instructions of a computer program are likely to be fetched
from _ Cache
The primary aim of computer process is to convert the data into – information
ALU and Control Unit have special purpose locations called – Registers
The communication line between CPU memory and Peripherals is called a - Bus
The basic unit of a worksheet into which you enter data in Excel is called – Cell
_ is the file system used by the operating system to identify the physical
locations of files on the hard drive – FAT
Which input device is used to read information on a credit card - Magnetic Stripe reader
Target NSSB
Which input device is used for inserting pin numbers for credit cards - Numeric pad
Which is an interactive device that facilitates touch sensation and fine-motion control in
Robotics and Virtual reality - Data Glove
Which device typically attachable to computer keyboard that allows a blind people to
read - Braille display
Which is an escape code language used to send commands to the printer for printing
documents - PCL (Printer Command Language)
The term refers to data storage systems that make it possible for a computer
or electronic device to store and retrieve data - storage technology
Small application programs that run on a Web page and provide animation are known as
_ - flash
A Proxy server is used for - To process client requests for web pages
The operating system that is self contained in a device and resident in the ROM is
_- Embedded Operating System
What is the correct way to refer the cell A10 on sheet3 from sheet1 - sheet3!A10
_ are specially designed computer chips that reside inside other devices, such
as your car or your electronic thermostat - Embedded computers
The F7 key is commonly used in Microsoft programs such as Microsoft Word, Outlook,
etc. for - checking spellings and grammar
Target NSSB
In which year did the JavaScript Programming language come into existence – 1995
A graphics tablet is a computer input device that enables a user to hand-draw images,
animations and graphics, with a special pen like stylus, similar to the way a person
draws images with a pencil and paper
What is the full form of BASIC in context of the BASIC computer language - Beginner’s
All-purpose Symbolic Instruction Cod
BASIC It is a computer programming language that was developed to provide a way for
students to write simple computer programs.
Who has created LISP, the Programming Language for Artificial Intelligence - John
McCarthy
Which view in PowerPoint can be used to enter speaker comments - Notes page view
PowerPoint can display data from which of the following add-in software of MS-Office -
Organization chart
You can create and edit organization charts directly within PowerPoint using the
"SmartArt" feature
The best way to insert a new slide in a presentation is to use the - Slide sorter view
A word processor is a software application designed for creating, editing, and formatting
text-based documents
In order to save a Word document as a web page you need to - Save as HTML
Which of the following are valid Min. & Max. zoom sizes in MS Office - 10, 500
Target NSSB
The quickest and easiest way in Word, to locate a particular word or phrase in a
document is to use the command – Find
Animation schemes are built-in animation effects and transitions that can be applied to
individual objects or entire slides in a presentation
We can replace a font on all slides with another font using the …........ option - Format,
Replace Fonts
Which of the following displays the buttons for changing text style, alignment and size -
Formatting toolbar
Why are headers and footers used in document - To allow page headers and footers to
appear on document when it is printed
The word processing task associated with changing the appearance of documents is -
Formatting
In order to save an existing document with a different name you need to - use the Save
as command
The button on the Quick Access Tollbar allows you to cancel your recent
commands or actions – Undo
The "Undo" feature helps you to quickly correct mistakes or revert changes in your
document.
Editing a document consists of reading through the document you've created, then -
Correcting your errors
The boxes that are displayed to indicate that the text, pictures or objects are placed in
it is called – Placeholder
What is the minimum number of rows and columns that a word table can have - 1 row
and 1 column
Text and graphics that have been cut or copied are stored in an area called the –
Clipboard
Target NSSB
The blinking symbol on the computer screen is called the – cursor
Malware, short for malicious software, is any software used to disrupt computer
operation, gather sensitive information, or gain access to private computer systems
Antivirus Software is used to scan the hard disk to remove the virus from them. Some of
the famous anti – viruses available are Avast, Norton, Avira, Kaspersky, AVG, etc.
CC (Carbon Copy) in e – mail indicates those who are to receive a copy of a message
addressed primarily to another
BCC (blind carbon copy) field is available for hidden notification; recipients listed in the
BCC field receive a copy of the message, but are not shown on any other recipient's
copy (including other BCC recipients)
Uploading refers to the sending of data from a local system to a remote system such as a
server or another client
Super Key - It is a set of one or more attributes whose values uniquely determine each
entity in the database table. It is a subset of a candidate key
Foreign Key - Foreign key points to the primary key of another table. It acts as a
reference between tables. It can accept the null and duplicate value
Composite Key - It is a combination of more than one column in the table that can be
used to uniquely identify each record. It is also known as a Compound key
Paste Special - Paste Special is used to paste an item from the clipboard with custom
formatting.
Cell Address – The location of a cell is known as Cell Address. Example: C10 (Column:
Row)
Autofill – Autofill fills the values in the cell according to a given pattern. (i.e. Months &
Days, Even Numbers, Odd Numbers, tens, etc) This is done through the Fill Handle.
Master Slide – A slide that controls the properties such as theme, layout, background,
colour, fonts, and positioning of all other slides in a presentation
Slides Pane – Slide Pane displays the slides thumbnails. It allows the user to view and
edit the slides
Task Pane – It allows to access commands like getting started, PowerPoint help, slide,
new presentation etc related to a specific task.
Ethernet - Ethernet is the most widely used LAN technology that defines wiring and
signalling standards for the physical layer of TCP/IP. Ethernet was standardized as IEEE
802.3
Fiber distributed data interface (FDDI) - FDDI is an optical data communication standard
used for long distance networks provides communication with fiber optic lines. This
protocol is based on the token ring protocol
Transport Layer – It is like as transport layer in the OSI model. Two end-to-end transport
protocols are used. Transmission Control Protocol (TCP) and Use Datagram Protocol
(UDP).
Application Layer – It contains high-level protocols. TELNET, FTP, SMTP, DNS, HTTP,
NNTP, DHCP are used.
Internet Host – Host is a computer or application which is used to transfer the data on
the internet Each host has a unique IP address called Hostname
Domain names are used to identify one or more IP addresses domain name serves as an
address which is used to access the website. It can be universally understood by Web
servers and online organizations
Which unit is a combinational digital electronic circuit that performs arithmetic and
bitwise operations on integer binary numbers - ALU
Which button is called as middle button used as third mouse button by pressing on it. -
scroll wheel
Which bus connects all the internal components of a computer such as CPU and memory
to the main board(motherboard) - Internal Bus
The Command to access the memory or the I/O device is carried by Control Bus
A bus that transfer data from one component to another or between computers is called
- Data Bus
Programming that actually controls the path of signals or data within computer is
called - Micro Programming
The register which holds the address of the location to or from which data are to be
transferred is known as - Memory Address Register
The circuit used to store one bit of data is known as Flip Flop
The control unit controls other units by generating control and Timing signals
Ctrl + Left arrow This key used to move one word to the left at a time.
Ctrl + Right arrow This is used for move one word to the right at a time.
Windows key + L Lock the computer, requiring password entry to access again.
Shift + Home Highlight from the current position to the beginning of the line.
Shift + End Highlight from the current position to the end of the line.
Win + Z This display the commands used in the current open window.
Win + Right Arrow It maximizes the window to the right side of the screen.
Shift + End It highlight from the current position to the end of the line.