Basic Computer Awareness 1.ENIAC was built by John Presper Eckert and John Mauchly. 2.ENIAC stands for Electronic Numeral Integrator and Computer. 3.Current generation of computers is known as Fifth generation. 4. First commercially available computers were known as UNIVAC. 5. UNIVAC was designed by IBM. 6. Large scale Integration (LSI) was introduced in which generation? -Fourth generation 7. Networking age lies in which generation? Fifth generation 8. IBM was previously known as Tabulating and recording company 9. In which year IBM changed its name? 1924 10. Who is the major market holder of computers? IBM format 11. IBM created first floppy disc in 1967. 12. Computer is a machine, which performs tasks such as Mathematical calculations, Electronics communication, Image processing etc. 13. A computer is controlled by set of instructions called programs. 14. Important feature/fetures of a computer is/are Reliability, Accuracy, Speed. 15. What is basic flow of data in computers? Input-processing-output 16.High speed computers have lead to many scientific projects which was previously impossible? - Weather forecasting 17 The ability to get answers fast enough so that one has time to take decisions on them, for example fight reservation, is an example of Real-time processing 18. Computers can perform operations on: Analog data, Digital data, Both 19. Computer is electronic equipment and it works on: Electrical pulses 20.Computer can not perform the following operations: Thinking, Object distingwishing in real environment , Imagination etc. 21. In recent times digital signal processing has obtained an important place in the field of computing It is used for a) Audio processing b) Image processing. 22. Poorly designed systems affect the Accuracy of a computer. 23. Computer seems capable of performing any task, provided that the: Task can be reduced to series of logical steps. 24. Which basic operation is actually performed by a computer? a. It transfers data internally with in computer b. It performs basic arithmetic operations and it performs operations on comparisions. 25. A computer exchanges information with outside world via Input output devices 26. Computers have: Limited ability.(no thinking ability) 27. If a company has got huge number of clients? Use computers to manage information about clients. 28. When a computer is provided with correct database, it can perform operations on database to get desired results, store the database and can be used for retrival and can be used for base of other applications. 29. In order to process the image/picture, for example increasing the brightness, which will be the efficient way to do it? Make use of a computer. 30. Nuclear data can be used for simulating nuclear explosions in super computers. This lie under the category of data processing. 31. 20th century is often called: Computer age 32. Digital computers operates on instructions provided in the form of electrical pulses denoted by 1 and 0. 33. Micro processors are widely used in the field of? Engineering, control systems and domestic machines. 34. Performing arithmetical operations or logical operations on data in order to convert them in to useful data is known as: processing 35. The process of saving data and instructions so that they are available for later use or processing is called? storing 36. The process of producing useful information or results for the user such as printed reports or visual display is called: outputting 37. Directing the manner and sequences in which all the operations are performed is called : controlling 38. The basic organization of the computer: remains the same for all system models 39. Which of the following units link external environment with the computer system? Input unit 40.Inputs received from all the input devices are transformed in to______, that the primary memory of the computer is designed to accept: Binary coded decimals. 41. Which of the following units links the computer system to the external world? output unit 42. The task of input interface is to : convert input data into machine readable form 43. The job of output interface is to: convert processed data into human readable form 44. The programs that deal with low-level machine functions that are essentially substitute for additional hardware are called: micro programs 45. In binary system numbers are represented by sequence of : 0 and 1. 46. The basic unit of memory in a computer is called: bit 47. One byte is made of: 8 bits 48. The time taken by the CPU to read or write a bit to memory is called? accesstime 49. Virus is a network______ issue? - security 50. ICR,OMR, OCR falls in the category of : Character recognition. 51. Give the expansion of of ICR: Intelligent Character Recognitio 52. OCR: Optical Character Recognition 53.OMR: Optical Mark Reder 54. OMR technology detects absence or presence of a mark, but not the shape of the mark. 55. Data protection from natural disaster such as network is network_____issue. reliability 56. Give the expansion of IT: Information Technology 57. What do you mean by the term IT? A system in which data can be processed and communicated between the various electronics equipments. 58. IT has removed geographical limitations for communications: true 59. Technology has drastically changed the way of: communication and business and research 60. e-mail: electronic mail 61. Where will you find all programs installed on a system? Start → All programs 62. Internet banking is done over : Internet 63.Which is the cheapest means of communication for people living in different countries? email 64. People can purchase items online with the help of: debit card and credit card (both). 65. Which software is used to create presentations? Microsoft PowerPoint 66.Which technique used now a days for producing micro chips? - small scale Integration 67.keyboard- input device 68.printer- output device 69.The process of entering a data and instructions in a computer system is called: inputting 70. Which software is used for creating tables with data and doing calculations on it? Microsoft Excel 71.All the calculations are performed and all the comparisons are made in ------- of computer.control unit. 72. Command to save a Microsoft Word document is CTRL + S 73.Intermediate results generated in the ALU are temporarily transferred back to----------until needed at a later time.- secondary storage unit 74. Which command is used to permanently delete a file or folder? Shift + Delete 75. Files are stored inside folders 76.ROM- Read only memory 77. Where will you find deleted files and folders? Recycle bin 78.Control unit, ALU and Registers are the parts of CPU. 79.______manages and coordinates entire computer system- control unit. 80.The control unit and ALU of a computer are jointly known as central processing unit. 81.In a computer all the calculations and comparisons are made inside the - central processing unit. 82. The primary storage is usally referred to as Random Access Memory. 83. RAM can : randomly select and use any location of memory to directly store and take back data and instructions. 84. The information from RAM can be: read and write 85.voice recognition system - input device 86. plotter is a : output device 87. Light pen VDT is an input device 88. Graphic VDT is capable of displaying? - graphics 89.Alpha numeric VDT is used to enter and retrieve only : - letters , special characters and numbers. 90. Non-volatile memory- It is not washed away even if power supply is down. 91.VDT- video Display Terminal 92. The most commonly used line printers is? - drum printer, chain printer 93.Page printers are Non impact printers 94. Line printers - impact printers 95. Non impact printers such as inkjet printers : cannot produce multiple copies of file in a single printing. 96. Inkjet printers use a special type of ink having high content of : Iron 97.Inkjet printers are : non impact printers 98.Daisy wheel printers are : Impact printers 99.Floppy disks is typically _____inches in diameter - 3.5 100. Chracter printer prints : one character at a time 101.The speed of letter quality printers normally range from 10-50 characters per second 102. The speed of dot matrix printers normally range from : 40-250 characters per second. 103. An example of a character printer is : Letter quality printer, Dot matrix printer and inkjet printer 104.Letter quality printers use a print wheel front known as a - daisy wheel 105. Which program you will use to write business letter? Microsoft Word 106. Impact printers : work like common type writer by hitting the typeface against paper and inked ribbon. 107. Computer memory is measured in Mega Bytes 108.Diskettes are most popular, inexpensive storage medium used in - micro computers 109. The capacity of a single -sided-single-density 5.25 inch diskette is a little over : 100 kilo bytes 110. The plastic of floppy disk is coated with : Magnetic oxide 111. Floppy disk is made of :flexible plastic 112. GUI stands for Graphical User Interface 113. The default extension of Microsoft Word and Microsoft Excel files are .docx,.xlsx 114. Floppy drive is a : secondary storage device 115. Floppy disks were introduced in : 1972 116. Which of the following is not an operating system? a) Windows b) Java c) Linux d) Solaris Answer – b 117. An operating system is said to be multi user if More than one users can work simultaneously 118. Floppy disks was first introduced by : IBM 119. Tape cassettes have a data transfer rate of : 1000 bytes per second 120. Tape cassettes and cartridges have relatively : Low data transfer rate 121.The changeable tape cassette used in the familiar home recorder is used for recording : digital data 122. Firewall is used forprotecting computers from virus 123. PROM (Programmable read only memory) : is non volatile 124. What is eCommerce? buying and selling takes place over Internet 125.Magnetic tape reels are suitable for use with : both large and medium size computers. 126. EDI stands for- Electronic data interchange 127. The information from ROM can be - read only 128. ____ provides space for storing data and instructions, space for intermediate results and laso space for final results? - storage unit 129. PROM are programmed to record information using a special facility known as a Prom Programmer. 130. ___chip is used to erase information and to reprogram it to store new information using a special pro-programmer facility. - EPROM 131.Database - a collection of records. 132. The basic unit of a worksheet into which you enter data in Excel is - cell 133. Who is the largest producer of processors in computer market: Intel 134. UNIX, Windows, Linux, OS/2 are all : Operating systems. 135. Microsoft excel sheets are known as- worksheet 136. The name of Indian super computer is : PARAM 137. Microsoft office consists of - Word, Excel, PowerPoint 138. CRAY is name of a : Supercomputer developed by America. 138. In banks and various other organization back of the computer data is taken on a periodic basis because: computer virus may damage the data and computer might breakdown. 139. Which one is the ISP in India : VSNL 140. ISP : Internet Service Provider 141. FoxPro : is a database management software 142. Compiler is used for : Converting high level language to machine language. 143. BASIC : Beginners All Purpose symbolic Instruction Code. 144. MS power point, Ms- excel, Ms- word : are Applications softwares. 145. MS windows is a System software. 146. McAFee software is used to delete files. 147. Downloading a file from a trustworthy friend is always safe : False 148. Anti virus: is a software that detects computer virus and software that disinfect the computer 149.computer virus is a program. 150. Computer virus in one computer affects another computer by : network connectivity, floppy disk and CD.(All) 151. Trojan horse is a virus 152. Who is a hacker : someone who enters into the computer without authorization. 153. Weather forecasting and nuclear simulations can be performed by a : super computer 154. DVD size compared to a CD is : same 155.Many computers connected to single computer falls in the category of : LAN 156. Touch screen of a computer is a : input / output device 157. MODEM : Modulator/ Demodulator 158. C/C++ : High level Languages 159. English : Low level language 160. Encryption is used in computers to : protect data from unauthorized access 161.Password : Secrets word known to authorized personal only. 162. Firewall : is used to a) stopping unauthorized access b) making network more secure to hacking attempts c) filtering the data that is going out of the network and coming in the network. 163. The smallest element that a computer monitor can display is known as : pixel 164. Fibre optic cables which method to transfer data? : Light waves 165.The voice recognition system consists of a microphone or a telephone that converts human speech in to: electrical signals 166. Most voice recognition systems are : speaker dependent 167. Internal memory of computer is made of____: electronic circuits 168.Read only memory is used to store basic set of instructions called : Basic Input Output System (BIOS) 169. External memory can be : magnetic memory, optical memory, magneto optical memory 170.Magnetic storage devices uses: material and mechanism similar to that of audio tapes. 171. An optical storage device uses: : use laser to store and retrieve information from plastic disk. 172. MACKENZIE publishing, with head quarters in London and branch offices in Asia, Europe and the US are probably connected by a: WAN 173. IT has made which of the following easier? All the above 174.Internet uses which application: WWW (World Wide Web) 175. Information is transmitted in internet in small units of data called : packets 176. Information on a network can be protected by : Firewall 177. I(n India the current satellite system used for Internet/ phones is : INSAT series 178. Text is collection of : Alphabets, numerals, special characters 179. Images are data in form of : pictures, photographs, hand drawing etc. 180.IP : Internet Protocol 181. Short cut to make a window the active window on the desktop : Alt+tab 182. A copy of important data is called : Back up 183. Which term is used to specify the series of steps by which a computer locates and loads the operating system once the power is turned on? : Booting 184. Large files are compressed using a program called ? WinZip. 185. In India Internet back bone provided by : VSNL 186. In an isolated office where there is no internet connection is required which connection is suitable : LAN 187. Network in a simplest term is a : a communication part between two or more computers 188. LCD : Liquid Crystal Display 189. GUI : Graphical User Interface 190. Computer Bus is used for : Transmission of data from one part to another 191.Scanner : input device 192. A group of 8 bits in a computer : byte 193. In computers 1 KB (kilo bytes) is equivalent to : 1024 bytes 194. A floppy disc can store up to maximum of : 1.44 MB 195. MAN : Metropolitan Area Network 196. WAP : Wireless Application Protocol 197.The computer size was very large in : first generation 198. All processing of computers is done in : CPU 199. The word “Computer” has been derived from : Latin language. 200. Charles Babbage : The father of computer 201. Data are raw facts from which information is derived. 202.IC chips are developed using : Silicon 203.Integrated chips are developed by : JS kilbi 204. The digital computer is worked on the theory of : calculation 205. Micro is television size computer. 206. Abacus was developed in : china 207. In which generation was microprocessor introduced : Fourth 208. Process to verify user name and password is known as Authentication 209. In which generation did multiprogramming start? - third generation 210. Which type of computer could be found in a digital watch? : embedded 211. First computer was programmed using : machine language 212. Digital computer use a binary system to encode data and programs. 213. The number system used by modern computers is Binary 214.A mainframe is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users. 215.Input/ Output devices are also called peripheral devices. 216. The base of Hexadecimal and Octal number system is 16,8 217. Shift key is used in combination with other keys, so this is also called combination key. 218. Enter key is also called return key. 219.RAM- temporary memory 220. Turning the num Lock key off will enable the keys other functions such as using the keypad as an arrow pad. 221. Alt, Ctrl and Shift keys are called as Modifier keys.An input/output device at which data enters or leaves a computer system is : Terminal 222. Windows operating system is - multi tasking , multi user 223. COM : Computer Output Microfilm) 224. Dumb terminal : is used only for data entry and storage and never for processing. 225. PDA : Personal Digital Assistants 226. Which one of the below is used to browse internet? Firefox 227. Spacebar is used to enter blank spaces in text. 228. HTTP stands for Hyper Text Transfer Protocol 229. FTP stands for File Transfer Protocol 230. 23 will be written in binary as- 10111 231. You can use the Tab key to indent a paragraph 232. A scanner scans : both pictures and text. 233. The input device to be used to get a printed diagram into a computer is the : scanner 234. These terminals (also called as cash registers) are often connected to complex inventory and sales computer systems. : POS (point-of-sale) 235. USB : Universal Serial Bus 236. Which command is used to print a document Ctrl + P 237. Dot matrix printer is bi-directional 238.A pixel is a picture element or dot on a screen 239. Plotter: is used to draw maps from stored data having high quality color graphics. 240. Resolution determines the clarity of computer. 241. How many bits make a nibble?- 4 242. How many bytes make a half word ? - 4 243. How many bytes make a full word? - 8 244. VGA : Visual Graphics Adapter 245. Laser printer belong to page printer 246.The display size of a monitor is measured : diagonally 247. How many bits make a byte? - 8 248. Using output device one can : view or print data. 249. Any data or instruction entered into the memory of a computer is considered as storage. 250. Which is valid Internet address protocol? IPV6 251. The process to copy the software in hard disk from secondary storage media is called : escalation 252. Main memory of computer is : Internal Hard disks drives are considered ______storage: non-volatile. 253. Flash is : hardware 254. Ram types: S-RAM, D-RAM, P-RAM etc. 255. Internal storage is primary storage. 256. A connection from one HTML document to another HTML document is called : Hyperlink 257.It is approximately a million bytes : Gigabyte 258. Print Queue is the list of print jobs waiting to be sent to a particular printer. 259. Which command can be used to recreate the disks tracks and sectors? : FORMAT 260. which of the following memories below is often used in a typical computer operation? : HDD 261. which of the following is a standard code used to exchange information among data processing and communication system? ASCII 262. Print Spooling is a process of sending documents to a storage where they are temporarily stored and remain there until printer prints them. 263. Grammatical errors are shown in Green. 264. Spell check is under which menu : Tool 265. Fiber optic is most resistant to electrical and noise interference. 266. You can delete one character using this key : backspace. 267. DEL command is used to delete files. 268. A goal of data mining includes which of the following : To explain some observed event or condition. 269. Servers are computers that provide resources to other computers connected to a : Network 270. These type of viruses are often transmitted by a floppy disk left in the floppy drive? : Boot sector 271. It controls the way in which the computer system functions and provides a way by which users can interact with the computer? : Operating system. 272. Ethernet is a family of computer networking technologies for local area network. 273. Anything that is typed in a worksheet appears : in both active cell and formula bar 274. To detect, locate and remove errors in programmes and/or malfunctions in equipment is : Debug. 275. The conducting material that was coated inside the screenof CRT is : aquadag. 276. IC are classified on the basis of: number of transistors. 277. A repair for a known software bug, usually available at no charge on the Internet, is called : patch 278. MTBF : Mean Time Before Failure 279. Save as dialog can be used : to save file by some alternative name. 280. Control unit of a digital computer is often called the : ICs 281. which file is the batch file that is read while booting a computer? : Autoexec.bat 282. Various applications and documents are represented on the Windows desktop by : icons 283. A unit of measures equal to approximately 1 billion bytes is called a : 1 GB 284. Instructions to computer are given through : input unit 285. To select several cells or ranges that are not touching each other, what would you do while selecting? : Hold down the Ctrl key 286. Compiler : converts all the statements in a program in a single batch and the resulting collection of instructions is placed in a new file. 287. The term ‘briefcase’ is used for a : window that is currently open 288. Macro media is the name of a company related with : software 289. In its default setting, an Excel workbook is made up of sheets and the default number is : 3 290. A storage device used to compensate for the difference in rates of flow of data from one device to another is : buffer 291. Powerful key that lets you exit a program when pushed : escape key 292.what is the media standard for most local network installations? CAT 5 293. The intersection of a row and column is called : a cell 294. You can add picture in your document from which menu? : Insert menu 295. which one of the following types of coax cabling has two outer conductors or shields, and offers greater resistance and decreased attention? : Dual-shielded coax 296. E-commerce refers to commercial activities carried out in an electronic network. 297.Wi max is related to which one of the following? Communication technology 298. Which one of the following bands is used in the transmission of signals in the Direct-toHome (DTH) television broadcasting? :Ku-band 299. which one of the following invented the television video games? : Ralph H Baer 300. Encryption in cyber world means : algorithmic alteration of passwords into scrabbled data to present access 301. Modems are devices used to transmit data over telecommunications lines. 302. References to each file of a disk are stored in a - root allocation table 303. Nanoscience is the study of molecules and structures whose size ranges from 1 to 100 nanometers. 304. Device drivers are that : short, special purpose programs 305. Which option will we use to give heading in the form? : Label 306. The process of preparing a floppy diskette for use is called : formatting 307. CPU gets the address of next instruction to be processed from the : index register 308. A directory within a directory is called : sub directory 309. Network components are connected to the same computer in the bus topology. 310. Viruses are attempts by individuals to obtain confidential information from you by falsifying their identity. 311. The physical components of a computer system : Hardware 312. The pop-up helper enables you to simultaneously keep multiple web pages open in one browser window. 313. The Menu bar of software contains lists of commands and option. 314. EDI : Electronic Data Interchange 315. A temporary storage area for information got by cutting and pasting is : clip board 316. A small arrow of blinking symbol on desktop is called a : cursor 317. To erase any part of a program we use delete command. 318. Windows 98 was developed in : 1998 319. Menus are lists of commands that appear on the screen. 320. Files are organized by storing them in folders. 321. To move down a page in a document : scroll option is used. 322. Easy to use : user friendly 323. To ‘maximise’ a window means to : expand it to fir the desktop 324. Date and time are available on the desktop at : taskbar 325. A shortcut is an icon on the desktop that provides a user with immediate access to a program or file. 326. Text and graphics that have been cut or copied are stored in an area called the : clip board 327. You can keep your personal files/folders in : my documents 328. Background of screen is known as : desktop 329. At which button is help menu available : Start 330. Windows explorer : A file manager 331. The taskbar is located : at the bottom of the screen. 332. Which extension is given to Word document by default : .doc 333. It is a group of worksheets : workbook 334. A chart placed in a worksheet is called : embedded chart 335. A database that contains tables linked by common fields is called a : relational database 336. The letter and number of the intersecting column and row is the : cell address 337. which is the short key to invoke the spell checker in MS Access? : F7 338. Algorithms are necessary : to find out a definite solution to computational problem 339. Logical errors : is the set of rules that give meaning to a statement. 340. Testing is done to : find out whether the program fulfills all the conditions correctly 341. GIGO : Garbage In Garbage Out 342. A computer programmer : does all the thinking for a computer 343. The person who writes instructions that tell that computer how to handle input information is called? : computer programmer 344. The flowchart is usually difficult to understand. 345. Portability : Ability of a program to see across different platforms without much changes. 346.It is a graphics method for describing the logic of decisions : Decision tables. 347. An algorithm that calls itself directly or indirectly is known as : recursion 348. Transmission of computerized data from one location to another is called : data communication 349. What is the commonly used unit for measuring the speed of modem? : bits per second 350. Networks are useful because : each user of the network can access files more easily. 351. URL : Uniform Resorce Locator : The address of a document or ‘page’ on the World Wide Web. 352. An webmail interface allows you to access your email from anywhere. 353. In a ring topology the computer in possession of the token can transmit data. 354. Downloading a document means the files is transferred from another computer to your computer. 355. Video conferencing is used for : Live conversation 356. An electronic meeting is known as : tele-conferencing 357. File server allows LAN users to share computer programs and data. 358. A package which can be downloaded via the Internet for testing purpose before buying is called : beta software 359. Servers are those computers, which provide resources to other computers connected by : network 360. A chat is : a type of conversation that takes place on a computer 361.A link is the term used when a search engine returns a web page that matches the search criteria. 362. Large collection of files are called : database 363. A form defined where data is placed on the screen. 364. An audit trail : is the recorded history of operations performed on a file. 365. In the DBMS approach, application programs perform the : processing functions 366. A transparent DBMS keeps its physical structure hidden from users 367. DDL : Data Definition Language 368.DML : Data Manipulation Language 369. The function of a database is : to collect and orgnise input data. 370. A file produced by a spreadsheet : is generally stored on disk in an ASCII text format 371. It refers to the technology that supports the transport of data between the mobile computing device and the main computer system : Wireless 372. It is a flexible data and communication using radio frequency : wireless LAN 373. The information is translated into a WML so it is viewable on the cell phone screen. 374. The Website responds to the request and forwards the information back through the link server. 375. One of the leading protocols is called : WAP 376. Data mining has become a cornerstone of CRMs. 377. Voice and positional commerce are becoming value-added features to m-commerce. 378. Mobile telephone was introduced in the year : 1946 379. AM : Amplitude Modulation 380. The first wireline telephone systm was introduced in the year : 1877 381. A walkie-talkie is an example of a Half Duplex System which uses ‘push to talk’ and ‘releae to listen’ type of switches. 382. The first cellular systems were :Analog. 383. A gateway is a node used to interconnect two networks. 384.Modulation is the process of sending a signal by changing the characteristics of a carrier frequency. 385.It was the first fully digital system utilizing the 900 MHz frequency band. 386. Information : is the knowledge derived from study, experience or instruction. 387. E-commerce refers to commercial activities carried out in an electronic network. 388. The most important or powerful computer in a typical network - Network server 389.Two broad categories of software are : System software and Application software 390. 3G Technologies - UMTS, CDMA, HSPA, EVDO, GPRS is not a 3G technology. 391.computers manipulate data in many ways and this manipulation is called : processing 392. To make the number pad act as directional arrows you press the num lock key. 393. Utility : handles most system functions that aren’t handled directly by the operating system. 394.Computer forensics is the science revolving around the use of nanostructures to build devices on an extremely small scale. 395.A person can open a bank account sitting in his home and can easily maintain the account as well via - net banking 396. The part of CPU which coordinates the activities of all other components of the computer is : motherboard 397.The contents of storage are lost when the computer turns off. 398. HP launches IT executive score card software. 399.Technology no longer protected by copyright, available to everyone is considered to be : proprietary 400. Ubiquitous computing paradigm use in which network - 5G 401. Assembly language is a low-level programming language. 402. Secondary memory is characterized by low cost per bit stored. 403. Acknowledgement from a computer that a packet of data has been received and verified is known as - ACK 404. A sequence of precise and unambiguous instructions for solving a problem in a finite number of operations is referred as - Algorithm 405. ALGOL is the High-level language 406.To identification particular location in storage area one have a - Address 407. A local storage register in the CPU which contains the address of the next instruction to be executed is referred as - Address register 408. A character set that contains letters, digits, and other special characters is refered as Alphanumeric 409. A standard intended to connect relatively low-speed devices such as keyboards , mice, modems and printers is - Access bus 410. The concept that one can disconnect peripherals and plug them in without letting computer shut down or reconfigure the system is referred as - Hot plugging 411. The time interval between the instant at which data is called from a storage device and the instant delivery begins in - Access time 412. A form of access to a computer or network with specified user name and password is referred as - Account 413. A local storage area also called a register, in which the result of an arithmetic or logic operation is formed is - Accumulator 414. A computer that operates on data which is in the form of continuously variable physical quantities - Analog computer 415. Anonymous FTP is the - Internet file transfer protocol 416. EFF sites allows anonymous FTP that - Do not require a password or access 417. ANSI : American National Standards Institute 418. The overall design, construction, organization and interconnecting of the various components of a computer system is referred as - computer Architecture 419. Asynchronous communication is - communication between independently operating units 420. Auxiliary storage is - secondary storage 421. Archive is - backup storage 422. A branch of computer science that deals with computers that possess reasoning, learning and thinking capabilities that resemble those of human beings is recognized as - Artificial Intelligence 423. ASCII is - A standard coding system for computers 424. ASCII-8 is - An extended version of ASCII -7 425. ASCII file is document file in the universally recognized format 426.A program that translates mnemonic statements into executable instructions is referred as Assembler 427. An Assembler is a - translator 428. An algebra that deals with logical propositions which are either true or false is referred as Boolean algebra 429. Bandwidth is - The range of frequencies available for data transmission 430. A coding structure in which characters are represented by means of a series of parallel bars is - Bar code 431. In Broadband system a network system - Share the several analog signals with same physical network channel 432.Bit : Binary digit / one binary piece of information 433. Broadband channel is the - The fastest carriers where data transfer rates is of 1 million baud(bits/second) or more. 434. An operation in which data is moved to a different location is referred as - Block move 435. Boolean variable assumes - values that are either true or false 436. Bubble memory is - Nonvolatile 437. Buffer is device/ storage area - where data are temporarily stored 438. A network geometric arrangement in which a single connecting line is shared by a number of nodes is called - Bus topology 439. An error in a computer program is referred as - Bug 440. Circuits that provide a communication path between two or more devices of a digital computer system is - Bus 450. A fixed number of adjustment bits that represent a particular character or symbol are referred as - Byte 451. Cache memory is a - small buffer storage 452. A unit for measuring data transmission speed that describes the capacity of a carrier is referred as - Baud 453. A process of trying out a new product by independent users before it is finally manufactured/ developed - Beta test 454. A selection, choice or condition involving two possibilities is referred as - Binary 455. In Batch processing - Several computer programs runs one after another without human interaction to run each program individually 456. BISYNC: Binary Synchronous 457. BIOS is responsible for - Handling the particulars of input/output operations 458. BIOS : Binary Input- Output System 459. A device that is used to transmit data from one location to another is referred as - carrier 460.programs developed by an outside supplier and provided to the user in a machine readable form is known as - canned programs 461. Call statement - A program statement which transfers program control to a subroutine. 462. Communications protocol is - A set of rules and procedures established to interconnect different computers and communicate between them. 463. To combine items from two or more sequenced files into a single one is referred as Collating 464. The process of writing computer instructions in a programming language is known as coding 465. A configuration of computers on a network such that computing tasks are done on server computer and used by client customers is referred as - Client/server architecture 466. COBOL is : Common Business Oriented Language 467. A collection of facts in raw form that become information after proper processing is known as - Data 468. In circuit switching : A dedicated physical path is established between sender and the receiver through nodes of a network for the complete duration of information exchange 469. Compiler : convert or translate a program written in a high-level language to an absolute or machine language form. 470. DASD : Direct Access Storage Device 471.Cyber crime is - offence done on/by using computer 472. The time interval between the instant at which a read/write command is given to a memory and the instant when the next such instruction can be issued to the memory is referred as - Cycle time 473. Console : is a device that enables human operators to communicate with the computer 474. The computer is - a data processor 475. A removable direct-access storage medium containing multiple magnetic disks mounted vertically on a single-shaft is referred as - Disk pack 476. Diskette is a - A low-cost, thin flexible magnetic disk storage device. 477. Internet banking is an example of - Electronic funds transfer (EFT) 478. EBCDIC is - 8-bit coding system 479. Digital computer is a computer - That works with discrete quantities 480. Electronic Mail/Message System (EMMS) best suits to - Postal service 481. A collection of related records is referred as - File 482. First generation computers uses - Vacuum tubes 483. First generation computers are programmed in - Assembly language 484. A technique for processing jobs on a first-come, first-served basis is - First-in, first-out FIFO 485. An adder which adds two binary digits and outputs a result bit and a carry bit (if any) is called - Half adder 486. Printed or filmed output from a computer device in human readable form is called - Soft copy 487. Electronic circuit used to interconnect I/O devices to a computer’s CPU/r memory is known as - Interface 488. LISP (LIST processing) is a - High-level programming language 489. Integrated software package is - A software product that combines several applications 490. keys labeled F1 to F12 on computer keyboard are - Function keys 491. Gateway is the device used to - To interface two otherwise incompatible network facilities. 492. A language processor that translates a statement of a high-level language and immediately executes it before translating the next source language statement is called - Interpreter 493. Combining records from two or more ordered files into a single ordered file is called Merging 494. One- thousandth of a second is called - Millisecond 495. One- millionth of a second is referred as - Microsecond 496. A LSI chip which contains the entire CPU of computer except main memory is called Microprocessor 497. Alternate facilities of programs, data files, hardware equipments, etc. used in case the original one is destroyed, lost, or fail to operate is - Backup 498. A facility available in an operating system that allows multiple functions from the same application package is referred as - Multi-threading 499. Technique to implement virtual memory where memory is divided into units of fixed size memory is - Paging 500. Password is - code by which a user gains access to a computer system.