This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Tuesday, January 5, 2016

The Greatest Person in Computer Science


Ali Aydar

Ali Aydar
Ali Aydar is a computer scientist and Internet entrepreneur. He is the chief executive officer at Sporcle. He is best known as an early employee and key technical contributor at the original Napster. Aydar bought Fanning his first book on programming in C++, the language he would use two years later to build the Napster file-sharing software.

Anita Borg

Anita Borg
Anita Borg (January 17, 1949 – April 6, 2003) was an American computer scientist. She founded the Institute for Women and Technology (now the Anita Borg Institute for Women and Technology). While at Digital Equipment, she developed and patented a method for generating complete address traces for analyzing and designing high-speed memory systems.

Alfred Aho

Alfred Aho
Alfred Aho (born August 9, 1941) is a Canadian computer scientist best known for his work on programming languages, compilers, and related algorithms, and his textbooks on the art and science of computer programming. Aho received a B.A.Sc. in Engineering Physics from the University of Toronto.

Bjarne Stroustrup

Bjarne Stroustrup
Bjarne Stroustrup (born 30 December 1950) is a Danish computer scientist, most notable for the creation and development of the widely used C++ programming language. He is a Distinguished Research Professor and holds the College of Engineering Chair in Computer Science.

Bill Gates

Bill Gates
Bill Gates (born October 28, 1955) is an American business magnate, philanthropist, investor, computer programmer, and inventor. Gates is the former chief executive and chairman of Microsoft, the world’s largest personal-computer software company, which he co-founded with Paul Allen.

Bruce Arden

Bruce Arden
Bruce Arden (born in 1927 in Minneapolis, Minnesota) is an American computer scientist. He graduated from Purdue University with a BS(EE) in 1949 and started his computing career in 1950 with the wiring and programming of IBM's hybrid (mechanical and electronic) Card Programmed Computer/Calculator at the Allison Division of General Motors.

Brendan Eich

Brendan Eich
Brendan Eich (born 1960 or 1961)is an American technologist and creator of the JavaScript scripting language. He cofounded the Mozilla project, the Mozilla Foundation and the Mozilla Corporation, and served as the Mozilla Corporation's chief technical officer and briefly its chief executive officer.

Barry Boehm

Barry Boehm
Barry Boehm (born 1935) is an American software engineer, Distinguished Professor of Computer Science, Industrial and Systems Engineering, the TRW Professor of Software Engineering. He is known for his many contributions to the area of software engineering.

Bert Bos

Bert Bos
Bert Bos (born 10 November 1963, The Hague, Netherlands) is a computer scientist. He studied mathematics at the University of Groningen, and wrote his PhD thesis on Rapid user interface development with the script language Gist. In 1996, he joined the World Wide Web Consortium (W3C) to work on Cascading Style Sheets (CSS).

Bryan Cantrill

Bryan Cantrill
Bryan Cantrill (born 1973) is an American Software Engineer who worked at Sun Microsystems and later at Oracle Corporation following its acquisition of Sun. Cantrill was included in the TR35 list for his development of DTrace, a function of the OS Solaris 10 that provides a non-invasive means for real-time tracing and diagnosis of software. He is currently Chief Technology Officer at Joyent.

Charles Babbage

Charles Babbage
Charles Babbage FRS (26 December 1791 – 18 October 1871) was an English polymath. He was a mathematician, philosopher, inventor and mechanical engineer, who is best remembered now for originating the concept of a programmable computer.

Dennis Ritchie

Dennis Ritchie
Dennis Ritchie(September 9, 1941 – c. October 12, 2011) was an American computer scientist. He created the C programming language and, with long-time colleague Ken Thompson, the Unix operating system. Ritchie and Thompson received the Turing Award from the ACM in 1983.

David J. Brown

David J. Brown
David J. Brown is an American computer scientist. He was one of a small group that helped to develop the system at Stanford that later resulted in Sun Microsystems, and later was a founder Silicon Graphics in 1982. He define the application binary interface for Solaris, Sun's principal system software product.

Edgar F. Codd

Edgar F. Codd
Edgar F. Codd (August 19, 1923 – April 18, 2003) was an English computer scientist who, while working for IBM, invented the relational model for database management, the theoretical basis for relational databases. He made other valuable contributions to computer science.

Frances Allen

Frances Allen
Frances Allen (born August 4, 1932) is an American computer scientist and pioneer in the field of optimizing compilers. Her achievements include seminal work in compilers, code optimization, and parallelization. She also had a role in intelligence work on programming languages.

Gordon Bell

Gordon Bell
Gordon Bell (born August 19, 1934) is an American electrical engineer and manager. An early employee of Digital Equipment Corporation (DEC) 1960–1966, Bell designed several of their PDP machines and later became Vice President of Engineering 1972-1983, overseeing the development of the VAX.

Gregory Chaitin

Gregory Chaitin
Gregory Chaitin (born 15th. November, 1947 in Argentina) is an Argentine-American mathematician and computer scientist. Beginning in the late 1960s, Chaitin made contributions to algorithmic information theory and metamathematics, in particular an computer-theoretic result equivalent to Godel's incompleteness theorem.

James Gosling

James Gosling
James Gosling OC (born May 19, 1955) is a Canadian computer scientist, best known as the father of the Java programming language. In 1977, Gosling received a Bachelor of Science in Computer Science from the University of Calgary.

John Backus

John Backus
John Backus (December 3, 1924 – March 17, 2007) was an American computer scientist. He directed the team that invented the first widely used high-level programming language (FORTRAN) and was the inventor of the Backus-Naur form (BNF), a widely used notation to define formal language syntax.

Jon Crowcroft

Jon Crowcroft
John Crowcroft (born 23 November 1957) is the Marconi Professor of Communications Systems in the Computer Laboratory of the University of Cambridge. Professor Jon Crowcroft is distinguished for his many seminal contributions to the development of the Internet. His work on satellite link interconnection techniques in the 1980s paved the way for rural broadband.

Larry Page

Larry Page
Larry Page (born March 26, 1973) is an American business magnate and computer scientist who is the co-founder of Google, alongside Sergey Brin. On April 4, 2011, Page succeeded Eric Schmidt as the chief executive officer of Google. As of 2014, Page's personal wealth is estimated to be US$32. 3 billion, ranking him #19 on the Forbes list of billionaires.

Larry Wall

Larry Wall
Larry Wall (born September 27, 1954) is a computer programmer and author, most widely known as the creator of the Perl programming language and Camelia, the spunky spokesbug for Perl 6. Wall grew up in south Los Angeles and then Bremerton, Washington, before starting higher education at Seattle Pacific University in 1976.

Linus Torvalds

Linus Torvalds
Linus Benedict Torvalds (born December 28, 1969) is a Finnish American software engineer, and he is well known for the architect and development of the Linux kernel. He was honored, along with Shinya Yamanaka, with the 2012 Millennium Technology Prize by the Technology Academy Finland "in recognition of his creation of a new open source operating system for computers leading to the widely used Linux kernel.

Luis Von Ahn

Luis Von Ahn
Luis Von Ahn (born 1979) is a Guatemalan entrepreneur and an associate professor in the Computer Science Department at Carnegie Mellon University. He is known as one of the pioneers of crowdsourcing. He is the founder of the company reCAPTCHA, which was sold to Google in 2009, and the co-founder and CEO of Duolingo, a popular language-learning platform.

Luca Cardelli

Luca Cardelli
Luca Cardelli FRS is an Italian computer scientist who is an Assistant Director at Microsoft Research in Cambridge, UK. Cardelli is well known for his research in type theory and operational semantics. Among other contributions, he helped design Modula-3, implemented the first compiler for the (non-pure) functional programming language ML.

Michael Dell

Michael Dell
Michael Dell (born February 23, 1965) is an American business magnate, investor, philanthropist, and author. He is known as the founder and CEO of Dell Inc., one of the world’s leading sellers of personal computers (PCs).

Michael Dertouzos

Michael Dertouzos
Michael Dertouzos (November 5, 1936 - August 27, 2001) was a Professor at the Massachusetts Institute of Technology and Director of the M.I.T. Laboratory for Computer Science (LCS) from 1974 to 2001. During Dertouzos's term, LCS innovated in a variety of areas, including RSA encryption, the spreadsheet, the NuBus, the X Window System, and the Internet.

Maurice Vincent Wilkes

Maurice Vincent Wilkes
Maurice Vincent Wilkes (26 June 1913 – 29 November 2010) was a British computer scientist credited with several important developments in computing. At the time of his death, Wilkes was an Emeritus Professor of the University of Cambridge. He received a number of distinctions.

Nello Cristianini

Nello Cristianini
Nello Cristianini (born 1968) is a Professor of Artificial Intelligence at the University of Bristol, a recipient of the Royal Society Wolfson Research Merit Award. His research contributions across different areas, such as machine learning, artificial intelligence and bioinformatics. Specifically, his work is concentrated in the statistical analysis of the learning algorithms.

Philip Don Estridge

Philip Don Estridge
Philip Don Estridge (June 23, 1937 - August 2, 1985), known as Don Estridge, led development of the original IBM Personal Computer (PC), and thus is known as "father of the IBM PC". His decisions dramatically changed the computer industry, resulting in a vast increase in the number of personal computers sold and bought.

Philip Matthaus Hahn

Philipp Matthaus Hahn
Philipp November 25, 1739 in Scharnhausen, today part of Ostfildern - May 2, 1790 in Echterdingen, today part of Leinfelden-Echterdingen) was a German priest and inventor. In about 1763 he devised a precision sundial, or heliochronometer that incorporated the correction for the equation of time.

Per Brinch Hansen

Per Brinch Hansen
Per Brinch Hansen (November 13, 1938 – July 31, 2007) was a Danish-American computer scientist known for concurrent programming theory. In 1970, his research in computer science focused on concurrent programming, Inspired by Ole-Johan Dahl and Kristen Nygaard's programming language Simula 67, he invented the monitor concept in 1972.

Rasmus Lerdorf

Rasmus Lerdorf
Rasmus Lerdorf (born 22 November 1968) is a Greenlandic programmer with Canadian citizenship. He created the PHP scripting language, authoring the first two versions of the language and participating in the development of later versions led by a group of developers including Jim Winstead.

Richard Stallman

Richard Stallman
Richard Stallman (born March 16, 1953) is an American is a software freedom activist and computer programmer. He is best known for launching the GNU Project, founding the Free Software Foundation, developing the GNU Compiler Collection and GNU Emacs, and writing the GNU General Public License.

Robert S. Boyer

Robert S. Boyer
Robert S.Boyer is a retired professor of computer science, mathematics, and philosophy at The University of Texas at Austin. He and J Strother Moore invented the Boyer–Moore string search algorithm, a particularly efficient string searching algorithm, in 1977. He and Moore also collaborated on the Boyer–Moore automated theorem prover, Nqthm, in 1992.

Sabeer Bhatia

Sabeer Bhatia
Sabeer Bhatia was born in Chandigarh on 30 December 1968. He grew up in Bangalore and had his early education at the Bishop's School in Pune and then at St Joseph's Boys High School in Bangalore. Sabeer Bhatia is an Indian American entrepreneur who founded the Hotmail email service and Jaxt.

Sergey brin

Sergey brin
Sergey Brin (born August 21, 1973) is an American computer scientist and internet entrepreneur who, with Larry Page, co-founded Google, one of the most profitable Internet companies. As of June 2014, his personal wealth was estimated to be US$ 30 billion. Together, Brin and Page own about 16 percent of the company.

Serge Abiteboul

Serge Abiteboul
Serge Abiteboul is a computer scientist working in the areas of data management, database theory, and finite model theory. He is currently a senior researcher at the Institute national de recherche en informatique et en automatique (INRIA), the French national research institute focussing on computer science and related areas, and has been a professor of the College de France.

Tim Berners Lee

Tim Berners Lee
Tim Berners Lee (born 8 June 1955), also known as "TimBL", is a British computer scientist, best known as the inventor of the World Wide Web. Berners Lee is the director of the World Wide Web Consortium (W3C), which oversees the Web's continued development.

Vint Cerf

Vint Cerf
Vint Cerf ( born June 23, 1943) is an American internet pioneer, who is recognized as one of "the fathers of the Internet", sharing this title with American engineer Bob Kahn. His contributions have been acknowledged and lauded, repeatedly. He was instrumental in the development of the first commercial email system (MCI Mail) connected to the Internet.

Monday, September 7, 2015

Important Questions For IBPS CLERK mains

Important Questions For IBPS CLERK               BY – SOLANKI SIR

1.       ANSI –  American National Standards  Institude.
2.       ASCII -  American standard code for information interchange.
3.       A Byte consist of eight bits.
4.       (55)8 in binary will be 101101.
5.       (1010110)2  =  (    )10
6.       The  box that contains central electronic components of the computer is the Motherboard.
7.       Devices such as monitor, printer, keyboard, mouse are called Peripheral devices .
8.       Which one of following is the opposite of keyboard --   printer.
9.       Impact printers have tinny hummer-like keys  that strike the paper through an inked ribbon.
10.    A printer speed measured in DPI .
11.    LASER printer in example of Non impact printer.
12.   Restarted the computer when it is alrealy power on is Warm booting.
13.   When the computer saves an image on desktop and power down is called Hibernate.
14.   Modem is devices used to transmit data over telephone lines .
15.    Ram is primary storage .
16.   Ram speed measured in Nano second.
17.   Virtual memory is – the use of space on hard disk to simulate addition main mermoy.
18.   Linux is OPEN source operating system.
19.   Unix is MULTIUSER operating system.
20.   Compiler read the entire program at one time.
21.   INTERPRETER translate program line by line.
22.   ASSEMBLER  translate  assembly language in to machine language.
23.   Which one the following keyboard output devices. PRINTER
24.   During the booting process the BIOS looks the system files
25.   ………. Is the ability of an operating system to control the activities of multiple program at the same time.  MULTITASKING.
26.   A SPOOLER is a program that coordinates the print jobs is completed.
27.   Virtual memory is typically locate on HARD DISK.
28.   THRASHING  means swapping data between virtual mermory and RAM too frequently.
29.   Verification the username and password is know as authentications.
30.   The combination of the operating system and the processor is referred to as the computer,s. PLATFORM
31.   ____________, stored on a ROM chip, is responsible for loading the operating system from its permanent location on the hard drive into RAM. BIOS
32.   Using Windows Explorer, a plus (+) sign in front of a folder indicates:   the folder contains subfolders
33.    The ____________ collects scattered pieces of files on the hard disk and rearranges them sequentially on the hard drive. Disk defragmenter
34.    To restore your Windows XP computer to the state it was in on a previous date, you can use the ____________ utility. System restore.
35.   ____________ is a file system, supported by Windows XP, that supports larger hard drives and larger file sizes that the FAT. NTFS
36.   The concentric circles on hard disks are called  TRACK.
37.   The devices whose drivers are included in Windows are called Plug and Play (PnP).
38.   Match the following operating systems with their characteristic features:
39.               I.    Lynx                      A. open source
           II.   Palm OS                 B. used in personal digital assistants
            III. Mac OS                  C. network operating system
            IV. Linux                     D. primarily for Apple computers
            V.  Novell Netware      E. real-time operating system
Answer: E, B, D, A, C   
40.    Match the following file extensions with their application types:
            I.    .xls                         A. Access database
            II.   .doc                       B. compressed file
            III. .htm                       C. Word document
            IV. .zip                        D. Excel file
            V.  .mdb                      E. Web page
Answer: D, C, E, B, A  
41.    Match the following acronyms with their descriptions:
            I.    NTFS                     A. command-driven PC operating system
            II.   API                        B. user interface involving windows and icons
            III. DOS                       C. system for managing and organizing files on disk
            IV. GIF                        D. file format for representing graphical information
            V.  GUI                       E. blocks of program code for performing common functions
 C, E, A, D, B  
42.    Match the following terms with their definitions:
     I.    tracks                     A. another term meaning to “open” a file
            II.   sectors                   B. smallest segment within a sector
            III. cluster                    C. pie-shaped wedges on a hard drive
            IV. write                      D. another term meaning to “save” a file
            V.  read                       E. concentric circles on a hard drive
 E, C, B, D, A 
43.    Match the following utility programs with their functions:
         I.    File compression                A. removes redundancies in a file to reduce the size
            II.   Task Manager                    B. removes unnecessary files from the hard drive
            III. System Restore                  C. enables users to check on a program or exit a nonresponding program
            IV. Error-checking                   D. allows users to restore system settings back to a specific date
            V.  Disk Cleanup                     E. once known as ScanDisk, it checks for lost files and fragments
Answer: A, C, D, E, B     
44.   Website is a collection of web pages.
45.   Web browser is software that is used to access the webpage.
46.   First page of website is called home page.
47.   Search engine is program that used to search the document specified keyword.
48.   ____ is the process of finding errors in software code? TESTING.
49.   A connection from one HTML document to another html documents is called HYPERLINK.
50.   All of the following are ways to communicate on the Internet EXCEPT: HYPERLINK.
51.   One of the more recent e-mail scams, which lures Internet users into revealing personal information, is referred to as: phishing.
52.   Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as    Malware .
53.   Which of the following is NOT a type of broadband BLOG Internet connection? .. Dail up connection.
54.   ____________ is a form of voice-based Internet communication that turns a standard Internet connection into a means to place phone calls. VOIP.
55.    Personal logs or journal entries posted on the Web are known as:.
56.   All of the following are search engines EXCEPT  Verisign  .
57.   Which of the following is more likely to be a popular choice for an Internet connection in a rural area?  SATE LLITE
58.   Although it is the least costly method of connecting to the Internet, ____________ is no longer the most common means of Internet connection in the United States. Dial up connection.
59.   Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called: Plug ins .
60.   One way to mark a site so that you can return to it later is to:  use Favorites or Bookmarks.
61.   URL stands for: Uniform Resource Locator.
62.   In the URL http://www.prenhall.com, the portion labeled http is the:  protocol
63.   What protocol allows files to be transferred from a Web server so that you can view them on your computer using a browser? HTTP
64.     ____________ are small text files that some Web sites automatically store on your computer’s hard drive when you visit the site.  COOKIES.
65.   The adware programs that are more intrusive and transmit information about you without your knowledge are considered:   Spyware.
66.   The most common browser in use today is:  Internet Explorer.
67.    A list of Web pages within a Web site you have visited that usually appears at the top of a page is called the: Breadcrumb list.
68.   Which of the following statements is TRUE concerning DSL - For DSL service to work correctly, you must be within approximately three miles of a Central Office.
69.   DSL service, in which the maximum download speed is higher than the maximum upload speed, is known as:  ADSL
70.      ____________ is an example of a security company that certifies that a company’s online transactions are secure.   VeriSign
71.   Webcasts use ____________ media technology to facilitate the viewing and downloading process of large audio and video files.  Streaming .
72.    The specially coded text that enables a user to jump from one location to another within a Web site or to another Website altogether is know as a(n) ____________ Hyperlink
73.     ____________ are national, regional, or local companies that connect individuals, groups, and companies to the Internet. ISP.
74.   Most e-mail providers provide protection from ____________, or junk e-mail. SPAM.
75.     A Web site address is also referred to as a(n) ____________. URL
76.   eBay is an e-commerce example  (consumer-to-consumer C2C).
77.   The “father” of the Internet  -- Vinton Cerf and Robert Kahn) 
78.   An indication that a Web site is secure is the appearance, on some Web browsers, of a small icon of a closed padlock on the status bar at the bottom of the screen.
79.       Match the following terms to their meanings:
            I.    WWW                    A. a large network of networks
            II.   Browser                 B. a tool used to locate information on the Web
            III. E-mail                    C. the means we use to access information over the Internet
            IV. Internet                  D. an application program used to view the Web
            V.  Search engine        E. electronic communication
Answer: C, D, E, A, B  
80.   Match the following terms to their meanings:
            I.    Cookies                             A. software with a malicious intent
            II.   E-commerce                      B. prevents annoying windows from opening
            III. Malware                             C. text files saved on your computer when you visit certain sites
            IV. Closed padlock icon          D. conducting business online
            V.  Pop-Up Stopper                 E. indicates a secure site
Answer: C, D, A, E, B     
81.    Match the following terms to their characteristics:
        I.    Dial-up                  A. connects with coaxial cable
            II.   ADSL                    B. maximum speed of 56 Kbps
            III. SDSL                     C. often available in rural areas when other options are not
            IV. Cable                     D. uploads and downloads data at the same speed
            V.  Satellite                  E. downloads data from the Internet faster than it can upload data
Answer: B, E, D, A, C    
82.    Match the following top-level domains to the categories of organizations they refer to:
            I.    .edu                       A. nonprofit organizations
            II.   .gov                       B. degree granting institutions
            III. .pro                        C. credentialed professionals
            IV. .mil                        D. United States military
            V.  .org                        E. United States government
83.   The network navigation device known as a “smart hub” that transmits a signal only to the node to which it should be sent is a(n): Swtich
84.     If a home network is connected to the Internet a ____________ is required to send data between the two networks.  Router.
85.   A wireless network uses ____________ as its transmission media. Radio waves.
86.    If you wish to extend the length of the network without having the signal degrade, you would use a: Repeater.
87.    ____________ viruses replicate themselves to the Master Boot Record whenever the computer boots up, ensuring that the virus will be loaded into memory before some virus protection programs are loaded. Boot  virus.
88.    ____________ viruses are often transmitted by a floppy disk left in the floppy disk drive. Boot virus .
89.     ____________ are viruses that are triggered when certain logical conditions are met. Logic bomb.
90.     ____________viruses attach themselves to documents such as Word and Excel. Macro virus.
91.   Blocking access to logical ports is a common method used by ____________ for maximizing computer security.  Firewall.
92.   A firewall’s ability to examine incoming and outgoing information and prevent the use of unauthorized logical ports is known as: Packet filtering.
93.   When you set up a router for a wireless network, the router uses a default network name known as the:  SSID (service set identifier ) .
94.   Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are examples of:  Security protocol.
95.   A ____________ is the name given to a computer that is controlled by hackers through the installation of a backdoor program and used to flood a target computer with bogus requests. Zombie.
96.   The 802.11 wireless standard is also known as Wifi (wireless fidelity).
97.   A(n) ____________ is a program that appears to be something useful or desirable (like a game or a screen saver) but actually does something malicious in the background. Trojan horse
98.     ____________ are software programs or hardware devices designed to keep computers safe from hackers. Firewall
99.    128.15.9.21 is an example of a(n) ____________. Ip address.
100.      Public places at which you can wirelessly connect to the Internet are known as “hot spots.
  Match the following computer threats to their meanings:
            I.    logic bomb             A. virus that executes based on specified conditions
            II.   Trojan horse          B. software allowing hackers to take control of a computer
            III. backdoor program C. simultaneous requests from multiple zombie computers
            IV. DDoS                     D. program appearing to do useful work but doing harm in the background
            V.  worm                     E. infectious program that runs independent of host files
Answer: A, D, B, C, E  
101.       Match the following acronyms to their definitions:
             I.    HTTP                     A. protects IP addresses from hackers
            II.   SMTP                     B. a protocol associated with Web pages
            III. HPNA                    C. a protocol used for e-mail
            IV. WAP                      D. an access point on a wireless network
            V.  NAT                      E. a network adapter used on a phoneline network
Answer: B, C, E, D, A  
102.         Match the following terms to their meanings:
                    I.    firmware                      A. a list of commands (mini program) that is executed
            II.   computer virus             B. a program that executes whenever the computer boots up
            III. script                            C. read-only memory (ROM) that has software written to it
            IV. Master Boot Record                                                                                   D. a short series of commands that automates repetitive tasks
            V.  macro                          E. a program that attaches itself to another program and attempts to spread                                              itself to other computers through the exchange of files
Answer: C, E, A, B, D  
103.          Match the following acronyms to their definitions:
                   I.    WPA                      A. unique number assigned to the network adapter by the manufacturer
                          II.   SSID                      B. wireless security protocol
            III. MAC                      C. provides a means of wirelessly connecting to a network
            IV. WAP                      D. default network name used by a router
            V.  WAN                     E. network made up of LANs
Answer: B, D, A, C, E 
104.        Match the following terms to their meanings:
      I.    server                     A. two or more computers connected together via software so they can                                                                            communicate
            II.   client                      B. can be a computer, peripheral, or communication device
            III. network                 C. a network device that retransmits a signal to all nodes attached to it
            IV. node                      D. accomplishes specific tasks and makes requests on the network
      V.  hub                        E. provides information, resources, and central control for functions on a network
105.      Mnemonic a memory trick is used in which of the following language?  Assembly language .
106.      The translator program used in assembly language is called  Assembler.
107.      Which of the following is called low level languages?  Machine and assembly language.
108.      Which of the following is machine independence
109.      program? High level language
110.      Which statement is valid about interpreter?    It translates one instruction at a time
111.      The language that the computer can understand and execute is called machine language .
112.      A computer program that converts an entire program into machine language is called a/an Compiler .
113.      Which of the following is most oriented to scientific programming? Fortran.
114.      A program written in machine language is calle  ........ program Object code.
115.      list of instructions used by a computer is called       Program.
116.      TWO OR MORE THAN COMPUTERS CONNECTED TO EACH OTHER FOR SHARING AN INFORMATION FORMS A ………Network .
117.      What is difference between a switch and hub? -- . Switch operate at data link layer while hubs operate at physical layer.
118.      In the OSI model, the ____________ layer handles data encryption and compression Presentation layer.
119.      A (N) ____________ IS A PRIVATE CORPORATE NETWORK, USED EXCLUSIVELY BY COMPANY EMPLOYEES. Intranet.
120.      ROUTER WORKS AT WHICH OF THE FOLLOWING OSI LAYERS?. Network Layer.
121.      HOW MANY LAYERS IN OSI REFERENCE MODEL? Seven Layer.
122.      A(N) ____________ SERVER KEEPS TRACK OF USERS LOGGING ONTO THE NETWORK AND THE SERVICES Authentication.
123.      . SETUP OF RULES ARE CALLED…….. Protocol.
124.      WHICH LAYER IS RESPONSIBLE FOR ROUTING ?  Network layer
125.       REPEATER OPERATE WHICH LAYER OF THE OSI MODEL ? Physical layer.
126.      . A DEVICE THAT CONNECTS TO A NETWORK WITHOUT THE USE OF CABLES IS SAID TO BE……. Wireless network.
127.      In the OSI model, the ____________ layer is responsible for assembling the data packets into frames. Data link Layer.
128.      THE LAYOUT AND Network interface card STRUCTURE OF THE NETWORK IS KNOWN AS THE NETWORK’S:  Topology.
129.      MODEM USED AT WHICH LAYER OF OSI MODEL? Physical Layer.
130.       A ………..is small group of computers and peripherals linked together in a small geographic area. LAN
131.       In ……….topology, network components are connected by only one cable Bus topology.
132.      Internet is a ……………….. WAN.
133.      The communication mode that supports two-way traffic but only one direction at time is …… Half  Duplex.
134.      NIC stand for……...
135.       In star topology …………………network device is used for central mode? Star Topology.
136.       Most common topology is call star topology.
137.       In a ring topology, the computer in possession of the____________can transmit data. Token
138.       The simultaneous transmission of data to a number of stations is known as Broadcast .
139.       UTP and STP are examples of: Twisted pair
140.      The wired medium least susceptible to signal interference is: Fiber optic calble
141.     ……………. Is a collection of data that is organized so that its contents can easily be accessed manages and updated.  Database.
142.     What is tuple ?   ) A row of record in database table
The process of checking the validity of information handling a transaction file is … Validation
143.     Arranging of data in a logical sequence is knows as … Sorting.
144.      A relational database organizes data by logically grouping similar data into ____________, or tables that contain related --- Relations.
145.     The ascending order of a data hierarchy is: -) bit-byte-field-record-file-database.
146.     What is the language used by most of the DBMSs for helping their users to access data? SQL
147.     Large collection of files are called: Database.
148.     Which of the following is the product of data – Information.
149.     When data changes in multiple lists and all lists are not updated, this causes  -- data inconsistency
150.      ____________ means that the data contained in a database is accurate and reliable.  Data integrity,
151.     In a database, a field is a:  category of information
152.     The purpose of the primary key in a database is to:  uniquely identify a record.
153.     The ____________ contains data descriptions and defines the name, data type, and length of each field in the database -- Data dictionary.
154.     The process of reducing redundancy in a database is called:  Normalization.
155.     A ____________ is a large-scale electronic repository of data that is time-variant.  ) Data warehouse.             
156.     OLAP --  assists users with analyzing and finding  trends in data warehouses
157.     TPS --  processes everyday business transactions
158.     DSS -   uses databases and models for assisting complex decision processes.
159.     SQL -- consists of commands and syntax for  querying relational databases
160.     The primary key must be a(n) ____________ field.    Unique.
161.     IP address is currently – 4 Bytes.
162.     World Wide Web -- a collection of linked information residing on computers connected by the internet.
163.     A web page is located using a URL (Uniform Resource Locator)
164.     HTML stands for    -- Hyper Text Markup Language
165.      A search engine is a program to search  for information --- . web pages for information using specified search  terms
166.      junk e-mail is also called – SPAM .
167.      A Website’s main page is called its—  Home page.
168.      A web ……… consists of one or more webpage located on a web server  --- Site.
169.      The software that allows users to surf the internet is called a ……. Web browser .
170.       ____________ is a form of voice-based Internet communication that turns a standard Internet connection into a means to place phone calls.    VOIP.
171.      ….. is the encompassing term that involves the use of electronic platforms - intranets, extranets and the Internet - to conduct a company's business.  -- . E-commerce.
172.      Programs such as Internet Explorer that serve as navigable windows into the Web are called— WEB BROWSER.
173.      All of the following use Web-based e-mail clients, meaning you can access the e-mail account from any computer, EXCEPT: Microsoft outlook.
174.      Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called  --- Plug-ins.
175.      One way to mark a site so that you can return to it later is to:  use Favorites or Bookmarks
176.      ____________ are small text files that some Web sites  automatically store on your computer’s hard drive when you visit the site.  --- Cookies.
177.      Which of the following is more likely to be a popular choice for an Internet connection in a rural area?  ==  Satellite network.
178.       Although it is the least costly method of connecting to the Internet, ____________ is no longer the most common means of Internet connection in the United States.  Dialup Connection.
179.      Each excel file is called a workbook because : ) It can contain many sheets including worksheets and chart sheets
180.      How are data organized in a spreadsheet?  Rows and columns.
181.      Which of the following methods cannot be used to edit the content of cell?  -- Alt keys.
182.      The cell reference for a range of cells that starts in cell B1 and goes over to column G and down to row 10 is --- ) B1:G10
183.      The PC productivity tool that manipulates data organized in rows and columns is called a – Spreadsheet.
184.      . Forms that are used to organize business data into rows and columns are called – Spreadsheet.
185.      User wishes to remove a spreadsheet from a workbook. Which is the correct sequence of events that will do this? --- Right click on the spreadsheet tab and select DELETE.
186.      When you see a cell with a red triangle in the top right corner, what does this signify? -- There is a comment associated with the cell.
187.      All formula in Excel start with  --- (=).
188.      You can use a function to combine text from two cells into one cell. But you can use an operator to do the same thing. Which operator is that?    & (ampersand)
189.      Two common wildcard characters that Excel recognizes are      * and ?
190.       Which of the following displays the contents of the active cell?    Formula bar
191.      A feature of MS Word that saves the document automatically after certain interval is available on – Save as.
192.      Background color or effects applied on a document is not visible in -- Print Preview
193.      What is the default left margin in Word 2003 document?            1,25.
194.      Which of the following is not valid version of MS Office?  Office Vista.
195.      Which of the following is a transparent graphic or text placed behind text?  Watermark
196.      Which of the following mail merge terms combines a document with a list of names and addresses to produce individualized documents? Mail Merge
197.      Which of the following is the keyboard shortcut to insert an endnote -- Press [Alt]+[Ctrl]+[D].
198.      Which of the following orientations is taller than it is wide?  Portrait
199.      MS Word allows creation of what type of documents by default?   .Doc
200.      Which language does MS-Word use to create Macros?   Visual Basic
201.      The most advanced from of ROM ??  EEPROM
202.      The result of an arithmatic and logical operations are stored in  ACCUMULATOR .
203.      Which company developed MS office 2007 -  MICROSOFT.
204.      You can select  the  current  row  in excel  worksheet by pressing  --- SHIFT+SPACE BAR
205.      Getting the data from different worksheet is called – Referencing
206.      Excel  uses a colon to denote a range of cells.
207.      Ctrl+p command used to print the document.
208.      Ctrl + f2 command used to print preview.
209.      The default window contains numbers of bars in m.s excel.     6 bars
210.      Total worksheet in excel 255 .