50 questions related to software -3





  1. Most dangerous risk in leaking of information is Online processing of data.
  2. A computer cannot “boot” if it does not have the operating system.
  3. The primary goal of a computer system is to turn data into information.
  4. To keep files organized, related documents are often stored in folders (also called directories) located on the storage medium.
  5. A series of statements explaining how the data is to be processed is called program.
  6. Files deleted from the hard disk are sent to the recycle bin.
  7. A mouse is often used to select or highlight.
  8. The copy command saves to the clipboard.
  9. Something which has easily understood instructions is said to be user friendly.
  10. The default settings are automatic and standard.
  11. The software of a system includes the programs or instructions.
  12. Window 95, Window 98 and Window NT are known as Operating System.
  13. A collection of programs that control how your computer system runs and processes information is called Office.
  14. Data going into the computer is called input.
  15. Microsoft Office is an application suite.
  16. When cutting and pasting, the item cut is temporarily stored in clipboard.
  17. A set of instruction telling the computer what to do is called program.
  18. In MS-Word 2007 clipboard option present in home menu.
  19. To create new folder in a window – Right click + Select New Folder.
  20. To delete file permanently - Shift + Del.
  21. To get the option of mail merge in MS-Office 2007 mailing menu is used.
  22. MACROS is used to store the text.
  23. To stop the running program esc key is used by the keyboard.
  24. In MS-Word 2007 maximum zoom is 500%.
  25. To make all letters small in a sentence lower case will apply after selecting whole sentence.
  26. In a word document ctrl+end key is used to go randomly last page in a document.
  27. The primary purpose of software is to turn data into information.
  28. A file is a collection of information saved as a unit.
  29. .bas, .doc and .html are example of extension.
  30. Transformation from input to output is performed by I/P – O/P Unit.
  31. Non-Volatile Memory :- without – flow of electricity it contain its content.
  32. Computer collect data, it means they allow user to store data.
  33. There is very small picture on the screen which represent program, File or Folder known as Icon.
  34. What is word processing? –It is a software package that enables you to create, edit, print and save documents for future retrieval and reference.
  35. What is Spreadsheet? – It is the computer equivalent of a paper ledger sheet. It consists of a grid made from columns and rows. It is an environment that can make number manipulation easy.
  36. Examples of High Level Language – FORTRAN (Formula Translation), BASIC (Beginners All Symbolic Instructions Code), COBOL (Common Business Oriented Language), LOGO (Language of Graphic Oriented), PASCAL, ADA, C and C++, JAVA etc.
  37. What is the full form of ANSI? – American National Standard Institute
  38. What is Auxiliary Storage? – Storage device other than main memory (RAM) e.g. disks and tapes.
  39. What is batch processing? – Execution of programs serially with no interactive processing. Contrast with real time.
  40. What is bootstrap? – A short computer program that is permanently resident or easily loaded into a computer and whose execution brings a larger program, such an operating system or its loader, into memory.
  41. CAD – Computer Aided Design
  42. CAM – Computer Aided Manufacturing
  43. CASE – Computer Aided Software Engineering
  44. ISO – International Organization for Standardization
  45. EEPROM – Electrically Erasable Programmable Read Only Memory
  46. EPROM – Erasable Programmable Read Only Memory
  47. CISC – Complex Instruction Set Computer
  48. What are Disk defragmenters? - It can detect computer files whose contents are broken across several locations on the hard disk, and move the fragments to one location to increase efficiency.
  49. Modifier Keys are Shift, Ctrl, Fn and Alt.
  50. Toggle Keys are Caps lock, Num Lock and Scroll Lock.


19 comments:

  1. Oh my goodness! Amazing article dude! Thanks, However I am going through troubles with your RSS. I don’t understand why I cannot join it. Is there anyone else getting the same RSS problems? Anyone that knows the answer can you kindly respond? Thanx!!
    Click here to getMoreinformation.

    ReplyDelete
  2. Well we really like to visit this site, many useful information we can get here.

    Data Science Training

    ReplyDelete
  3. Amazing post found to be very impressive provided with the facts related to a software inn any system. Thanks for sharing and keep posting such an informative content.

    Data Science Course in Raipur

    ReplyDelete
  4. I want to post a remark that "The substance of your post is amazing" Great work.360DigiTMG data science bootcamp malaysia

    ReplyDelete
  5. Fantastic blog extremely good well enjoyed with the incredible informative content which surely activates the learners to gain the enough knowledge. Which in turn makes the readers to explore themselves and involve deeply in to the subject. Wish you to dispatch the similar content successively in future as well.

    artificial intelligence course in raipur

    ReplyDelete
  6. Hello! I just want to give a big thank you for the great information you have here in this post. I will probably come back to your blog soon for more information!

    Data Science Course

    ReplyDelete
  7. Stupendous blog huge applause to the blogger and hoping you to come up with such an extraordinary content in future. Surely, this post will inspire many aspirants who are very keen in gaining the knowledge. Expecting many more contents with lot more curiosity further.

    Data Science Course in Bhilai

    ReplyDelete
  8. You know your projects stand out of the herd. There is something special about them. It seems to me all of them are really brilliant!
    cyber security training malaysia

    ReplyDelete
  9. GlassWire Pro activation code offers you gorgeous info and makes simple the network recognition that where the contaminated file is interrupting. GlassWire Pro Activation Code

    ReplyDelete
  10. Reimage PC Repair License Key helps you to free your browser and distinctive programs effortlessly. You can free up your treasured picture with the help License Key For Reimage

    ReplyDelete
  11. When looking for an iOS iPhone mobile app development services company, you want to find a reputable partner that can turn your app idea into a successful and user-friendly iOS application.
    Best iOS iPhone Mobile App Development Services Company

    ReplyDelete