Computer Knowledge

When data changes in multiple list and list are not updated, this causes data inconsistency

2. Granting an outside organization access to internet web pages is often implemented using a

extranet

3. The code that relational database management systems use to perform their database task is

refer to as SQL

4. Data integrity means that the data contained in the database is accurate and reliable

5. The IBM made the first electronic computer in 1953

6. Control panel is used for increasing and decreasing the speed of the cursor of mouse

7. The .mpeg is the format of a movie file

8. The memory address sent from the CPU to the main memory over a set of wires is called address

bus

9. The enhanced keyboard contains 101 keys

10. Cache memory is a part of main memory

11. The central host computer or file server in a star network maintains control with its connecting

devices through polling

12. The integration of all kinds of media such as audio, video, voice, graphics and text into one

coherent presentation combined is called multimedia

13. A technique for searching special databases, called data warehouses, looking for related

information and patterns is called data mining

14. Batch processing is a technique in which a number of similar items or transactions are processed

in groups or batches during a machine run

15. A program which helps create written documents and lets you go back and make corrections as

necessary word processor

16. A place that a user can create to store files- folder

17. Start or restart the computer-boot

18. A blinking indicator that shows you where your next action will happen-cursor

19. Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things

within programs- menu bar

20. The command used to remove text or graphics from a document. The information is then stored

on a clipboard so you can paste it- cut

21. A removable magnetic disc that holds information-hard drive

22. A command to get a file you worked on from the memory where it was stored-open

23. To move down a page in a document-scroll

24. A program that works like a calculator for keeping track of money and making budgets-
spreadsheet

25. All of the following are examples of real security and privacy risks EXCEPT- spam.

26. A process known as data mining is used by large retailers to study trends.

27. Point-of-sale (POS) terminals (formerly known as cash registers) are often connected to complex

inventory and sales computer systems.

28. The ability to recover and read deleted or damaged files from a criminal computer is an example

of a law enforcement specialty called- computer forensics.

29. Surgeons can perform delicate operations by manipulating devices through computers instead of

manually. This technology is known as- robotics.
RK Yadav

Post a Comment

Previous Post Next Post