06 December, 2012

Memory module frequently asked questions - RIMM, DIMM, SIMM,


Small outline dual in-line memory modules (SO-DIMMs) are used in notebook computers. They are smaller and thinner than other DIMMs, so are used when there is less space within a chassis.
SO-DIMM modules for HP computers must meet the following requirements:

  • The number of pins on the SO-DIMM must match the socket type.

  • SO-DIMM memory requires a 200-pin slot.

  • DDR2 SO-DIMMs are not compatible with DDR1 DIMM and DDR2 DIMM memory modules.

  • DDR3 SO-DIMMs are not compatible with DDR1 or DDR2 and use a 204 pin slot.

  • With a computer running at a system bus of 533 MHz or 667 MHz, use a PC2-4200 (DDR2 DIMM 533) type.
Dual in-line memory modules (DIMMs), used in most desktop computers, are small circuit boards that can hold groups of memory chips. DIMMs provide a wider path with two rows of pins on a side, allowing for faster data transfer than single in-line memory modules (SIMMs). Like SIMMs, DIMMs might be manufactured single or double-sided. DIMMs do not have to be added in pairs and can be mixed with other DIMMs that have the same number of pins. For example, a 1-gigabyte (GB) DIMM can be added to the motherboard next to a 2 GB DIMM.
NOTE: DIMMs can only operate as fast as the speed of the system bus. If two or more DIMMs of different speeds are installed, the total speed of all installed memory is as fast as the DIMM with the lowest speed.

DIMM modules for HP computers must meet the following requirements:

  • The number of pins on the DIMM must match the socket type.

  • DDR memory requires a 184-pin slot and 2.5 operating voltage.

  • DDR2 memory is not compatible with DDR1 memory and requires a 240-pin slot and 1.8 operating voltage.

  • DDR3 memory can operate about twice the bandwidth of DDR2.
    DDR3 DIMMS are not compatible with DDR1 or DDR2 memory.
    DDR3 DIMMS require a 240-pin slot and 1.5 operating voltage. A slot for DDR3 memory is keyed differently than DDR2 or DDR. Do not attempt to install DDR3 memory into a motherboard designed for DDR or DDR2. Doing so can permanently damage the motherboard and DIMM.

  • Synchronous dynamic random access memory (SDRAM): Only use DDR type SDRAM memory if the computer came with DDR-SDRAM.
Rambus in-line memory modules (RIMMs) are 184-pin memory boards that permit transfer rates of 600-800 MHz. RIMMs used with the Intel Pentium® 4 processors run on a 400 MHz system bus, allowing data transfer rates of 3.2 Gigabytes a second.
RIMM modules for HP computers must meet the following requirements:


  • HP computers require PC600 or PC800 RDR modules (184-pin Rambus dynamic Random access memory [RDRAM]).

  • Non-ECC (non error-correcting checking).

  • Rambus/Intel specification compliant.

  • All four RIMM sockets must be filled, either with a RIMM or with a continuity module called a Continuity RIMM (C-RIMM). C-RIMMs do not contain memory, but are placeholders to close the memory circuit.

  • RIMMs work in pairs, and they must be from the same vendor. RIMMs must also have the same memory size density within each channel.

  • When C-RIMMs fill empty sockets, they must be placed in the RIMM A2 and B2 sockets.

  • The RIMMs must be inserted in the RIMM A1 and B1 sockets.

Small outline Rambus in-line memory modules (SO-RIMMs) are 160-pin memory boards used in notebook computers. They are smaller than other RIMMs, so are used when there is less space within a chassis.

Certain memory modules can operate in multiple channel modes. The motherboard specifications for your computer contain dual channel mode information, if available and supported. Dual channel and triple channel memory mode provides increased performance over single channel mode.
The following requirements must be met for the DDR memory to function in multiple channel mode:

  • All DIMMS must be of the same density (256 MB, 512 MB, etc.)

  • Same DRAM chip technology (x8 or x16).

  • All either single-sided or dual-sided.

  • DDR2 and DDR3 support Dual Channel mode. The same type of memory must be matched into the same matched slot for Channel A and Channel B. Usually the memory slots are color coded to make it easier to understand.

  • DDR3 memory can support 3 DIMMs in Triple Channel mode. The same memory size and type needs to be installed into the matched DIMM slots for channels A, B and C. Usually the memory slots are color coded to make it easier to understand.
NOTE:Motherboards with Intel i945G or i945P chipsets; with DDR2-667 memory modules using one Gigabit technology perform as DDR2-533 memory modules. If faster DDR2-667 memory modules are used, they must be 256 or 512 Megabit.

Maximum memory supported by operating system



  • Windows 8 has a minimum memory requirement of 1 GB RAM (32-bit) or 2 GB RAM (64-bit). Information about the maximum amount of memory is not available at this time.
  • Windows 7 has a minimum memory requirement of 1 GB RAM (32-bit) or 2 GB RAM (64-bit). The maximum amount of memory depends on the edition used:
    Edition of Windows 7Maximum addressable memory
    Starter (32-bit or 64-bit)2 GB
    Any 32-bit version of 7 (except Starter)4 GB (approximately 3.3 GB available for use)
    Home Basic 64-bit8 GB
    Home Premium 64-bit16 GB
    Enterprise 64-bit192 GB
    Business 64-bit192 GB
    Ultimate 64-bit192 GB
  • Windows Vista comes in a variety of editions. All versions of Vista have a minimum memory requirement of 512 MB (1 GB to take advantage of certain premium features, such as Aero graphics). The maximum amount of memory depends on the edition used:
    • Edition of Windows VistaMaximum addressable memory
      Starter (32-bit)1 GB
      Any 32-bit version of Vista4 GB (approximately 3.3 GB available for use)
      Home Basic 64-bit8 GB
      Home Premium 64-bit16 GB
      Business 64-bit128 GB
      Ultimate 64-bit128 GB
    • Windows XP comes in 32-bit or 64-bit version. The maximum amount of memory depends on the version used:
      Version of Windows XPMaximum addressable memory
      32-bit4 GB (approximately 3.3 GB available for use)
      64-bit128 GB

20 November, 2012

More Not Known Computer Questions to ALL

UNSEEN and RARE important QUESTIONS of Computer


000.Computer Tower OR Tower of the Computer  is called as..:

(A)  MOUSE
(B)  DVD WRITER
(C) RAM
(D) CABINET
(E) None of these


1. Technology no longer protected by copyright, available to everyone, is considered to be:
(A) Proprietary
(B) open
(C) experimental
(D) in the public domain
(E) None of these

2. A typical modern computer uses
(A) Magnetic cores
(B) LSI chips
(C) Magnetic tapes
(D) More than 1000 vacuum tubes
(E) None of these

3.ALU is called for _____ of a computer
(A) Heart
(B) Master dispatcher
(C) Primary memory
(D) All of the above
(E) None of these

4. A single dimensional array is called
(A) List
(B) Subscripts
(C) Matrix
(D) File
(E) None of these

5.How many types of drawing objects are available in drawing Tool Bar ?
(A) 4
(B) 5
(C) 10
(D) 12
(E) None of these


6.Data processing is___
(A) data collection
(B) similar to computer programming
(C) associated with commercial work
(D) akin to data coding
(E) None of these

7.In computer terminology, information means
(A) Raw data
(B) Data in more useful
(C) Alphanumeric data
(D) Program
(E) None of these

8.What is meant by the term RAM?
(A) Memory which can only be read
(B) Memory which can be both read and written to
(C) Memory which is used for permanent storage
(D) Memory which can only be written to
(E) None of these

9. In UNIX, which command is used to sort the lines of data in a file in reverse order
(A) sort
(B) sh
(C) st
(D) sort –r
(E) None of these

10. The commonly used UNIX commands like date, ls, cat etc. are stored in
(A) /dev directory
(B) /bin directory
(C) /tmp directory
(D) /unix directory
(E) None of these

11. In UNIX, which command is used to change the protection mode of files starting with the string emp and ending with 1, 2 or 3 ?
(A) Chmod u+x emp[1-3]
(B) Chmod 777 emp*
(C) Chmod u+r ??? emp
(D) Chmod 222 emp ?
(E) None of these

12. The variables which can be accessed by all modules in a C program, are known as
(A) Local variables
(B) Internal variables
(C) External variables
(D) Global variables
(E) None of these

13. Which computer memory is used for storing programs and data currently being processed by the CPU ?
(A) Mass memory
(B) Internal memory
(C) Non-volatile memory
(D) PROM
(E) None of these

14. A record that follws a group of related records and contains data relevant to those records is called as....
(A) Trailer record
(B) Traffic record
(C) Transaction record
(D) Transducer
(E) None of these

15. A type of semiconductor memory that usually has small capacity but very fast access is
(A) PROM
(B) RAM
(C) Scratchpad
(D) ROM
(E) None of these

16. ____ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.

(A) Nanoscience
(B) Microelectrodes
(C) Computer forensics
(D) Artificial intelligence
(E) None of these

17.A single pole, single throw switch with one common line and one output line is
(A) Switch circuit
(B) SPDT switch
(C) SPST switch
(D) Star bit
(E) None of these

18.A one-bit signal that indicates the start of data transmission by an asynchronous device is
(A) Parity bit
(B) Status bit
(C) Zero bit
(D) Star bit
(E) None of these

19.__ is data that has been organized or presented in a meaningful fashion.
(A) A process
(B) Software
(C) Storage
(D) Information
(E) None of these

20. The name for the way that computers manipulate data into information is called
(A) programming
(B) processing
(C) storing
(D) organizing
(E) None of these

21. Computers gather data, which means that they allow users to _____ data.
(A) present
(B) input
(C) output
(D) store
(E) None of these

22. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered
(A) data
(B) output
(C) input
(D) the process
(E) None of these

23. A circut with about 100 transistors fabricated on a single chip is called
(A) MCR
(B) MSI
(C) MIS
(D) RJE
(E) None of these

00. Heart of the Computer is called ...:
(A)  Kernel
(B)  CPU
(C) RAM
(D) chip
(E) None of these


0. Brain of the Computer is called ...:
(A)  Kernel
(B)  CPU
(C) RAM
(D) chip
(E) None of these

Windows system key combinations and Shortcuts


Windows system key combinations

  • F1: Help
  • CTRL+ESC: Open Start menu
  • ALT+TAB: Switch between open programs
  • ALT+F4: Quit program
  • SHIFT+DELETE: Delete item permanently
  • Windows Logo+L: Lock the computer (without using CTRL+ALT+DELETE)

Windows program key combinations

  • CTRL+C: Copy
  • CTRL+X: Cut
  • CTRL+V: Paste
  • CTRL+Z: Undo
  • CTRL+B: Bold
  • CTRL+U: Underline
  • CTRL+I: Italic

Mouse click/keyboard modifier combinations for shell objects

  • SHIFT+right click: Displays a shortcut menu containing alternative commands
  • SHIFT+double click: Runs the alternate default command (the second item on the menu)
  • ALT+double click: Displays properties
  • SHIFT+DELETE: Deletes an item immediately without placing it in the Recycle Bin

General keyboard-only commands

  • F1: Starts Windows Help
  • F10: Activates menu bar options
  • SHIFT+F10 Opens a shortcut menu for the selected item (this is the same as right-clicking an object
  • CTRL+ESC: Opens the Start menu (use the ARROW keys to select an item)
  • CTRL+ESC or ESC: Selects the Start button (press TAB to select the taskbar, or press SHIFT+F10 for a context menu)
  • CTRL+SHIFT+ESC/del: Opens Windows Task Manager
  • ALT+DOWN ARROW: Opens a drop-down list box
  • ALT+TAB: Switch to another running program (hold down the ALT key and then press the TAB key to view the task-switching window)
  • SHIFT: Press and hold down the SHIFT key while you insert a CD-ROM to bypass the automatic-run feature
  • ALT+SPACE: Displays the main window's System menu (from the System menu, you can restore, move, resize, minimize, maximize, or close the window)
  • ALT+- (ALT+hyphen): Displays the Multiple Document Interface (MDI) child window's System menu (from the MDI child window's System menu, you can restore, move, resize, minimize, maximize, or close the child window)
  • CTRL+TAB: Switch to the next child window of a Multiple Document Interface (MDI) program
  • ALT+underlined letter in menu: Opens the menu
  • ALT+F4: Closes the current window
  • CTRL+F4: Closes the current Multiple Document Interface (MDI) window
  • ALT+F6: Switch between multiple windows in the same program (for example, when the Notepad Find dialog box is displayed, ALT+F6 switches between the Find dialog box and the main Notepad window)

Shell objects and general folder/Windows Explorer shortcuts

For a selected object:
  • F2: Rename object
  • F3: Find all files
  • CTRL+X: Cut
  • CTRL+C: Copy
  • CTRL+V: Paste
  • SHIFT+DELETE: Delete selection immediately, without moving the item to the Recycle Bin
  • ALT+ENTER: Open the properties for the selected object

To copy a file

Press and hold down the CTRL key while you drag the file to another folder.

To create a shortcut

Press and hold down CTRL+SHIFT while you drag a file to the desktop or a folder.

General folder/shortcut control

  • F4: Selects the Go To A Different Folder box and moves down the entries in the box (if the toolbar is active in Windows Explorer)
  • F5: Refreshes the current window.
  • F6: Moves among panes in Windows Explorer
  • CTRL+G: Opens the Go To Folder tool (in Windows 95 Windows Explorer only)
  • CTRL+Z: Undo the last command
  • CTRL+A: Select all the items in the current window
  • BACKSPACE: Switch to the parent folder
  • SHIFT+click+Close button: For folders, close the current folder plus all parent folders

Windows Explorer tree control

  • Numeric Keypad *: Expands everything under the current selection
  • Numeric Keypad +: Expands the current selection
  • Numeric Keypad -: Collapses the current selection.
  • RIGHT ARROW: Expands the current selection if it is not expanded, otherwise goes to the first child
  • LEFT ARROW: Collapses the current selection if it is expanded, otherwise goes to the parent

Properties control

  • CTRL+TAB/CTRL+SHIFT+TAB: Move through the property tabs

Accessibility shortcuts

  • Press SHIFT five times: Toggles StickyKeys on and off
  • Press down and hold the right SHIFT key for eight seconds: Toggles FilterKeys on and off
  • Press down and hold the NUM LOCK key for five seconds: Toggles ToggleKeys on and off
  • Left ALT+left SHIFT+NUM LOCK: Toggles MouseKeys on and off
  • Left ALT+left SHIFT+PRINT SCREEN: Toggles high contrast on and off

Microsoft Natural Keyboard keys

  • Windows Logo: Start menu
  • Windows Logo+R: Run dialog box
  • Windows Logo+M: Minimize all
  • SHIFT+Windows Logo+M: Undo minimize all
  • Windows Logo+F1: Help
  • Windows Logo+E: Windows Explorer
  • Windows Logo+F: Find files or folders
  • Windows Logo+D: Minimizes all open windows and displays the desktop
  • CTRL+Windows Logo+F: Find computer
  • CTRL+Windows Logo+TAB: Moves focus from Start, to the Quick Launch toolbar, to the system tray (use RIGHT ARROW or LEFT ARROW to move focus to items on the Quick Launch toolbar and the system tray)
  • Windows Logo+TAB: Cycle through taskbar buttons
  • Windows Logo+Break: System Properties dialog box
  • Application key: Displays a shortcut menu for the selected item

Microsoft Natural Keyboard with IntelliType software installed

  • Windows Logo+L: Log off Windows
  • Windows Logo+P: Starts Print Manager
  • Windows Logo+C: Opens Control Panel
  • Windows Logo+V: Starts Clipboard
  • Windows Logo+K: Opens Keyboard Properties dialog box
  • Windows Logo+I: Opens Mouse Properties dialog box
  • Windows Logo+A: Starts Accessibility Options (if installed)
  • Windows Logo+SPACEBAR: Displays the list of Microsoft IntelliType shortcut keys
  • Windows Logo+S: Toggles CAPS LOCK on and off

Dialog box keyboard commands

  • TAB: Move to the next control in the dialog box
  • SHIFT+TAB: Move to the previous control in the dialog box
  • SPACEBAR: If the current control is a button, this clicks the button. If the current control is a check box, this toggles the check box. If the current control is an option, this selects the option.
  • ENTER: Equivalent to clicking the selected button (the button with the outline)
  • ESC: Equivalent to clicking the Cancel button
  • ALT+underlined letter in dialog box item: Move to the corresponding item

Internet Terms of U and V


Vlog

  1. Vlog is short for "video blog" and is pronounced "vlog" (one syllable). 
  2. A vlog is a blog, or web log, that includes video clips. It may be entirely video-based or may include both video and written commentary. Several types of vlogs are available on the Web, including instructional videos, travel updates, and personal commentaries.
  3. People who create vlogs are known as "vloggers." 


VoIP
   

  1. Stands for "Voice Over Internet Protocol," and is often pronounced "voip." 
  2. VoIP is basically a telephone connection over the Internet. 
  3. The data is sent digitally, using the Internet Protocol (IP) instead of analog telephone lines. This allows people to talk to one another long-distance and around the world without having to pay long distance or international phone charges.
  4. In order to use VoIP, you need a computer, an Internet connection, and VoIP software. You also need either a microphone, analog telephone adapter, or VoIP telephone.
  5. The largest provider of VoIP services is Vonage, but there are several other companies that offer similar services. While Vonage charges a monthly service fee, programs like Skype and PeerMe allow users to connect to each other and talk for free. However, these free services may offer fewer connections, lower audio quality, and may be less reliable than paid services like Vonage.
  6. VoIP is also referred to as IP telephony, Internet telephony, and digital phone.




VPN

  1. Stands for "Virtual Private Network" (not a successor to the UPN television network). 
  2. VPN is a network term that most computer users don't need to know, but at least you can impress your friends by talking about it. 
  3. A virtual private network is "tunneled" through a wide area network WAN such as the Internet. 
  4. This means the network does not have to be located in one physical location like a LAN. However, by using encryption and other security measures, a VPN can scramble all the data sent through the wide area network, so the network is "virtually" private.
  5. Businesses often use VPNs to communicate across multiple locations. For example, a large company that has offices in several cities may need to send data to the different locations via the Internet. To keep the information secure, the company might set up a VPN with an encrypted connection. This is similar to having a secure intranet over the Internet. On a smaller scale, individual users may have a VPN account with their company, which allows them to connect to their office computer from their home or another location. 
  6. This is especially helpful for business travelers who need to access office data from their laptops.



UDP
  1. Stands for "User Datagram Protocol." 
  2. It is part of the TCP/IP suite of protocols used for data transferring. 
  3. UDP is a known as a "stateless" protocol, meaning it doesn't acknowledge that the packets being sent have been received. 
  4. For this reason, the UDP protocol is typically used for streaming media
  5. While you might see skips in video or hear some fuzz in audio clips, UDP transmission prevents the playback from stopping completely.



UGC
  1. Stands for "User Generated Content." 
  2. In the early years of the Web, most websites were static, meaning each page had fixed content that did not change unless it was updated by the webmaster. As the Web evolved, dynamic websites, which generate content from a database, became the norm. Now, in the Web 2.0 era, many websites now include UGC, or content created by visitors.
  3. Many different types of websites contain user generated content. 
  4. One example is a Web forum, which allows users to discuss topics by posting comments online.
  5. Another example is a wiki, which allows users to directly add and edit website content. Wikipedia, for instance, contains information written and submitted by thousands of authors around the world. 
  6. Social networking websites like Facebook and LinkedIn, are also UGC websites that allow users to create personal profiles and share information with each other. 
  7. These websites simply create a platform for users to add and share content with each other.
  8. While wikis, Web forums, and social networking websites contain nearly all user generated content, many other sites now contain both original content and UGC. 
  9. For example, blogs often include a section where visitors can post comments about the author's articles. 
  10. News websites typically allow visitors to post their feedback below the news stories. Often, these hybrid pages eventually contain more user generated content than original content. 
  11. Thanks to UGC, the Web is now a more interactive medium, allowing users to actively participate in the creation of website content.

Revising concepts



  1. The primary storage devices are used to store information only when the computer is on. 
  2. Secondary storage devices were developed to store data and information permanently on them.
  3. The different units of memory are bits, bytes, kilobytes, megabytes, gigabytes and terabytes.
  4. The floppy disks are simplest and most popular secondary storage device. 
  5. The commonly used floppy disks are of 3.5" diameter and 1.44MB storage capacity.
  6. Hard disks are the secondary storage device installed inside the CPU of the computer. 
  7. The speed of harddisks is 3600 revolutions per second and the storage capacity of the hard disks ranges from 10 GB to 40GB.
  8. Compact discs commonly called CDs are used to store 60MB to 750MB of data. The CDs are also available as audio CDs to listen music and video CDs to watch movies.
  9. The diameter of the CD ranges from 10 cms to 30 cms. A typical CD is of 13 cm diameter. 
  10. One CD can store 600 MB to 750 MB data on it.
  11. Laser reads the normally used CDs.
  12. CD comprises of a transparent thin layer of aluminium covering the pitted surface for reflectivity

UNITS OF MEMORY STORAGE


  •  4 bits = 1 nibble
  •  8 bits = 1 byte
  • 1024 byte = 1 kilobyte (KB)
  • 1024 kilobyte = 1 megabyte (MB)
  • 1024 megabyte = 1 gigabyte (GB)
  • 1024 gigabyte = 1 terabyte (TB)


Examples: Convert the following into their byte equivalents:
i.  240 KB
= 240 X 1024 bytes.

ii. 4.2 GB
= 4.2 X 1024 MB
= 4.2 X 1024 X 1024 KB
= 4.2 X 1024 X 1024 X 1024 bytes

iii. 1.44 MB
= 1.44 X 1024 KB
= 1.44 X 1024 X 1024 bytes

iv. 20 GB
= 20 X 1024 MB
= 20 X 1024 X 1024 KB
= 20 X 1024 X 1024 X 1024 bytes

v.  10 TB
= 10 X 1024 GB
= 10 X 1024 X 1024 MB
= 10 X 1024 X 1024 X 1024 KB

= 10 X 1024 X 1024 X 1024 X 1024 bytes

vi.  1.2 MB
= 1.2 X 1024 KB
= 1.2 X 1024 X 1024 bytes

Internet Terms Starting from W, X



XHTML


  1. Stands for "Extensible Hypertext Markup Language." 
  2. XHTML is a spinoff of the hypertext markup language (HTML) used for creating Web pages.
  3. It is based on the HTML 4.0 syntax, but has been modified to follow the guidelines of XML, the Extensible Markup Language.
  4. XHTML 1.0 is sometimes referred to as HTML 5.0.
  5. XHTML pages must have perfect syntax. This means no missing quotes or incorrect capitalization in the markup language. 


Web Server
 

  1. A Web server is a computer system that hosts websites. I
  2. It runs Web server software, such as Apache or Microsoft IIS, which provides access to hosted webpages over the Internet. 
  3. A fast Internet connection allows Web servers to support multiple connections at one time without slowing down.
  4. Any computer can be used as a Web server, as long as it is connected to the Internet and has the appropriate software installed. 
  5. However, most Web servers are 1U rack-mounted systems, meaning they are flat, trimmed down computers that can be mounted on a server rack. Most Web hosting companies have several server racks, which each contain multiple servers. This is the most space-efficient way to host a large number of websites from a single location.
  6. Web servers typically host multiple websites. 
  7. Web servers that host websites for multiple users are called "shared hosts." This is the most common type of hosting solution and is used for personal sites, small business sites, and websites run by small organizations.
  8. Web servers that only host websites for a single person or company are called "dedicated hosts." These types of servers are appropriate for high-traffic websites and sites that require custom server modifications. 
  9. Dedicated hosts are also more reliable than shared hosts


Web Host


  1. In order to publish a website online, you need a Web host. 
  2. The Web host stores all the pages of your website and makes them available to computers connected to the Internet. The domain name, such as "sony.com," is actually linked to an IP address that points to a specific computer. When somebody enters your domain name into their browser's address field, the IP address is located and Web site is loaded from your Web host.
  3. A Web host can be hosted from anywhere from one to several thousand computers that run Web hosting software, such as Apache, OS X Server, or Windows Server. 
  4. Most websites you see on the Web are accessed from a "shared host," which is a single computer that can host several hundred Web sites. 
  5. Larger websites often use a "dedicated host," which is a single machine that hosts only one website. Sites with extremely high amounts of traffic, such as apple.com or microsoft.com, use several computers to host one site.
  6. If you want to publish your own website, you'll need to sign up for a "Web hosting service." Finding a good Web host shouldn't be too hard, since their are thousands available. Just make sure the Web host you choose offers good technical support and ensures little or no downtime. You'll usually have to pay a monthly fee that varies depending on how much disk space and bandwidth your site will use. So it's a good idea to estimate how big your site will be and how much traffic you expect before signing up for a Web hosting service.


Web 2.0
 

  1. Web 2.0 is term that was introduced in 2004 
  2. Refers to the second generation of the World Wide Web
  3. The term "2.0" comes from the software industry, where new versions of software programs are labeled with an incremental version number. 
  4. However, Web 2.0 does not refer to a specific version of the Web, but rather a series of technological improvements.Some examples of features considered to be part of Web 2.0 are listed below:

Blogs - also known as Web logs, these allow users to post thoughts and updates about their life on the Web.
Wikis - sites like Wikipedia and others enable users from around the world to add and update online content.
Social networking - sites like Facebook and MySpace allow users to build and customize their own profile sand communicate with friends.
Web applications - a broad range of new applications make it possible for users to run programs directly in a Web browser.

  1. Web 2.0 technologies provide a level user interaction that was not available before. 
  2. Websites have become much more dynamic and interconnected, producing "online communities" and making it even easier to share information on the Web.


WAIS
 

  1. Stands for "Wide Area Information Server.
  2. This is a program that can index enormous amounts of information and make it searchable across large networks (including the Internet). 
  3. People can search the WAIS index and it will return results by relevance. Searches can then be narrowed down by subsequent searches on the original results. 
  4. Search engines are a new and improved version of WAIS, specifically for the Web.


W3C
 

  1. Stands for "World Wide Web Consortium." 
  2. The W3C is an international community that includes a full-time staff, industry experts, and several member organizations. 
  3. These groups work together to develop standards for the World Wide Web. 
  4. W3C also provides standards for Web graphics (such as PNG images), as well as audio and video on the Web. 
  5. The organization also develops standards for Web applications, Web scripting, and dynamic content. 
  6. Additionally, the W3C provides privacy and security guidelines that websites should follow.


Wiki
 

  1. A wiki is a Web site that allows users to add and update content on the site using their own Web browser. 
  2. A great example of a large wiki is the Wikipedia, a free encyclopedia in many languages that anyone can edit. 
  3. The term "wiki" comes from the Hawaiian phrase, "wiki wiki," which means "super fast." I guess if you have thousands of users adding content to a Web site on a regular basis, the site could grow "super fast."


WWW


  1. Stands for "World Wide Web." 
  2. It is important to know that this is not a synonym for the Internet
  3. The World Wide Web, or just "the Web," as ordinary people call it, is a subset of the Internet
  4. The Web consists of pages that can be accessed using a Web browser. 
  5. The Internet is the actual network of networks where all the information resides. 
  6. Things like Telnet, FTP, Internet gaming, Internet Relay Chat (IRC), and e-mail are all part of the Internet, but are not part of the World Wide Web. 
  7. The Hyper-Text Transfer Protocol (HTTP) is the method used to transfer Web pages to your computer. 
  8. With hypertext, a word or phrase can contain a link to another Web site. 
  9. All Web pages are written in the hyper-text markup language (HTML), which works in conjunction with HTTP.


IBPS 2011 CWE Solved Question Paper on Computer Knowledge Part-2


Q-21. For opening and closing of the file in Excel, you can use which bar?
(1) Standard
(2) Title
(3) Formatting
(4) Formatting or title
(5) None of these

Q-22. A disk's content that is recorded at the time of manufacture and that cannot be
changed or erased by the user is.............?
(1) Memory-only
(2) Read only
(3) Write only
(4) Run only
(5) None of these

Q-23. Which of the following controls the manner of interaction between the user and the
operating system?
(1) User interface
(2) Screen saver
(3) Language translator
(4) Platform
(5) None of these

Q-24. The blinking point which shows your position in the text is called...............?

(1) Cursor
(2) Blinker
(3) Pointer
(4) Causer
(5) None of these

Q-25. In a spreadsheet programme the................contains related worksheets and
documents?
(1) Formula
(2) Column
(3) Cell 
(4) Workbook
(5) None of these

Q-26. What is correcting errors in a programme called?
(1) Compiling
(2) Grinding
(3) Debugging
(4) Interpreting
(5) None of these

Q-27. Which one of the following software applications would be the most appropriate for
performing numerical and statistical calculations?
(1) Graphics package
(2) Document processor
(3) Data base
(4) Spread sheet
(5) None of these


Q-28. What is the file extension for all word documents?
(1) Txt
(2) FIL
(3) Doc
(4) WRD
(5) None of these

Q-29. Backup of the data files will helps to prevent............?
(1) Loss of data
(2) Duplication of data
(3) Virus infections
(4) Loss of confidentiality
(5) None of these

Q-30. Reusable optical storage will typically have the acronym..........?
(1) DVD
(2) CD
(3) ROM
(4) RW
(5) None of these

Q-31. The most important of powerful computer in typical Network...............?
(1) Desktop
(2) Network server
(3) Network client
(4) Network station
(5) None of these

Q-32. The ability to find an Individual Item in a file immediately..................is used?

(1) File allocation table
(2) Sequential access
(3) Directory
(4) Directory access
(5) None of these

Q-33. A................ contains specific rules and words that express the logical steps of an
algorithm?
(1) Logic chart
(2) Programming structures
(3) Syntax
(4) Programming language
(5) None of these

Q-34. Storage that retains its data after the power is turned off is reffered to as.............?
(1) Volatile storage

(2) Non volatile storage 
(3) Direct storage
(4) Sequential storage
(5) None of these

Q-35. To make a notebook act as a desktop model. The notebook can be connected to
a...............which is connected to a monitor and other devices?
(1) Port
(2) Bay
(3) Network
(4) Docking station
(5) None of these


Q-36. Every component of your computer is either.............. applications software or system
software?
(1) Hardware or software 
(2) Input devices or output devices
(3) Software or CPU/RAM
(4) Only hardware
(5) None of these

Q-37. After a picture has been taken with a digital camera and processed appropriately.
The actual print of the picture is considered:
(1) Output 
(2) The process
(3) Input
(4) Data
(5) None of these

Q-38. DSL is an example of.................connection.
(1) Wireless
(2) Network
(3) Slow
(4) Broadband
(5) None of these


Q-39. Which of the following is a pure object oriented language.
(1) C
(2) C++
(3) Java
(4) All of these

(5) None of these

Q-40. Capacity at a "5 1/4" Inch floppy disk is:
(1) 1.44 mb
(2) 1.2 mb
(3) 1.44 gb
(4) 2 mb
(5) None of these

Q-41. Which of the following is a graphical package?
(1) Adobe page maker
(2) ms-word
(3) Corel-draw
(4) Acrobat-reader
(5) None of these

Q-42. "Status bar" is available in a software window-
(1) Just above taskbar
(2) Just below menu bar
(3) Just above scrollbar
(4) All of these
(5) None of these


Q-43. What is the full-form of "TCP"?
(1) Transfer control protocol
(2) Transmission control protocol
(3) Text control protocol
(4) Transmission calibrated protocol
(5) None of these


Q-44. The document can be zoomed maximum up to-
(1) 150%
(2) 100%
(3) 500%
(4) 600%
(5) None of these

Q-45. Which of the following is a type of network application software?
(1) Web Browser
(2) Router
(3) Gateway
(4) HUB
(5) None of these

Q-46. Outlook is a part of-
(1) MS-Office
(2) Tally
(3) DTP
(4) Page maker

(5) None of these

Q-47. We can format the H/D with the help of-
(1) DM diskmanager
(2) Booting
(3) QAPLUS
(4) Disk Reader
(5) None of these


Q-48. In the URL http://www.prenhall.com, the portion labeled http is the
(1) Domain Name
(2) Host
(3) Top-level Domain
(4) Protocol
(5) None of these

Q-49. The number of pixels displayed on a screen is known as the screen-
(1) Resolution 
(2) Referesh Rate
(3) Colour depth
(4) Viewing size
(5) None of these


Q-50. To remove data from one cell and take it to another cell............option is used.
(1) Copy and paste
(2) Cut and paste 
(3) Copy and paste special
(4) None of the above
(5) None of these

IBPS 2011 CWE Solved Question Paper on Computer Knowledge

Computer Knowledge

Q-1. Time taken to move from one cylinder of a add to another is called?
(1) Transfer rate 
(2) Average Seek time 
(3) Lacking 
(4) Roundtrip time
(5) None of these 

Q-2. Which of the following is not a type of bus?
(1) Address bus 
(2) Software bus 
(3) Data bus
(4) Control 525
(5) None of these 

Q-3. Separate Read/write heads are required in which of these memory access schemes?
(1) Direct access 
(2) Random access
(3) Sequerical access
(4) Both (1) and (2) 
(5) None of these

Q-4. Is the study of molecules and structures whose size ranges from 1 to 100 nanometers?
(1) Microelectrodes 
(2) Computer forensics 
(3) Nano Science

(4) Artificial infelliquence
(5) None of these

Q-5. ................is data that has been organized or presented in a Meaningful fashion?
(1) Software 
(2) A process 
(3) Information
(4) Storage 
(5) None of these 

Q-6. The .................. is the programme that manages the hard ware of the computer system, 
including the CPU, memory storage device and input/output devices?
(1) Operating system
(2) Geu
(3) Internet 
(4) Software 
(5) None of these


Q-7. Which component is not connected with mother board?
(1) Monitor
(2) UPS
(3) Keyboard
(4) Scanner
(5) None of these

Q-8. First analytical engine was developed by?
(1) Jon Von Neumann
(2) Bill Gates
(3) Charles Babbage

(4) Jon McCarthy 
(5) None of these

Q-9. An email account includes a storage Area of ten called a (n).............?
(1) Attachment
(2) Hyperlink
(3) IP Address
(4) Mail box
(5) None of these

Q-10. A ............ is the ability of a device to ''Jump" directly to the requested data?
(1) Random access
(2) Sequential access
(3) Quick access
(4) All of the above
(5) None of these

Q-11. A..............converts all the statements in a programme in a single batch and the 
resulting collection of instructions is placed in a new file?
(1) Compiler 
(2) Inter preter
(3) Instruction 
(4) Converter
(5) None of these


Q-12. The instructions that tell a computer how to carry out the processing tasks are 
reffered to as computer........?
(1) Processors
(2) Programs

(3) Input Devices
(4) Memory modules
(5) None of these

Q-13. Ctrl. Shift and Alt are called ......... keys.
(1) Function
(2) Alphanumeric
(3) Adjustment
(4) Modifier
(5) None of these

Q-14. Various applications and documents are represented on the windows desktop 
by............?
(1) Symbols
(2) Graphs
(3) Labels
(4) Icons
(5) None of these


Q-15. The simultaneous processing of two or more programs by multiple processors 
is..........?
(1) Multitasking
(2) Time-sharing 
(3) Multiprocessing 
(4) Multiprogramming 
(5) None of these.



Q-16. When you save to this, your data will remain intact even when the computer is 
turned off...........?
(1) RAM
(2) Motherboard

(3) Secondary Storage device
(4) Primary storage device
(5) None of these

Q-17. When sending an email, the ......... line describes the content of the message?
(1) Subject
(2) Contents 
(3) To 
(4) cc
(5) None of these

Q-18. File 5 deleted from the hard disk are sent to the....................?
(1) Recycle Bin
(2) Motherboard
(3) Clipboard
(4) Flood disk 
(5) None of these

Q-19. A complete electronic circuit with transistors and other electronic components on a 
small silicon chip is called a (n)............?

(1) Magnetic disk 
(2) Work Station 
(3) Integrated Circuit
(4) CPU 
(5) None of these

Q-20. How many different documents can you have open at any one time?
(1) Not more that there

(2) Only one
(3) As many as your computer memory will hold
(4) No more than your taskbar can display
(5) None of these

Contact Form

Name

Email *

Message *

Related Posts Plugin for WordPress, Blogger...