Students and Teachers Forum
Any raw facts or figure that may not have significant meaning by itself is known as data. Processed data or organized collection of related data which has significant meaning is known as information. .....
Viruses spread from one computer to other computers by following ways:1) Using pirated software.2) Sharing of portable disks among the computers.3) Downloading files or programs from unsecured web sites.4) Exchanging of data or files over a .....
Some reasons for creating viruses are:1) To stop the software piracy.2) To entertain the users by displaying interesting messages or pictures.3) To destroy data, information and files. 4) To expose the programming .....
System infector virus infects the various parts of the operating system or master control program .....
Any four symptoms of computer viruses are as follows: Changes in the size of files or executable files. Opening of the programs takes more time or fails to open. Programs hang frequently or restart automatically. Missing of files or .....
Computer viruses can spread from one computer to another computer by following ways: By sharing of infected portable devices. By using pirated software By opening virus infected email or attached file. By downloading files from .....
Any four destructive effects of computer viruses are as follows: Computer virus can degrade the overall performance of the computer system. Computer virus can change the content of the files and codes of programs. Computer virus can .....
Any four reasons for creating computer viruses are as follows: To stop software piracy. To remind the incidents that happened at different time. To earn money. To expose the programming capabilities of a programmer. .....
Computer virus is a destructive program that disturbs the normal functioning of a computer. It is designed intentionally to harm data, information and programs of the computer. When a virus enters in file or program, it becomes active and .....
The machine readable code which is obtained after the translation is called object code and the instructions written using C language is called source code. .....
The basic data types of C language are as follows: Character set Identifiers Keyword .....
Any two features of C language are as follows: C language can be used for developing application programs and system programs C language has enough number of built in functions and operators. .....
C language is a structured programming language developed by Dennis Ritchie which has features of both high level language and low level language. .....
Structured programming is a programming pattern aimed at improving the clarity, quality, and development time of a computer program by making extensive use of subroutines, block structures and loops. .....
CD-ROM is a cheap, durable and portable storage media used to store data and information in the multimedia technology. This is why multimedia products are found only in CD-ROMs. .....
Any four common software that are used in producing multimedia are: Adobe Photoshop Animator Pro Maya Macromedia Flash .....
The computer that has the capability to create multimedia products and can handle or present more than one medium simultaneously is known as multimedia computer. The list of hardware components required in multimedia computer are as .....
The following are the components of multimedia: Text: The text is primary component of multimedia. Most of the information can be presented with the help of text. The text can be emphasized by using different fonts, fonts colors etc. GraphicA .....
Multimedia is a technology which stores data as text, photo, animation, music, video, etc. and gives the method to collect and modify the data as required. Any four multimedia CDs are as follows: TOEFL CD Tutorial CD Britannica Encyclopedia Oxford .....
The UPS supplies back up electric power to the computer system where there is electric power failure so that user can save their unsaved work and can shut down the computer system properly. In this way, UPS protects computer hardware as well as .....
The differences between client-server network model and peer-to peer network model are as follows: Client-server Network Model Peer-to-peer Network Model It is a network model where there is at least one server and one .....
The device that protects the computer system from the fluctuation of electric voltage or frequent power failure is known as power protection devices. Any four power protection devices are as follows: UPS Volt guard Spike guard .....
The computer hardware are very delicate and they require regular maintenance which helps to increase the life span of the hardware. The regular maintenance of hardware keeps the computer on good working condition and helps to find out problems .....
The hardware security refers to the protection of computer hardware from being damaged or lost due to accidental or international harm. Any four hardware security measures are as follows: Regular Maintenance Insurance Free from dust .....
The protection of computer system from being lost or damaged due to accidental or international harm is known as computer security. In other words, computer security is protecting computer data, information, programs and hardware from being lost or .....
The different types of computer networks are as follows: Local Area Network (LAN) A LAN is a small network of computers within small area like room, buildings and campus. In local area network the cables are used as transmission channel. Nowadays, .....
Modem transfers data from one computer to another computer through telephone line. Modem accepts the data from computer and convert into analog signals using modulation procedure and these analog signals are send over telephone lines. The .....
The differences between hub and switch are as follows: HUB SWITCH It transmits the data packets to all the nodes connected on the network. It does not transmit the data packets to all the nodes connected on the network. It cannot reduce the .....
The differences between server and workstation are as follows: Server Workstation A server is an application or device that performs service for connected clients as part of client server architecture. A workstation is .....
The action and punishment against such crimes will be in the range of a minimum RS.50,000 to maximum RS.3,00,000 in cash and six months to three years .....
It is divided into 12 sections and 80 clauses wit detailed information on role and rights of regulator,certification authority,consumer,government and all the concerned stake .....
After 2061 the cyber law of Nepal was promulgated and revised in .....
The method of making the data or message unreadable by unauthorized people while transferring through the internet is called encryption. The method of converting encrypted data back into its original form to make understandable to the receiver is .....
Digital signature is a security mechanism system in the cyberspace for digital data transformation by attaching a code on the document of electronic records. It uses two keys, one public and another is private, which are used to encrypt and decrypt .....
The effects of computer crime are:1) Security problems2) Physical theft of the computers and other devices3) very less privacy4) computer virus easily attack software and .....
List of any four cyber crimes are as follows: Unauthorized access to computer systems and networks Email bombing Hacking Cyber-stalking .....
The crime committed with the help of computers is known as cyber crime. The criminal activities like stealing or destroying data, information and files, accessing others files spreading computer viruses, transferring money without knowledge of owner .....
Resolution is the written proposal forwarded to the meeting for discussion and final decision through the agreement of all participating members.It is one of the important procedures in an office. It can be passed for formulating plans and policies, .....
Resolution is the written proposal forwarded to the meeting for discussion and final decision through the agreement of all participating members. It can be passed for formulating plans and policies, raising fund, election of the director, .....
The following are the main functions and duties of the Office of the Treasury & Comptroller: Releasing initial imprest fund to the government offices at the beginning of fiscal year. Releasing reimbursement release to the offices on the basis of .....
The functions of the Office of the Comptroller General are mentioned in financial administration act 2056. The functions of the Office of the Comptroller General are as follows: Implementing various accounting forms for keeping the record of .....
The following are the main functions and duties of the Office of the Auditor General: To perform the final audit of all government offices, constitutional bodies and offices of the army, police and court considering the provision of law. To consult .....
The differences between internal audit and external audit are as follows: External Audit Internal Audit External audit is of periodic nature and conducted after completion of the fiscal year. Internal audit is of continuous nature and .....
The following are the main objectives of external audit: Complying with lawTo comply with the concerned law is the first and foremost objective of external or statutory audit. It complies with the concerned law under which the entity is established. .....
The following are the main objectives of internal audit: Verifying books of accountInternal audit regularly and continuously verifies, examines and reviews the books of account of the entity concerned and reports on them. Reviewing the internal .....
Any five importance of auditing are explsined below: CredibilityAuditing lends credibility to the financial statements prepared by a business. It helps to make decisions relating to business activities. Thus, it facilitates the operations of the .....
Auditing is the systematic act of examining, verifying and reviewing the accounting records and statement by an independent person considering their accuracy, reliability and effectiveness to provide true and fair result of the operation. It is the .....
TRhe differences between central level accounting and operating level accounting are as follows: Bases of differences Central Level Accounting Operating Level Accounting Offices It is maintained by central level offices. It is maintained .....
The accounting system which is maintained by Central Level Offices like Ministries Department and Constitutional Bodies is known as central level accounting. Central level offices are responsible for submitting the financial statements to the .....
The new accounting system is an effective tool for making record and analysis of government funds. However, it is not free from limitations. The following are the main limitations of the new accounting system: It is mostly based on the cash system. .....