Students and Teachers Forum
A number system that uses eight different digits to represent different values is known as octal number system. The base of octal number system is 8 because it consist eight digits from 0 to 7. The octal number system is used in the computer to .....
A number system that uses sixteen different digits to represent different values is known as hexadecimal number system. The base of hexadecimal number system is 16 because it consist sixteen digits from 0 to 9 and A to F to represent values from ten .....
The world wide web which is also known as web is one of the popular services on the Internet. The WWW provides the millions of information on various topics. There are millions of websites on the web which provide information. Each website is .....
Search engine is a program in a database that is used especially for finding particular sites on the World Wide Web. Some examples of search engines are www.google.com, www.yahoo.com .....
Web browser is one of the software application for retrieving, presenting and traversing information resources on the world wide web.Web browseris of two types. They are: Graphical browser Text only browser .....
Web servers are those computers that deliver web pages. Each web server has its own IP address. The web server can run different types of theweb page and .....
The internet is the largest network that connects millions of computer around the world. It is also known as network of the .....
Any two advantages of peer to peer network are as follows: It is easy to set up a peer-to-peer network than a client-server network. Each computer in the network has equal right and can determine resources to be shared. .....
A network in which all computers are connectedto a central device (server) and communication is done through server is known as client server network. Some of the disadvantages of client server network are as follows: All the workstation has to .....
A network in which all the computers have equal right and are suitable foronly small geographical area such as small rooms, building, school, etc. is known as peer to peer network. Some of the disadvantages of peer to peer network are as follows: It .....
Any four advantages of client server network are as follows: Only an authorized person can access the resources of the network. It is more secured than the peer-to-peer network. All the workstations can be managed from a single server computer. The .....
The differences between client-server network model and peer-to peer network model are as follows: Client-server Network Model Peer-to-peer Network Model It is a network model where there is at least one server and one .....
A client is a network computer that utilizes the resources of other network computers, including other clients. The client computer has its own processor, memory and storage and can maintain some of its resources and perform its own tasks and .....
The star topology is the most popular network topology used to connect computers and other network devices in which nodes are connected to a centrally-located device called hub in the form of a star.The advantages of star topology are as follows: .....
The topology in which nodes are connected in a daisy chain by a linear sequence of buses which is formed by joining many segments of coaxial cables with BNC jacks and T-connectors is known as bus topology. The disadvantages of bus topology are as .....
The network topology is the cabling pattern of an interconnection of computers on the network. It can be defined as the physical layout of cabling for connecting computers and other network devices on the network which describe how the computers and .....
The different types of computer networks are as follows: Local Area Network (LAN) LAN is a small network of computers within a small area like room, buildings, and campus. In local area network, the cables are used as the transmission channel. .....
A wide area network (WAN) is the large network of computers in the wide geographical area such as cities, districts and countries through satellite or other long range communication technologies. A WAN can formed by joining many groups of LANs and .....
A metropolitan area network (MAN) is the network of computers spread over a city through the wire or wireless media. A MAN can be formed by joining two or many groups of LANs within cities. A network of different branches of bank, college, companies .....
A local area network (LAN) is a small network of computers that are relatively near to each other within a small area like a room, building or within a short distance from wire or wireless media. The LAN where wireless media are used is known as .....
A communication protocol is a set of rules by which computers on the network communicate with each other. Any four protocols used on the networks are as follows: FTP ( File Transfer Protocol) TCP/IP (Transmission Control Protocol/ .....
The disadvantages of computer network are: Data and information may be stolen by computer hackers if the security of the network is not reliable. If any computer in a network gets affected by computer virus, there is the high chance of spreading .....
Computer Networks can allow businesses to reduce expenses and improve efficiency by sharing data and common equipment, such as printers, among many different computers. At the same time, the network may be connected by cables, telephone lines, .....
Computer network is a group of interconnected computers through transmission media in order to communicate and share resources like hardware, data and software. Any three advantages of computer network are: Data and software of computer .....
Computer virus is a destructive program, which replicates itself by making copies of itself without the user's knowledge. It is developed by the programmer by the help of internet for destroying or damaging the data, information and programs .....
The boot sector virus infects the information system during the start-up process. It tends to create a bad sector of the hard drive or floppy disk. The virus infects the system by using infected diskettes during start up. The entire computer system .....
Any four destructive effects of computer viruses are as follows: Computer virus can degrade the overall performance of the computer system. Computer virus can change the content of the files and codes of programs. Computer virus can .....
Computer virus is a destructive program that disturbs the normal functioning of a computer. It is designed intentionally to harm data, information and programs of the computer. When a virus enters in file or program, it becomes active and .....
The background area of the windows screen where icon, menu etc. appear is called .....
The small picture buttons that represent commands, programs, files or folders are called icons. My Computer, Recycle Bin, Internet Explorer etc are the desktop .....
Microsoft Window Operating systems are the popular operating system for personal computers. They are Graphical User Interface. It makes hardware usable in computer and provides an environment to work on software. MS Window 98, Windows XP, Windows 7 .....
We have to follow following steps to open a program using icon:Place your mouse over the icon.Text appears identifying its name or contents.Then, double-click the .....
The left side of the Start menu lists programs, and the right side allows access to common Windows folders (My Documents, for example). It also provides access to Help and Support, Search, and .....
The basic items shown on a desktop arestart button, task bar and .....
Cd command is used to change or get into the directory. Example:C:\> CD .....
FORMATcommand is used to format disk. Syntax: Format [Drive:] [Path] File .....
EDIT command helps to open and edit the files in .....
Any two examples of external command are as follows: EDIT FORMAT .....
Any five examples of internal commands are as follows: DEL REN MD CD RD VOL .....
Internal commands are part of COMMAND. COM file of MS-DOS when a computer is started, such types of command are automatically loaded in computer's memory. Examples of internal commands are CLS, DIR, COPY, DEL REN, MD, CD, RD, etc.External commands .....
A file is a collection of related information stored on a disk with a unique name for its identification.The rules for file naming are: The file name should not have more than eight characters. Blank spaces are not allowed while naming a file. .....
MS-DOS is one of the most popularly used CUI operating system software for microcomputers which was developed by Microsoft Corporation USAThe features are: It is a single user operating system. MS-DOS can be run on both hard disk and floppy disk. .....
Booting refers to starting up a computer. In other words, the process of loading the system files into the computer's memory is called booting. Computer can boot in two different ways: Cold Boot Warm .....
CUI operating system uses the character (text) to communicate whereas GUI operating system presents information in a graphical form to .....
single-user operating system multi-user operating system 1. It allows a single user to perform just one task at a time. 1. It allows a multiple users to use programs simultaneously. 2. It does not support networking environment. 2. It supports .....
Basically, operating system is classified into two types:Single - user operating system Multi - user operating system .....
An operating system is an organized set of software program to manage the overall operation of the computer.The three functions of an operating system are: To assist to execute application software. To control and coordinate hardware parts. To let .....
Tailored software is a small software, developed by using high level language for specific small process.This software is developed for solving specific problems of specific users or .....
Packaged Software is ready made, error-free, advance and standard software for general works. Some of the examples of packaged software are Microsoft Excel, Microsoft Word .....
Some of the software available for user purpose are as follows: Word processing Spreadsheet Database management Graphics and Presentation Animation Web designing .....