SLC Preparation

This site helps in many sectors of education and tries to provide information on many sectors. And noticed that it may also be helpful for the students for their SLC education. Recently the site contains info about computer science (in IT Zone) and is updating about furthers also. Please keep on visiting.

www.theinfozones.com

IT Tech Terms Collections

  1. Networks of networks.
  2. Physical layout of network.
  3. A card used to connect the computer in network.
  4. Software that detects or removes the computer virus.
  5. The combination of multiple media such as text, images, videos, animation and audio.
  6. A set of rules by which computers communicate with each other over a network.
  7. Number of bits transferred per second over a transmission medium.
  8. A web service which contains answers to the questions commonly asked by many users.
  9. The method of consolidating fragmented files on the computer's hard disk.
  10. The integration of text, graphics, audio, animations, videos etc.
  11. A device that amplifies the incoming signals, creates a new copy of it and transmits the signals on the network.
  12. A wireless technology or line of sight communication that can be used to transmit data between two different networks or computers.
  13. A program that can replicates itself without user's knowledge or permission.
  14. The array or link pattern of computers and other network.
  15. Protocol used to connect computer on internet.
  16. The array or link pattern of computers and other network.
  17. Technique of providing medical information and services through the internet.
  18. A block of data at the end an electronic message that attests the authenticity of the message.
  19. The sharpness of the image on the monitor screen determined by the number of pixels that make up the image.
  20. The device used to connect dissimilar network.
  21. A set of rules by which computers communicate with each other over a network.
  22. Moral rules to be followed bye computer and other professional.
  23. Rules and format to accept and transfer data in computer network.
  24. Making an extra copy of data and software.
  25. A virus that corrupts system files of operating system.
  26. Buying and selling products and services online.
  27. Cabling structure of LAN.
  28. Group of computers that can share resource.
  29. A program that destroys the other program.
  30. An organization offering access to some or all the services available on the internet.
  31. A device which provides continuous power to the computer equipment.
  32. The world wide network of computers.
  33. A device with multiple ports that allow network devices to be connected together.
  34. A worldwide discussion group in which people share information and ideas on a particular area of interest.
  35. A computer program designed to infect executable program files having extension .exe, .com, or . dll.
  36. It is volatile memory of computer.
  37.  A program that can translate assembly language into machine code.
  38. The device that gives continuous power to the computer even at the time of power cut.
  39. The output that can be changed easily.
  40. The combination of analog and digital computer.
  41. A small portable computer that runs on a single main battery or from an AC/DC adapter.
  42. A computer program that allows other programs to interact with computer hardware.
  43. A device that gives soft-output.
  44. Set of codes used in writing program.
  45. A part of computer that stores data and information temporarily.
  46. The main circuit board containing the vital components of a PC.
  47. A highly general or generic term usually referring to the provision of services via the internet.
  48. A technology used to store, communicate and manipulate information.
  49. Early counting device using beads on strings.
  50. The computer which works on the basis of signal produced due to the variation in physical quanties.
  51. The system diagnostic program stored in ROM.
  52. A programming language that uses binary codes.
  53. A software is designed to solve the particular kind of task in the computer.
  54. A printer produce more sound and provides less quality output.
  55. The process of detecting and removing errors in the computer programs.
  56. A collection of related information.
  57. A long narrow socket on the motherboard into which we can plug an expansion card.
  58. The combination of multiple media such as text, images, video, animation and audio.
  59. The main information processor in a digital computer capable of executing a program.
  60. A unit performing mathematical and logical operations.
  61. A peripheral device for producing text, images on paper for present and future use.
  62. A computer capable of solving problems by processing information in discrete form.
  63. A pathway or connection where the electronic impulses travel along within the microprocessor and system unit.
  64. The legal issued adopted by the government to minimize the computer crime.
  65. A medical procedure in which a computer is used to generate a 3-D image of a body part.
  66. A representation of an element in windows desktop.
  67. An electronic device capable of storing electrical energy.
  68. An electronic device that controls the flow of electrons in a vacuum.
  69. A blinking point of light displayed on the screen to help the user in the input data.
  70. The act of entering data and instructions into a computer.
  71. The virus that infect master control program software and delete the file having the extension .exe, .sys, .com.
  72. The nerve centre of the CPU that directs and coordinates the activities of the entire computer.
  73. The smallest unit of information handled by a computer.
  74. A photoelectric scanner that reads the bar codes.
  75. A device is used to make menu selection and draw freehand shapes on a screen.
  76. The connector that passes data in and out of a computer peripheral device.
  77. A device that converts digital signal to analog and vice-versa.
  78. The concentric circles that is divided on the surface of the floppy disk
  79. Binary code were devised by ....
  80. A long-term memory used to store program and data for the future reference.
  81. A network serving a single organization or site that is modeled after the internet.
  82. A measure of machine cycle time; equals one thousandth of second.
  83. Compiler, interpreter and assembler are called .....
  84. It is the computer errors caused due to incorrect input data programs.
  85. A topology in which all the nodes are connected in a single communication line.
  86. It is the online non-commercial interaction between government organization and the government employees.
  87. Linux operating system was developed in ....
  88. It is a small high speed memory located between main memory and microprocessor.
  89. A collection of four bits.
  90. Set of programs, which makes computer work.
  91. A world wide network of networks.
  92. Protocol used by e-mail client to download e-mails from e-mail server.
  93. The program which scans and removes viruses from computer.
  94. The process of loading system files into computer memory.
  95. The secret word that provides software security for the computer users. - password
  96. The process of rearranging files and blank spaces on disk. - disk defragmentation
  97. Keeping the copy of important file and software which can be used if the original one will be damaged - backup
  98. A device with a rechargeable battery used for giving the power backup to computer system in the absence of electricity. - UPS
  99. A program that controls the function of the hardware device. - device driver
  100. A device that connects multiple networks that use the same protocol.
  101. The scattering of the parts of the same file over different location in the disk. - fragmentation
  102. A type of virus that pretends to be a normal useful program. - trojan horse
  103. The process of encoding information in such a way that it is unreadable to all unless it is restored to original form. - encryption
  104. Number of bits that can be transferred per second over a given transmission medium. - bandwidth
  105. The process of restoring encrypted data to its original form. - decryption
  106. A formula used to generate digital signatures. - hash algorithm
  107. Laws related to the internet and cyberspace. - cyber law
  108. The application of IT for the functioning of the government.
  109. A person who breaks and used password of other computer and file illegally. - hacker
  110. A simulation of movement created by displaying a series of images and text with special effects. - animation
  111. An artificial environment created with computer hardware and software. - virtual reality
  112. A hardware device that provide common wiring point in LAN. - HUB
  113. The bulletin board service or public message group service of internet.
  114. Used to instruct as a master. - multimedia
  115. A technology which store text, sound, graphics and other information as digital data.  - multimedia technology
  116. Face-to-face interaction among participating users. - multimedia conferencing
  117. Moving text or image. - animation
  118. A software that can cause malfunction in normal functioning of a computer. - virus
  119. A program equivalent to machine language. - object program
  120. An error caused by missing comma, type mismatching etc. - syntax error
  121. The process of converting coded data into its original data. - decoding
  122. An integration of audio, video, graphics and text. - multimedia technology
  123.  The integration of text, audio, sound and animation.
  124. The moving graphics or images.
  125. The still-frame pictures displayed on screen.
  126. The artificial environment created by computer technology.
  127. A hardware or software that connects two dissimilar networks. - gateway
  128. A device used in network with multiple port. - hub
  129. A device that converts analog signals to digital and vice-versa. - modem
  130. Cable lines or path through which data flows in a specified path. - guided media
  131. The internal interference produced by adjacent pair of twisted pair cables. - noise  
  132. The difference between the highest and lowest frequencies of a transmission channel. - bandwidth
  133. The process of transferring a file from remote computer to the requesting computer. - downloading
  134. The tool that is used to maintain performance and error free file management. - scandisk

Computer Virus Examples:

  • Boot Sector Viruses:
    • C-Brain, Stone, Disk Killer, Danish boot, Devel 941 etc.
  • File Infecting Viruses:
    • Acid rain, Enigma, Nemesis, Cascade, Crazy, Alien .298 etc.
  • Macro Viruses:
    •  DMV, Nuclear, word concept etc.
  • Multipartite Viruses:
    • Invader, Flip, Tequila etc. 
  • Polymorphic Viruses:
    • Chameleon, Cascade, Evil, Phoenix, Proud etc.
  • Stealth Virus:
    • Frodo, Joshi, Whale, The 4096 virus etc. 
  • Parasitic Virus:
    • Jerusalam 

Categories following into:
Boot sector virus, file infecting virus, stealth virus, macro virus, polymorphic virus,
  • friday the 13th, w97m. melissa, stoned, frodo, involuntary

Networking And Internet - Page 6

Q1: The slowest transmission speeds is in:
    • a) fiber optic cable 
    • b) coaxial cable 
    • c) twisted pair cable 
    • d) satellite


Q2: Protocol to fetch the mail from the mail server is ...
    • a) FTP 
    • b) POP 
    • c) SMTP
    • d) ARP


Q3: The topology which has dedicated point to point link to the central hub.
    • a) bus
    • b) star
    • c) ring
    • d) tree


Q4: A wireless network uses .... as its transmission media.
    • a) satellite 
    • b) radio waves
    • c) twisted pair
    • d) frequency wave


Q5: The topology which has circular loop of point to point links.
    • a) ring
    • b) bus
    • c) star
    • d) tree


Q6: WLAN can be set up by using ....
    • a) coaxial cable
    • b) UTP cable 
    • c) bluetooth 
    • d) all of above


Q7: ......... is a mode of communication that transmits data in only one directions.
    • a) hub 
    • b) half duplex 
    • c) simplex 
    • d) repeater


Q8: Which of the following is basic internet protocol?
    • a) HTTP 
    • b) POP 
    • c) TCP/IP
    • d) none


Q9: In which topology network devices are connected through hub?
    • a) ring
    • b) bus
    • c) star
    • d) none


Q10: It is difficult to identify faults and add new component in ... topology.
    • a) ring
    • b) bus
    • c) star
    • d) all


I will Practice Again For Better Reminding or Go To Next Page

Networking And Internet - Page 5

Q1: Internet is an example .....
    • a) CAN 
    • b) LAN
    • c) MAN
    • d) WAN


Q2: Token passing system is used in ..... topology.
    • a) star
    • b) ring
    • c) bus
    • d) all


Q3: Which of the following is not communication device?
    • a) modem 
    • b) CSU/DSU 
    • c) multiplexer 
    • d) microwave


Q4: Which is the connector of coaxial cable?
    • a) RJ-45
    • b) BNC
    • c) ST
    • d) RJ-11


Q5: In which communication media data transfer is high?
    • a) twisted pair
    • b) coaxial cable 
    • c) fiber optics 
    • d) microwave


Q6: Which is a guided media?
    • a) fiber optics
    • b) microwave 
    • c) infrared
    • d) radiowave


Q7: Telephone is example of .....
    • a) WAN
    • b) LAN
    • c) MAN
    • d) IT


Q8: Which of the following protocol is used to fetch Email from mail server to the concerned client?
    • a) POP
    • b) SMTP
    • c) FTP
    • d) TCP


Q9: Which is the network OS?
    • a) Mac OS
    • b) MS DOS 
    • c) LINUX 
    • d) Client


Q10: What type of network is used for large geographical area?
    • a) LAN 
    • b) MAN 
    • c) WAN
    • d) none


I will Practice Again For Better Reminding or Go To Next Page

Cam Studio Free Download

From Publisher's Note:
CamStudio is a freeware software able to record all screen and audio activity on your computer and create industry-standard AVI video files and using its built-in SWF Producer can turn those AVIs into lean, mean, bandwidth-friendly Streaming Flash videos (SWFs)

Here are just a few ways you can use this software:
  • You can use it to create demonstration videos for any software program
  • Or how about creating a set of videos answering your most frequently asked questions?
  • You can create video tutorials for school or college class
  • You can use it to record a recurring problem with your computer so you can show technical support people
  • You can use it to create video-based information products you can sell
  • You can even use it to record new tricks and techniques you discover on your favourite software program, before you forget them
Download the software:
Standalone Version 2.7 (or offline version) (Download)

Software Crack, Patch, Serial Download

  • Many many searches on the search engines are of the words crack, patch or serial key or activation key etc of the popular software. Many software vendors release their software in the internet world for marketing as trial version. But when the software are so popular or useful for the clients, their are searches for the key, patch, crack etc for continuing the use of the software. 
  • Instead of such searching, user can buy the full version of the software if they want to continue the use of such software.
  • Some of the most searched keywords on the search engines are like followings:
  • Anyplace control activation key
  • Anyplace control crack
  • Anyplace control patch
  • Internet download manager (IDM) activation key
  • Internet download manager (IDM) crack
  • Kaspersky antivirus activation key
  • Kaspersky crack
  • Nod32 antivirus activation key
  • Nod32 antivirus serial key
  • Nod32 antivirus username and password
  • Nod32 crack
  • Nod32 smart security username and password
  • Windows 7 activation key
  • Windows 7 product key
  • Windows activation key

Anyplace Control Software Free Download

From Publisher's Note:
Anyplace Control displays remote computer desktops in separate 'Remote Screen' windows. These are the primary interfaces for interacting with a remote computer, and they allow you to control a PC directly with your keyboard and mouse.
You can also open several of these windows at once - allowing you to monitor more than one computer simultaneously. These software windows could then be resized, and minimized like conventional Windows.

Download Software Free  (Latest Version)
Buy the software for full version instead of searching for serial number or crack or patch for the software.

Networking And Internet - Page 4

Q1: The network architecture used in most home network is:
    • a) client-server LAN 
    • b) client-server WAN 
    • c) peer-to-peer LAN 
    • d) peer-to-peer WAN


Q2: The unit of speed at which data can be transmitted on a network.
    • a) bit rate
    • b) bandwidth 
    • c) bandlength 
    • d) none


Q3: What is the main line of defense between a local network, of intranet, and the internet?
    • a) USB port 
    • b) encryption key 
    • c) firewall
    • d) none


Q4: The operating system that assists with configuring home networks with a network setup wizard.
    • a) windows 98 
    • b) windows ME 
    • c) windows XP 
    • d) DOS


Q5: Which is the network operating system?
    • a) MS-DOS 
    • b) windows 7 
    • c) MS-UNIX 
    • d) Windows NT


Q6: An intelligent device that connects two different networks.
    • a) router
    • b) hub 
    • c) switch 
    • d) repeater


Q7: Physical layout of computer network...
    • a) server 
    • b) topology 
    • c) node 
    • d) terminal


Q8: If we wish to extend the length of the network without having the signal degrades, we would use
    • a) a repeater 
    • b) a router 
    • c) a gateway 
    • d) a switch


Q9: Which of the following is/are not protocol.
    • a) IXP/SXP 
    • b) UTP 
    • d) HTP 
    • d) all of them


Q10: Which of the following is not connector?
    • a) BNC 
    • b) DIX 
    • c) RJ-45 
    • d) POP


I will Practice Again For Better Reminding or Go To Next Page

Multiple Choice Questions (IT)

  • Multiple Choice Questions For Practicing IT Knowledge. 
  • For Preparing Computer Operator Examination.
  • For Lok Sewa Aayog Exam Preparation.
  • For Reminding IT Knowledge.
  • The contents may help students in their study and also be fruitful for the candidates preparing for the computer operator examination conducted by different organizations.   
  • Click Here To Go

    Networking And Internet - Page 3

    Q1: Which network navigation device merely retransmits a signal to all other nodes attached to it?
      • a) router 
      • b) NIC
      • c) hub
      • d) adapter


    Q2: A device that is required to send data between the two networks.
      • a) router
      • b) repeater
      • c) switch
      • d) NIC


    Q3: What are used on the both end of BUS topology to avoid interference?
      • a) terminators
      • b) connectors
      • c) simulators
      • d) none


    Q4: A device which has multiple ports.
      • a) hub
      • b) router
      • c) bridge
      • d) gateway


    Q5: Which of the following is protocol?
      • a) TCP/IP
      • b) HTTP
      • c) POP
      • d) all


    Q6: An example of guided media:
      • a) infrared
      • b) microwave
      • c) fiber optics
      • d) radio wave


    Q7: Which one is communication media?
      • a) radio wave 
      • b) fiber optics
      • c) radio wave 
      • d) all


    Q8: Choose the odd one.
      • a) ST connector 
      • b) BNC 
      • c) RJ-45
      • d) PS/2


    Q9: Which of the following is not network protocol?
      • a) TCP/IP 
      • b) SMTP 
      • c) UTP
      • d) FTP


    Q10: Which one is not a network topology?
      • a) star 
      • b) ring
      • c) client server
      • d) bus


    I will Practice Again For Better Reminding or Go To Next Page

    Networking And Internet - Page 2

    Q1: The design of the network is called the network:
      • a) architecture
      • b) server 
      • c) transmission 
      • d) type

    Q2: A switch is also known as:
      • a) smart hub 
      • b) DSL modem 
      • c) smart router 
      • d) cable modem


    Q3: In which communication media do data travels in the form of light signal?
      • a) telephone wire
      • b) fiber optics
      • c) coaxial cable
      • d) twisted pair


    Q4: Which is not LAN topology?
      • a) star
      • b) ring
      • c) bus
      • c) circle


    Q5: Which protocol is used to send email?
      • a) HTTP
      • b) SMTP
      • c) HTTP 
      • c) FTP


    Q6: HTTP is protocol for...
      • a) sending hyper text 
      • b) email 
      • c) fetching pages on WWW 
      • d) receiving mail


    Q7: Which of the following is network service?
      • a) file server 
      • b) print server 
      • c) message service 
      • d) all


    Q8: The computer that acts the central authority in the network is
      • a) protocol
      • b) client
      • c) server
      • d) none


    Q9: The network in which all the computers have equal access.
      • a) peer-to-peer
      • b) centralizing 
      • c) client/server
      • d) all


    Q10: It requests services, data and other resources available on the server.
      • a) cables
      • b) workstation
      • c) NIC 
      • d) connectors


    I will Practice Again For Better Reminding or Go To Next Page

    Choose Correct Answer (Networking And Internet & Email)

    Here are the some of the questions for practicing / reminding the networking and internet & email section. It is recommended to practice the same page till not confident on all the 10 questions.
    Page 1 Page 2 Page 3 Page 4 Page 5
    Page 6 Page 7 Page 8 Page 9 Page 10
    Page 11 Page 12 Page 13 Page 14 Page 15
    Page 16 Page 17 Page 18 Page 19 Page 20
    Page 21 Page 22 Page 23 Page 24 Page 25
    Page 26 Page 27 Page 28 Page 29 Page 30
    Page 31 Page 32 Page 33 Page 34 Page 35
    Page 36 Page 37 Page 38 Page 39 Page 40
    Page 41 Page 42 Page 43 Page 44 Page 45
    Page 46 Page 47 Page 48 Page 49 Page 50

    Domain Advertisement

    Interested in registering domain?

    We provide the service of domain registrations as well as web-hosting services, and website development too. Please contact to the following for further.

    mail to: searchdomain@yahoo.com

    Networking And Internet - Page 1

    Q1: The term network basically refers to:
      • a) sharing
      • b) communication
      • c) interconnection
      • d) all

    Q2: Bandwidth is measured in:
      • a) kbps 
      • b) bps 
      • c) kps 
      • d) none

    Q3: Which of the following are network services?
      • a) database services 
      • b) LAN 
      • c) MAN 
      • d) peer-to-peer


    Q4: Which of the following is not a goal of computer network?
      • a) resource sharing 
      • b) high reliability 
      • c) scalability 
      • d) none


    Q5: Another name of Usenet is:
      • a) gopher 
      • b) newsgroup 
      • c) CERN 
      • d) browser


    Q6: Which of the following is transmission media?
      • a) bridge 
      • b) gateway 
      • c) router 
      • d) none


    Q7: Which is the network operating system?
      • a) MS-DOS
      • b) windows 7 
      • c) MS-UNIX 
      • d) windows NT


    Q8: Which of the following is the component of network?
      • a) windows vista 
      • b) UPS 
      • c) switch
      • d) volt guard


    Q9: Which is the devices installed on long cable to amplify the signal?
      • a) repeaters 
      • b) adapters 
      • c) switches
      • d) routers


    Q10: Different computer are connected in LAN by a cable and .......
      • a) modem
      • b) NIC 
      • c) telephone lines 
      • c) TV card


    I will Practice Again For Better Reminding or Go To Next Page

    To Find The Greatest Number From N Number Supplied

    CLS
    c = 1
    h=0
    INPUT "How many numbers do you want to enter"; n
    FOR i = 1 TO n
        INPUT "Enter the number"; x
        IF x > h THEN
            h = x
        ELSE
        END IF
    NEXT i
    PRINT "The highest number is"; h
    END

    To Add The N Numbers Entered

    CLS
    INPUT "How many numbers do you want to add"; n
    FOR i = 1 TO n
        INPUT "Enter the number you want to add"; x
        s = s + x
    NEXT i
    PRINT "The sum of the numbers you entered is"; s
    END

    To Find The Sum From 1 to N

    CLS
    INPUT "Enter the last number of the series you want to add"; n
    FOR i = 1 TO n
        s = s + i
    NEXT i
    PRINT "The sum of the series from 1 to"; n; "is"; s
    END

    To Update The Marks

    • A sequential data file "std.dat" contains name, class and roll no., marks of english and science of a student. Make a program to update marks in english and science. (assuming only one record)
    • CLS
      OPEN "std.dat" FOR INPUT AS #1
      OPEN "temp.dat" FOR OUTPUT AS #2
      INPUT #1, n$, cl, r
      INPUT "Enter marks in english:"; en
      INPUT "Enter marks in science:"; sc
      WRITE #2, n$, cl, r, en, sc
      CLOSE #1, #2
      KILL "std.dat"
      NAME "temp.dat" AS "std.dat"
      END

    To Find The Certain Record In A Data File

    • A sequential data file "std.dat" contains name, class and roll of a student. Make a program to display certain records in the file according to the roll no. supplied.
    • CLS
      OPEN "std.dat" FOR INPUT AS #1
      INPUT "Enter the roll number of the required student:"; rn
      PRINT "Name", "Class", "Roll"
      DO WHILE NOT EOF(1)
          INPUT #1, n$, cl, r
          IF r = rn THEN
              PRINT n$, cl, r
          ELSE
          END IF
      LOOP
      CLOSE #1

    To Display All Records In The File.

    • File contains name, class and roll no., marks of english and science of some students.
    CLS
    OPEN "std.dat" FOR INPUT AS #1
    PRINT "Name", "Class", "Roll", "English", "Science"
    DO WHILE NOT EOF(1)
        INPUT #1, n$, cl, r, en, sc
        PRINT n$, cl, r, en, sc
    LOOP
    CLOSE #1
    END

    What is file mode? What are the modes of files in Qbasic?

    The purpose of opening data file is called file mode.
    • The different modes of opening sequential data files are:
      • OUTPUT or "O" mode: 
        • OUTPUT mode is used to create a new sequential data file. If the data file is already exists, it will erase all previous contents and new contents are added from the beginning of the file. 
          • Example of OUTPUT mode: (Click)
      • APPEND or "A" mode:
        • APPEND mode is used to add more records in the existing sequential data file. It will add data from the end of the file.
          • Example of APPEND mode: (Click)
      • INPUT or "I" mode: 
        • INPUT mode is used to open data file for reading data from existing file.
          • Example of INPUT mode: (Click

    PRINT# Statement

    • The PRINT# statement is used to store one or more data items to the specified file using either OUTPUT or APPEND mode.
    • Syntax:
      • PRINT # file number, data 1, data 2
    • Eg:
      • WRITE #1, n$, roll

    To Add More Records In File

    File contains name, class and roll no., marks of english and science of a student.
     
    Normal Program
    CLS
    OPEN "std.dat" FOR APPEND AS #1
    INPUT "Enter name:"; n$
    INPUT "Enter class:"; cl
    INPUT "Enter roll:"; r
    INPUT "Enter marks in english:"; en
    INPUT "Enter marks in science:"; sc
    WRITE #1, n$, cl, r, en, sc
    CLOSE #1
    END

    To Display Records From File "std.dat"

    • File contains name, class and roll no., marks of english and science of a student.
    • CLS
      OPEN "std.dat" FOR INPUT AS #1
      INPUT #1, n$, cl, r, en, sc
      PRINT "Name: "; n$
      PRINT "Class: "; cl
      PRINT "Roll:"; r
      PRINT "Marks In English:"; en
      PRINT "Marks In Science:"; sc
      CLOSE #1
      END

    To Input Data In A File "std.dat"

    • A program to input the name, class and roll no, marks of english and science of a student and store in a sequential file "std.dat".
    • CLS
      OPEN "std.dat" FOR OUTPUT AS #1
      INPUT "Enter name"; n$
      INPUT "Enter class"; cl
      INPUT "Enter roll"; r
      INPUT "Enter marks in english"; en
      INPUT "Enter marks in science"; sc
      WRITE #1, n$, cl, r, en, sc
      END

    To find greatest number among N supplied numbers

    Normal Program
    CLS
    c = 1
    h = 0
    INPUT "How many number do you want to enter"; m
    FOR i = 1 TO m
        INPUT "Enter the number"; n
        IF n > h THEN
            h = n
        END IF
    NEXT i
    PRINT "The greatest number is"; h
    END

    To print the fibonacci series

    Normal Program
    CLS
    a = 1
    b = 1
    PRINT a;
    PRINT b;
    FOR i = 1 TO 8
        c = a + b
        PRINT c;
        a = b
        b = c
    NEXT i
    END

    Computer Network - Set 1

    Q1: Which one is not shared in network?
        a) floppy 
        b) keyboard 
        c) hard disk 
        d) printer

    Q2: 22222222222222222222
      • a) 2222222222
      • b) 2222222222
      • c) 2222222222
      • d) 2222222222

    Q3: 333333333333333333333
      • a) 3333333333
      • b) 3333333333
      • c) 3333333333
      • d) 3333333333


    Q4: 44444444444444444444
      • a) 4444444444
      • b) 4444444444
      • c) 4444444444
      • d) 4444444444


    Q5: 55555555555555555555
      • a) 5555555555
      • b) 5555555555
      • c) 5555555555
      • d) 5555555555


    Q6: 666666666666666666666
      • a) 6666666666
      • b) 6666666666
      • c) 6666666666
      • d) 6666666666


    Q7: 77777777777777777777
      • a) 7777777777
      • b) 7777777777
      • c) 7777777777
      • d) 7777777777


    Q8: 88888888888888888888
      • a) 8888888888
      • b) 8888888888
      • c) 8888888888
      • d)8888888888


    Q9: 99999999999999999999
      • a) 9999999999
      • b) 9999999999
      • c) 9999999999
      • d) 9999999999


    Q10: 1010101010101010101010101010101010101010
      • a) 1010101010
      • b) 1010101010
      • c) 1010101010
      • d) 1010101010


    Practice Again For Better Reminding

    To Display Natural Numbers From 1 to 10

    Using FOR ...... NEXT 
    Normal Program:
    CLS
    FOR i = 1 TO 10 STEP 1
        PRINT i
    NEXT i
    END

    To check entered character is vowel or consonant.

    Normal Program:
    CLS
    INPUT "Enter any one character:"; a$
    IF a$ = "a" OR a$ = "e" OR a$ = "i" OR a$ = "o" OR a$ = "u" THEN
        PRINT "The entered character is vowel";
    ELSE
        PRINT "The entered character is consonant";
    END IF
    END

    Choose Correct One (Computer) - Set 1

    Q1: 11111111111111111111
      • a) 1111111111
      • b) 1111111111
      • c) 1111111111
      • d) 1111111111

    Q2: 22222222222222222222
      • a) 2222222222
      • b) 2222222222
      • c) 2222222222
      • d) 2222222222

    Q3: 333333333333333333333
      • a) 3333333333
      • b) 3333333333
      • c) 3333333333
      • d) 3333333333


    Q4: 44444444444444444444
      • a) 4444444444
      • b) 4444444444
      • c) 4444444444
      • d) 4444444444


    Q5: 55555555555555555555
      • a) 5555555555
      • b) 5555555555
      • c) 5555555555
      • d) 5555555555


    Q6: 666666666666666666666
      • a) 6666666666
      • b) 6666666666
      • c) 6666666666
      • d) 6666666666


    Q7: 77777777777777777777
      • a) 7777777777
      • b) 7777777777
      • c) 7777777777
      • d) 7777777777


    Q8: 88888888888888888888
      • a) 8888888888
      • b) 8888888888
      • c) 8888888888
      • d)8888888888


    Q9: 99999999999999999999
      • a) 9999999999
      • b) 9999999999
      • c) 9999999999
      • d) 9999999999


    Q10: 1010101010101010101010101010101010101010
      • a) 1010101010
      • b) 1010101010
      • c) 1010101010
      • d) 1010101010


    Practice Again For Better Reminding

    What is input mask?

    • A field property which determines what type of data can be entered in the field as well as where data can be entered and how many characters are allowed is regarded as input mask.

    What is formatting table?

    • Changing the default appearance of a table either by changing the height row or width of column, changing the fonts, colour etc is known as formatting table.

    What is fragmentation?

    As the uses of computers going on, there will be the process of adding new files, removing or deleting files occurs frequently. And this will cause some files to be unmanaged, i.e. the parts of some files may be scattered over different locations of the disk. These scattered parts of the same file over different location on the disk is said as fragmentation.
    • Fragmentation causes the slow access of disk, files and degrades the overall performance of the disk.

    What is Scandisk?

    The process of maintaining the disk files and folders using a kind of utility software by checking files, folders, bad sectors, lost clusters, lost chains and other errors of the specific disk is named as scandisk.

    What is Internet Telephony?

    Internet Telephony is a system that allows the users to make telephone call or voice call from one location to another location using the service of internet.
    • As advancement in technology, it is not only the way to use telephone to have communication, we can have further cheap and reliable way of communication than telephone. And internet telephony is one of them.

    What is E-Commerce?

    The process of performing business activities online through the service of internet is e-commerce.
    • It includes activities like buying and selling of products, transferring fund from one location to another, accessing business information through internet, booking tickets online etc.

    What is ISP?

    ISP is Internet Service Provider. It is an organization that provides the services of internet to the users. Connection to the internet is possible only through ISP. 

    What is Intranet and Extranet?

    • Intranet: Intranet is a computer network maintained privately and that can be only accessed by the authorized persons of the organization that own the network.
    • An intranset is based on the protocol TCP/IP.
    • Extanet: Extranet is a private network that uses the internet protocols network connectivity.  Extranet can be viewed as part of a company's intranet that is extended to users outside the company, usually via the internet.

    Remove Skype History

    When multiple users runs the same computer for skype communication, there will be stored the login name of the users. Want to remove them?
    • How to remove user names in Skype history?
    • I want to delete my login history.
    • How to delete my account history?
    • How to remove user names from the log in screen?
    • How to remove usernames in the sing-in window?
    When someone login to skype, it stores the username on its skype name text box. If multiple users do login on the same PC, then all the login data/history will be saved on it. So when other users try to login, all the login data is displayed. But there is no handy tool to remove the history. This can be an easy way to remove the history.
    • Here is the trick.
    1. Click on the start button.
    2. Click on run. (If run command is not on the list, hold on the window key and press r)
    3. Type this '%appdata%\skype' on the run box.
    4. Click ok.
    5. A window will appear.
    6. Here, delete the folder with the name you don't want to appear on the history.
    7. Open skype and check. (the history will be removed).

    How To Hide/Show Ribbon Bar In MS-Excel/Word/Access/Powerpoint?

    The Ribbon as a part of the Microsoft Office Fluent user interface, is designed to help user quickly find the commands that they need to complete a task. Commands are organized in logical groups that are collected together under tabs. Each tab relates to a type of activity, such as writing or laying out a page. To reduce screen clutter, some tabs are shown only when they are needed. When the Ribbon is minimized, only the tabs are visible.

    There is no way to delete or replace the Ribbon with the toolbars and menus from the earlier versions of Microsoft Office. However, user can minimize the Ribbon to make more space available on your screen.

    How to Hide the ribbon?
    To minimize the Ribbon, simply right click on any place of the Ribbon. A menu pop-up and check (click) the minimize the ribbon. The ribbon will be minimized.

    How to Restore/Show the ribbon?
    Now, if needs to restore or show the ribbon, simply right click on the menu bar or home button and click the minimize the ribbon to remove the check mark. The ribbon will be visible.

    What is EPUB File and How to Open It?

    EPUB is short for Electronic PUBlication. It is a free and open e-book standard by the International Digital Publishing Forum (IDPF). Files have the extension .epub.
    • A file with the EPUB file extension is an Open Publication Structure eBook file.
    How To Open an EPub File?
    • An EPUB file can be opened using some of the following methods.
    There are many popular viewers for EPUB such as,
    • FBReader
    • Adobe Digital Editions (Download)
    • Calibre (Download)
    • Aldiko
    • Booki.sh
    • BlueFire Reader
    • Books
    • MegaReader
    It can also be opened inside the Firefox using the EPUBReader, a free add-on that lets to read the contents of any ePub book.

    Determine The System Running (32 bit OS or 64 bit OS)

    32 bit OS and 64 bit OS are two categories of operating software. So, there is also different version of software (32 bit and 64 bit) for the 32 bit and 64 bit OS.
    So, it should be determined which OS is running on the system before installing the software.

    Boot Windows From USB

    Booting a computer from CD/DVD is sometime problematic. There may be the several problems like CD scratches, CD drive problem etc. So, it may be good choice to use USB boot option to boot the computer.
    • To boot from USB, some steps to be followed before making the USB bootable.
    1. Have the ISO image file or problem free CD of windows.
    2. Have a USB drive of minimum of the capacity that can store the entire boot files.
    3. After these, have the software to prepare bootable USB. If don't have can be downloaded. (Click here to download)
    4. Install the software.
    5. Insert the USB disk on the USB port.
    6. Run the software.
    7. On the first step (i.e. Choose ISO file), Click Browse to locate the ISO file.
    8. After locating the ISO file, Click Next.
    9. On step Two (i.e., Choose Media Type.), select USB device.
    10. On step Three (i.e, Insert USB device), choose the appropriate USB device.
    11. Finally click Begin Copying.
    12. It will take several minutes to copy the files (depending on the system).
    13. After completing the copy, click start over.
    14. Finally the USB is ready as bootable disk.
    15. Now configure the BIOS to boot from the USB.
    For Windows XP users
    The following applications must be installed prior to installing the tool:

    Check Your Current Location

    While surfing the internet one may want to know the location from where he is surfing, And what is the IP address. Visitors/Internet Users may need to know their IP address for many reasons including gaming, tech support, remote desktop connection, proxy detection, anonymity, to see if their address has changed, etc. This helps to know him further information regarding the geolocations, etc.
    • Some free internet sites provides free services to know these information.
    For More Details (Click Here)

    Currency Converter

    Need to know one currency value with other currency. Here is a quick solution. Just type the amount you want to know and select the proper currencies in the boxes. You will get the instant result.

    International Call Dialing Codes

    International Dialing Codes are the codes one have to dial before dialing the contact number to someone out of the country. If the codes are not correct, the call can not be success. 

    Keyboard ShortKeys Combinations

    General keyboard shortcuts
    1. CTRL+ C - Copy
    2. CTRL+X - Cut
    3. CTRL+V - Paste
    4. CTRL+Z - Undo
    5. CTRL+B - Make text bold
    6. CTRL+I - Make text Italic
    7. CTRL+U - Make text underlined
    8.  DELETE - Delete
    9. SHIFT+DELETE - Delete the selected item permanently without placing the item in the Recycle Bin
    10. CTRL while dragging an item - Copy the selected item
    11. CTRL+SHIFT while dragging an item - Create a shortcut to the selected item
    12. F2 key - Rename the selected item
    13. CTRL+RIGHT ARROW - Move the insertion point to the beginning of the next word
    14. CTRL+LEFT ARROW - Move the insertion point to the beginning of the previous word
    15. CTRL+DOWN ARROW - Move the insertion point to the beginning of the next paragraph
    16. CTRL+UP ARROW - Move the insertion point to the beginning of the previous paragraph
    17. CTRL+SHIFT with any of the arrow keys - Highlight a block of text
    18. SHIFT with any of the arrow keys - Select more than one item in a window or on the desktop, or select text in a document
    19. CTRL+A - Select all
    20. F3 key - Search for a file or a folder
    21. ALT+ENTER - View the properties for the selected item
    22. ALT+F4 - Close the active item, or quit the active program
    23. ALT+ENTER - Display the properties of the selected object
    24. ALT+SPACEBAR - Open the shortcut menu for the active window
    25. CTRL+F4 - Close the active document in programs that enable you to have multiple documents open simultaneously
    26. ALT+TAB - Switch between the open items
    27. ALT+ESC - Cycle through items in the order that they had been opened
    28. F6 key - Cycle through the screen elements in a window or on the desktop
    29. F4 key - Display the Address bar list in My Computer or Windows Explorer
    30. SHIFT+F10 - Display the shortcut menu for the selected item
    31. ALT+SPACEBAR - Display the System menu for the active window
    32. CTRL+ESC - Display the Start menu
    33. ALT+Underlined letter in a menu name - Display the corresponding menu
    34. Underlined letter in a command name on an open menu - Perform the corresponding command
    35. F10 key - Activate the menu bar in the active program
    36. RIGHT ARROW - Open the next menu to the right, or open a submenu
    37. LEFT ARROW - Open the next menu to the left, or close a submenu
    38. F5 key - Update the active window
    39. BACKSPACE -View the folder one level up in My Computer or Windows Explorer
    40. ESC - Cancel the current task
    41. SHIFT when you insert a CD-ROM into the CD-ROM drive - Prevent the CD-ROM from automatically playing
    42. CTRL+SHIFT+ESC - Open Task Manager

    Dialog Box Keyboard Shortcuts
    1. CTRL+TAB - Move forward through the tabs
    2. CTRL+SHIFT+TAB - Move backward through the tabs
    3. TAB - Move forward through the options
    4. SHIFT+TAB - Move backward through the options
    5. ALT+Underlined letter - Perform the corresponding command or select the corresponding option
    6. ENTER - Perform the command for the active option or button
    7. SPACEBAR - Select or clear the check box if the active option is a check box
    8. Arrow keys - Select a button if the active option is a group of option buttons
    9. F1 key - Display Help
    10. F4 key - Display the items in the active list
    11. F7 - Spelling and Grammar
    12. BACKSPACE - Open a folder one level up if a folder is selected in the Save As or Open dialog box

    Microsoft natural keyboard shortcuts
    1. Windows Logo - Display or hide the Start menu
    2. Windows Logo+BREAK - Display the System Properties dialog box
    3. Windows Logo+D - Display the desktop
    4. Windows Logo+M - Minimize all of the windows
    5. Windows Logo+SHIFT+M - Restore the minimized windows
    6. Windows Logo+E - Open My Computer
    7. Windows Logo+F - Search for a file or a folder
    8. CTRL+Windows Logo+F - Search for computers
    9. Windows Logo+F1 - Display Windows Help
    10. Windows Logo+ L - Lock the keyboard
    11. Windows Logo+R - Open the Run dialog box
    12. Windows Logo+U - Open Utility Manager

    Windows Explorer keyboard shortcuts
    1. END - Display the bottom of the active window
    2. HOME - Display the top of the active window
    3. NUM LOCK+Asterisk sign (*) - Display all of the subfolders that are under the selected folder
    4. NUM LOCK+Plus sign (+) - Display the contents of the selected folder
    5. NUM LOCK+Minus sign (-) - Collapse the selected folder
    6. LEFT ARROW - Collapse the current selection if it is expanded, or select the parent folder
    7. RIGHT ARROW - Display the current selection if it is collapsed, or select the first subfolder
    8.  Shortcut keys for Character Map
    9.  After double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
    10. RIGHT ARROW - Move to the right or to the beginning of the next line
    11. LEFT ARROW - Move to the left or to the end of the previous line
    12. UP ARROW - Move up one row
    13. DOWN ARROW - Move down one row
    14. PAGE UP - Move up one screen at a time
    15. PAGE DOWN - Move down one screen at a time
    16. HOME - Move to the beginning of the line
    17. END - Move to the end of the line
    18. CTRL+HOME - Move to the first character
    19. CTRL+END - Move to the last character
    20. SPACEBAR -Switch between Enlarged and Normal mode when a character is selected