Information Technology Application UG Program
58 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

The basic operations performed by a computer are?

  • Arithmetic operation
  • Logical operation
  • Storage and retrieval
  • All of the above (correct)
  • What is the main difference between a mainframe and a supercomputer?

  • Supercomputers are focused to execute as many programs as possible while mainframe uses its power to execute few programs as fast as possible
  • Supercomputers are much smaller than mainframe computers
  • Supercomputers are focused to execute few programs as fast as possible while mainframe uses its power to execute as many programs concurrently (correct)
  • Supercomputer is much larger than mainframe computers
  • The brain of any computer system is?

  • ALU
  • Memory
  • CPU (correct)
  • Control unit
  • Storage capacity of magnetic disk depends on?

    <p>All of the above</p> Signup and view all the answers

    The two kinds of main memory are?

    <p>All of the above</p> Signup and view all the answers

    Computer is free from tiresome and boredom. We call it?

    <p>Diligence</p> Signup and view all the answers

    A hybrid computer?

    <p>Resembles both a digital and analogue computer</p> Signup and view all the answers

    The ALU of a computer responds to the commands coming from?

    <p>Control section</p> Signup and view all the answers

    The main electronic component used in first generation computers was?

    <p>Vacuum Tubes and Valves</p> Signup and view all the answers

    A dumb terminal has?

    <p>A keyboard and screen</p> Signup and view all the answers

    Software in a computer?

    <p>Both of the above</p> Signup and view all the answers

    Today's computer giant IBM was earlier known by different name which was changed in 1924. What was that name?

    <p>Computing Tabulating Recording Co.</p> Signup and view all the answers

    Before a disk drive can access any sector record, a computer program has to provide the record's disk address. What information does this address specify?

    <p>All of the above</p> Signup and view all the answers

    The arranging of data in a logical sequence is called?

    <p>Sorting</p> Signup and view all the answers

    What is the responsibility of the logical unit in the CPU of a computer?

    <p>To compare numbers</p> Signup and view all the answers

    You can read newspapers online which is one of the applications of Information Technology. What is this application?

    <p>online newspaper</p> Signup and view all the answers

    ___________ is a place where processing takes place.

    <p>CPU</p> Signup and view all the answers

    Physical part of a computer are known as___________

    <p>Hardware</p> Signup and view all the answers

    A Processor acts like a/an

    <p>Brain</p> Signup and view all the answers

    A Processor is also known as

    <p>CPU</p> Signup and view all the answers

    RAM stands for

    <p>Random Access Memory</p> Signup and view all the answers

    ROM stores data

    <p>Permanently</p> Signup and view all the answers

    Which of the following is the highest speed slot?

    <p>AGP</p> Signup and view all the answers

    A video game is played by using _________ card

    <p>Graphics</p> Signup and view all the answers

    Barcode Reader is a/an _________ device

    <p>Input</p> Signup and view all the answers

    Which is used in security system and criminal investigations?

    <p>Fingerprint Reader</p> Signup and view all the answers

    Which is also known as a mechanical agent?

    <p>Robots</p> Signup and view all the answers

    _____ is the set of instructions given to the computer to perform a specific task.

    <p>Software</p> Signup and view all the answers

    _____ is the most famous type of Operating System for personal computers.

    <p>Microsoft Windows</p> Signup and view all the answers

    A system software that helps an Operating System to communicate with a device is called

    <p>Device Driver</p> Signup and view all the answers

    ____ is a program that allows a user to analyze and maintain a computer.

    <p>Utility</p> Signup and view all the answers

    _____ creates a link between a user and the computer.

    <p>Operating System</p> Signup and view all the answers

    A _________ keeps the mouse free from dust and dirt.

    <p>mouse pad</p> Signup and view all the answers

    Keep the index finger on the ________ button.

    <p>left</p> Signup and view all the answers

    Keep the middle finger on the ________ button.

    <p>right</p> Signup and view all the answers

    Move the mouse over a ________.

    <p>mouse pad</p> Signup and view all the answers

    Always keep the _________ on the mouse pad.

    <p>mouse</p> Signup and view all the answers

    _________ has a tail.

    <p>Mouse</p> Signup and view all the answers

    A mouse is a part of a _________.

    <p>computer</p> Signup and view all the answers

    A keyboard has _________ keys.

    <p>Both</p> Signup and view all the answers

    Cursor is a _________ blinking line on the monitor.

    <p>small</p> Signup and view all the answers

    There are usually __________ keys on the keyboard.

    <p>104</p> Signup and view all the answers

    __________ keys are found at the top of the keyboard.

    <p>Function</p> Signup and view all the answers

    __________ key is used to write in capital letters.

    <p>Caps Lock</p> Signup and view all the answers

    _________ erases letters to the left of the cursor.

    <p>Backspace</p> Signup and view all the answers

    Arrow keys are used to move the cursor in __________ directions.

    <p>Both</p> Signup and view all the answers

    Mouse is connected to _________.

    <p>CPU</p> Signup and view all the answers

    Which Key Combination Is Used To Deselect A Selection?

    <p>Ctrl + D</p> Signup and view all the answers

    Cable Television Is An Example Of……..

    <p>MAN</p> Signup and view all the answers

    This Refers To The Physical Layout Of The Network Computer And Links.

    <p>Topology</p> Signup and view all the answers

    It Is Not Important To Secure Wi Fi Network.

    <p>False</p> Signup and view all the answers

    Wireless Networks Are.……..To Install And Maintain.

    <p>Cheaper</p> Signup and view all the answers

    There Are……….Different Ways To Crop An Image.

    <p>3</p> Signup and view all the answers

    Magnetic And Polygon Are The Two Types Of.…….Tool.

    <p>Lasso</p> Signup and view all the answers

    Clone Tool Is Similar To Paint Bucket Tool.

    <p>False</p> Signup and view all the answers

    There Are Four Types Of Network.

    <p>False</p> Signup and view all the answers

    Networking Is Only Used For Sharing Resources.

    <p>False</p> Signup and view all the answers

    WAN Stands For Wide Area Network.

    <p>True</p> Signup and view all the answers

    Study Notes

    Information Technology Overview

    • Information Technology (IT) is a crucial driver of economic growth globally, influencing every sector.
    • IT applications are present in daily life, from household appliances to advanced computing systems.
    • IT is vital for a country's overall development, facilitating education, e-governance, and rapid economic progress.

    Definition of Information Technology

    • IT encompasses technologies designed for storing, processing, and transmitting information.

    Important Features of Information Technology

    • Simplifies and enhances access to education, particularly in remote areas.
    • Promotes e-governance, increasing public participation in governance and policy-making.
    • Aids law enforcement and judicial processes, enabling quicker proceedings.
    • Increases public access to rights and legal actions, contributing to societal happiness and prosperity.
    • Facilitates constructive use while posing challenges such as misuse and cybersecurity threats.

    Demerits of Information Technology

    • The rise of technology has also led to sophisticated criminal activities.
    • Vulnerable to misuse by children and individuals with malicious intent, leading to ethical and legal issues.

    Information Technology Act, 2000

    • The Indian government established the IT Act to cater to the growing need for IT regulation.
    • The Act facilitated e-governance, providing legal recognition to electronic records and signatures.
    • It supports electronic business transactions and mandates banks to maintain electronic records.

    Areas Covered by Information Technology

    • Key topics in IT studies include:
      • Electronics: Devices used in daily life, such as TVs, radios, and clocks.
      • Electronic Technology: Innovations like microelectronics and D.N.A. robots.

    Types of Electronic Devices

    • Semiconductor devices: Integral to most electronic gadgets, primarily made of silicon.
    • Analog devices: Measure continuous information (e.g., AM radios).
    • Digital devices: Operate using coded signals (e.g., computers).

    Advancements in Electronic Technology

    • Golden-i: A voice-operated wearable computing device.
    • DNA Robot: Research technology aimed at treating serious diseases like cancer.
    • LCD and LED: Display technologies using liquid crystals and diodes respectively.

    Additional Areas in Information Technology

    • Telecommunications: Essential for remote communication.
    • Fiber Optics: Transmits data in light pulses using total internal reflection.
    • ISDN: Standard for simultaneous voice, video, and data transmission over public networks.
    • Computer Systems: Devices for data manipulation (e.g., Blue Gene supercomputer).

    Cybercrime Challenges

    • Cybercrime can target individuals, groups, or organizations, posing significant threats to financial security.
    • Types of cybercrime include hacking, child exploitation, cyber-extortion, and cyber-terrorism.

    Cybersecurity

    • Cybersecurity involves measures to protect systems from unauthorized access and data theft.
    • High-security requirements are crucial for sensitive data belonging to government and critical organizations.

    Data Security Strategies

    • Develop a comprehensive security architecture and policies.
    • Conduct regular risk assessments and implement disaster recovery plans.

    E-Infrastructure and National Policies

    • Essential for societal development, facilitating integration of varied technologies.
    • Initiatives like the National Policy on Universal Electronic Accessibility aim to enhance electronic access for all.
    • Information Technology Investment Regions (ITIRs) support IT growth through infrastructure development.

    National Knowledge Network

    • Concept established to create a future-proof network supporting innovative research and collaboration.

    Dot Bharat Initiative

    • Launched to promote Indian languages online, enhancing digital accessibility in native scripts.### Computer Components and Functions
    • A Utility program assists users in analyzing and maintaining computers.
    • The Operating System acts as an interface between the user and the computer system.
    • A mouse pad keeps the mouse free from dust and provides a smooth surface for movement.
    • Place the index finger on the left button of the mouse and the middle finger on the right button.

    Mouse and Keyboard Basics

    • Always keep the mouse on the mouse pad for optimal use.
    • A mouse is a part of a computer system and typically has a tail (wire).
    • A keyboard generally consists of 104 keys, including both number and alphabet keys.
    • Function keys are located at the top of the keyboard and assist in executing specific functions.

    Keyboard Keys and Functions

    • The Caps Lock key is used to type in capital letters.
    • The Backspace key erases letters to the left of the cursor, whereas the Delete key removes letters to the right.
    • Arrow keys on the keyboard enable cursor movement in multiple directions (both horizontal and vertical).
    • The Ctrl + D combination is utilized to deselect a selection within text or images.

    Networking Basics

    • Cable Television is classified as a MAN (Metropolitan Area Network).
    • Topology refers to the physical layout and connections of a network computer.
    • Securing a Wi-Fi network is essential; it is a misconception that it is not important.
    • Wireless networks are generally cheaper to install and maintain compared to wired networks.

    Image Editing Tools

    • There are three different ways to crop an image in image editing software.
    • The Lasso tool includes Magnetic and Polygon types for making selections.
    • The Clone tool is distinct from the Paint Bucket tool, emphasizing that they serve different functions.

    Networking Misconceptions

    • It is incorrectly stated that there are only four types of networks; the number is not limited.
    • Networking is not exclusively for sharing resources; it also facilitates communication and data transfer.
    • WAN stands for Wide Area Network, confirming a basic understanding of network classifications.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Explore the impact of Information Technology in the 21st century, focusing on its role in economic growth and everyday life. This quiz covers its significance across various sectors and how technology influences both professional and personal environments.

    More Like This

    Use Quizgecko on...
    Browser
    Browser