Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1:

a) prepare the full form of the given abbreviations:

•    VDU
•    EPROM
•    RAM
•    CPU

b) Distinguish between primary and secondary memory.

c) Describe the role of operating system in a computer.

d) What do you understand by the term BYTES?

problem 2:

a) describe different ‘Secondary Storage devices’.
b) List out the input devices and output devices.
c) Describe the function of ‘Control unit’ in the Central processing unit of a computer.
d) Enlist various types of control and functional keys on the keyboard.

problem 3:

a) Describe ‘Control Box’ in a window, giving a neat sketch.
b) prepare the names of Common Accessory applications. In addition prepare steps to access each of them.
c) Describe the role of Window Explorer in a computer.
d) prepare down steps to rename a file or a folder.

problem 4:

a) prepare down steps of changing font size of text in MS Word.
b) prepare steps of ‘Bulleting the text’ in MS Word in a, b, c format.
c) Describe, in brief, creating a document via template in MS Word.
d) prepare steps of changing Color of text in MS Word.

problem 5:

a) prepare all the steps to print a MS Word document.
b) How can you insert header and footer in a MS Word document?
c) In brief describe the ‘Different layout’ option in the MS Word.
d) What is the usefulness of ‘Print Preview’ option? From which menu can you access it?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92682

Have any Question? 


Related Questions in Computer Engineering

Here is a sugared lambda expression that uses let

Here is a "sugared" lambda expression that uses let declarations: Let compose = λf. λg. λx. f (g x) in let h = λx. x + x in compose h h 3 The "desugared" lambda expression, obtained when each let z = U in V is re- placed ...

1 rewrite the computer terms glossary application using the

1. Rewrite the computer terms glossary application using the customdesigned Hash class developed in this chapter. Experiment with different hash functions and collision-resolution strategies. 2. Using the Hashtable class ...

Assignment ticket seller phase iithis assignment contains

Assignment: Ticket Seller Phase II This assignment contains elements that you have learned over the past few weeks, including: An event planning document outlining objects, triggers, and events that will be used to drive ...

Read the scenario carefully and then discuss how the

Read the scenario carefully and then discuss how the concepts of confidentiality, integrity, and availability relate to the value of each asset. For example, the school would normally have the student's health records. W ...

Design an algorithm to simulate multiplication by addition

Design an algorithm to simulate multiplication by addition. Your program should accept as input two integers (they may be zero, positive, or negative).

1 what is security and information security what is the

1. What is security and information security? What is the difference? 2. It has been stated that security is a continuous process; what are the states in this process? 3. What are the differences between symmetric and as ...

1 calculate the cpi for the processor in the table using 1

1. Calculate the CPI for the processor in the table using: 1) only a first level cache, 2) a second level direct-mapped cache, and 3) a second level eight-way set associative cache. How do these numbers change if main me ...

1 write a program that performs a simulation to estimate

1. Write a program that performs a simulation to estimate the probability of rolling five-of-a-kind in a single roll of five six-sided dice. 2. A random walk is a particular kind of probabilistic simulation that models c ...

Balanced scorecard analysis and strategic

Balanced Scorecard Analysis and Strategic Plan Resources Balanced Scorecard Analysis and Strategic Plan Scoring Guide. iGuide: ePortfolio. APA Style and Format. This assignment is the culmination of your work in previous ...

1 name two accessor methods and two mutator methods of the

1. Name two accessor methods and two mutator methods of the Rectangle class. 2. Look into the API documentation of the Rectangle class and locate the method Read through the method documentation. Then determine the resul ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro