Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1:

a) prepare the full form of the given abbreviations:

•    VDU
•    EPROM
•    RAM
•    CPU

b) Distinguish between primary and secondary memory.

c) Describe the role of operating system in a computer.

d) What do you understand by the term BYTES?

problem 2:

a) describe different ‘Secondary Storage devices’.
b) List out the input devices and output devices.
c) Describe the function of ‘Control unit’ in the Central processing unit of a computer.
d) Enlist various types of control and functional keys on the keyboard.

problem 3:

a) Describe ‘Control Box’ in a window, giving a neat sketch.
b) prepare the names of Common Accessory applications. In addition prepare steps to access each of them.
c) Describe the role of Window Explorer in a computer.
d) prepare down steps to rename a file or a folder.

problem 4:

a) prepare down steps of changing font size of text in MS Word.
b) prepare steps of ‘Bulleting the text’ in MS Word in a, b, c format.
c) Describe, in brief, creating a document via template in MS Word.
d) prepare steps of changing Color of text in MS Word.

problem 5:

a) prepare all the steps to print a MS Word document.
b) How can you insert header and footer in a MS Word document?
c) In brief describe the ‘Different layout’ option in the MS Word.
d) What is the usefulness of ‘Print Preview’ option? From which menu can you access it?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92682

Have any Question? 


Related Questions in Computer Engineering

The probability of a risk is not the only metric in

The probability of a risk is not the only metric in determining what risks to mitigate. The cost and time associated with the risk, and the overall impact to the organization are some of the factors that must be consider ...

Show that if strings over an alphabet a with at least two

Show that if strings over an alphabet A with at least two letters are encoded over a one-letter alphabet (a unary encoding), then strings of length n over A require strings of length exponential in n in the unary encodin ...

Most cd music has two channels calculate the data rate in

Most CD music has two channels. Calculate the data rate, in kbps, for each channel of CD music based on its sampling rate and bit depth. If CD music (two channels) is converted to MP3 files at 256 kbps, what is the compr ...

Structured assignment - business continuity policy

Structured Assignment - Business Continuity Policy Statement Research paper You have been hired as a consultant to design BCP for SanGrafix, a video and PC game design company. SanGrafix's newest game has become a hot se ...

Compare and contrast crystallized versus fluid intelligence

Compare and contrast crystallized versus fluid intelligence. Give an example of each form of intelligence 3 paragraphs.

Assume that you have a table named newemployee that has the

Assume that you have a table named NEW_EMPLOYEE that has the columns Department, Email, First Name, and Last Name, in that order. Write an INSERT statement to add all of the rows from the table NEW_EMPLOYEE to EMPLOYEE. ...

Go on the internet eg the amazon site or the digikey or

Go on the internet, eg. the Amazon site, or the Digikey or Newark distributor sites, and read up on three types of Arduino shields used with the Arduino Uno. Explain what type of projects each shield is used with.

1 describe the mitigation procedures used to address the

1. Describe the mitigation procedures used to address the difficulties identified in Problem 26.5. 2. Describe the basic policy for log management. 3. Describe how to protect XML content in web service messages. 4. Descr ...

These exercises consider data from the 2005-2006 nhanes the

These exercises consider data from the 2005-2006 NHANES. The objective of this set of exercises is to perform a typical imputation and analysis session. The logical steps include examination of missing data, imputation o ...

One of the reasons for using planning-driven approaches in

One of the reasons for using planning-driven approaches in software development projects is that the plan provides some structure to measure project progress. Do you think this measure is adequate? Can you think of bette ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate