Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1:

a) prepare the full form of the given abbreviations:

•    VDU
•    EPROM
•    RAM
•    CPU

b) Distinguish between primary and secondary memory.

c) Describe the role of operating system in a computer.

d) What do you understand by the term BYTES?

problem 2:

a) describe different ‘Secondary Storage devices’.
b) List out the input devices and output devices.
c) Describe the function of ‘Control unit’ in the Central processing unit of a computer.
d) Enlist various types of control and functional keys on the keyboard.

problem 3:

a) Describe ‘Control Box’ in a window, giving a neat sketch.
b) prepare the names of Common Accessory applications. In addition prepare steps to access each of them.
c) Describe the role of Window Explorer in a computer.
d) prepare down steps to rename a file or a folder.

problem 4:

a) prepare down steps of changing font size of text in MS Word.
b) prepare steps of ‘Bulleting the text’ in MS Word in a, b, c format.
c) Describe, in brief, creating a document via template in MS Word.
d) prepare steps of changing Color of text in MS Word.

problem 5:

a) prepare all the steps to print a MS Word document.
b) How can you insert header and footer in a MS Word document?
c) In brief describe the ‘Different layout’ option in the MS Word.
d) What is the usefulness of ‘Print Preview’ option? From which menu can you access it?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92682

Have any Question? 


Related Questions in Computer Engineering

Visit the nist web site and view the document announcing

Visit the NIST Web site and view the document "Announcing the Advanced Encryption Standard (AES)" which can be found at http://csrc.nist.gov/publications/fips/ fips197/fips-197.pdf. Review the FIPS-197 standard. Examine ...

1 as mentioned in the link-layer fragmentation and

1. As mentioned in the "Link-Layer Fragmentation and Interleaving" section, PPP, Frame Relay, ATM, and other WAN technologies support fragmenting packets (frames) at Layer 2. As you may have learned in basic networking c ...

1 in chapter 8 we learned that a circuit-switched network

1. In Chapter 8, we learned that a circuit-switched network needs end-to-end addressing during the setup and teardown phases. Define end-to-end addressing in a telephone network when two parties communicate. 2. When we h ...

1 is the use of checksum for error control optional or

1. Is the use of checksum for error control optional or mandatory in a. UDP? b. TCP? 2. Assume a TCP server expects to receive byte 2001, but it receives a segment with sequence number 2200. What is the reaction of the T ...

Perform a hierarchical clustering of the one-dimensional

Perform a hierarchical clustering of the one-dimensional set of points 1, 4, 9, 16, 25, 36, 49, 64, 81, assuming clusters are represented by their centroid (average), and at each step the clusters wit

Design and implement a merging algorithm that uses only two

Design and implement a merging algorithm that uses only two arrays. It can be assumed that the sizes of the two data sets are known in advance. An interesting way to do this is to place the array with the biggest element ...

A create a new model with a setup procedure that creates

(a) Create a new model with a SETUP procedure that creates turtles. (b) Create a slider that controls the number of turtles created. (c) Write a GO procedure that makes the turtles wander around the screen randomly. (d) ...

1 can the value of the header length field in an ipv4

1. Can the value of the header length field in an IPv4 packet be less than 5? When is it exactly 5? 2. A host is sending 100 datagrams to another host. If the identification number of the first datagram is 1024, what is ...

Using a graphics program design several security awareness

Using a graphics program, design several security awareness posters on the following themes: updating antivirus signatures, protecting sensitive information, watching out for e-mail viruses, prohibiting the personal use ...

Deterministic and random behavior it is human nature to

Deterministic and random behavior It is human nature to assume that there is a causal force behind everything that we observe, but some times this is not the case. However, even when we have a perfect understanding of a ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro