Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1:

a) prepare the full form of the given abbreviations:

•    VDU
•    EPROM
•    RAM
•    CPU

b) Distinguish between primary and secondary memory.

c) Describe the role of operating system in a computer.

d) What do you understand by the term BYTES?

problem 2:

a) describe different ‘Secondary Storage devices’.
b) List out the input devices and output devices.
c) Describe the function of ‘Control unit’ in the Central processing unit of a computer.
d) Enlist various types of control and functional keys on the keyboard.

problem 3:

a) Describe ‘Control Box’ in a window, giving a neat sketch.
b) prepare the names of Common Accessory applications. In addition prepare steps to access each of them.
c) Describe the role of Window Explorer in a computer.
d) prepare down steps to rename a file or a folder.

problem 4:

a) prepare down steps of changing font size of text in MS Word.
b) prepare steps of ‘Bulleting the text’ in MS Word in a, b, c format.
c) Describe, in brief, creating a document via template in MS Word.
d) prepare steps of changing Color of text in MS Word.

problem 5:

a) prepare all the steps to print a MS Word document.
b) How can you insert header and footer in a MS Word document?
c) In brief describe the ‘Different layout’ option in the MS Word.
d) What is the usefulness of ‘Print Preview’ option? From which menu can you access it?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92682

Have any Question? 


Related Questions in Computer Engineering

1 what is the relationship between d-amps and amps2 what is

1. What is the relationship between D-AMPS and AMPS? 2. What is GSM? 3. What is the function of the CDMA in IS-95? 4. What are the three types of orbits? 5. Which type of orbit does a GEO satellite have? Explain your ans ...

1 use keplers law to check the accuracy of a given period

1. Use Kepler's law to check the accuracy of a given period and altitude for an Iridium satellite. 2. Use Kepler's law to check the accuracy of a given period and altitude for a Globalstar satellite. 3. Find the efficien ...

The stream cipher described in definition 211 can easily be

The stream cipher described in Definition 2.1.1 can easily be generalized to work in alphabets other than the binary one. For manual encryption, an especially useful one is a stream cipher that operates on letters. 1. De ...

In some applications particular information needs to be

In some applications, particular information needs to be retrieved from a list with a much higher frequency than other information. Under these conditions the best way to arrange the list is to put the most frequently re ...

The work of an it department is never finished the wvcc

The work of an IT department is never finished. The WVCC network administrators and student assistants have many plans for the next network upgrade. Their main concern at this point is availability. Although the hierarch ...

1 study and suggest the best ways to defend the national

1. Study and suggest the best ways to defend the national critical infrastructure from potential attackers. 2. We indicated in the text that the best ways to manage security threats is to do an extensive risk assessment ...

Choose an insurance company domiciled in ohio nationwide

Choose an insurance company domiciled in Ohio.(( Nationwide, Grange, Progressive, Westfield, State Auto Ins. )) . Choose a company that has a lot of information available on it's website so that you can do a thorough job ...

Advanced problem there are ways to improve the

Advanced problem!) There are ways to improve the square-and-multiply algorithm, that is, to reduce the number of operations required. Although the number of squarings is fixed, the number of multiplications can be reduce ...

1 compare the authorization model used by the network

1. Compare the authorization model used by the network operating systems (NOS) to that used by the old stand-alone operating systems. 2. List and discuss the most common access privileges in a computing system. 3. Discus ...

Verify the rsa with crt example in the chapter by computing

Verify the RSA with CRT example in the chapter by computing yd = 15103 mod 143 using the square-and-multiply algorithm.  An RSA encryption scheme has the set-up parameters p = 31 and q = 37. The public key is e = 17. 1. ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro