Ans:- An electronic device that processes data to produce meaningful information.
Ans:- Charles Babbage.
Ans:- Central Processing Unit.
Ans:- CPU.
Ans:- Arithmetic Logic Unit.
Ans:- Control Unit.
Ans:- ALU and CU.
Ans:- Raw facts and figures.
Ans:- Processed data that is meaningful to the user.
Ans:- Input, Processing, and Output units.
Ans:- Keyboard.
Ans:- Monitor.
Ans:- Basic Input Output System.
Ans:- Physical components of a computer.
Ans:- A set of instructions that tells the computer what to do.
Ans:- System software and Application software.
Ans:- Software that manages computer hardware and software resources.
Ans:- Windows.
Ans:- A device used to enter data into a computer.
Ans:- Keyboard and Mouse.
Ans:- A device used to display or print processed data.
Ans:- Monitor and Printer.
Ans:- The storage area in a computer for data and instructions.
Ans:- Primary memory and Secondary memory.
Ans:- Random Access Memory.
Ans:- Read Only Memory.
Ans:- Electrically Erasable Programmable Read Only Memory.
Ans:- RAM
Ans:- ROM.
Ans:- Universal Serial Bus.
Ans:- A secondary storage device used to store data permanently.
Ans:- What is a byte?
Ans:- Bit.
Ans:- Kilobyte
Ans:- 1024 bytes.
Ans:- A collection of data or information stored in a computer.
Ans:- A container used to organize files.
Ans:- An external device connected to a computer.
Ans:- A group of computers connected to share resources and information.
Ans:- Local Area Network.
Ans:- Wide Area Network.
Ans:- Metropolitan Area Network.
Ans:- Internet Protocol.
Ans:- Uniform Resource Locator.
Ans:- World Wide Web.
Ans:- Software used to access the Internet.
Ans:- Google Chrome.
Ans:- Electronic mail used for sending messages via the Internet.
Ans:- Internet Service Provider.
Ans:- A malicious program that can damage computer data.
Ans:- Software that detects and removes computer viruses.
Ans:- Quick Heal.
Ans:- A program used to organize data in rows and columns.
Ans:- Graphical User Interface.
Ans:- An instruction given to the computer to perform a specific task.
Ans:- A set of instructions written to perform a task.
Ans:- The process of writing computer programs.
Ans:- A software that converts source code into machine code.
Ans:- An organized collection of data.
Ans:- The main processing chip in a computer.
Ans:- American Standard Code for Information Interchange.
Ans:- Portable Document Format.
Ans:- HyperText Markup Language
Ans:- HyperText Transfer Protocol.
Ans:- A device that converts digital signals to analog and vice versa.
Ans:- A wireless technology for short-range communication.
Ans:- Wireless Fidelity; a technology for wireless networking.
Ans:- Storing and accessing data over the Internet instead of a local computer.
Ans:- Representing binary data (0 or 1).
Ans:- A step-by-step procedure to solve a problem.
Ans:- A diagram showing the steps of an algorithm.
Ans:- Running multiple tasks simultaneously on a computer.
Ans:- The process of starting a computer.
Ans:- Restarting a computer without turning off the power.
Ans:- Starting the computer after power is switched on
Ans:- The smallest unit of a digital image.
Ans:- An output device used to print documents.
Ans:- Inkjet and Laser printers.
Ans:- An input device used to convert physical documents into digital form.
Ans:- A device used to print large drawings and graphics.
Ans:- A display that responds to touch input.
Ans:- A device that reads barcodes on products.
Ans:- Automated Teller Machine.
Ans:- Information and Communication Technology.
Ans:- Copying data for protection against loss.
Ans:- A computer that provides resources to other computers.
Ans:- A computer that requests services from a server.
Ans:- Software with freely available source code.
Ans:- Software owned by an individual or company.
Ans:- Software that is free to use.
Ans:- Software distributed for free on a trial basis.
Ans:- The process of converting data into a secure format.
Ans:- Converting encrypted data back to readable form.
Ans:- Illegal activities performed using computers.
Ans:- A security system that controls incoming and outgoing network traffic.
Ans:- The simulation of human intelligence by machines.
Ans:- A program that simulates human conversation.
Ans:- The intersection of a row and column in a spreadsheet.
Ans:- A clickable link that connects to another document or webpage.
Ans:- The use of text, images, sound, and video together.