computer
computer
creating, loading, or running programs and for the temporary storage and
manipulation of data, in which time of access to each item is independent of the
storage sequence.
To view all slides on a single screen in Microsoft Powerpoint, we use Slide sorter
view.
View in Slide Sorter You can view your slides as thumbnails in the Slide
Sorter view.
You can easily sort and arrange the order of your slides using this view as you
create your presentation and again when you get ready to print it.
You can see and sort the presentation slides in PowerPoint using the Slide
Sorter view.
The first ATM was installed in a Barclay's Bank branch in London in 1970.
Firefox uses the Gecko layout engine to render web pages, which implements
current and anticipated web standards.
Stuxnet
Conficker
Sasser
o This worm can easily spread out from one computer to another without
user interference.
Zeus
o Zeus Virus (or Zeus Trojan malware) is a form of malicious software that
targets Microsoft Windows and is often used to steal financial data.
Microsoft Access:
In MS Word the default action when pressing the Enter key is to create a new
paragraph.
In Microsoft Word, the keyboard shortcut Ctrl+Enter adds a page break at the
cursor's current position.
Ctrl+ L is the short key to align a paragraph to the left side of the page.
Ctrl+ E is the short key to align a paragraph to the center of the page.
Ctrl+ R is the short key to align a paragraph to the right side of the page.
Other bitmap image formats, such as JPEG, GIF, and PNG, incorporate
compression algorithms to reduce file size. Each format uses a different type of
compression, but they all represent an image as a grid of pixels. Compressed
bitmaps are significantly smaller than uncompressed BMP files and can
be downloaded more quickly. Therefore, most images you see on the web are
compressed bitmaps.
If you zoom into a bitmap image, regardless of the file format, it will look
blocky because each dot will take up more than one pixel. Therefore, bitmap
images will appear blurry if they are enlarged. Vector graphics, on the other hand,
are composed of paths instead of dots and can be scaled without reducing the
quality of the image.
Originating with the 1987 IBM PS/2 and its VGA graphics system, the 15-
pin connector went on to become ubiquitous on PCs, as well as many monitors,
projectors, and high definition television sets.
FireWire, which is also called IEEE 1394, is a connecting device used primarily
for adding peripherals to a computer.
The fundamental sequence of steps that a CPU performs is called CPU Cycle, it is
also known as the "fetch-execute cycle,".
During each cycle, a CPU can perform a basic operation such as fetching an
instruction, accessing memory, or writing data.
Since only simple commands can be performed during each cycle, most
CPU processes require multiple clock cycles.
The information on the CMOS chip includes types of disk drives are installed,
the current date and time of your system clock, and your computer's boot
sequence.
The CMOS is reset and loses all custom settings in case the battery runs out of
energy, additionally, the system clock resets when the CMOS loses power.
o It is a special kind of program which is required for the CPU to talk to other
devices. ROM chip stores all this information and the program which is stored on
ROM chips is called firmware.
o The data on the CMOS chip can be accessed and updated via the CMOS Setup
program.
o Power is required to maintain the data stored on CMOS Chip, power is supplied
by a battery on the motherboard.
HTTP protocol is used for requesting a web page in ASP.NET from the Web Server:
Important Point of HTTP
HTTP is the foundation of data communication for the World Wide Web, where
hypertext documents include hyperlinks to other resources that the user can easily
access.
Ctrl + Shift
To unhide a selected column
+O
Ctrl + Shift
To apply the percent format
+%
Ctrl + Shift
To apply the currency format
+$
Ctrl + L: The keyboard shortcut is used for aligning the objects or elements of the
MS PowerPoint towards the left.
Ctrl + M: The keyboard shortcut is used for a new slide in the presentation.
Queries: Once a table is made and also the user or computer programmer is
trying to find a calculated output, then it's referred to as queries. this might
embrace filtering, shrewd, sorting, updating, etc.
Macros: The tool victimization that predefined actions which may automatize
tasks on associate Access reports are termed macros. Multiple tasks are assigned
and they can operate whenever the macros choice is chosen on a report.
Report: Once all the data is entered into the info, it is reviewed or analysed
employing a report. A report will then be made-to-order or changed as per the
user’s demand.
Originally created in 1989, this format was first implemented in the PKZIP
utility of PKWARE, Inc. as a replacement for Thom Henderson's previous ARC
compression format. Numerous software utilities other than PKZIP quickly
supported the ZIP format then.
Transport Layer Security (TLS) and Secure Sockets Layer (SSL) are cryptographic protocols
designed to provide the security of communication over a computer network.
Software as a service(SAAS) is a licensing and distribution model of software in which software is
licensed and centrally hosted on a subscription basis.
Search engine optimization(SEO) is the method of enhancing the quality and amount of website
traffic from search engines to a website or a web page.
The affected areas are then said to be 'infected' with a computer virus when
this replication succeeds.
o For superscript, press Ctrl, Shift, and the Plus sign (+) at the same time.
Binary digit
The Simple Mail Transfer Protocol (SMTP) is used to deliver e-mail messages
over the Internet.
This protocol is used by most e-mail clients to deliver messages to the server
and is also used by servers to forward messages to their final destination.
Communication between mail servers generally uses the standard TCP port
25 designated for SMTP.
It provides high transmission speed for video and voice over an ordinary
copper telephone wire.
Object Linking and Embedding allows users to edit and create documents that
contain objects created by different applications.
F1 key: It is used as the help key in almost every program. Opens a help
screen when this key is pressed.
F3 key: Often opens a search feature for many programs, including Microsoft
Windows when at the Windows Desktop.
F6 key: Move the cursor to the address bar in Internet Explorer, Mozilla
Firefox, and most other internet browsers.
F11 key: Enter and exit full-screen mode in all modern internet browsers.
F12 key: Open the Save as a window in Microsoft Word.
This was the technology used in the first generation of computers, such as the
ENIAC, which was designed during World War II.
However, they had limitations such as generating a lot of heat, being large in
size, and being prone to burnout/failure.
Integrated Circuits:
These are miniature electronic circuits that can perform a variety of tasks,
including amplifying signals, regulating voltage, and performing logical
operations.
One of the benefits of integrated circuits is that they're much smaller and
more efficient than vacuum tubes and transistors.
Transistors:
Ctrl +
Insert a new slide
M
Alt+Tab
Alt + S
Ctrl + S
Ctrl + Tab
Shortcut
Description
keys
Ctrl+V Paste
Shift+Ins Paste
A ledge r is the actual account head to identify your transactions and are
used in all accounting vouchers.
Alt + D is the keyboard command used to delete the ledger created in tally.
o Go to Gateway of Tally > Accounts Info. > Ledgers > Alter > Press Alt+D
.
Users can delete any ledger in Tally if the balance does not exist in that
particular ledger.
Alt+C is the short key to access Auto Value Calculator in the amount field
during voucher entry.
Ctrl+C is the short key to create Cost Center from the Ledger creation
screen.
Ctrl+B is the short key to create a Budget from the Ledger creation screen.
Ctrl+G is the short key to create an account Group from the Ledger creation
screen.