- describe revolution in IT?
- What is hardware. and software? explain types of software.
- Define input and output devices? explain any five input devices?
- What is monitors? explain its types.
- What is printer? explain its types.
- What is plotter? explain it types.
- What is computer network? explain its types and advantages.
- What is topology? explain network topologies.
- What is osi model? explain different layers of osi model
- What is data communication? explain its modes.
- Explain synchronous and asynchronous transmision?
- What is communication media? explain its types.
- Explain virus and antivirus?
- Explain different applications and uses of computers?
- What is copyright? explain copyright law?
- What are data protection and privacy issues?
- What is operating system? explain features of windows operating systems.
- What is word processing? explain features of word processing.
- What is spreed sheet? explain its features
- What is internet? explain its uses and applications.
- Describe the role of information technology in promoting primary education?
- What is computer memory? explain various a units of computer memory in detail.
- What is difference between input and output devices? elaborate.
- What is main purpose of operating system? how you different it from other types of software?
- Describe the shutting down and booting up process of computer system in detail.
- Define data communication system. also elaborate its various modes.
- What is a network topology? write note one any three well known network topology.
- Describe the purpose of footnote and end note. write procedure for inserting footnote and end note in MS Word document.
- Make a worksheet having some numerical data. use this data and apply all the basic formals (hints, add, subtract multiply and divide) document your working in a report?
- Apply various filtering techniques on data using worksheet filter and explain it?
- Disuse the merit and demerit of internet and email?
- Define data backup how you will protect your valuable data from various attacks?
Thursday 5 December 2013
Aiou code 360 Information Technology Application important Questions Spring 2013
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment