Answer: Analytical engineThe Analytical Engine was a proposed mechanical general-purpose computer designed by English mathematician and computer pioneer Charles Babbage. It was first described in 1837 as the successor to Babbage's difference engine, a design for a mechanical computer.
Answer: CursorIn computer user interfaces, a cursor is an indicator used to show the current position for user interaction on a computer monitor or other display device that will respond to input from a text input or pointing device.
Answer: MachineCPU doesn’t understand the C++ language (or any high level programming language). All the High level language statements must be translated into machine code before they can be executed.
Answer: Root directoryThe root directory is the first or top-most directory in a hierarchy. It can be likened to the trunk of a tree, as the starting point where all branches originate from. The root file system is the file system contained on the same disk partition on which the root directory is located; it is the file system on top of which all other file systems are mounted as the system boots up.
Answer: BugA software bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.
Answer: Third generationMulti-programming started in third generation.
Answer: MultimediaMultimedia is content that uses a combination of different content forms such as text, audio, images, animation, video and interactive content. Multimedia can be recorded and played, displayed, dynamic, interacted with or accessed by information content processing devices, such as computerized and electronic devices, but can also be part of a live performance.
Answer: PatchA patch is a piece of software designed to update a computer program or its supporting data, to fix or improve it. This includes fixing security vulnerabilities and other bugs, with such patches usually called bug fixes, and improving the usability or performance.
Answer: SchemaA database schema is the skeleton structure that represents the logical view of the entire database. It defines how the data is organized and how the relations among them are associated. It formulates all the constraints that are to be applied on the data.
Answer: Software that drives graphics hardwareMicrosoft DirectX is a collection of application programming interfaces (APIs) for handling tasks related to multimedia, especially game programming and video, on Microsoft platforms.
Answer: Delete keyDelete key is used to delete data.
Answer: All of the aboveModifier keys include Alt, Ctrl, Shift. A modifier key is a key that modifies the action of another key when the two are pressed together.
Answer: subclassesA superclass passes its characteristics to it's subclass in concept of inheritance in programming languages.
Answer: Write Once Read ManyIn computer storage media, WORM (write once, read many) is a data storage technology that allows information to be written to a disc a single time and prevents the drive from erasing the data. The discs are intentionally not rewritable, because they are especially intended to store data that the user does not want to erase accidentally.
Answer: ParamPARAM is a series of supercomputers designed and assembled by the Centre for Development of Advanced Computing (C-DAC) in Pune, India. The latest machine in the series is the PARAM Kanchenjunga.
Answer: Power PointPowerPoint is used to make presentations/slide shows.
Answer: Caps LockA Toggle key is a key that is operated the same way but with opposite effect on successive occasions.
Answer: bombSome viruses have a delayed payload, which is sometimes called a bomb. For example, a virus might display a message on a specific day or wait until it has infected a certain number of hosts. A time bomb occurs during a particular date or time, and a logic bomb occurs when the user of a computer takes an action that triggers the bomb.
Answer: Unauthorised AttacksFirewall protects against Unauthorised Attacks. Network firewalls may be hardware devices, software programs, or a combination of the two. Network firewalls guard an internal computer network against malicious access from the outside. Network firewalls may also be configured to restrict access to the outside from internal users.
Answer: Software processSoftware process deals with the technical and management issues of software development.