………. is a computer program that provides services to other computer programs. -Technology

1 Answer

Answer :

Server is a computer program that provides services to other computer programs.

Related questions

Description : ……… is a computer program that detects, prevents and takes action to remove malicious software programs. -Technology

Last Answer : Antivirus is a computer program that detects, prevents and takes action to remove malicious software programs.

Description : MAN provides communication services upto 5 km. -Technology

Last Answer : False MAN provides communication services upto 100 km.

Description : Programs that ask servers for services are called (a) users (b) hosts -Technology

Last Answer : (c) In the client-server model, the client is a piece of hardware/software that ask servers for services.

Description : ……….. is a software program that provides a user interface to work with the file system. -Technology

Last Answer : File manageris a software program that provides a user interface to work with the file system.

Description : ………… is a program that mediates between application programs and hardware. -Technology

Last Answer : Operating systemis a program that mediates between application programs and hardware.

Description : ……….. is a computer which provides sharing the resources of other computers connected in a network. -Technology

Last Answer : Serveris a computer which provides sharing the resources of other computers connected in a network.

Description : Computer is a folder that provides you with a convenient place to store your important files and folders. -Technology

Last Answer : FalseComputer is an icon on desktop. It does not store files and folders, it simply helps you to display the folders contained on that drive.

Description : The time_sharing operating system allows multiple programs share the computer resources simultaneously. -Technology

Last Answer : TrueIn time-sharing OS, a small amount of time is allocated for the processing simultaneously.

Description : Which of the following is incorrect? a) A Layered-style program is divided into an array of modules or layers b) Each layer provides services to the layer “below” and makes use of services provided by the layer “above” c) All of the mentioned d) None of the mentioned

Last Answer : Each layer provides services to the layer “below” and makes use of services provided by the layer “above”

Description : In twisted pair cable, two insulated wires are twisted around each other which provides protection against noise. Explain. -Technology

Last Answer : Twisting the cables keep them close together so that, any external magnetic fields must cross both cable at the same time, so the interference created in one cable is cancelled by the almost exact opposite amount of interference in the other.

Description : ……………… feature allows you to view different items such as comments, formatting etc. and also provides the option to view other author’s comments. -Technology

Last Answer : (c) Show Markup feature under Review tab allows you to view different items.

Description : For what, Memo data type is used? (a) To add table (b) To store objects created in other programs -Technology

Last Answer : (c) As we know, Memo provides character upto 65536 so, it is used for long text entries.

Description : RDBMS provides relational operators to manipulate the data. Here, RDBMS refers to (a) Record Database Management System -Technology

Last Answer : (b) RDBMS stands for Relational Database Management System, which provides the operator to manipulate the data stored in the database table.

Description : The ait attribute provides …………… for an image. -Technology

Last Answer : alternative information

Description : ………….. is a visual desktop experience which provides an easy way to access desktop. -Technology

Last Answer : Aero is a visual desktop experience which provides an easy way to access desktop.

Description : ……….. option provides a way to change the size of an image. -Technology

Last Answer : Compressoption provides a way to change the size of an image.

Description : ………………. provides a command to change the layout of your slide. -Technology

Last Answer : Home tab provides a command to change the layout of your slide.

Description : Sutapa received an email from her bank stating that there is a problem with her account. The email provides -Technology

Last Answer : She should check whether it is a valid bank site or not by checking in the url https. It is always better to type the url and then login to the site. She should not click on the link provided in the email.

Description : Utility programs include (a) Virus scanning software (b) Backup software -Technology

Last Answer : (d) Utility programs includes virus scanning, backup, disk defragmenter software.

Description : The set of programs designed to perform user specific tasks is called application software. -Technology

Last Answer : TrueApplication software refers to the programs that perform operations for a specified task of a user.

Description : What are the some important programs of Accessories? -Technology

Last Answer : Some important programs of Accessories are as follows:1. Calculator It offers advanced capabilities of a programming, scientific and statistical calculator.2. Text Editor It refers to a simple Word processor ... that is used to create drawings on a blank drawing area or in an existing pictures.

Description : It is used to start programs, obtain help, search for files and folders etc. (a) File menu (b) Edit menu (c) Format menu (d) Start button -Technology

Last Answer : (d) Start button is used to start program, obtain helps, search for files and folders etc and also displays the most commonly used programs in a particular context.

Description : …………. represent graphical representation of various files and programs of an operating system. -Technology

Last Answer : Icons represent graphical representation of various files and programs of an operating system.

Description : …………. represent graphical representation of various files and programs of an operating system. -Technology

Last Answer : Recycle Binrepresent graphical representation of various files and programs of an operating system.

Description : ………….. are desktop icons that links to particular files and programs. -Technology

Last Answer : Shortcutsare desktop icons that links to particular files and programs.

Description : What is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them? -Technology

Last Answer : Antivirus is used to identify, prevent and take action against malicious programs such as viruses and worms, by deactivating or deleting them.

Description : List some commonly available antivirus programs. -Technology

Last Answer : Some of the commonly available antivirus programs in the market are as follows:1. Symantec Norton antivirus2. AVG antivirus3. McAfee scan4. Quick Heal

Description : One limitation of antivirus programs is that they: (a) Sometimes start behaving like virus -Technology

Last Answer : (d) Antivirus can detect only those viruses for which they are programmed.

Description : Point out the correct statement. a) Eucalyptus and Rackspace both use Amazon EC2 and S3 services b) The RightScale user interface provides real-time measurements of individual server instances c) ... technology are highly configurable and can be run under batch control d) All of the mentioned

Last Answer : All of the mentioned

Description : …………. is a program interface that enables a user to communicate with computer through graphics or symbols. -Technology

Last Answer : GUI (Graphical User Interface) is a program interface that enables a user to communicate with computer through graphics or symbols.

Description : A …….. is a virus that is often disguised as a useful computer program. -Technology

Last Answer : (a) Trojan horse is a virus, i.e. often disguised as a useful computer program.

Description : A ……. is a software program that is designed to copy itself from one computer to another, without human intervention. -Technology

Last Answer : (c) A worm is a self-replicating software program. It does not require another program to host it.

Description : A malicious program that is used to remove all information from your computer is known as ……… -Technology

Last Answer : A malicious program that is used to remove all information from your computer is known asthe sweeper.

Description : ……….. is a software program that is designed to copy itself from one computer to another. -Technology

Last Answer : Worm is a software program that is designed to copy itself from one computer to another.

Description : A virus is a harmful program, which one entering a computer, starts creating copies of itself. -Technology

Last Answer : True Virus is a malicious program that is designed to make a system sick, just like a real virus.

Description : Does Microsoft Office provides photo edit programs?

Last Answer : Not really. Mircosoft office is generally made for business and professional use such as working on tasks for work or school projects, Microsoft did used to offer picture editor but no longer produce this software, they do still have picture manager though its tools are not usefull for editing

Description : Who provides the programs stored in ROM?

Last Answer : Only the manufacturer

Description : Which of these services will not be provided by a typical Internet Service Provider (ISP)? -Technology

Last Answer : (a) ISP refers to a company that provides Internet services, modem, connection and technical help. It does not provide an E-mail address.

Description : Mention the services which are provided by transactional category of an E_banking. -Technology

Last Answer : There are no geographical barriers and the services that can be offered at a minimum cost. Through Internet banking, you can check your transactions at any time and as many times as you want to. ... transaction. e.g. a customer login to his or her bank account by accessing the bank Website.

Description : ……. services typically include reviewing account activity and balance, sending electronic payments -Technology

Last Answer : (a) E-banking provides all transactional and non-transactional activities.

Description : Write a brief note on Vividh Bharati Services. -Technology

Last Answer : Vividh Bharati was started on 2nd October 1957, as a service of 'light entertainment' to compete with Radio Ceylon.Earlier, AIR had banned film music on its prgrammes. Sponsored programmes were ... rest of the time was given to devotional music, short plays, short stories and poetry recitals.

Description : Is there a customizable program that uses themes to control different programs on my computer?

Last Answer : It’s in control panel; it’s called Parental Controls

Description : Which statement is valid about computer program? A) High level languages must be converted into machine language to execute B) High level language programs are more efficient and faster to execute C) It ... to identify errors in high level language program than in low level programs D) All of above

Last Answer : Answer : A

Description : What do you understand by the term DOS: a) Downloading the system program from the Internet b) Downloading operating system c) The master control program of the computer which helps the computer to ... d) The programs which helps computer to check the various peripheral devices e) None of The Above

Last Answer : e) None of The Above

Description : Computer programs are written in a high level programming language, however, the human readable version of a program is called a) cache b) instruction set c) source code d) word size

Last Answer : c) source code

Description : ……. is an electronic device that manipulates information or data according to the set of instructions called program. -Technology

Last Answer : Computeris an electronic device that manipulates information or data according to the set of instructions called program.

Description : Which language processor converts an HLL program into machine language at once? -Technology

Last Answer : Compiler is a language processor which converts whole HLL program into machine language at once which can be understood by the processor.

Description : A search engine is a program to search (a) for information (b) Web pages -Technology

Last Answer : (d) A search engine is a software system that is designed to search for information on the Web pages.

Description : Which device is used to convert the program written in assembly language into machine language? (a) Interpreter -Technology

Last Answer : (c) Assembler is used to convert the program written in assembly language into machine language because it is a language processor that converts the user defined language into a form which can be easily understood by the computer.

Description : Which of the following is not related to a utility software? (a) Text editor (b) Antivirus program (c) Disk compression software -Technology

Last Answer : (d) Railway reservation system is an example of application software whereas, rest all are software utilities.