Information Technology & Cyber Laws 2
#1

FUNCTIONAL UNITS OF COMPUTERS

*Input Unit
*Central Processing Unit
*Output Unit

INPUT UNIT AND OUTPUT UNIT’
*Device which receives data for processing are called input device.
*An input device converts input information into suitable binary code form acceptable to a computer.

Input Output devices
*Major Input Devices - Keyboard, Mouse, Light pen, Joystick, Scanner, Track ball, Microphone, Digital Camera, Touch screen, Barcode Reader, Optical Mark Reader (OMR), Magnetic Ink Character Recognition (MICR)
*Major Output Devices - Monitor, Printer, Projector, Sound card, Speaker, Video card, Plotter, Head phone

KEYBOARD
Keys on keyboard
*Alpha numeric keys - letters and numbers 
*Punctuation keys - comma, period, semicolon etc.
*Special keys - Function keys, arrow keys, caps lock key. etc.
*The number of function keys on keyboard 
Ans : 12
*The largest key on the keyboard 
Ans : Space bar
*The key placed at the top left comer of the keyboard
Ans : Escape key (Esc key)
*The Primary input device
Ans : Keyboard
*The Primary output device
Ans : Monitor

ASCII
*Standard which is used to convert a keystroke to its corresponding bit 
Ans : ASCII
*ASCII - American Standard Code for Information Interchange
*Normally ASCII has 7 - bit code characters.
*An 8 bit character encoding commonly used in IBM mainframe operation systems 
Ans : EBCDIC 
*EBCDIC - Extended Binary Coded Decimal Interchange Code
Ans : 256 (0-255)
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: cyber crimes cyber laws, cyber laws in malayalam, kerala cyber laws in malayalam, china cyber laws seminar report, cyber laws in india pdf in malayalam, cyber laws details malayalam pdf, seminar topics on cyber laws,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Information Technology & Cyber Laws 36 amrutha735 0 476 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 35 amrutha735 0 425 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 34 amrutha735 0 435 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 33 amrutha735 0 493 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 32 amrutha735 0 428 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 31 amrutha735 0 456 26-12-2017, 10:41 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 30 amrutha735 0 507 26-12-2017, 10:41 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 29 amrutha735 0 433 26-12-2017, 10:41 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 28 amrutha735 0 485 23-12-2017, 04:34 PM
Last Post: amrutha735
  Information Technology & Cyber Laws 27 amrutha735 0 491 23-12-2017, 04:33 PM
Last Post: amrutha735

Forum Jump: