Information Technology & Cyber Laws 2
#1

FUNCTIONAL UNITS OF COMPUTERS

*Input Unit
*Central Processing Unit
*Output Unit

INPUT UNIT AND OUTPUT UNIT’
*Device which receives data for processing are called input device.
*An input device converts input information into suitable binary code form acceptable to a computer.

Input Output devices
*Major Input Devices - Keyboard, Mouse, Light pen, Joystick, Scanner, Track ball, Microphone, Digital Camera, Touch screen, Barcode Reader, Optical Mark Reader (OMR), Magnetic Ink Character Recognition (MICR)
*Major Output Devices - Monitor, Printer, Projector, Sound card, Speaker, Video card, Plotter, Head phone

KEYBOARD
Keys on keyboard
*Alpha numeric keys - letters and numbers 
*Punctuation keys - comma, period, semicolon etc.
*Special keys - Function keys, arrow keys, caps lock key. etc.
*The number of function keys on keyboard 
Ans : 12
*The largest key on the keyboard 
Ans : Space bar
*The key placed at the top left comer of the keyboard
Ans : Escape key (Esc key)
*The Primary input device
Ans : Keyboard
*The Primary output device
Ans : Monitor

ASCII
*Standard which is used to convert a keystroke to its corresponding bit 
Ans : ASCII
*ASCII - American Standard Code for Information Interchange
*Normally ASCII has 7 - bit code characters.
*An 8 bit character encoding commonly used in IBM mainframe operation systems 
Ans : EBCDIC 
*EBCDIC - Extended Binary Coded Decimal Interchange Code
Ans : 256 (0-255)
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: cyber crimes cyber laws, seminar topics on cyber laws, information technology cyber law seminar topics 2012, cyber laws malayalam, cyber laws in india pdf malayalam, cyber laws and family in malayalam, cyber laws details malayalam pdf,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Information Technology & Cyber Laws 36 amrutha735 0 482 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 35 amrutha735 0 431 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 34 amrutha735 0 444 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 33 amrutha735 0 500 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 32 amrutha735 0 435 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 31 amrutha735 0 461 26-12-2017, 10:41 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 30 amrutha735 0 515 26-12-2017, 10:41 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 29 amrutha735 0 445 26-12-2017, 10:41 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 28 amrutha735 0 502 23-12-2017, 04:34 PM
Last Post: amrutha735
  Information Technology & Cyber Laws 27 amrutha735 0 503 23-12-2017, 04:33 PM
Last Post: amrutha735

Forum Jump: