No products in the cart.

Ask questions which are clear, concise and easy to understand.

Ask Question
  • 1 answers

Gaurav Seth 5 years ago

<th>BASIS FOR COMPARISON</th> <th>PRIMARY MEMORY</th> <th>SECONDARY MEMORY</th>
Basic Primary memory is directly accessible by Processor/CPU. Secondary memory is not directly accessible by CPU.
Altered Name Main memory. Auxiliary memory.
Data Instructions or data to be currently executed are copied to main memory. Data to be permanently stored is kept in secondary memory.
Volatility Primary memory is usually volatile. Secondary memory is non-volatile.
Formation Primary memories are made of semiconductors. Secondary memories are made of magnetic and optical material.
Access Speed Accessing data from primary memory is faster. Accessing data from secondary memory is slower.
Access Primary memory is accessed by the data bus. Secondary memory is accessed by input-output channels.
Size The computer has a small primary memory. The computer has a larger secondary memory.
Expense Primary memory is costlier than secondary memory. Secondary memory is cheaper than primary memory
Memory Primary memory is an internal memory. Secondary memory is an external memory.
  • 1 answers

Shivam Tyagi 5 years ago

By unacdmey Let's crack it
  • 1 answers

Gaurav Seth 5 years ago

Microsoft is a leading global vendor of computer software; hardware for computer, mobile and gaming systems; and cloud services. Microsoft's corporate headquarters is located in Redmond, Wash., and it has offices in more than 60 countries.

Company origins:

Microsoft's roots go back at least as far as 1975, when the first commercially available personal computer appeared on the cover of Popular Electronics magazine. The Altair 8800 was a rudimentary system, but it found a market for home-based computers and created a new demand for software to use with these systems.

  • 1 answers

Kartik Yadav 5 years ago

Why do I need to activate or deactivate my apps? Activation validates your software license by contacting Adobe servers periodically. The frequency depends on the app and your plan. Deactivation disconnects your app from your computer. You can then activate the apps on another computer or later reactivate them on the same computer. How do I activate an app? Make sure your computer is connected to the Internet. Open the app that you want to activate. If prompted, sign in. Your app is now activated. Otherwise, choose one of the following options from the Help menu depending on your app:                   Help > Sign in                  Help > Activate  If you see Sign Out in the menu option, it means you are already signed in. How do I deactivate an app? Make sure your computer is connected to the Internet. Open the app that you want to deactivate, and sign in if prompted. Choose one of the following options from the Help menu depending on your app:               Help > Sign out                 Help > Deactivate  If you select Help > Deactivate choose one of the following options (when prompted): Deactivate or Suspend Activation: Temporarily deactivates the app, but retains licensing information on your computer. Deactivate permanently: Removes the licensing information from your computer and requires you enter a serial number to activate again. RUNNING INTO A PROBLEM? If you still have issues in activating or deactivating your apps, see one of the following: Troubleshoot Creative Cloud activation errors  Troubleshoot activation errors for non-subscription products Switching to a new computer? If you bought a new computer and want to transfer your apps to it, simply deactivate your apps from the old computer so that you can use them on the new computer.
  • 1 answers

Yogita Ingle 5 years ago

An organization performs all the activities through proper communication. To perform the organizational activities smoothly and efficiently, effective communication plays a vital role. Effective communication makes the receiver understand the meaning of the message as per the intention of the sender. It makes the receiver see and feel as the sender does. The effective communication plays an important role for the successful operation of the organization. There are a number of barriers to effective communication. These barriers are the blockage, breakdowns, and disruption in the flow of the message. Due to these barriers, the receiver cannot understand the meaning of the message as per the intention of the sender. These barriers create problems in responding the message and carrying activities as per the intention of the sender. The barriers to effective communication results due to the following reasons:

  • If the symbols used in the message are not correctly understood by the receiver.
  • If the information is manipulated as per the interest of the sender.
  • If the message is to be transmitted to a long distance.
  • If the sender uses technical and difficult words in the message.
  • If the sender uses long and complex sentences in the message.
  • 1 answers

Yogita Ingle 5 years ago

Primary memory is the main memory of the computer system. Accessing data from primary memory is faster because it is an internal memory of the computer. The primary memory is most volatile which means data in primary memory does not exist if it is not saved when a power failure occurs.
 

Two types of Primary Memory are:

  • RAM: Random access memory which is also known as RAM is generally known as a main memory of the computer system. It is called temporary memory or cache memory. The information stored in this type of memory is lost when the power supply to the PC or laptop is switched off.
  • ROM: It stands for Read Only Memory. ROM is a permanent type of memory. Its content is not lost when the power supply is switched off. The computer manufacturer decides the information of ROM, and it is permanently stored at the time of manufacturing which can not be overwritten by the user.
  • 1 answers

Gaurav Seth 5 years ago

Definition: The computer is an electronic device. It is known as an electronic device because it runs through electricity. It takes input, processes it and gives desired results. The results of the computer system are also known as output.

<center>

Computer characteristics

</center>
  1. Speed: The computer is a much faster device. A computer machine can solve very complex problems faster than a person. It gives results within a second. Now a day, the computer can solve not only a single problem but also multiple problems within very less time.
  2. Data Storage: A computer system can store a large amount of data for a long time period. The data can be store in internal as well as external devices. The internal device of data storage is Hard disk and external storage devices are Pen drive, External Hard disk, etc.
  3. Accuracy: Computers can generate reliable results with high computational speed. If the input is right then only the appropriate output will be generated. The computer never gives inaccurate results; if results are inaccurate it means inputted data was erroneous.
  4. Versatility: A computer is a versatile machine that can perform different types of jobs with the same accuracy rate.
  5. Diligence: Computers never get tired. As humans get tires when he works regularly but the computer can perform tasks over and over again, with the same outcome, and it does so without tiring.
  6. No IQ: It performs a task that is exactly as directed by the user because it does not have its intelligence.
    Reliable: Consistency refers that a computer is a reliable machine, as it always gives consistent results.
1. The collection of unprocessed facts, figures and symbols is known as ____________. (a) Information (b) Software (c) Data and Information (d) None of the above 2. ______________ is the processed form of data which is organized meaningful and useful. (a) Information (b) Software (c) Data (d) None of the above 3. Hardware is any part of the computer that has a physical structure that can be seen and touched. (a) True (b) False (c) Not sure (d) None of the above 4. Components of computer hardware are ____________________________. (a) Input devices and output devices (b) A system unit and storage devices (c) Communication devices (d) All of the above 5. __________ devices accept data and instructions from the user. (a) Output (b) Input (c) Components of hardware (d) Storage 6. Which disk is made up of a circular thin plastic jacket coated with magnetic material? (a) Hard Disk (b) Compact Disk (c) DVD (d) Floppy Disk 7. ___________ disks are used to store more than 25 GB of data with a very high speed in less amount of time. (a) Digital Versatile (b) Compact (c) Blue-Ray (d) None of the above 8. Random Access Memory and Read Only Memory are examples of _______________. (a) Primary Memory (b) Secondary Memory (c) Auxiliary Memory (d) Both primary and secondary memory 9. Which system uses only the digits 0 and 1? (a) Bits (b) Binary number system (c) Secondary number system (d) Nibbles 10. There are two primary types of softwares namely _________ and __________.
  • 1 answers

Tanisha Chauhan 4 years, 4 months ago

1 c) Data and information
  • 2 answers

Yogita Ingle 5 years ago

The full form of CPU is the Central Processing Unit. The CPU socket is a particular section where the CPU is mounted inside the motherboard to perform other outputs and inputs of the system. The CPU’s known as the brain of a computer. It performs all the basic logical and arithmetic operations activities and transmits the commands and programs of the computer. The term CPU is normally used to refer to a processor that consists of the arithmetical logical unit

and control unit.

CPU = ALU + CU

Where

ALU – Arithmetical Logical Unit

CU – control unit

Asha Virmani 5 years ago

Central processing unit
  • 1 answers

Meghna Thapar 5 years ago

Communication is simply the act of transferring information from one place, person or group to another. Every communication involves (at least) one sender, a message and a recipient. These include our emotions, the cultural situation, the medium used to communicate, and even our location. Communication provides the information individuals and groups need to make decisions by transmitting the data needed to identify and evaluate choices. Thus communication helps to facilitate decision making.

  • 4 answers

Gaurav Seth 5 years ago

  1. Locate the file or folder by using Windows Explorer.

    To do so, right-click Start and choose Open Windows Explorer and then browse to locate the file you want to delete.

  2. In Windows Explorer, right-click the file or folder that you want to delete and then choose Delete.

    The Delete File dialog box appears.

  3. Click Yes to delete the file.

    Instead of right-clicking and choosing Delete from the menu that appears earlier, you can press the Delete key on your keyboard.

Yogendra Kanwar 5 years ago

We can select that and click on delete

Dev Prakash 5 years ago

First a fall, select file then you will able to see delete option. Click on delete, when you click on delete files will delete

Aman Kumar 5 years ago

1.Just normally click on the file that you want to delete. 2.On the keyboard find the delete button and click on that. 3.Then the computer ask to permanently delete this file or not . 4.If you want to delete the file permanently click on yes option.
  • 1 answers

Gaurav Seth 5 years ago

Single-level directory structure

Single level directory structure has only one directory which is called the root directory. The users are not allowed to create subdirectories under the root directory. All the files created by the several users are present in the root directory only.

  • 1 answers

Agnes Jimmy 5 years ago

Verbal vs Non-Verbal Communication Communication is the process of passing or exchanging ideas, emotions, information, and thoughts between two or more people. When a meaningful interaction happens among people, then effective communication takes place. In simple words, the way people perceive and understand the meaning of words or sentences or physical actions, and then a process of communication happens. Communication is very essential at all levels in human life without which one can’t survive in this social environment encompassing personal as well as professional. The main purpose of communication is to correctly pass the information to the receiver, thus creating clarity of thoughts and removing misunderstanding, else the whole idea of the communication could be defeated. But communication has discrete forms or types, the main are Verbal and Non Verbal Communication that is not clear to many. In Verbal communication, thoughts or emotions or information is exchanged between individuals through the use of speech. Any interaction where a person uses the words to converse then it’s recognized as verbal communication. Nonverbal communication refers to signals transmitted through facial expressions, posture, eye contact, gestures, tone of voice, body language, and other ways.
  • 1 answers

Mr. Sinha 5 years ago

Changing the appearance of text or document to make it more prominent as per user's requirement is reffered as formatting
  • 1 answers

Jitendra Singh 5 years ago

System software is in two types one is system software and application software
  • 2 answers

#Kavya Goenka 5 years ago

Tq?

Yogita Ingle 5 years ago

Stands for "Garbage In, Garbage Out." GIGO is a computer science acronym that implies bad input will result in bad output. Because computers operate using strict logic, invalid input may produce unrecognizable output, or "garbage."

  • 5 answers

Dilpreet Kaur 5 years ago

One Time Password (OTP)

Arnav Damle 5 years ago

one time password

Kashish Porwale 5 years ago

One time password

Madhusmita Sahu 5 years ago

Otp is also use for hacking so,if anyone ask your otp then don't tell to that person..???

Gaurav Seth 5 years ago

A one-time password (OTP) is an automatically generated numeric or alphanumeric string of characters that authenticates the user for a single transaction or login session.

OTP​ is a string of characters or numbers automatically generated to be used for one single login attempt. OTP, One Time Passwords in full, can be sent to the user’s phone via SMS orPush messaging and is used to protect web-based services, private credentials and data. OTP’s will minimize the risk of fraudulent login attempts and thus the risk of stolen data. OTP’s come in all shapes and sizes, but always add an extra layer of authentication.

  • 3 answers

Kashish Porwale 5 years ago

Vital information resource under siege

Nitin Raj 5 years ago

Vital information resource under siege

Anmol Dwivedi 5 years ago

Vital information resources under siege

myCBSEguide App

myCBSEguide

Trusted by 1 Crore+ Students

Test Generator

Test Generator

Create papers online. It's FREE.

CUET Mock Tests

CUET Mock Tests

75,000+ questions to practice only on myCBSEguide app

Download myCBSEguide App