No. of Printed Pages : 2

BFW-053

B.Sc. IN LEATHER GOODS AND ACCESSORIES DESIGN (BSCLGAD) Term-End Examination

00274

June, 2017 BFW-053 : COMPUTER APPLICATION - I Time : 3 hours

Maximum Marks : 70

Note : Answer any seven questions. All questions carry equal marks.

1.

Define storage. Distinguish between primary and secondary storage devices.

2.

10

Define computer virus. Differentiate between a computer virus and computer worm.

3.

10

Discuss the role of operating systems. Classify the different types of operating systems on the basis of type of interface.

4.

10

What are Network Protocols ? Name a few

10

network protocols. 5.

Define the term Software. Describe the different types of softwares in brief.

BFW-053

1

10 P.T.O.

6.

7.

8.

10

Differentiate between the following : (a)

Internet and Intranet

(b)

Spreadsheet and Database

Describe

the

important

features

of

MS-PowerPoint.

10

Explain Computer Generations in detail.

10

BFW-053

2

500

Computer Application-I.PDF

Define computer virus. Differentiate between a. computer virus and computer worm. 10. 3. Discuss the role of operating systems. Classify. the different types of ...

290KB Sizes 1 Downloads 157 Views

Recommend Documents

pdf-1466\communication-networks-computer-science-computer ...
... of the apps below to open or edit this item. pdf-1466\communication-networks-computer-science-computer-networking-by-cram101-textbook-reviews.pdf.

computer / information technology / computer science & engineering
GUJARAT TECHNOLOGICAL UNIVERSITY. B.E Semester: 4. Computer Engineering/ Computer Science & Engineering/. Information Technology. Subject Name ...

computer / information technology / computer science & engineering
Object-oriented programming in Turbo C++ By Robert Lafore, Galgotia Publication. 3. Object-oriented programming with C++ By E.Balagurusamy, 2 nd. Edition ...

Computer Organization
Explain how the performance of a computer can be measured? What are the ... Represent the number 81234561 in 32-bit Big-Endian and Little-Endian memory ...

pdf-134\computer-literacy-basics-computer-and-internet-literacy-cgs ...
... the apps below to open or edit this item. pdf-134\computer-literacy-basics-computer-and-intern ... y-cgs-1060c-by-connie-morrison-and-dolores-wells.pdf.

Computer Basics Quick Reference, Computer Basics Cheat Sheet
which means unsaved data disappears when you shut off the computer. ROM (read-only memory): Computer's ... Terabyte (TB):. 1,099, 511,627,776 bytes.

Vendor Empanelment for Computer To Computer Link (CTCL) - NSE
Sep 16, 2016 - The following vendor has been empanelled with the Exchange for providing CTCL and IBT based trading services to the trading members of ...

Notification-HSSPP-Computer-Jr-Computer-Instructor-Posts[1].pdf ...
six months experience in Software/ Hardware/ Networking etc. Pay: Consolidated salary of Rs. 9,0001- per month. Note: In respect of ctaim of experience, the ...

MIT TYBSC Computer Science Sem 1 Theoretical Computer ...
MIT TYBSC Computer Science Sem 1 Theoretical Computer Science & Computer Construction.pdf. MIT TYBSC Computer Science Sem 1 Theoretical Computer ...

Vendor Empanelment for Computer To Computer Link (CTCL) - NSE
Sep 16, 2016 - ... segment and Currency Derivatives segment: Vendor Name. Correspondence Address. Contact Details. M/s uTrade Solutions. Private Limited.

The Future of Computer Science - Cornell Computer Science
(Cornell University, Ithaca NY 14853, USA). Abstract ... Where should I go to college? ... search engine will provide a list of automobiles ranked according to the preferences, .... Rather, members of a community, such as a computer science.

pdf-1595\embedded-computer-vision-advances-in-computer-vision ...
... apps below to open or edit this item. pdf-1595\embedded-computer-vision-advances-in-comput ... sion-and-pattern-recognition-from-brand-springer.pdf.

Define computer network. Computer network is a ...
Reed Solomon code is used to correct burst errors. ➢ The use of error-correcting codes is often referred to as forward error correction. Hamming code. ➢ Hamming codes are code words formed by adding redundant check bits, or parity bits, to a data

MIT TYBSC Computer Science Computer Networks II.pdf ...
الزاوية BÔAتسمى الزاوية المركزية. حدد زوايا مركزية أخرى في هذا الشكل . o. C. A. D. B. O. التي تحصر القوس AB. #. Whoops! There was a problem loading this page. Retrying... Whoops! The

pdf-15105\guide-to-computer-network-security-computer ...
... the apps below to open or edit this item. pdf-15105\guide-to-computer-network-security-comput ... mmunications-and-networks-by-joseph-migga-kizza.pdf.

Computer Basics Quick Reference, Computer Basics Cheat Sheet
It calculates and processes information, and its speed ... RAM (random-access memory): Computer's main memory, which is used to ... Networks and the Internet.

Computer Science E-259 Lectures - Computer Science E-259: XML ...
Sep 17, 2007 - most important new technology development of the last two years." Michael Vizard ... applications: what are the tools and technologies necessary to put ... XML. When. ▫ The World Wide Web Consortium (W3C) formed an XML.