Skip to main content


Important Points of Fundamental Examination


1.      Computer Definition
2.      CPU Architecture
3.      Memory System
4.      External Memory
5.      IC and Its classification
6.      Microprocessor
7.      Types of computer
8.      Memory Access mode and time
9.      Output Device
10.  Types of Output
11.  CRT, LCD, Projection Display
12.  Printing Device
13.  Types of Printing Device
14.  Input Device (OBR, OMR, MICR)
15.  Input/Output Interface
16.  Software Definition
17.  Structure of Software
18.  Programming Language
19.  Types of Language
20.  Generation Language
21.  Operator and Operand
22.  Element of Software
23.  Operating System
24.  Operating System Interaction
25.  Types of Operating System
26.  Difference between Network and Distributed Operating System
27.  Multiprogramming Operating System
28.  Buffering and Spooling
29.  Parallel Processing
30.  M.J. Classification (SISD, SIMD, MISD, MIMD)
31.  Pipelining
32.  Vector Processing
33.  NETWORKING
-------------------------------------------------
1.      Communication Authority
2.      Data Communication Code
3.      Communication Rate and Speed
4.      Channel (Private and Switch)
5.      Analog and Switch Transmission
6.      Parallel and Serial Transmission
7.      Communication Standard and Protocol
8.      Communication Transmission (Synchronous and Asynchronous)
9.      Communication Mode (Simplex, Half Duplex and Full Duplex)
10.  Communication Device (Modem, Coder, Switch, Workstation, Node, Multiplexer)
11.  Computer Network (LAN, MAN, WAN)
12.  Topology (RING, STAR, BUS)
13.  LAN Access Method (CSMA/CD, Token Passing)
14.  Communication Architecture (OSI Model Structure)
15.  Switching Technique (Circuit, Massage and Packet Switching)
16.  WAN Hardware Device (BRIDGE, ROUTER and GATEWAY)
17.  Types of WAN (PUBLIC and PRIVATE Network)
18.  Public Network (PSDN, PSTN, ISDN, VAN)
19.  Application of Network (EMAIL, EDI and Application to Application EDI)
20.  Network Scenario (INTERNET, BITNET, NICNET, COMPUSERVE)
21.  Breaches of Security
22.  Security and Types of Security
23.  Security Measures
24.  Password Security
25.  Cryptography
26.  Algorithm of Cryptography
27.  Virus
28.  Types of infector
29.  Example of Virus
-----------------------------------------------------------
1.      GUI and CUI
2.      Advantage of GUI
3.      Feature of Windows
4.      File naming system
5.      Utility Software (Disk Difragmentation, Disk Cleanup, CHKDSK, Backup Utility)
6.      Multimedia
7.      Types of Multimedia
8.      Multimedia Tools
9.      Minimum Requirement of Multimedia
10.  Software of Multimedia
11.  Advantage of MSOFFICE
12.  Mail Merge
13.  Macro
14.  Auto text and Autocorrect
15.  Hyperlink
16.  Presentation and Application
17.  Slide
18.  Master Slide
19.  Custom Animation


Comments

Popular posts from this blog

Concept of Big data

Best Laptop for students Concept of BIG DATA The concept of big data arrived in executive suites via IT and engineering departments, and those technical roots have led to some disagreement of what the term means. At its core, big data refers to high volumes of information from multiple sources being fed into data stores on a time-sensitive basis. The shorthand: lots of data coming rapidly and from many places. Big data is an important foundation of quality  business intelligence , providing enough information to detect meaningful trends. Big Data Everywhere!  • Lots of data is being collected and warehoused • Web data, e-commerce • purchases at department/ grocery stores • Bank/Credit Card transactions • Social Network Type of Data • Relational Data (Tables/Transaction/Legacy Data) • Text Data (Web) • Semi-structured Data (XML) • Graph Data • Social Network, Semantic Web (RDF), … • Streaming Data • You can only scan the data o...

CODD RULES of RDBMS

Codd’s rules for RDBMS (i)                 The information rule. (ii)              Guaranteed access of   data (iii)            Systematic treatment of null value. (iv)            On line DB support. (v)              Comprehensive sup-language rule. (vi)            The view update rule. (vii)         Insert update rule. (viii)       Physical data independence. (ix)            Logical data independence. (x)              Integrity rule (xi)  ...