Ctrl + F is the shortcut in your browser or operating system that allows you to find words or questions quickly.
Ctrl + Tab to move to the next tab to the right and Ctrl + Shift + Tab to move to the next tab to the left.
On a phone or tablet, tap the menu icon in the upper-right corner of the window; Select "Find in Page" to search a question.
Share UsSharing is Caring
It's the biggest motivation to help us to make the site better by sharing this to your friends or classmates.
The study of algorithms, programming languages, data structures, and computer systems, preparing students for diverse careers in technology and innovation.
GTR...?
The first message "LOGIN" using the ARPANET was sent from
What software is this?
All the following statements of WWW are true except
Shift this Binary 3 places left:0001 0101
Who can edit the material, under the Copyright, Designs and Patents Act?
What is the Extension of MS Word file?
stack is based on
_____is referred as two or more computers are connected with each other.
Choose correct answers
BTW...?
Which chatting platform's icons are these ???
Sound waves are analogue data. Computers cannot work with analogue data. So what is need to be done in order for computers to store sound waves.
A part of the program which causes it to operate incorrectly. The error does not prevent the program running but it does not produce the expected output.
An ... allows multiple items to be stored under one variable name, this reduces the need for multiples variables.
______________ your foot in ice cold water to reduce the swelling.
BRB...?
The ____________ business of airlines is flying people and cargo from place to place.
________was the first person to send an electronic email in 1971.
2 types of IP addresses?
Can we off an colour pictures are file effect
For the simplest of images, computers can use a compression algorithm called
Type the following translation of His Majesty’s Address to the Nation on the 114th National Day into your answer box within the given time period. "On the auspicious occasion of our National Day, I offer my deep prayers to Guru Rinpoche, humble reverence to Zhabdrung Ngawang Namgyal, and profound gratitude to His Majesty the Fourth Druk Gyalpo. I extend my heartfelt Tashi Delek to the people of the 20 Dzongkhags and Bhutanese living abroad. Despite the threats from the Covid-19 pandemic, we have continued to successfully pursue our national goals. This is due to the blessings of the Triple Gem, the good fortune of our leaders, the merit of our forefathers, and the unified efforts of our people.Today, our Nation stands secure and peaceful. Yet, the foremost question in our people’s minds is when the pandemic will end. While it is difficult to provide a definitive answer, the most important task ahead is for us to remain fully prepared and vigilant. "
a film which is extremely upsetting is har___________
The computer Hardware can be classified into
set of typewriter-like keys that enable you to enter data into a computer
Convert Binary into Denary:0110 1100
_Select all the penalties for breaking the Data Protection Act
IB...?
ON-OFF STATE OF A SINGLE WIRE IS CALLED
NVM.....
SECONDARY MEMORY IS ALSO KNOWN AS ... (2 ANSWERS)
Computers use ... to transform the 1s and 0s from input wires.
Write your name And best friend name
Two characteristics of password attack
System software can be classified into
Which of the following groups have only input devices?
The Website address is called URL.
What is the difference of the 1st generation of computers to the 2nd generation of computers.
This is called...?
Convert Hexadecimal into Denary:45A
Give Output devices Examples.
Did you find our presentation informative???
It is clear that most common cyber-attacks occur because of the.... (2 words)
A______________________ is an artificial intelligence (AI) software that can simulate a conversation or a chat with a user in natural language through messaging applications, websites, mobile apps or through the telephone.
what are applications of stack
In the "early days", what was a computer
Which of these is an operating system?
Is a word processor package from Ms Office
One of the following is not a cyber-attack
Find the odd one out from the following
4 Things common to all computers
When your document is in print layout, it looks exactly as it’s going to be printed.
The intersection of a row and column is called a
The cyber-attack in which attacker intercepts communication between two hosts..
File sizes are always measured in
IN DECIMAL NUMBETR SYSTEM WE HAVE DIGITS FROM ... TO ...
Add the 2 Binaries:0010 0111and0100 1010
CPU stands for?
Define 'Home Tab' in MS Word.
Some consequences that cyber-attacks can produce ( 3 options are correct)
-contains the circuitry and hard drive for the computer. It is the brain of your computer and controls and processes all the information you input into your computer. It also directs and controls the flow of information back out of your computer.
____is used for maintenance and configuration of the computer system.
A PC has a total storage capacity of 500 GB. How much storage capacity will the same PC have in terms of MB.
By looking at the picture guess which chatting platform it is....
SERIES OF COMMANDS
Which is a mobile operating system developed by Apple?
Spot the odd one from the following
Convert Hexadecimal into Binary:45A
Which of the following software can’t be categorized as application software?
what is the first step for enginnering design process?
KEY TERMSThe things that are considered right and wrong, it consists of the standards of behaviour that are acceptable within society, they are the moral principles and values.
Internet is known as ________in Dzongkha
While her husband had affairs with other women, she lived in ................. ignorance.
impossible to believe and really unlikely is far-...............
Description on secondary storage(true or false)
Which of these is not a way to represent an algorithm?
queue is based on the principle
What does CPU do?
... compression algorithms reduce the size of files without losing any information in the file, which means that we can reconstruct the original data from the compressed file.
In what year was the Data Protection Act passed?
What does input do?
Entering data into a program.
a program or piece of software designed and written to fulfill a particular purpose of the user.
_Select all the types of operators:
Convert negative binary numbers in two's compliment format into Denary:1001 0011
IF THE INPUT IS 1, THE OUTPUT IS 0:
Which type of loop repeats until a condition is met?
A ___ is the basic unit of all computing memory storage terms.
Internet is also referred as_______
_____ is a way of repeating code
A MAC address is usually made up of how many bits?
... is the process of converting one data type to another.
What is computational thinking?
In a flow diagram what does a parallelogram shape mean?
In ... the next statement to be executed depends on whether the condition being tested is True or False.
Convert Binary into Hexadecimal:1011 1110 0001
What is the name of the computational technique which involves breaking down a large complex problem into smaller and simpler sub problems until each part of the problem can be solved computationally?
the process that professionals use to write code that instructs how a computer, application or software program performs
The text in the document can be divided into columns
In order to connect your computer to the Internet with a modem, your computer will have to have a(n) ________ port
Charles Babbage was born in
-another term for display screen
output device that prints text or illustrations on paper
device that reads information from a CD or DVD onto your display screen and/or your speakers
Choose among the programming languages that has specific purposes.
What does this do?
In what year was the Copyright, Designs and Patents Act passed?
Do a fill in for imagine
Which chatting platform is this ????
_Select all the examples which are protected by the Copyright, Designs and Patents Act
One characterstic that explains DDoS attack
Which chatting platform is this ???
is used to hold programs and data you put into a computer while it is on. Once you turn your computer off, any information in RAM will be erased and lost forever. Therefore, you MUST save your data to a hard drive or flash drive before turning your computer off.
File size of an image is calculated as:
Head and shoulders are area in the top and bottom of each page
A ... is a location in memory, the value CANNOT be changed.
The following image represents..... attack
Social engineering can be also known as ..... attack
the shortwave wireless interconnection technology for mobile devices.
... is a set of instructions that follows on one after another.
Image: https://quizizz.com/media/resource/gs/quizizz-media/quizzes/08ddecff-732d-4286-8cf8-89a37fd982f7?w=200&h=200
Which Persian scientist is the word 'Algorithm' named after?
_Select all the things an organisation must do if they collect your personal data.(according to the Data Protection Act)
Image: https://quizizz.com/media/resource/gs/quizizz-media/quizzes/0af942a8-43e0-4273-b0b0-736ebad9fd3c?w=200&h=200
What is the name of the computational method where you remove unnecessary details to create a simpler focused representation of a problem or situation?
Difference Between RAM and ROM?
_Select all the rights you have, according to the Data Protection Act
Since computers are not capable on understanding human language programs, it is translated into machine code known as...
... are techniques that reduce file size by discarding the less important information.
a member of the group of animals that includes humans and monkeys
The club has ................. plans to build a new stadium.
... is the repetition of a process.
the bulk of the memory of a personal computer that is magnetically stored on hard disks that constitute the hard drive. Information in the hard drive is durable, in that it remains magnetically stored when the computer is turned off. **everything you save unless you save to a disk or a jump drive*
A ...................... $3 trillion was spent in building the U.S. nuclear arsenal.
The background of the desktop is called...
Convert Denary into Binary:254
Human mistakes in the accessing of online services occur because (3 options are correct)
'Multimedia' has been a .................... in the computer industry for years.
_Select all the penalties of breaking the Copyright, Designs and Patents Act
Which type of loop repeats a given number of times.
Which people were allowed to use the 1st generation of computers?
Response from the program.
Hexadecimal number system is a base __ system
A structure diagram is useful for showing the results of which computational method?
Maximum number of columns in a table can be
Trojan horses, spyware and viruses are examples of.....attack
WHAT IS MEMORY BUS?
............... forces have taken control of cities in the north of the country.
The most used virus protection software is...
What is 'benchmarking?
Which of these actions does primary storage do?
What should you do after making your model
KEY TERMSHow we impact the natural world, E-Waste, sustainability, recycling and energy demand, are issues regarding technology.
KEY TERMSHow groups of people of particular beliefs, practices or languages may be affected by a particular situation concerning the use of computers/technology.
This memory is for short-term storage and is lost when the computer is turned off.
Which of the following is not a pointing device?
Button are used to cut a launch and actions in your presentation
LEGISLATIONThis act looks after the personal data of people.
The very first network connections re-used the ... of telephone lines, communicating binary data via pulses of electricity.
microcomputer that's often used by hobbyists to create projects like animated LED displays or bird watchers
Which button should be clicked to reduce a window on the taskbar?
In a flow diagram, how do you show iteration (loop)?
How many years after the death of a creator dies the Copyright, Designs and Patents Act last?
When you present an algorithm graphically as a flow diagram, what shape do you use to represent selection?
"CTRL+ N" in MS Word.used for.
By looking at the picture guess which chatting platform it is.....
Every component of your computer is either
Output obtained on paper using a printer is called...
What is the other name used for computer programs and information?
In which year was internet and television launch in Bhutan?
The air was full of ..................... smells of flowers and freshly cut grass.
a tiny physical device that acts like a digital switch in computers
She came to the party wearing an ______________ costume and blond wig.
a movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted.
Tortillas are a .................. of Mexican cooking.
WHICH OF THE FOLLOWINGS IS NOT RELATED TO BINARY DATA
Which chatting platform's logo is this ???
What is meant by sampling resolution (bit depth)?
Input Devices exmaples.
Main drawback of high resolution images?
HTH...?
Choose among the Programming Languages Example that does have general purposes.
a device that controls the movement of the curser or a point on the display screen. It is a small object you lay on hard, flat surface
What is the name of the chatting platform in the picture ???
to play it by ___________ means to improvise
Convert negative denary into Binary in two's compliment format:-67
A ... is a name for a memory location used to store data that can be changed.
The full form of ARPANET is
Net stands for_______
Bitmap images are made up of ______
Bhutan Telecom launched the first mobile communication service in the country.
What symbol is used for commenting?
Futures find and correct that spellings and Zama arrows
Top down design, heirarchical structure idagram and tree diagram are all connected with representing the results of which computational technique?
The number of bits used to represent each color is called the ____________
It is difficult for humans to translate Human Language Programs into Machine Code or Binary Code. Hence, programmers use ___ ___ that translates our Programs into Computer Language easily.
What is an Image Resolution?
WITH 8 BITS YOU CAN STORE NUMBERS BETWEEN ... AND ...
What are the main Components of MS Word?
One characteristic that explains the term cyber-attack would be:
a device you can use to copy a picture or words from a printed page, onto your computer
KEY TERMSThe things that are actually right and wrong, things are passed and enforced to help protect the users of computers.
All sites in your presentation used a background
Which generation were when computers became portable.
You always have to use outline before you print a document.
Why are comments used?
What is pseudocode?
A web page is a document with only text.
All the evidence points to dreaming being a highly complex ..................... activity.
... are sent to a user's computer from websites, thy allow a website to store data about your browsing, remember you are logged in, track you and target your advertising. They must be consented to.
This is a permanent memory chip inside your computer. ROM has all the information a computer needs to tell it how to run.
-small, portable device using flash memory to store data, ranging in capacities from 64 MB to over 1 TB.
What did you know about secondary storage?
The instructions that we feed to the computer that allows it to complete a specific task is known as...
Which country's chatting platform is this ????
What is an algorithm?
Convert Denary into Hexadecimal:2004
To keep up this site, we need your assistance. A little gift will help us alot.
Donate- The more you give the more you receive.
Related SubjectEuclidean Algorithm
Programming Logic and Design
Computer Programming 2
Quantum Computers
Programming vs Coding
Origin of Women in Computing
Software Development
Mechatronics
Computer Information Systems
Computer Numerical Control
Introduction to Computing
Introduction to Multimedia
Database Management System
Data Structures and Algorithms
Computer Fundamentals
3D Game Art Development
Next Generation Kindle
Apple M4 Macs
Apple Intelligence: Transforming Our Digital Experience
Quality Assurance Testing
Driver Device
Computer System
Computer Support Technician
Desktop Publishing
Programmable Logic Controller
Managing Information and Technology
Information Technology Capstone Project
Intro to Hardware Description Language
Information Systems Operations and Maintenance
Animation Project
Computer Programming
Modeling and Simulation
Operating System Functions
Linux Administration
Entrepreneurship Information
Network Administration
Learning Communities
Work Immersion
Professional Salesmanship
Discrete Mathematics
The Contemporary World
Application Development and Emerging Technology
Introduction to Machine Learning
Number Theory
Web Enhanced Animation Graphics
Cyber Security: Theories and Practice
2D and 3D Digital Animation
Intrusion Detection System
Professional Ethics in Information Technology
Network Security
Manufacturing Technology
Industrial Electronics Maintenance
Shopee Cashback Voucher
Temu $0 Shipping Fee
Amazon 75% Off Discounts