Computer Capsule For RRB and UIIC Mains Exam 2017

Download as pdf or txt
Download as pdf or txt
You are on page 1of 27

Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017

COMPUTER CAPSULE FOR IBPS RRB AND UIIC ASSISTANT MAINS 2017
1. Which among the following is not a mobile Operating 10. Which among the following is not an Object Oriented
System? Programming Language?
(a) Bada (b) Safari (c) Symbian (a) Python (b) PASCAL (c) Java
(d) MeeGo (e) WebOS (d) C++ (e) Ruby
2. Which among the following key can be used as a 11. Which cloud is a cloud computing environment that uses
shortcut to rename a folder in Microsoft Windows 8 and a mix of on-premises, private cloud and third-party,
higher versions? public cloud services with orchestration between the
(a) F2 (b) F4 (c) F6 two platforms and it is particularly valuable for dynamic
(d) F9 (e) F11 or highly changeable workloads?
3. AT&T designed its first commercial modem, specifically (a) Dynamic Cloud (b) Advance Cloud
for converting digital computer data to analog signals for (c) Hybrid Cloud (d) Sharing Cloud
transmission across its long distance network. What is (e) Combined Cloud
the name of the modem? 12. If you are allowing a person on the network based on the
(a) Telex (b) Memex (c) CompuServe credentials to maintain the security of your network,
(d) Bell 103 dataset (e) Dataphone then this act refers to the process of ______.
4. Integrated Chips or IC’s were started to be in use from (a) Authentication (b) Automation (c) Firewall
which generation of Computers? (d) Encryption (e) Decryption
(a) 1st Generation (b) 2nd Generation 13. The use of combination of 1’s and 0’s is feature of which
(c) 3rd Generation (d) 4th Generation of the following type of Computer Language?
(e) 5th Generation (a) High Level Language (b) PASCAL
5. In Computer programming there is set of subroutine (c) Machine Language (d) C
definitions, protocols, and tools for building software (e) COBOL
and applications. Which among the following is a term 14. Which among the following is a recently debated
for sets of requirements that govern how one application principle that Internet service providers and
can talk to another? governments regulating the Internet should treat all data
(a) UPS (b) API (c) CGI on the Internet the same, not discriminating or charging
(d) J2EE (e) OLE differentially by user, content, website, platform,
6. BSoDs can be caused by poorly written device drivers or application, type of attached equipment, or mode of
malfunctioning hardware, such as faulty memory, power communication?
supply issues, overheating of components, or hardware (a) Comcast (b) Net Neutrality
running beyond its specification limits. Which color (c) Oblique-net (d) Net Fraternity
screen is displayed when encountered a BSOD Error? (e) Fair Web
(a) Red (b) Grey (c) Black 15. Which among the following is an important circuitry in a
(d) Blue (e) Green computer system that directs the operation of the
7. Which among the following is the smallest unit in an processor?
image in a computer screen? (a) Memory (b) Address Bus
(a) Unit (b) Pixel (c) Array (c) Accumulator (d) ALU (e) Control Unit
(d) Resolution (e) Clip 16. MS Word is a text or document editing application
8. Microsoft Word is a word processor developed by program that comes in the package of MS Office Suite.
Microsoft. In MS Word Spelling Check is a feature Which among the given options is not related with MS
available in which tab? Word?
(a) File (b) Home (c) Insert (a) Page Layout (b) Antivirus (c) Mailings
(d) Review (e) References (d) Format Painter (e) SmartArt
9. There is a network that can connect networks ranging 17. Which among the following is another name for a group
from small location or area to a bigger range including of 4 bits?
public packet network and large corporate networks. (a) Nibble (b) Byte (c) Kilo Byte
That network's enterprise allows users to share access (d) Mega Byte (e) Peta Byte
to applications, services and other centrally located 18. Which among the given options is IBM’s Supercomputer?
resources. Its ability for a huge geographical access has (a) Tihane-2 (b) SunwayTaihu Light
transformed networking. Which among the following is (c) Watson (d) Shasra-T (e) Brain
that network? 19. Which is a feature included in Microsoft PowerPoint
(a) SAN (b) CAN (c) LAN software that allows the user to see all the slides in a
(d) WAN (e) MAN presentation at one time?

www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App


1
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
(a) Slide Sorter (b) Slide Master (d) FORTRAN (e) Ruby
(c) Handout Master (d) Slide Header (e) Reading View 34. Who among the following sent the first electronic mail?
20. Which among the given options does not have flash (a) Ray Tomlinson (b) Charles Babbage
memory? (e) J.Presper Eckert (d) John W Mauchly
(a) Pen Drive (b) Hard Disk (c) Car Radio (e) Ana Lovelace
(d) Memory Cards (e) Memory Stick 35. What are programs such as Microsoft Edge that serve as
21. Which of the following is not valid version of MS Office? navigable windows into the Web called as?
(a) Office 2010 (b) Office Vista (c) Office 2007 (a) Hypertext (b) Web browsers
(d) Office 2016 (e) None of the above (c) Internet (d) Networks
22. Chief component of first generation computer was (e) Windows Navigator
____________. 36. Which among the following is a self-contained step-by-
(a) Transistors (b) Vacuum Tubes and Valves step set of operations to be performed?
(c) Integrated Circuits (a) System Software (b) Algorithm
(d) VLSI (e) ULSI (c) Network topology (d) Application software
23. Which among the following is the largest space? (e) Utility software
(a) Kilobyte (b) Petabyte (c) Terabyte 37. What is Remote Desktop Connection?
(d) Gigabyte (e) Megabyte (a) It was known as Terminal Services in Windows
24. Communication between walkie-talkies involves which Server 2008 and earlier, it is one of the components of
of the following types of transmission? Microsoft Windows.
(a) Simplex (b) Full –Duplex (c) Half-Duplex (b) a technology that allows you to carry your computer
(d) Online (e) None of these in remote areas.
25. The process of replacing Windows 8 with Windows 8.1 (c) a technology that allows you to sit at the client
is called ________. computer and connect to the host remote computer in a
(a) Upgrading (b) Updating (c) Installing different location
(d) Downgrading (e) Replacement (d) both (a) and (c)
26. Example of telecommunication device is a ________ . (e) All of the above
(a) modem (b) printer (c) keyboard 38. When you save a Microsoft Access project, what file
(d) scanner (e) mouse format do you use?
27. Which among the following is the reboot where the (a) .adp (b) .Xml (c) .gif
power to the system is physically turned off and back on (d) .doc (e) .pptx
again, causing an initial boot of the machine? 39. What is the function of control unit?
(a) Toggle (b) Cold booting (a) Providing resources to another node on a network
(c) Warm booting (d) Logging off (e) None of these (b) Performing complex task of logical and arithmetic
28. Which of the following option may be used to change functions
page-size and margins? (c) Memory usage
(a) Page Layout (b) View (c) Home (d) Directing the operation of the other units by
(d) Data (e) Review providing timing and control signals.
29. What is a Firewall in Computer Network? (e) Displaying output to the end-user
(a) The physical boundary of Network 40. Which memory is non-volatile and may be written only
(b) An operating System of Computer Network once?
(c) A system designed to prevent unauthorized (a) RAM (b) EPROM (c) EEPROM
access (d) PROM (e) None of the above
(d) A web browsing Software
(e) None of these
30. Which one of the following is an added set of one or
more attributes taken collectively to uniquely identify a
record?
(a) Alternate key (b) Sub key (c) Super key
(d) Foreign key (e) None of these
31. Bluetooth is an example of which of the following
networks?
(a) Personal area network (b) Local area network
(b) Virtual private network (d) None of the above
(e) Wireless fidelity
32. What is the new default font used in MS Word
document?
(a) Times New Roman (b) Arial
(c) Algerian (d) Preeti (e) Calibri
33. Which is not an object oriented Programming language-?
(a) JAVA (c) C++ (b) Python

www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App


2
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
History
The word Computer in earlier times meant a person who operations; it can accept data, store data, retrieve data,
performed calculations or computations. With years its process data and produce output.
definition changed to a machine that performs calculations. Charles Babbage was known as father of computer. He
It can perform all type of mathematical and logical invented two machines in 1822 introduced Difference
Engine and in 1834, introduced Analytical engine
Difference Engine Charles Babbage First automatic mechanical calculator
Analytical Engine Charles Babbage Mechanical general-purpose computer
Z1 Konrad Zuse World’s first freely programmable computer
MARK-1 Konrad Zuse First Freely programmable Computer
ENIAC John W. Mauchly and J. First general purpose programmable electronic
Presper Eckert computer
EDSAC John von Neumann First computer to store program
EDVAC John W. Mauchly and J. Binary serial computer
Presper Eckert
UNIVAC John W. Mauchly and J. First general-purpose computer for commercial use
Presper Eckert
Intel 4004 Intel First commercially available microprocessor by
Intel, a 4-bit CPU
LISA(Local Integrated Apple Inc. First commercial personal computers to have a GUI
Software
Architecture)
Dataphone AT&T First AT&T Commercial modem
ARPANET United States Department Early packet switching network and the first
of Defence network to implement the protocol suite TCP/IP.
NEXUS Browser Tim Berners-Lee First Web Browser was WorldWideWeb later
(WorldWideWeb) named Nexus. The first commonly available web
browser with a graphical user interface was Erwise.
Six Degrees First social networking/ social media site

ENIAC was the first digital computer and it was invented Mauchly Computer Corporation, and released a series of
by J.Presper Eckert and John Mauchly at the University of mainframe electronic digital stored-program computer
Pennsylvania and began construction in 1943. It uses 18000 under the name of UNIVAC.
vacuum tubes as a storing device. They were also founders of MIT introduces the whirlwind machine (first computer with
the first computer company, it was initially named Electronic RAM) on March 8, 1955.
Controls Company which was later changed to Eckert–

Generation of computer
Subject 1st generation 2nd generation 3rd generation 4th generation 5th generation
Period 1940-1956 1956-1963 1964-1971 1971-present present & beyond
Circuitry Vacuum tube Transistor Integrated Microprocessor ULSI (Ultra Large
chips (IC) (VLSI) Scale Integration)
technology
Memory Capacity 20 KB 128KB 1MB Semiconductor type VLSI and ULSI
and very high
Processing Speed 300 IPS inst. Per 300 IPS 1MIPS(1 Faster than 3rd Very fast
sec. million inst. Per generation
sec.)
Programming Assembly High level C,C++ C,C++,Java All the Higher level
Language Language language languages,
(FORTRAN, Neural networks,
COBOL, ALGOL)
Example of UNIVAC, IBM 1401, IBM IBM 360 series, Pentium series Artificial
computers EDVAC 7094, 1900 series Multimedia, Intelligence,
CDC 3600,D Stimulation Robotics
UNIVAC 1108

www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App


3
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
Types of computer

Analog computer introduced by Lord Kelvin. Numerical Shasra T is considered as India’s fastest super computer,
data are represented by measurable physical variables such manufactured by Indian Institute of Science.
as electrical voltage. A thermometer is a simple analog Servers are dedicated computers that serve the needs or
computer. request of other programs or computer.
Digital computer that accepts and process data in the form Workstations serve usually one user only.
of numbers and all the character are converted into binary Information appliances are computers specially designed
code. to perform a specific "user-friendly" function—such as
Hybrid computer used the combined feature of analog and playing music, photography.
digital machine. you can see hybrid computer in geological An embedded system is a computer system with a
departments. dedicated function within a larger system.
Microcomputer these are small relatively inexpensive
computer designed for personal and office use. It has lowest
storing and processing speed. These can be laptop or
desktop.
Minicomputer powerful as compare to microcomputer it
has higher memory provide faster operating speeds and
large storage capacities than microcomputers. It can be used
as a server and capable of supporting from 2 to 200 users.
Mainframe computer it has very high memory and
processing speed and used as a server (can support
thousands of users)
Super computer can be used for complex type of application
i.e. specific research, weather forecasting, Weapon designing
etc.
CDC 6600 was the first successful supercomputer.
Sunway TaihuLight of China is the fastest supercomputer in
the world.
PARAM-8000 India’s first Super Computer developed by C-
DAC Pune in 1998.

Hardware and I/O Devices


A computer is an electronic device that accepts data from the (such as a computer) which converts the electronically
user (input), processes the data by performing calculations generated information into human-readable form.
and operations on it and generates the desired Output.
The CPU is fabricated as a single Integrated Circuit (IC) chip.
An unprocessed collection or representation of raw facts It is also known as the Microprocessor. Multiprocessor
represented in a manner suitable for communication, Computers uses two or more central processing units (CPUs)
interpretation or processing by humans or by automatic within a single computer system. The term also refers to the
means, is known as Data. ability of a system to support more than one processor
Personal computers use a number of chips mounted on a and/or the ability to allocate tasks between them.
main circuit board called Motherboard. A motherboard is
the physical arrangement in a computer that contains the
computer's basic circuitry and components.

An output device is any piece of computer hardware


equipment used to communicate the results of data
processing carried out by an information processing system

www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App


4
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
The central processing unit (CPU) is the brain of your The data that is fed into a computer processor, received into
computer. It handles all the instructions you give your the computer by a keyboard or other sources is called Input.
computer. The control unit (CU) is a component of a Examples of input devices include keyboards, mouse,
computer's central processing unit (CPU) that directs scanners, digital cameras and joysticks.
operation of the processor. It tells the computer's memory,
arithmetic/logic unit and input and output devices how to A keyboard is a typewriter-style device, which uses an
respond to a program's instructions. arrangement of buttons or keys, to act as mechanical levers
or electronic switches. Most of the commonly available
An arithmetic logic unit (ALU) is a digital circuit used to personal computers have a keyboard, popularly known as
perform arithmetic and logic operations. It represents the Qwerty.
fundamental building block of the central processing unit Function Keys F1-F2
(CPU) of a computer.
Toggle Keys Caps Lock, Num Lock,
Instruction Execution: the program which is to be executed Modifier Keys Shift, Alt, Ctrl, Fn
is a set of instruction which are stored in memory. The CPU Alphanumeric Keys A-Z, 0-9
executes the instructions of program to complete a task and
this execution takes place inside the CPU with the help of 'Caps lock' and 'Num lock' keys are called as Toggle Keys
registers ALU (arithmetic logic unit) and CU(control unit). because when pressed, they change their status from one
When the processor executes instructions, data is state to another.
temporarily stored in small local memory location and these
are called registers. Numeric Keypad is a keypad located on the right hand side
Accumulator Register:- which stores the immediate result of the keyboard. It consists of digits and mathematical
of arithmetic and logical operations. operators.
Memory address register (MAR) :- which contain the
address of memory location to which data is to be stored. A Modifier key is a special key (or combination) on a
Program counter :- which contain the address of the next computer keyboard that temporarily modifies the normal
instruction to process. action of another key when pressed together. By themselves,
Instruction register:- which contain the current instruction modifier keys usually do nothing; that is, pressing any of the
being processed Shift, Alt, or Ctrl keys alone does not (generally) trigger any
action from the computer.

A Mouse is the most popular input device which is used


today for interactive processing and for the one line entry of
data for batch processing. The first computer mouse was
invented by Douglas Engelbart.

Drag and Drop refers to the action of clicking and holding


down the mouse button, while moving the mouse and then
releasing the mouse button.

Joystick is the device that moves in all directions and


controls the movement of a pointer.

A Touch Screen is a type of display screen device that is


placed on the computer monitor to allow direct selection or
activation of the computer when the user touches the screen.
It acts as both input and output device.

Light Pen is the pen shaped device, which can sense light
and is used to point at spots on a video screen.
A technology enables a high-speed reading of large
quantities of data and transferring these data to the
computer without using a keyboard. It is referred as Optical

Mark Reader (OMR). It uses a beam of light that is reflected


on the paper with marks, to capture presence and absence of
marks.

www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App


5
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
MICR reads the characters by examining their shapes in a V) Chain printer:- A chain printer uses a chain of print
matrix form and the information is then passed `on to the characters wrapped around two pulleys
computer. MICR stands for Magnetic Ink Character Reader.
It provides a high level of security and is therefore used by VI) Band printer:- Band printer has a steel band divided
the banking industry for faster processing of the cheque. into five sections of 48 characters each.

Bar Code is a machine readable code, which is represented Non – Impact Printers do not touch the paper when
by parallel vertical lines with varying widths. For reading creating an image.
these bar-coded data, a device is used, which is known as a
Bar Code Reader (BCR) I) Ink-jet printers:- One or more nozzles in the print head
emit a steady stream of ink drops. Droplets of ink are
Optical Character Recognition (OCR) is used to scan the electrically charged after leaving the nozzle. The droplets are
document containing text. It is the mechanical or electronic then guided to the paper by electrically charged deflecting
conversion of scanned or photographed images of plates
typewritten or printed text into machine-encoded/
computer-readable text. II) Laser printers:- Laser printers use buffers that store an
entire page at a time. When a whole page is loaded, it will be
A point of sale terminal (POS terminal) is an electronic printed.
device used to process card payments at retail locations.
III)Thermal printer:- is a digital printing process which
The device that prints information from the computer onto produces a printed image by selectively heating coated
the paper is Printer. thermo chromic paper, or thermal paper as it is commonly
The printed form of output is referred as Hard Copy. The known, when the paper passes over the thermal print head.
form of output displayed on the screen is referred as Soft
Copy. A plotter is an output device that interprets commands from
Pages per Minute (PPM) is the unit used to count the speed a computer to make line drawings on paper with one or
of the printer. more automated pens. Unlike a regular printer, the plotter
can draw continuous point-to-point lines directly from
On the basis of technology, printers are categorized into vector graphics files or commands.
Impact and Non- Impact Printers.
An uninterruptible power supply (UPS) is a device that
Impact printers create an image by using some mechanism allows a computer to keep running for at least a short time
to physically press an inked ribbon against the page, causing when the primary power source is lost.
the ink to be deposited on the page in the shape desired.
A Monitor is a TV-like display attached to the computer on
I) Dot matrix :- The dot-matrix printer uses print heads which the output can be displayed and viewed. It can either
containing from 9 to 24 pins. These pins produce patterns of be a monochrome display or a color display. The number of
dots on the paper to form the individual characters pixels displayed on a screen is known as Resolution.

II) Daisy wheel:- A hammer strikes a “petal” containing a


character against the ribbon, and the character prints on the
paper. Its speed is slow typically 25-55 characters per
second.

III) Line printer:- Line printers, or line-at-a-time printers,


use special mechanism that can print a whole line at once;
they can typically print the range of 1,200 to 6,000 lines per
minute

IV) Drum printer:- A drum printer consists of a solid,


cylindrical drum that has raised characters in bands on its
surface. The number of print positions across the drum
equals the number available on the page.

www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App


6
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
Software and Operating System
A set of instructions that tells the computer about the tasks Operating system is a set of programs that help in controlling
to be performed and how these tasks are to performed, is and managing the hardware and the software resources of a
known as Software. computer system. Main functions of operating system are
The set of instructions, which control the sequence of :-
operations, are known as Program. It is a sequence of -Process management
instructions, written to perform a specified task with a -Memory management
computer. -File management
-Security
-Command and interpretation
-Resource allocation

Types of OS.
1)Batch operating system : Here data and program that
need to be processed are bundled and collected as a batch
and executed together.
2)Multiprogramming operating system : It allows the
instruction and data from two or more separate process to
reside in primary simultaneously. Multiprogramming system
are multitasking multiuser and multiprocessing operating
system.
3)Single user : It is designed for single user and a single
person use it at a time i.e. DOS window’s 95 etc.
4)Distributed operating system : It is the one which
manages a collection of independent computers and makes
them appear to the user of the system as a single computer.
5)Real Time Operating System (RTOS) : It is a computing
environment that reacts to input within a specific time
period. It is used at those Places in which we Requires higher
Application software is a group of program designed for and Timely Response.
fulfill the demand of end user e.g. MS office, PowerPoint, 6) Time Sharing System: A time sharing system allows the
Windows Media Player. many users to simultaneously share the computer resources.
System software is a program which is created for the Since each action or command in a time-shared system take
system and to make the system user friendly such as a very small fraction of time, only a little CPU time is needed
operating system or is a type of computer program that is for each user.
designed to run a computer's hardware and application 7)Mobile OS: Windows 10 Mobile is the latest name for
programs. Microsoft's phone and tablet operating system. Google's
Utility software designed to help analyze, configure, latest’s version of its android OS is Nougat and iOS i.e.
optimize or maintain a computer such antivirus software. iPhone Operating System's latest version is iOS 10.

Computer Languages
Low level language: these are coded in a form which is easy Fortran: it is known as formula translation. It is used for
to understand by the processor. scientific application

Machine language: it is also a type of low level language COBOL (Common Business Oriented Language ): used for
these can be develop in binary language (0 and 1) . record keeping and data management in business
organizations.
Assembly language: it is also a type of low level language
and using the human readable instruction of the CPU. It is BASIC (Beginner’s All Purpose Symbolic Instruction
written as ‘MOV A.’ Code): first language designed for non-professional
programmers.
High level language programmer can write code in simple PASCAL: it is developed as a teaching tool for programming
easy language, it is user friendly . E.g. C, JAVA concepts.

C language: it is a middle level programming language and Simula was the first object-oriented programming language.
also known as procedural language Java, Python, C++, Visual Basic .NET and Ruby are the
C++ is high level language that uses the OOPS concept. most popular Object Oriented Programming languages.
The Java programming language is designed especially for
www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App
7
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
use in distributed applications on corporate networks and Linker is used to combine all the object files and convert
the Internet. Ruby is used in many Web applications. Curl, them into a final executable program.
Smalltalk, Delphi and Eiffel are also examples of object-
oriented programming languages. Interpreter converts high level language program into
machine language. It is very slow because it convert program
Language processor (Translator): Programmers write line by line.
their program in one of the high level language because it is
much easy to code in these language but computer does not Compiler: It also translates the program from high level
understand any of these language so it is necessary to language to machine language. It is very fast because it
convert program into a machine language so translator do converts the whole program into machine language.
this work.
Assembler: It is used for converting the code of low level
Loader: It loads the code which is translated by translator language (assembly language) into machine level language.
into the main memory and makes it ready to execute.

MEMORY MANAGEMENT
8 bit 1 byte
1024 Byte 1 KB (Kilo Byte)
1024 KB 1 MB (Mega Byte)
1024 MB 1 GB (Giga Byte)
1024 GB 1 TB (Tera Byte)
1024 TB 1 PB (Peta Byte)
1024 PB 1 EB (Exa Byte)
1024 XB 1 ZB (Zeta Byte)
1024 ZB 1 YB (Yota Byte)

A group of 4 bits is called a nibble. A byte is also known as for primary or main storage. Primary storage is volatile and
an Octet. can be contrasted with non-volatile secondary storage, also
known as auxiliary storage.
Primary Storage (memory), also known as main storage
and it is the area in a computer in which data is stored for Cache memory is a smaller, faster memory which stores
quick access by the computer's processor. The terms random copies of the data from frequently used main memory
access memory (RAM) and memory are often as synonyms locations. A CPU cache is a hardware cache used by the

www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App


8
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
central processing unit (CPU) of a computer to reduce the
average time to access data from the main memory. Virtual memory is memory on the hard disk that the CPU
uses as an extended RAM.
Secondary memory is where programs and data are kept
on a long-term basis. Common secondary storage devices are
the hard disk and optical disks. The hard disk has enormous
storage capacity compared to main memory. The hard disk is
usually contained inside the case of a computer.

Read-only memory (ROM) is a storage medium used in


computers and other electronic devices. Data stored in ROM
can only be modified slowly or with difficulty, or not at all.

ROM is non-volatile and the contents are retained even


after the power is switched off.
It only allows reading.
The types of ROM include PROM, EPROM and EEPROM.
Access Storage Cost per bit
PROM - (programmable read-only memory) is a memory Time Capacity of storage
chip on which data can be written only once. Primary Faster Smaller High
memory
The difference between a PROM and a ROM (read-only Secondary Slower Higher Low
memory) is that a PROM is manufactured as blank memory, memory
whereas a ROM is programmed during the manufacturing
process. To write data onto a PROM chip, you need a special Memory can also be categorized on the basis of their
device called a PROM programmer or PROM burner. material:
EPROM - (erasable programmable read-only memory) is a Semiconductor memory:-such as RAM, ROM, EPROM, and
special type of PROM that can be erased by exposing it to flash memory.
ultraviolet light.
Magnetic memory:-such as hard disk, floppy disk and
EEPROM - (electrically erasable programmable read-only magnetic tapes.
memory). EEPROM is a special type of PROM that can be
erased by exposing it to an electrical charge. Optical memory:-such as computer disk, DVD and blue-ray
disk.
Random Access Memory (RAM), allows the computer to A bus, in computing, is a set of physical connections (cables,
store data for immediate manipulation and to keep track of printed circuits, etc.) which can be shared by multiple
what is currently being processed. hardware components in order to communicate with one
another.
RAM is referred to as volatile memory and is lost when the
power is turned off. The address bus (sometimes called the memory bus)
It also known as read/write memory as information can be transports memory addresses which the processor wants to
read from and written onto it. access in order to read or write data. It is a unidirectional
The two main types of RAM are Static RAM and Dynamic bus.
RAM.
The data bus transfers instructions coming from or going to
SRAM retains data as long as power is provided to the the processor. It is a bidirectional bus.
memory chip and need not be refreshed periodically. It is
often used as CPU Cache memory. SRAM stands for Static The control bus (or command bus) transports orders and
Random Access Memory. synchonisation signals coming from the control unit and
travelling to all other hardware components. It is a
The data on DRAM continues to move in and out of the bidirectional bus, as it also transmits response signals from
memory as long as power is available and must be the hardware.
continually refreshed to maintain the data. DRAM stands for
Dynamic Random Access Memory.

www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App


9
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
Number System
The radix or base is the number of unique digits, including
zero, used to represent numbers in a positional numeral
system. For example, for the decimal system the radix is ten,
because it uses the ten digits from 0 through 9. And that of
Binary is base 2.
Number System

Decimal, Binary, Octal and Hexadecimal


Equivalents Hence (75)10 =(101011)2
Any number system to decimal:
Decimal Binary Octal Hexadecimal
Sum of all (Digit × (Base)Base’s Place)
0 0000 000 0 Example: (1A2)16 = (?)10 (From the table you can refer A is
1 0001 001 1 equivalent to 10)
2 0010 002 2 ((1× 162)+(10 × 161)+ (2×160))= 256+160+2=418
3 0011 003 3 Example: (110110)2=(?)10
4 0100 004 4 ((1×25)+ (1×24)+ (0×23)+ (1×22)+ (1×21)+
(0×2 ))=32+16+4+2= 54; (110110)2=(54)10
0
5 0101 005 5
Octal to Binary: (345)8 =(?)2 (Write down 3 bit binary
6 0110 006 6 equivalents of all digits)
7 0111 007 7 3=011, 4=100, 5=101; Hence (345)8 =(011100101)2
8 1000 010 8 Octal to Hexadecimal: Convert to Binary first and then
9 1001 011 9 group 4 bits to get hexadecimal number. Example: (345) 8
10 1010 012 A =(?)16 =>(345)8 =(011100101)2 = 0000 1110 0101 =(0E5)16
11 1011 013 B
12 1100 014 C
13 1101 015 D
14 1110 016 E
15 1111 017 F

Hexadecimal to Binary: Refer the above table for the


conversion process
(1A2)16 = (?)2
1=0001, A= 1010, 2=0010; Hence (1A2)16 =
(000110100010)2
Decimal to Binary: (75)10 =(?)2
Divide 75 by 2 (and write down its remainder).

Computer Network
Different types of network are: LAN, MAN and WAN. computers, telephones, tablets and personal digital
A LAN (local area network) is a group of computers and assistants.
network devices connected together, usually within the same
building. By definition, the connections must be high speed Campus Area Network or corporate area network is a
and relatively inexpensive (e.g., token ring or Ethernet). computer network made up of an interconnection of local
A MAN (metropolitan area network) is a larger network area networks (LANs) within a limited geographical area.
that usually spans several buildings in the same city or town. A Storage Area Network (SAN) is a specialized, high-speed
A WAN (wide area network), in comparison to a MAN, is network that provides block-level network access to storage.
not restricted to a geographical location, although it might be A virtual private network (VPN) extends a private network
confined within the bounds of a state or country. A WAN across a public network, such as the Internet. It enables
connects several LANs, and may be limited to an enterprise users to send and receive data across shared or public
(a corporation or an organization) or accessible to the public. networks as if their computing devices were directly
The technology is high speed and relatively expensive. The connected to the private network.
Internet is an example of a worldwide public WAN.
Networking Devices
A personal area network (PAN) is a computer network Modem: Modem stands for Modulator-Demodulator. It is
used for data transmission amongst devices such as used to connect computers for communication via telephone
lines.
www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App
10
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
Hub: It works at the Physical layer. It just acts like a network. The source of data origination is single but there
connector of several computers i.e. simply connects all the may be multiple receivers. A communication channel is of 3
devices on its ports together. It broadcasts all the data types:
packets arriving at it with no filtering capacity.
Simplex: This, communication is unidirectional i.e. one of
Switch: It works at the Data Link Layer. It is used for the two devices can transmit the data and the other can only
dividing a network into segments called subnets. It provides receive the data. For e.g. Radio broadcasting, television
filtering of data packets and prevents network traffic also. broadcasting etc.

Repeater: It operates at the Physical Layer. It is used to Half duplex: This communication is bidirectional. Either of
amplify a signal that has lost its original strength so as to the devices can act as transmitter or receiver but only one
enable them to travel long distances. device can transmit the data at one time. For e.g. Walkie-
Router: It works at the Network Layer and is used to Talkie.
connect different networks that have different architectures
and protocols. It sends the data packets to desired Full Duplex: Here the communication is in both directions
destination by choosing the best path available thus reducing and both the devices can simultaneously transmit the data.
network traffic. For e.g. Telephone conversation.

Gateway: It operates in all the layers of the network The Open Systems Interconnection model (OSI) is a
architecture. It can be used to connect two different conceptual model that characterizes and standardizes the
networks having different architectures, environment and internal functions of a communication system by partitioning
even models. it into abstraction layers. The model is a product of the Open
Systems Interconnection project at the International
Bridge: They are used two connect two LANs with the same Organization for Standardization (ISO).
standard but using different types of cables. It provides an
intelligent connection by allowing only desired messages to 7 APPLICATION LAYER Data
cross the bridge thus improving performance. It uses (Network Process to Application)
physical addresses of the packets for this decision.
6 PRESENTATION LAYER Data
IPv4 - 32 bits numeric address (Data Representation & Encryption)
IPv6 - 128 bits hexadecimal address 5 SESSION LAYER Data
IPv6 does not use broadcast messages and has three types (Inter-host Communication)
of addresses, which are categorized as : 4 TRANSPORT LAYER Segments
Unicast addresses. A packet is delivered to one interface. (End-to-end connections & reliability)
3 NETWORK LAYER Packets
Multicast addresses. A packet is delivered to multiple
interfaces. (Path Determination and IP)
2 DATA LINK LAYER Frames
Anycast addresses. A packet is delivered to the nearest of (Physical Addressing)
multiple interfaces (in terms of routing distance). 1 PHYSICAL LAYER Bits
With an IPv4 IP address, there are five classes of available IP (Media, Signal and Binary
ranges: Class A, Class B, Class C, Class D and Class E, while Transmission)
only A, B, and C are commonly used. Each class allows for a
Network topology is the arrangement of the various
particular range of valid IP addresses. Class D is reserved for
elements (links, nodes, etc.) of a computer network. There
multicast groups and Class E is reserved for future use, or
are two basic categories of network topologies:
Research and Development Purposes.
 Physical topologies and Logical topologies.
Data Communication deals with the transmission of digital
Physical topology is the placement of the various
data from one device to another. Data is transferred through
components of a network, including device location and
a pathway called as communication channel which can be
cable installation, while Logical topology illustrates how
physical wire connecting the devices or may be unguided
data flows within a network, regardless of its physical
media like laser, microwave etc.
design. Various types of topologies are:
A communication channel has a source or transmitter at one
side and a designation or receiver at another side of the
Bus Topology Every computer and network device is connected to
single cable.

www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App


11
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
Star Topology All the computers are connected to a single hub
through a cable. This hub is the central node and all
others nodes are connected to the central node.

Ring Topology Each computer is connected to another computer, with


the last one connected to the first. Exactly two
neighbors for each device.

Mesh It is a point-to-point connection to other nodes or


Topology devices. All the network nodes are connected to each
other

Tree It has a root node and all other nodes are connected to
Topology it forming a hierarchy. It is also called hierarchical
topology.

Hybrid topology uses a combination of any two or more A private cloud is infrastructure operated solely for a single
topologies in such a way that the resulting network does not organization, whether managed internally or by a third
exhibit one of the standard topologies. party, and hosted either internally or externally.

Cloud computing is a type of Internet-based computing that A hybrid cloud uses a private cloud foundation combined
provides shared computer processing resources and data to with the strategic integration and use of public cloud
computers and other devices on demand. services.

Public clouds are owned and operated by companies that Google Drive is a personal cloud storage service from Google
offer rapid access over a public network to affordable which gives every user 15 GB of Drive storage space.
computing resources. OneDrive is Microsoft's service for hosting files in the "cloud
computing". OneDrive offers 5GB of storage space for free.

Internet
The Internet is a global system of interconnected computer A Home page, index page, or main page is a page on a
networks that use the standard Internet protocol suite website. A home page usually refers to:
(TCP/IP) to link several billion devices worldwide.  The initial or main web page of a website, sometimes
It is a network of networks that consists of millions of called the "front page" (by analogy with newspapers).
private, public, academic, business, and government  The first page that appears upon opening a web browser
networks, of local to global scope, that are linked by a broad program, which is also sometimes called the start page.
array of electronic, wireless, and optical networking This 'start page' can be a website or it can be a page with
technologies. various browser functions such as the visual display of
ARPANET adopted TCP/IP in 1983, and from there websites that are often visited in the web browser.
researchers began to assemble the “network of networks”  The web page or local file that automatically loads when a
that became the modern Internet. web browser starts or when the browser's "home" button
The World Wide Web (abbreviated as WWW or W3, is pressed; this is also called a "home page". The user can
commonly known as the Web) is a system of interlinked specify the URL of the page to be loaded, or alternatively
hypertext documents that are accessed via the Internet. choose e.g. to re-load the most recent web page browsed.
 A personal web page, for example at a web hosting
A Website is a set of related web pages served from a single service or a university web site that typically is stored in
web domain. the home directory of the user.

www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App


12
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
A Hyperlink is a reference to data that the reader can
directly follow either by clicking or by hovering or that is Domain Types
followed automatically
Type Description
A web browser (commonly referred to as a browser) is a com Commercial and for profit organization
software application for retrieving, presenting and edu Educational provider, college, Universities
traversing information resources on the World Wide Web. gov Government agencies
Mil US military sites
Some of the famous browsers are Safari, Chrome, Firefox, net Internet infrastructure and service providers
Bolt, UC Browser and Internet Explorer org Miscellaneous and Non-profit organisations

The Uniform Resource Locator, abbreviated as URL is a


An email attachment is a computer file sent along with an
specific character string that constitutes a reference to a
email message. One or more files can be attached to any
resource. In most web browsers, the URL of a web page is
email message, and be sent along with it to the recipient.
displayed on top inside an address bar.
(i) An example of a typical URL would be
Hotmail was co-founded by an Indian American
"http://www.bankersadda.com".
entrepreneur Sabeer Bhatia along with Jack Smith in July of
Here the domain name is ‘bankersadda.com’
1996
Downloading means to receive data to a local system from a
remote system or to initiate such a data transfer
CC (Carbon Copy) in e – mail indicates those who are to
receive a copy of a message addressed primarily to another.
Uploading refers to the sending of data from a local system
The list of CC recipients is visible to all other recipients of the
to a remote system such as a server or another client with
message.
the intent that the remote system should store a copy of the
data being transferred
An additional BCC (blind carbon copy) field is available for
hidden notification; recipients listed in the BCC field receive
An Internet Protocol address (also known as an IP
a copy of the message, but are not shown on any other
address) is a numerical label assigned to each device (e.g.,
recipient's copy (including other BCC recipients)
computer, printer) participating in a computer network. It
acts as an identifier for a computer. It is a unique address for
The Drafts folder retains copies of messages that you have
every computer.
started but are not yet ready to send.
Domain names are used to identify one or more IP
The first email was sent by Ray Tomlinson to himself in
addresses.
1971.
The universal resource locator, or URL, is an entire set of
Internet Explorer was deprecated in Windows 10, with
directions, and it contains extremely detailed information.
Microsoft Edge replacing it as the default web browser.
The domain name is one of the pieces inside of a URL.

Computer Security
A Computer Virus is a computer program or code that can
replicate itself and spread from one computer system to Antivirus Software is used to scan the hard disk to remove
another system. A computer virus has the capacity to corrupt the virus from them. Some of the famous anti – viruses
or to delete data on your computer and it can utilize an e- available are Avast, Norton, Avira, Kaspersky, AVG, etc.
mail program to spread the virus to other computer systems A person who uses his or her expertise to gain access to
.In the worst case scenario, it can even delete everything on other people’s computers to get information illegally or do
your hard disk .The purpose of it is to disrupt the operation damage is a Hacker.
of the computer or the program. Authorization is the function of specifying access rights to
resources related to information security and computer
Some examples of Computer Virus are Trojan viruses. security in general and to access control in particular. More
Stealth viruses, worms, malware (malicious software), formally, "to authorize" is to define an access policy.
Disk Killer, Stone virus, Sunday, Cascade, Nuclear, Word
Concept, etc. Authentication is the act of confirming the truth of an
attribute of a single piece of data or entity. It might involve
Malware, short for malicious software, is any software confirming the identity of a person by validating their
used to disrupt computer operation, gather sensitive identity documents, verifying the validity of a website with a
information, or gain access to private computer systems. It digital certificate, tracing the age of an artifact by carbon
can appear in the form of executable code, scripts, active dating, or ensuring that a product is what its packaging and
content, and other software. labeling claim to be. In other words, Authentication often

www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App


13
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
involves verifying the validity of at least one form of sometimes, indirectly, money) by masquerading as a
identification. trustworthy entity in an electronic communication.
A Spoofing attack is a situation in which one person or
Phishing is the attempt to acquire sensitive information program successfully represents oneself as another by
such as usernames, passwords, and credit card details (and falsifying data and thereby gaining an illegitimate advantage.

Microsoft Office
Microsoft Office is an office suite of desktop applications, Office 365 is a subscription service that includes the most
servers and services for the Microsoft Windows and Mac recent version of Office, which currently is Office 2016. It
operating systems. It includes Microsoft Word, Excel, comes with the applications you’re familiar with, like Word,
PowerPoint, Outlook, OneNote, Access and Publisher. PowerPoint, and Excel, plus extra online storage, ongoing
Note: Microsoft Windows Vista was an windows OS for tech support.
PC not Office Suit.

MS WORD
Microsoft Word is a word processor developed by Microsoft. Ctrl + [ Decrease the font size by 1 point
Ctrl + ] Increase the font size by 1 point
It is used for creating, editing, formatting, storing, retrieving Ctrl+ Spacebar Remove paragraph or character
and printing of a text document. formatting.
Ctrl + C Copy the selected text or object
Microsoft Word's native file formats are denoted either by a Ctrl + X Cut the selected text or object
.doc or .docx file extension. Ctrl + V Paste text or an object
A Cursor is an indicator used to show the position on a Ctrl + Alt + V Paste special
computer monitor or other display device that will respond Alt+ Ctrl + S Split the document Window
to input from a text input or pointing device. Ctrl + Z Undo the last action
Ctrl + Y Redo the last action
Home Clipboard, Font, Paragraph, Styles,
Editing To create a document, we use New command at the menu.
Insert Pages, Tables, Illustrations, Links,
Header & Footer, Text, Symbols(and Save as is used to save a document for the first time. It is also
Equations) used to change the destination of the saved file in the
Page Layout Themes, Page Setup(includes margins, computer.
orientation, breaks etc.), Page
Background(includes watermark and Print Preview is used to see the document before the
borders), Paragraph, Arrange printout is taken.
References Table of Content, Footnotes, Citation and
Bibliography, Captions, Index, Table of Cut and Paste options are used to move the data from one
Authorities part of the document to another.
Mailings Create(Envelops & Labels), Start Mail
Merge Control Keys + Function keys
Review Proofing( Spelling & Grammar, Ctrl+F2 Choose the print preview command
Research, Thesaurus, Word Count), (Microsoft office Button)
Language(and Translate), Comments, Ctrl+F3 Cut on the spike
Tracking, Changes, Compare, Protect Ctrl+F4 Close the window
View Document Views, Show, Zoom, Window, Ctrl+F6 Go to the next window
Macro
Design Table Style Options, Table Styles, Draw Ctrl+F9 Insert an empty field
Borders Ctrl+F10 Maximise the document window
Layout Tables, Rows & Columns, Merge, Cell Ctrl+F11 Lock a field
Size, Alignment, Data Ctrl+F12 Choose the Open command (Microsoft
Office Button)
Basic Keys (Common Tasks)
Ctrl + N Create a new document
Portrait and Landscape options are available in
Ctrl + B Make letters bold
Orientation category of Page Setup.
Ctrl + I Make letters italic
Ctrl + U Make letters underline
Alignment refers to the position of text between the
Ctrl + Shift+ < Decrease font size one value
margins.
Ctrl + Shift + > Increase the font size one value
www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App
14
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
Auto Correct in word automatically corrects certain
Auto complete is a feature in word that automatically spelling, typing, capitalisation or grammar errors.
completes the spelling of days of the week and months of the
year that have more than five letters in their names. Thesaurus is used for finding a synonym for a word in the
document.
Function Keys Word has extensive lists of bullets and numbering features
F1 Get help or visit Microsoft office Online. used for tables, lists, pages, chapters, headers, footnotes, and
F2 Move text or graphic. tables of content.
F4 Repeat the last action
F5 Choose the Go To command (Home tab).
F6 Go to the nest pane or frame.
F7 Choose the spelling command (Review tab)
F8 Extend a selection
F9 Update the selected fields
F10 Show key tips
F11 Go to the nest field
F12 Choose the Save As command (Microsoft Office
Button).
Header and Footer option is used to display information
such as title and page number of the document.
The bar at the top of the window that bears the name of the
window, is known as Title Bar.
A screen element of MS Word that is usually located below
the title bar that provides categorized options is called Menu
Bar.

MS EXCEL
Microsoft Excel is a spreadsheet application developed by Short cut key to insert a new worksheet in MS-Excel is ALT
Microsoft for Microsoft Windows and Mac OS. + Shift + F1 + or F11.

It features calculation, graphing tools, pivot tables, and a Sheet tab is the tab at the bottom of the worksheet
macro programming language called Visual Basic for window that displays the name of the worksheet.
Applications.
A Microsoft office document that contains one or more
The intersection of a row and column is called a Cell. worksheets is known as a Workbook.

The cell in which we are currently working is known as Shortcut Keys of MS-Excel
Active Cell. Key Description
F2 Edit the selected cell
Microsoft Excel's native file formats are denoted either by F5 Go to a specific cell
a .xls or .xlsx file extension. F7 Spell check selected text and/or
A Worksheet is made of columns and rows, wherein document
columns run Vertically and rows run Horizontally. F11 Create chart
Ctrl + Shift + ; Enter the current time
Up to Excel 2003, the standard amount of columns has Ctrl + ; Enter the current date
been 256 and 65,536 rows. Shift + F3 Open the Excel insert function window
Excel 2007 onwards, the maximum number of rows per Shift + F5 Bring up Find and Replace box.
worksheet increased to 1,048,576 and the number of Ctrl + A Select all contents of the worksheet
columns increased to 16,384. Ctrl + B Bold highlighted selection
Ctrl + I Italic highlighted selection
Microsoft Excel has the basic features of all spreadsheets, Ctrl + U Underline highlighted selection
using a grid of cells arranged in numbered rows and letter- Ctrl + P Bring up the print dialog box to begin
named columns to organize data manipulations like printing
arithmetic operations Ctrl + Z Undo last action
Ctrl + F9 Minimise current workbook
The letter and number of the intersecting column and row Ctrl + F10 Maximise currently selected workbook
is the Cell Address. Ctrl + F6 Switch between open
workbooks/window
Ctrl + page up Move between Excel worksheet in the

www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App


15
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
same Excel document. into cell currently selected.
Ctrl + Page Move between Excel worksheets in the Ctrl + Arrow Move to next section to text
Down same Excel document key
Ctrl + Tab Move between two or more open Excel Ctrl + Space Select entire column
files Shift + Space Select entire row
Alt + = Create a formula to sum all of the above
cells
Ctrl + ’ Insert the value of the above cell
PowerPoint

 Microsoft PowerPoint is a slide show presentation  Slide Show from current slide - Show the
program developed by Microsoft. It was officially presentation as a full screen slideshow from the current
launched on May 22, 1990, as a part of the Microsoft selected slide.
Office suite.
 Filename extension: .ppt, .pptx, .pps or .ppsx Slide Area: Displays the active slide

Ribbon Task Pane: It contains more options and appears when


The Ribbon is the strip of buttons across the top of the you choose an option in one of the Ribbon tabs.
main window. The Ribbon has tabs which in turn
contain groups of buttons for various options - some SHORTCUTS OF POWERPOINT
groups also contain galleries (for example galleries for To do this Press
Themes and Theme Colors.) Start the presentation F5
form the beginning
Slides/Outline Pane Perform the next N, ENTER, PAGE DOWN,
Normally placed on the left side of the interface, this animation for advance to RIGHT,
pane contains two tables - the Slides tab and Outline the next slide ARROW, DOWN ARROW, or
tab. SPACEBAR
Perform the previous P, PAGE UP, LEFT ARROW,
Status Bar animation or return to UP ARROW, or BACKSPACE
A horizontal strip at bottom; that provides information the previous slide
about the open presentation like slide number, applied Go to slider number number + ENTER
Theme, etc. It also includes the view and zoom options. End a presentation ESC or HYPHEN
Return to the first slide 1 + ENTER
View Buttons Redisplay hidden CTRL + P
Essentially there are three view buttons displayed right pointer or change the
beneath on the status bar with zoom-in and zoom-out. pointer to a pen
 Normal view - Clicking this enables Normal view, Shift- Redisplay hidden CTRL + A
clicking this gets you to Slide Master view. pointer or change the
 Slide Sorter view - Clicking this displays zoom-able pointer to an arrow
thumbnails of every slide in the open presentation Go to the first or next TAB
Shift-clicking this button gets you to Handout Master hyperlink on a slide
view. Go to the last or previous SHIFT + TAB
hyperlink on a slide

DATABASE MANAGEMENT SYSTEM


DBMS is the acronym of Data Base Management System.  External view or user view/View Level- It is the
DBMS is a collection of interrelated data and a set of highest level of data abstraction. This includes only
programs to access this data in a convenient and efficient those portions of database of concern to a user or
way. It controls the organization, storage, retrieval, security Application program. Each user has a different external
and integrity of data in a database. view and it is described by means of a scheme called
external schema.
Types of Database Model: Network Database Model,  Conceptual view/Logical Level- All the database
Hierarchical Database model, Relational Database Model and entities and the relationship among them are included.
Object-Oriented Database Model. One conceptual view represents the entire database
called conceptual schema.
Architecture of DBMS-The generalized architecture of  Internal view/Physical Level- It is the lowest level of
DBMS is called ANSI/ SPARC model. The architecture is abstraction, closest to the physical storage method. It
divided into three levels: describes how the data is stored, what is the structure of

www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App


16
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
data storage and the method of accessing these data. It is UNIQUE - Ensures that each row for a column must have a
represented by internal schema. unique value
Data model: A data model is a plan for building a database. CHECK - Ensures that the value in a column meets a specific
The model represents data conceptually, the way the user condition
sees it, rather than how computers store it. Data models DEFAULT - Specifies a default value for a column
focus on required data elements and associations.
 Entity – Relationship Model Primary Key uniquely identifies a record in a table.
 Relational Model
Entity: A thing (animate or inanimate) of independent A candidate key is a single field or the least combination of
physical or conceptual existence and distinguishable. In the fields that uniquely identifies each record in the table.
University database context, an individual student, faculty
member, a class room, are entities. A foreign key is generally a primary key from one table that
appears as a field in another.
Attributes: Each entity is described by a set of
attributes/properties. DDL: Data Definition Language is used for specifying the
database schema. It contains commands to create tables,
SQL (Structured Query Language) is a database computer alter the structure, delete tables or rename tables. E.g. Create
language designed for the retrieval and management of data DML: Data Manipulation Language is used for accessing and
in relational database. manipulating data in a database. E.g. Select, Update
Constrains: In SQL, we have the following constraints- DCL: Data Control Language is used for granting and
NOT NULL - Indicates that a column cannot store NULL value revoking user access on a database.

FULL FORMS & ABBREVIATIONS


TCP Transmission Control Protocol GIF Graphics Interchange Format
FTP File Transfer Protocol ASCII American Standard Code for Information
TFTP Trivial File Transfer Protocol Interchange
SFTP Secure File Transfer Protocol ASP Active Server Pages
SMTP Simple Mail Transfer Protocol BCC Blind Carbon Copy
HTTP Hyper Text Transfer Protocol CC Carbon copy
HTTPS Hyper Text Transfer Protocol Secure CAD Computer Aided Design
UDP User Datagram Protocol CDMA Code Division Multiple Access
ARP Address Resolution Protocol GSM Global System for Mobile Communication
Tel Net Telecommunication Networking CMOS Complementary Metal Oxide Semi-
POP3 Post Office Protocol Version3 Conductor
BGP Border Gateway Protocol CMYK Cyan Magenta Yellow Block
P2P Point to Point Protocol GPS Global Positioning System
PPP Peer to Peer Protocol GUI Graphical User Interface
IP Internet Protocol HDMI High Definition Multimedia Interface
SNMP Simple Network Management Protocol GIGO Garbage in Garbage Out
NTP Network Time Protocol LIFO Last In First Out
SIP Session Initiation Protocol FIFO First In First Out
DHCP Dynamic Host Configuration Protocol PING Packet Internet Gopher
IMAP4 Internet Message Access Protocol Version HDD Hard Disc Drive
4 NIC Network Interface Controller/Cord
RARP Reverse Address Resolution Protocol HDTV High Definition Television
SSH Secure Shell ISP Internet Service Provider
MIME Multipurpose Internet Mail Extension JPEG Joint Picture Expert Group
SMIME Secure MIME LCD Liquid Crystal Display
ALGOL Algorithmic Language LED Light Emitting Diode
ANSI American National Standard Institute TFT Thin Film Transistor
ATM Asynchronous Transfer Mode CRT Cathode Ray Tube
AS Autonomous System MIDI Musical Instrument Digital Interface
BASIC Beginners All Purpose Symbolic MPEG Moving Picture Expert Group
Instruction Code PDA Personal Digital Assistants
BIOS Basic input Output System PDF Portable Document Format
BPS bit Per Second ARPANET Advanced Research Projects Agency
DNS Domain Name Server Network
EDI Electronic Data Interchange SQL Structured Query Language
URL Uniform Resource Locator USB Universal Serial Bus

www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App


17
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
VIRUS Vital Information Resource Under Siege OMR Optical Mark Reader / Recognition
VOIP Voice Over Internet Protocol OCR Optical Character Reader / Recognition
IVR Interactive Voice Response BCR Bar Code Reader
WIFI Wireless fidelity MICR Magnetic Ink Character Reader /
WIMAX Worldwide Interoperability for Recognition
Microwave Access PCB Printer Circuit Board
ADSL Asymmetric Digital Subscriber Line SRAM Static RAM
API Application Program Interface DRAM Dynamic RAM
ARP Address Resolution Protocol PROM Programmable ROM
RARP Reverse ARP EPROM Electrically PROM
ICANN Internet Corporation of Assign Names & EEPROM Electrically Erasable PROM
Numbers HDD Hard Disc Drive
DPI Dots Per Inch FDD Floppy Disc Drive
DSL Digital Subscriber Line CD Compact Disc
FAT File Allocation Table DVD Digital Video/Versatile Disc
MANET Mobile Ad-Hoc Network BRD Blu Ray Disc
MIPS Million Instruction Per Second HVD Holographic Versatile Disc
BIPS Billion Instruction Per Second ACID Atomicity Consistency Isolation Durability
TIPS Trillion Instruction Per Second WYSIWYG What you see is what you get
NAT Network Address Translation
IEEE Institute of Electrical and Electronic
Engineer
IMAP Internet Message Access Protocol
ISDN Integrated Servers Digital Network
ISO International Standard Organization/
International Org for Standardization
DHTML Dynamic Hyper Text Markup Language
MAC Media Access Control
CAN Campus Area Network
PAN Personal Area Network
SAN Storage Area Network
CNM Circulatory Network Mode
IPV4 Internet Protocol Version 4
IPV6 Internet Protocol Version 6
DBMS Data Base Management System
MODEM Modulator Demodulator
RAM Random Access Memory
ROM Read Only Memory
SMPS Switch Mode Power Supply
GLOSSARY
A and operating system to interact with input/output
 Access time - The amount of time it takes for requested devices.
information to be delivered from disks and memory.  Bug - A software bug is an error, flaw, failure, or fault in
 Antivirus software - A program designed to look for a computer program or system produces an incorrect or
and destroy viruses that may infect the memory of a unexpected result.
computer or files stored on a computer.  Bus - A pathway along which electronic signals travel
 Artificial intelligence (AI) - Computer systems that between the components of a computer system.
attempt to imitate human processes for analyzing and C
solving problems.  Cookie - A packet of information that travels between a
 Accumulator - A local storage area called a Register, in browser and the web server.
which the result of an arithmetic or logic operation is  Crash - Your computer or application no longer works
formed. correctly and so you “loose” all the work you’ve done
B since the last time you saved.
 BIT - It is basic unit of computers. It has two values 1 & 0  Command - An instruction that causes a program or
only. computer to perform a function.
 BYTE - Combination of 8 Bits.  Cache - It is a memory storage area that keeps frequent
 Basic Input Output System (BIOS) - Also known as use data readily available to the computer so that the
ROM BIOS. It provides an abstraction layer for the computer does not retrieve them from slow storage
hardware, i.e., a consistent way for application programs devices.
www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App
18
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
 Clock Speed - The speed of computer is measured in  Hub-A network device that connects multiple computers
clock speed. High clock speed is synonymous with high on a LAN so that they can communicate with another
processing capability. It is measured in Megahertz network and the internet.
(MHz).  Header - Repetitive information that appears at the top
 Column - A vertical block of cells in a table or (the head) of every page of a document.
spreadsheet.  Hypertext transfer protocol (HTTP) - The protocol
D used on the World Wide Web that permits Web clients
 Delete - To remove an item of data from a file or to (Web browsers) to communicate with Web servers
remove a file from the disk. I
 Debugging - Locating and eliminating defects in a  Icons-In a graphical user interface (GUI), a small,
program. pictorial, on screen representation of an object, such as a
 Desktop - The electronic work area on a display screen. document, program, folder or disk drive.
 Dots Per Inch (DPI) - It is defined as the measure of the  Instant messaging (IM) - A chat program that lets
resolution of a printer and scanner, or monitor. people communicate over the Internet in real time.
 Domain Name - A unique name that identifies a  Internet protocol (IP) address - A unique set of
particular website and represents the name of the server numbers that identifies a computer over a network.
where the web pages reside.  Internet service provider (ISP) - An organization that
E provides access to the Internet for a fee.
 Edit - To make certain changes in existing data.  Intranet - A private network established by an
 Ethernet Card - A network adapter that enables a organization for the exclusive use of its employees.
computer to connect to an Ethernet. Firewalls prevent outsiders from gaining access to an
organization’s intranet
F J
 Fax - A shortened form of the word facsimile. A copy of a  JPEG - Joint Photographic Experts Group. A format for
document transmitted electronically from one machine storing complex graphics in compressed form.
to another.  Justification - Aligning lines of text at the left margin,
 File transfer protocol (FTP) - A set of guidelines or the right margin, both margins, and the centre. Text
standards that establish the format in which files can be aligned at both margins is considered fully justified.
transmitted from one computer to another.
 Firewall - A security system usually consisting of K
hardware and software that prevents unauthorized  Keyboard - The device used to enter information into a
persons from accessing certain parts of a program, computer.
database, or network.  Kilobyte - A measurement of the storage capacity of a
 Flash Memory - It is a type of non-volatile computer device. One kilobyte represents 1024 bytes.
storage chip that can be electrically erased and
reprogrammed. It was developed by EEPROM. L
G  LAN - A local area network (LAN) is a computer network
 Gateway - A machine that links two networks using that interconnects computers within a limited area such
different protocols. as a home, school, computer laboratory, or office
 Gigabyte - A measurement of the storage capacity of a building, using network media.
device. One gigabyte represents 1024 megabytes.  Laptop computer - A portable computer. Also known as
 Google – search engine on the web. a notebook computer.
 Gopher - A protocol used for locating and transferring  Landscape Orientation – The positioning of the page so
information on the internet. It is an internet search tool that the information is printed across the long
that allows users to access textual information. dimension of the page.
 GUI - Graphical User Interface uses icons and menus to  Liveware - It is a term to describe the human system,
carry out commands such as opening files, delete files, opposed to hardware or software in a computer.
move files etc.. M
 Graphic Interchange Format (GIF) - A simple file  Macro virus - A type of virus that attaches itself to
format for pictures and photographs that are documents or word processing templates.
compressed so that they can be sent quickly.  Malware - Software that disrupts normal computer
H functions or sends a user’s personal data without the
 Hard copy - Text or graphics printed on paper; also user’s authorization.
called a printout.  Memory - The part of a computer that stores
 Hard disk - A rigid type of magnetic medium that can information.
store large amounts of information.  Memory Cell - A circuit in memory that represents a
 Hyperlink - An image or portion of text on a webpage single bit of information.
which is linked to another webpage.  Mass Storage - Storage systems that provide access to
hundreds of billions of bytes of stored data. They are
www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App
19
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
often referred to as Archival Storage because of the very  Protocol - A set of rules and regulations that
large volumes of historical or backup data they can store. coordinates the exchange of information over the
 MIPS - An acronym derived from millions of instructions network.
per second. Used to measure the speed of a processor.  Portrait orientation - Positioning paper so that
 Morphing - The transformation of one image into information is printed across the short dimension of the
another image. paper.
 Mobile Commerce (m-Commerce) - A form of e- Q
commerce that has the ability to conduct monetary  Query - An alternate pipe form of operating system,
transactions via a mobile device such as a cell phone. which handles data in the form of messages rather than
 Mozilla - a web browser and successor to Netscape bytes.
Communicator.  Qwerty - It is one of the standard computer keyboard,
 Multitasking - The ability of a computer to execute with the character Q, W, E, R, T, Y on the top row of
more than one program at a time. letters on the keyboard.
N R
 NIBBLE - Combination of four bits.  Response time - The time a computer takes to execute a
 Network - A system of interconnected computers. command.
They are of three types i. e. LAN, MAN, WAN.  Retrieve - To call up information from memory or
 Network Interface Card (NIC) - This is a part of the storage so that it can be processed in some way.
computer that allows it to talk to other computers via a  Record - A collection of all the information pertaining to
network protocol like TCP/IP. a particular subject.
 Node - A computer which is attached to the network.  Row - A horizontal block of cells in a table or
Each node has its own address on the network so that it spreadsheet.
can be uniquely identified and can communicate with  Resolution - Measurement of the degree of sharpness of
other nodes on the same or different network. a displayed image. It is defined as number of pixels per
O square inch on a computer generated display.
 Offline - Refers to the state in which a computer is  Register - A temporary storage unit for quick, direct
temporarily or permanently unable to communicate accessibility of a small amount of data for processing.
with another computer. S
 Online - Refers to the state in which a computer is ready  Save As – Give the file a name and/or store the file in a
to communicate with other computers. certain place.
 Open source software - Software that makes the  Save - Tell the computer to create a file on disk that has
underlying source code available to all users at no the information you’ve put into the document.
charge.  Scroll bar - Allows you to move around through your
 Operating system (OS) - Software that manages the document.
internal functions and controls the operations of a  Shut down - To quit all applications and turn off the
computer. computer.
P  Spam - unwanted repetitious messages, such as
 Palmtop computer - A portable computer smaller than unsolicited bulk e-mail.
a notebook (or laptop) computer that fits on the palm of  Scanner - An input device that can copy a printed page
your hand. Also called a handheld computer. into a computer’s memory, thus doing away with the
 Password - A user’s secret identification code, required need to type the copy.
to access stored material. A procedure intended to  Screen saver - A program that changes the screen
prevent information from being accessed by display while the user is away from the computer.
unauthorized persons.  Server - A computer that manages a shared resource
 Piracy - The illegal copying of software or other creative and provides a set of shared user services to the clients.
works.  Search Engine - Software that searches, gathers and
 Peripherals - A connectable device that has an auxiliary identifies information from a database based on an
function outside the permanent system configuration index, keywords or titles.
such as plotters, printers and graphic displays.  Spam - Unwanted repetitious messages, such as
 Phishing - A type of computer fraud that tries to trick unsolicited bulk e-mail.
users into revealing their passwords and other  Soft copy - Information shown on the display screen.
confidential information.  Sort - To arrange fields, records, or files in a
 Pixel - A smallest picture element of a digital image. The predetermined sequence.
smaller the pixels, the higher the resolution.  Surfing the Net - Browsing through various Web sites
 Port - An electrical connection on the computer into on the Internet in search of interesting things.
which a cable can be plugged so that the computer can T
communicate with other devices such as printer or  Trash - Place where you put files and folders that you
modem. want to delete or get rid of.

www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App


20
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
 Topology - The structure of the network, including The most common Web browsers now in use are
physical connections such as wiring schemes and logical Internet Explorer, Google Chrome and Mozilla Firefox.
interactions between network devices.  Web site - One or more related pages created by an
 Track - A ring on a disk where data can be written. individual or an organization and posted on the World
 Telnet - A protocol for remote computing on the Wide Web.
internet that allows a computer to act as a remote  Wi-Fi (Wireless fidelity) - A process that permits high-
terminal on another machine, anywhere on the internet. speed wireless transmission of data.
 Touchpad - The device on a laptop computer that takes  Word processing - The electronic process of creating,
the place of a mouse. formatting, editing, proofreading, and printing
 Touch screen technology - The technology that permits documents.
a user to perform a function simply by touching the  Workstation - A desktop computer that runs
screen on an appropriate spot. applications and serves as an access point in a local area
U network.
 Uninterrupted Power Supply (UPS) - A Battery Z
powered backup system that provides enough electricity  Zombie - A computer that has been hijacked by a
to a computer during a power outage so that a user can cracker without the owner’s knowledge and used to
save files before shutting down the computer. perform malicious tasks on the Internet.
 Universal Serial Bus (USB) - A common standard for
connecting multiple peripherals to a computer as
needed.
 Upload - To transfer information from a client computer
to a host computer.
V
 Virus - A piece of computer code designed as a prank or
malicious act to spread from one computer to another by
attaching itself to other programs.
W
 WAP - Wireless Application Protocol is a specification
for a set of communication protocol used to allow
wireless devices to access the internet and other
utilities.
 Web browser - Software that permits a user with a click
of a mouse to locate, display, and download text, video,
audio, and graphics stored in a host computer on the
Web.

Important Questions Based on Microsoft Office:


1. Microsoft Office is a __________. 7. In order to move from one worksheet to another in
A) Shareware B) Public-domain software MS-Excel workbook. One should click ___________.
C) Open source software D) An application suit A) active cell B) scroll bar C) sheet tab
E) Firmware D) tab button E) None of these
2. Which term is not related with font? 8. In a spreadsheet, a __________ is a number you will use
A) Font face B) Font size C) Font color in a calculation.
D) Font grammar E) None of these A) label B) cell C) field
3. The valid format of MS Word is __________. D) value E) None of these
A) .jpeg B) .png C) .doc 9. In Power Point, which of the following will not
D) .exe E) None of these advance the slides in a slide show view?
4. Which of the following option may be used to change A) Esc key B) The spacebar
page-size and margins? C) The Enter key D) The mouse button
A) Page Layout B) View C) Tools E) None of these
D) Data E) None of these 10. In Microsoft PowerPoint, two kinds of sound effects
5. To justify the selected text, the shortcut key is files that can be added to the presentation are
__________. A) .wav files and .mid files
A) Ctrl + 1 B) Ctrl + J C) Ctrl + U B) wav files and .gif files C) wav files and .jpg files
D) Ctrl + Alt + K E) None of these D) jpg files and .gif files E) None of these
6. Workbook is a collection of __________ in MS Excel? 11. Which PowerPoint view displays each slide of the
A) page set-up B) buttons C) diagrams presentation as a thumbnail and is useful for
D) charts E) worksheets rearranging slides?
www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App
21
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
A) Slide Sorter B) Slide Show C) Slide Master A) Ctrl + S B) Ctrl + 1 C) Shift + A
D) Notes Page E) Slide Design D) Ctrl + A E) None of these
12. If you want to insert a chart to your slide then go to 26. MS Word is __________ software.
__________. A) System B) Application C) Programming
A) Insert – Chart B) Home – Chart C) Format – Chart D) Compiler E) None of these
D) Table – Chart E) None of these 27. The shortcut key for paste selected text/picture in
13. Which of the following is not a type of Microsoft MS Word is __________.
access database object? A) Ctrl + X B) Ctrl + C C) Ctrl + V
A) Table B) Worksheets C) Modules D) Ctrl + Z E) None of these
D) Macros E) None of these 28. Using Print Preview is useful. When you want to
14. Row in an Access table is also known as __________. A) colour the document B) save the document
A) field B) record C) data C) delete the document D) copy the document
D) type E) None of these E) view how the document will appear when printed
15. Queries in Access can be used as __________. 29. To indent the first paragraph of your report, you
A) View, change and analyse data in different ways should use this key.
B) A source of records for forms and reports A) Space bar B) Return key C) Tab key
C) to access internet D) Both a and b D) Shift key E) None of these
E) None of these 30. In Excel, the contents of the active cell are displayed
16. Pressing F8 key for three times selects in the ________.
A) A word B) A sentence C) A paragraph A) footer bar B) tool bar C) task bar
D) Entire document E) None of these D) menu bar E) formula bar
17. What happens if you press Ctrl + Shift + F8? 31. __________ appear at the bottom of the Excel Window.
A) It activates extended selection A) Work sheet tabs B) Name box C) Formula bar
B) It activates the rectangular selection D) Title bar E) None of these
C) It selects the paragraph on which the insertion line is. 32. In MS excel ________ are numbered from 1 to onwards
D) Both (A) and (C) E) None of these and __________ are numbered from A to onwards.
18. How can you disable extended selection mode? A) Columns, rows B) Rows, slides C) Slides, rows
A) Press F8 again to disable D) Rows, columns E) None of these
B) Press Del to disable C) Press Esc to disable 33. What is the default column width of MS Excel?
D) Press Enter to disable E) It cannot be disables A) 5.5 B) 2.98 C) 8.43
19. What does EXT indicator on status bar of MS Word D) 6.49 E) None of these
indicate? 34. To insert a new slide go to __________ tab, in the Slides
A) It indicates whether the external text is pasted on group, click New Slide.
document or not A) Home B) View C) Animations
B) It indicates whether extended add-ons are installed D) Slide show E) None of these
on MS Word or not 35. Times new Roman, Cambria, Arial are the example of
C) It indicates whether Extended Selection mode is __________.
turned on or off A) Font face B) Themes C) SmartArt
D) Both (A) and (B) E) None of these D) Clipart E) None of these
20. What is the maximum number of lines you can set 36. In Access a __________ is the collection of data items of
for a drop cap? all the fields pertaining to one entity.
A) 3 B) 10 C) 15 A) field B) record C) form
D) 20 E) 50 D) report E) None of these
21. What is the default number of lines to drop for drop 37. A table of how many columns can you insert in a
cap? word document in maximum.
A) 3 B) 10 C) 15 A) 55 B) 42 C) 32
D) 20 E)7 D) 63 E) As you wish
22. What is the shortcut key you can press to create a 38. In MS Access a __________ name must be unique within
copyright symbol? a database.
A) Alt+Ctrl+C B) Alt + C C) Ctrl + C A) Field B) Record C) Table
D) Ctrl + Shift + C E)None of these D) Character E) None of these
23. How many columns can you insert in a word 39. The minimum number of rows and columns in MS
document in maximum? Word document is
A) 35 B)63 C) 55 A) 1 and 1 B) 2 and 1 C) 2 and 2
D) 65 E) 60 D) 3 and 3 E) None of these
24. What is the smallest and largest font size available in 40. Thesaurus tool in MS Word is used for
Font Size tool on formatting toolbar? A) Spelling suggestions B) Grammar options
A) 8 and 72 B) 8 and 64 C) 12 and 72 C) Synonyms and Antonyms words
D) 10 and 40 E) None of these D) All of the above E) None of these
25. Select all the text in MS Word document by: 41. Why Drop Caps are used in document?
www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App
22
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
A) To drop all the capital letters C) We regret to inform you that your submission has
B) To automatically begin each paragraph with capital been declined
letter D) 11 E) None of these
C) To begin a paragraph with a large dropped initial 49. If you want to convert a symbol or several lines of
capital letter text into an AutoCorrect entry, you should:
D)To drop the numbers A) Insert the symbol or type the text in a Word
E) None of these document first. Then, select the text or symbol and
42. A bookmark is an item or location in document that go to the AutoCorrect dialog box.
you identify as a name for future reference. Which of B) Click the Tools menu and choose AutoCorrect
the following task is accomplished by using Options. Then, click the Insert menu and choose Symbol
bookmarks? (or click the Format menu and choose Paragraph) to add
A) To add anchors in web page the symbol or paragraph to AutoCorrect.
B) To mark the ending of a paragraph of document C) AutoCorrect can only accommodate one line of text. It
C) To quickly jump to specific location in document is not possible to convert a symbol or multiple lines of
D) To add hyperlinks in webpage text into an AutoCorrect entry.
E) None of these D) Insert the symbol or type the text in a Word
43. A word processor would most likely be used to do document first. Then, select the text or symbol and click
A) Keep an account of money spent the Edit menu followed by Paste Special. Select New
B) Do a computer search in media center AutoCorrect Entry and then click OK.
C) Maintain an inventory E) None of the above
D) Type a biography 50. AutoCorrect was originally designed to replace
E) Maintain records of database _________ words as you type.
44. Which of the following is not valid version of MS A) Short, repetitive B) Grammatically incorrect
Office? C) Misspelled words D) Incorrect Image
A) Office XP B) Office Vista C) Office 2007 E) None of the above
D) Office 2010 E) None of these 51. Which of the following is the second step in creating
45. You cannot close MS Word application by a macro?
A) Choosing File menu then Exit submenu A) Start recording
B) Press Alt+F4 B) Using your mouse or keyboard, perform the task you
C) Click X button on title bar want to automate
D) From File menu choose Close submenu C) Assign a keyboard shortcut to the macro
E) None of these D) Give the macro a name
46. The key F12 in MS Word opens a E) None of these
A) Save As dialog box B) Open dialog box 52. If you will be displaying or printing your document
C) Save dialog box D) Close dialog box on another computer, you’ll want to make sure and
E) Opens help menu select the _____________ option under the ‘Save’ tab.
47. What is the short cut key to open the Open dialog A) Embed Fonts B) Embed True Type
box? Fonts
A) F12 B) Shift F12 C) Alt + F1 C) Save True Type Fonts D) Save Fonts
D) Ctrl + F12 E) None of these E) Font Face
46. Which of the following symbol sets would be most 53. In Word, the mailing list is known as the ____________.
likely to contain a mathematical symbol such as a A) Data sheet B) Source C) Data source
degree sign, greater than or equal to, or a Greek D) Sheet E) Hyperlink
letter? 54. To delete 3-D rotation from the shape, point to 3-D
A) Wingdings B) Wingdings 3 C) Webdings Rotation, and then click _____.
D) Symbol E) Arial A) Non Rotation B) Not Rotation C) None Rotation
47. When assigning a shortcut key to a symbol, you D) No Rotation E) None of these
should always try to select a key or key combination 55. In Microsoft Office Power-Point 2007, a _____ is a
that is: connection from one slide to another slide in the
A) Unassigned same presentation or to a slide in another
B) Located on the ten-key pad section of your keyboard. presentation, an e-mail address, a Web page, or a
C) Assigned to another task. file.
D) From the same font family as the symbol.
E) None of these A) Hyphenation B) Header C) Footer
48. Suppose you wanted to create an AutoCorrect entry D) Hyperlink E) None of these
that would type the words ‘We regret to inform you 56. In PowerPoint, which of the following is the default
that your submission has been declined’ of the page setup orientation for notes pages, outlines and
following choices, which would be the best name you handouts?
could assign to this entry? A) Vertical B) Landscape C) Portrait
A) Regret B) Subdual D) All of these E) None of these
www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App
23
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
57. In slide layout panel, how many layouts are available D) Microsoft Default Connection Control
for next layout by default? E) None of the above
A) 4 B) 7 C) 12
D) 15 E) None of these
58. In Access, this operation copies a backup file from
the storage medium back onto the computer :
A) Restore B) Recreate C) Copy
D) Structure E) None of these
59. In the Form Wizard dialog box, the fields from the
selected table are displayed in which list box?
A) All fields B) All Records
C) Available Records D) Available Fields
E) None of these
60. Which control does access use to link data access
page components to access data?
A) Microsoft Office Data Source Control
B) Microsoft Dynamic Data Control
C) Microsoft Data Connection Control

Miscellaneous Questions on Computer Knowledge


1. CD-ROM is a _______? (a) dynamic (b) static (c) volatile
(a) Semiconductor memory (b) Memory registers (d) non-volatile (e) faulty
(c) Magnetic memory (d) Cache Memory 8. How can the user determine what programs are
(e) None of the above available on a computer ?
2. Actual execution of instructions in a computer takes (a) Checking the hard disk properties
place in? (b) Viewing the installed programs during the booting
(a) ALU (b) Control Unit (c) Storage unit process
(d) Control bus (e) None of the above (c) Checking the operating system for a list of
3. Modem stands for _______. installed programs
(a) A type of secondary memory (d) Checking the existing files saved on the disk
(b) Modulator demodulator (e) None of these
(c) Mainframe operating device memory 9. Processing involves ________.
(d) Multiprocessing device (a) inputting data into a computer system
(e) None of the above (b) transforming input into output
4. _______ Controls access to the resources on a network. (c) displaying output in a useful manner
(a) Server (b) Client (d) providing relevant answers
(c) Both ((a) and (b) (d) Memory (e) None of these
(e) None of the above 10. Which process checks to ensure the components of
5. The wider the bus, the _______ the transfer of data the computer are operating and connected properly?
(a) Greater the number of transfer steps required and (a) Booting (b) Processing (c) Saving
the slower (d) Editing (e) None of these
(b) Greater the number of transfer steps required and 11. What kind of programming language is Java?
the faster (a) Object-oriented programming language
(c) Fewer the number of transfer steps required and the (b) Relational programming language
slower (c) Sixth-generation programming language
(d) Fewer the number of transfer steps required and (d) Database management programming language
the faster (e) None of these
(e) None of the above 12. Formatting a disk results in all the data being?
6. What does 'GIF' Stands for? (a) Saved to the disk (b) Copied from the disk
(a) Graphics Interchange Format (c) Deleted from the disk
(b) Geo Interchange Format (d) All of the above (e) None of the above
(c) Graphical Interconnection Format 13. What type of web technology creates an online
(d) Graphics Interlace Format community where people can make statements and
(e) Graphics Interchange File others can read and respond to those statements?
7. Cache and main memory will lose their contents (a) I-Journal (b) Podcast (c) ASP
when the power is off. They are _______. (d) Blog (e) None of these
www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App
24
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
14. What is a common medium used for thieves to steal (e) BIOS and ROM
others' identities? 28. What is the full from of CRT?
(a) Telephone (b) Pick pocketing (a) Cathode Ray Tube
(c) Burglary (d) Email (b) Computer Resolution and Transparency
(e) None of the above (c) Cathode Resolution and Transparency
15. Application software? (d) Computer RAM Trash
(e) None of these
(a) Is used to control the operating system
29. Which among the following is not hardware?
(b) Is designed to help programmers
(a) Motherboard (b) Operating system
(c) Performs specific task for computer users (c) CPU (d) Keyboard
(d) Is used for making design only (e) Hard disk drive
(e) All of the above 30. Which of the following is software?
16. A set of instruction telling the computer what to do (a) Motherboard (b) CPU
is called? (c) Microsoft Windows
(a) Mentor (b) instructor (c) compiler (d) RAM (e) All of these
(d) program (e) debugger 31. In computing, a _____ is a directive to a computer
17. A __________ is anything that can cause harm. program order to perform a specific task.
(a) vulnerability (b) redundancy (c) Spam (a) Hard boot (b) Hibernation (c) Command
(d) threat (e) None of the above (d) Warm boot (e) Format
18. A __________ is a small program embedded inside of a 32. Which of the following is/are modifier keys in a
GIF image. computer?
(a) Ctrl (b) Alt (c) Shift
(a) web bug (b) cookie (c) spyware application
(d) Both 2 and 3 (e) All of the above
(d) spam (e) None of the above
33. Which among the following is associated with Internet
19. When you save an Microsoft Access project, what file Mail?
format do you use? (a) Inbox (b) Server (c) Trash
(a) .adp (b) .Xml (c) .mbd (d) Drop Box (e) One Drive
(d) All of these (e) None of the above 34. What is a cursor?
21. To select a column the easiest method is to? (a) It is an indicator
(a) double click any cell in the column (b) It shows the position on a computer monitor
(b) drag from the top cell in the column to the last cell in (c) Cursor is Latin for ‘runner.
the column (d) Both 1 and 2
(c) click the column heading (e) All of the above
(d) click the row heading 35. Which among the following is not legitimate type of
(e) None of the above computer virus??
22. 30,000 bytes is equal to (a) Boot Virus (b) File infector Virus
(a) 30 KB (b) 3 MB (c) 3 GB (c) Resident Virus (d) Hangout Virus
(d) 3 TB (e) None of these (e) Macro Virus
23. Terminal is a: 36. 30,000 bytes is equal to
((a) device to give power supply to computer (a) 30 KB (b) 3 MB (c) 3 GB
(b) Point at which data enters or leaves the (d) 3 TB (e) None of these
computer 37. The main folder on a storage device is called
(c) The last instruction in a program (a) Platform (b) Interface (c) Root Directory
(d) any input /output device (d) Device Driver (e) None of these
(e) None of these 38. ISDN stands for
24. Which part of a computer cannot be touched? (a) Integral Service Dynamic Network
(a) Mouse (b) Monitor (c) Hardware (b) International Subscriber Dialup Network
(d) Software (e) None of these (c) International Service Digital Network
25. Manipulation of data in computer is called (d) Integrated Service Digital Network
(a) Boot (b) Processing (c) Simplification (e) None of these
(d) Format (e) Clean disk 39. Which technology is used by cell phones to access
26. Which computer bus connects the main memory to the the internet?
memory controller in computer systems? (a) Cloud computing (b) Neural Networks
(a) Data Bus (b) Memory Bus (c) XML language (d) micro browser software
(c) I/O Bus (d) Both (b) and ((c) (e) None of the above
(e) None of these 40. Which of the following scrambles a message by
27. _____ and _____ are the two types of computer memory. applying a secret code?
(a) RAM and CPU (b) ROM and CPU (a) Audits (b) Encryption (c) UPS
(c) RAM and ROM (d) RAM and BIOS (d) Firewalls (e) Encapsulation

www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App


25
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
41. What type of monitoring file is commonly used on (d) Simple Questioning Language
and accepted from Internet sites? (e) Structured Query Logic
(a) Smartware (b) Phishes (c) Cookies 54. From where to where is a multicast message sent?
(d) Trojans (e) None of the above (a) From one source to one destination
42. The software that secretly collects information (b) From multiple source to multiple destination
about the web client's internet habits?
(c) From multiple sources to one destination
(a) Detectware (b) Spam (c) Spyware
(d) From one source to multiple destinations
(d) Pharming (e) All of the above
43. Which register is used as a working area in CPU ? (e) None of the above
(a) Program counter (b) Instruction registers 55. Using the direct broadcast address,
(c) Instruction decoder (a) a host sends a packet to all other host on the
(d) Parity generator (e) Accumulator network.
44. Which of the following is the valid subnet mask for (b) a router sends a packet to all other hosts on the
class B IP Address? network.
(a) 251.254.25.5 (b) 255.255.0.0 (c) a host sends a packet to a specific host on the
(C) 155.151.12.9 (d) 255.0.0.0 network.
(e) 255.255.255.0 (d) a host sends a packet to all routers on the network.
45. Repeaters function in which layer? (e) none of the above
(a) Physical layer (b) Data link layer 56. In computing, a WYSIWYG editor is a system. What
(c) Network layer (d) Both (a) and (b) does WYSIWYG stands for?
(e) Session layer (a) what you see is what you get
46. Name the input device from the given options, that (b) when you see is where you get
cannot be used to work in MS Office ?
(c) when you see is what you get
(a) Scanner (b) Mouse (c) Keyboard
(d) where you see is when you get
(d) Joy stick (e) All of the above
47. Select the odd one out : (e) None of the above
(a) Interpreter (b) operating system 58. 56. What is the Global Access shortcut key for
(c) Compiler (d) Assembler Opening a new database in MS Access?
(e) both (a) and (d) (a) Cntrl+A (b) Cntrl+F (c) Cntrl+S
48. Name the first widespread computer virus for MS- (d) Cntrl+O (e) Cntrl+N
DOS? 59. What is the latest version of MS Office available?
(a) Brain (b) Handshake (c) Code Red (a) Office 2016 (b) Office 10 (c) Office 300
(d) Melissa (e) Sasser (d) Office 250 (e) None of the above
49. What is ICMP (Internet Control Message Protocol)? 60. Which of the following is an operating system?
(a) a protocol that manages memory (a) Compiler (b) Plotter (c) Mac
(b) a protocol used to monitor computers (d) Both 1 and 2 (e) All of the above
(c) a protocol that handles error and control 61. Which of the following is the name of an application
messages similar to MS Office?
(d) both (a) and (b) (e) None of these (a) Libre Office (c) Open Office (c) Neo Office
50. What is Loading Operating System into main (d) Free Office (e) All of the above
memory called? 62. What is the full form of UNIVAC?
(a) Printing (b) Saving (c) Storing (a) Universal Automatic Computer
(d) Staring (e) Booting (b) Universal Array Computer
(c) Unique Automatic Computer
51. What is a group of computers and associated devices
(d) Unvalued Automatic Computer
that share a common communications line or
(e) None of these
wireless link to a server within a small geographic
63. The process of converting analog signals into digital
area are called?
signals so they can be processed by a receiving
(a) LAN (b) WAN (c) MAN
computer is referred to as
(d) both (a) and (b) (e) None of these (a)Modulation (b) Demodulation
52. _____________ is created when two tables are joined on (c) Synchronizing (d) Digitizing (e) Transmission
attributes that are neither primary keys nor foreign 64. Which of the following memory has stored data in
keys. large number?
(a) Relation (b) Cardinality (c) Spurious tuple (a) RAM (b) ROM (c) Cache memory
(d) Candidate Key (e) None of the above (d) Hard Disk (e) None of these
53. What does SQL stand for? 65. Generally, web address is located by
(a) Structured Query Language (a) Hyperlink (b) HTTP (c) URL
(b) Structered Questioning Logicstics (d) Locator (e) Browser
(c) Simplfied Query Logic 66. Which of the following is more than TB ?

www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App


26
Computer Capsule for IBPS RRB and UIIC Assistant Mains 2017
(a) MB (b) KB (c) PB (c) File name and Path (d) Path and Port
(d) Bit (e) Bytes (e) IP and Locator
67. A web address is a unique name at identifies a 74. Which of the following is a recent version of
specific _______ on the internet. operating systems?
(a) URL (b) HTML (c) CSS (a) Windows XP (b) Windows 7 Basic
(d) Website (e) None of these (c) Windows 8 (d) Windows 10
68. If you wish to extend the length of the network (e) Windows 2013
without having the signal degrade, you would use a 75. What is the full form of SMTP?
(a) Gateway (b) Router (c) Modem (a) Swift Mail Transmission Program
(d) Repeater (e) Resonator (b) Simple Mail Transfer Protocol
69. The ______ button on the Quick Access Toolbar allows (c) Swift Mail Transfer Program
you to cancel your recent commands or activities. (d) Spam Mail Trash Program
(a) Search (b) Cut (c) Undo (e) None of these
(d) Redo 76. A high speed device used in CPU for temporary
70. Which of the following is not a binary number? storage during processing is called
(a) 110010 (b) 201020 (c) 101010 (a) Register (b) Bus (c) Compiler
(d) 100001 (e) 1011101 (d) Translator (e) Bus
71. Which of the following is a base of hexadecimal 77. Which of the following is used for establishing
number? connection to other document or locations within a
(a) 8 (b) 2 (c) 10 website?
(d) 16 (e) 24 (a) Hyperlink (b) Web link (c) CSS
72. A web address is a unique name at identifies a (d) Java query (e) HTML Link
specific _______ on the internet. 78. When a computer is turned on, where does it get the
(a) URL (b) HTML (c) CSS first instructions that it loads into RAM?
(d) Website (e) None of these (a) From RAM (b) From ROM
73. What do you call the programs that are used to find (c) From the Hard Disk
out possible faults and their causes? (d) From a CD (e) None of these
(a) Operating system extensions (b) Cookies 79. ___________is designed to communicate instructions to
(c) Diagnostic software (d) Boot diskettes a machine, particularly a computer. It can be used to
(e) None of the above create programs to control the behavior of a
74. 72. What is Adwords ? machine or to express algorithms.
(a) Advertising Service by Microsoft (a) PROM (b) Programming language
(b) Advanced Search Engine (c) Microcontrollers (d) EPROM
(c) Advertising Service by Google (e) None of the above
(d) Automatic words Search Engine by Yahoo 80. Which of the following groups contains all graphical
(e) Advertising Service by Yahoo file extensions?
75. 73. Given the following URL - (a) JPG, GIF, BMP (b) GIF, TCF, WMF
http://www.example.com:80/path/to/myfile.html, (c) TCP, JPG, BMP (d) ADP, GIF, PPT
here , 'www.example.com', ':80' stand for _____ and (e) JPG, CPX, GCM
______ respectively.
(a) IP and source (b) Domain Name and Port

www.bankersadda.com | www.sscadda.com | www.careerpower.in | adda247 the official App


27

You might also like