100% found this document useful (1 vote)
2K views18 pages

SAS IT Theory PC-3 PDF

The document provides an overview of operating systems, including definitions of key terms like real-time operating systems, single-tasking vs multi-tasking systems, and examples of different types of operating systems like DOS, UNIX, Linux, Windows, and embedded operating systems. It discusses features of early operating systems like DOS and Windows 95 compared to newer systems like Windows XP, and covers topics ranging from data buses and system software to graphical user interfaces, firewalls, and enterprise directories.

Uploaded by

ARAVIND K
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views18 pages

SAS IT Theory PC-3 PDF

The document provides an overview of operating systems, including definitions of key terms like real-time operating systems, single-tasking vs multi-tasking systems, and examples of different types of operating systems like DOS, UNIX, Linux, Windows, and embedded operating systems. It discusses features of early operating systems like DOS and Windows 95 compared to newer systems like Windows XP, and covers topics ranging from data buses and system software to graphical user interfaces, firewalls, and enterprise directories.

Uploaded by

ARAVIND K
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

IT Theory PC-3

Sl.No. Things to know : Introduction to Computers Chapters

1. Data Bus is an electrical path that connects the CPU, Memory and the other hardware
devices on the motherboard.

2. OS is an example of System Software.

3. Four major types of operating systems are: real time, single-user/single tasking,
single-user multitasking, and multi-user multitasking.

4. A real-time operating system is a very fast, relatively small OS. They are needed to run
medical diagnostics equipment, life support systems, machinery, scientific
instruments, and industrial systems.

5. MS-DOS is one example of a single-tasking OS.

6. UNIX, VMS and mainframe operating systems such as MVS are examples of multi-user 6A
OSs.

7. The two most common types of user interfaces are Graphical and Command Line.
Graphical user interfaces are so called because you use a mouse to work with
graphical objects such as windows, menus, icons, buttons and other tools.

8. The window that is currently in use is called active window.

9. The process of moving from one open window to another is called task switching.

10. Some older operating systems (such as MS-DOS) and some current versions of UNIX
and LINUX feature a command-line interface, which uses typewritten commands
rather than graphical objects to execute tasks.

11. The desktop of a GUI operating system is not a real desktop, but simply a metaphor.

12. OLE stands for Object Linking and Embedding.

13. A backup utility such as tape or a CD-R disc, can help you copy large group of files
from the hard disk to another storage medium.

14. A Virus is a parasitic program that can delete or scramble files or replicate itself until
the host disk is full. It is sometimes called the host. Eg. Trojan Horse, Code Red, SQL
Slammer, Melissa, CIH, Storm Worm, Conficker, Flashback, CriptoLocker, Stuxnet,
Zeus, Sasser, Logic Bomb etc.

15. An anti virus utility can examine the contents of a disk or RAM for hidden viruses and
files that may act as hosts for virus code.

IT Theory/PC-3/RRM Page 1
16. Clipboard is a temporary space used for holding the data which is being copied or
moved.

17. Firewall : Your ISP and most corporations employ specialized computers on their
internet connections that are dedicated to examining and blocking traffic coming
from and going to the Internet. Such a computer is called a firewall, and
manufacturers such as Cisco, 3COM and others offer these products at a very high
price.

18. Windows XP comes with a simple firewall that you can simply turn on through the
properties dialog of each network connection. There are many third party firewall
6A
programs, such as Kerio winroute Pro.

19. Intrusion detection software reveals the types of attacks a firewall is thwarting,
creating logs of the attempts and notifying you of certain types of intrusion attempts.

20. Screen savers are popular utilities.

21. A program that lets you back up data files is an example of a backup utility.

22. A list of command choices in an operating system or application is called a menu.

23. DOS and some versions of UNIX are examples of command line interfaces.

24. Which operating system you would expect to be used in a computerized heart
monitor – real time.

25. The operating system is an intermediary between programs and hardware.

26. A context menu provides quick access to commonly used commands related to the
item you have right clicked.

27. DOS (which stands for Disk Operating System) originally came into widespread use in
the 1980s with the appearance of the IBM PC, which was the first personal computer
to catch on with consumers and businesses.
Two versions of DOS reigned as the desktop operating system of choice throughout
the 1980s; the first was PC DOS, which IBM released with its computers and the other
was Microsoft’s version of DOS, known as MS-DOS, which was used on millions of
“IBM-compatible” PCs, or “Clones”. 6B
28. MS-DOS is a system which is capable of performing only one task at a time and hence,
it is named as single-tasking system. One drawback of MS-DOS is that it cannot
accommodate more than one person at a time. It is also known as single-user OS.

29. Developed in 1980 by Seattle Computer Products, DOS bought the rights from
Microsoft Corporation in the year 1981 and released MS-DOS with all IBM’s PCs.

30. Weaknesses of DOS : it supported only one user at a time; could run only one

IT Theory/PC-3/RRM Page 2
program at a time; it had no built in support for networking and users had to
manually install drivers anytime they added a new hardware component to their PC.
DOS supports only 16-bit programs. DOS used a command line interface that forced
users to remember cryptic command names.
Why is DOS still in use?
Two reasons are its size & simplicity.

31. Windows NT workstation : Microsoft released Windows (New Technology), a 32-bit


operating system for PCs, in 1993. 6B
32. The term windows 9x is used when referring to any member of the closely related
threesome: Windows 95, Windows 98 and Windows Me.
33. Windows 95 has improved multitasking, compared to previous versions of Windows,
and it was the first version of Windows to support the Plug and Play standard for
connecting new hardware.
34. In 2000, Microsoft released Windows Me (Millennium Edition), the last member of
the Windows 9x family of consumer-grade operating systems.
35. Windows XP, released in October 2001, is the latest in the Windows suite of PC
operating system families. Windows XP is available in several different products:
Windows XP Professional, Windows XP Home, Windows XP Media Center Edition and
Windows XP Embedded. Microsoft also created 64-bit Windows XP for use with AMDs
Opteron and Athlon 64 CPUs.
36. Windows Vista is an operating system from Microsoft, and is part of the Windows
series of operating systems. It was released in late 2006. There are 5 different
versions of Windows Vista, namely – Windows Vista Home Basic, Windows Vista
Home Premium, Windows Vista Business, Windows Ultimate, Windows Vista
Enterprise.
37. The biggest drawback of the Macintosh Operating System (Mac-OS) is the fact that it
works only on Macintosh Computers.
38. UNIX (similar to DOS) runs on a wide range of computers including supercomputers,
notebook PCs etc. UNIX has been popular for high powered workstations. UNIX is
composed of three parts : Kernel, shell and the programs, where the kernel is the hub
of the UNIX OS.
The main function of the Kernel is to allocate memory and time to the programs.
The main function of the shell is to act as an interface between the user and kernel
39. Linux is considered a “freeware” operating system. Linux is a full 32-bit, multitasking
operating system that supports multiple users and multiple processors. Linux uses a
command line interface, but windows-based GUI environments, called shells are
available. The most popular Linux vendors are Red Hat and Novell, and both offer
special Linux bundles for desktop computers as well as for servers.
40. The START button appeared in the version of windows : Windows 95.
41. In the Windows suite of PC operating system families, the latest is Windows XP.

IT Theory/PC-3/RRM Page 3
42. The biggest non technical difference between UNIX and Linux is price.
43. A network operating system (NOS) is an OS that is designed to run on a network
server dedicated to providing various services to other computers on the network.
44. Windows Server 2008 Standard has the capability of supporting up to a maximum of 4
GB RAM in its 32-bit version and 32 GB RAM in its 64-bit version.
45. Novell offers two Linux Server products, SuSE Enterprise and SuSE Standard, in
addition to the Novell Net Ware server product.
46. An embedded operating system is one that is built into the circuitry of an electronic 6B
device, unlike a PC’s operating system, which resides on a magnetic disk.
47. Palm OS is the standard operating system for palm-brand PDAs as well as other
proprietary handled devices. The Palm OS continues to be used in other systems such
as cell phones and other small devices.
48. Pocket PC OS is a specific type of operating system that Microsoft developed to use in
direct competition with the Palm OS on PDAs.
49. Symbian is an OS found in ‘smart’ cell phones from Nokia and Sony Ericsson that
feature options such as touch screens, games, multimedia functions, and Internet
Connectivity.
50. Windows 95 was Microsoft’s first true GUI-based, 32-bit OS for PCs.
51. An Enterprise Directory is a specialized database that contains data about the users of
a network and the computer resources of the network.
52. Microsoft introduced the Active Desktop feature with the Windows 98 OS.
53. Windows NT was released as a 32-bit OS in 1993.
54. Windows 95 was the first version of Windows to support the Plug and Play standard
for connecting new hardware.
55. Which feature of Windows 98 enables users to integrate Internet resources directly
on the Windows desktop? Active Desktop
56. Which version of windows 2000 was intended for use on desktop computers?
Professional.
57. How many processors are supported by the Data Center Server edition of Windows
Server 2003? 32 processors.
58. Which network operating system has long been the OS of choice for the most critical
servers of the Internet, such as those that maintain the lists of Internet domain 7A
names? UNIX
Windows NT was originally designed as a replacement for DOS
59.
Which term is used to refer any member of the closely related threesome – Windows
60.
95, Windows 98 and Windows Me? Windows 9x.
61. A network is a set of technologies – including hardware, software and media that can
be used to connect computers together, enabling them to communicate, exchange
information, and share resources in real time.

IT Theory/PC-3/RRM Page 4
62. If the server stores data files for users to access, it is commonly called a file server.
63. The network server may be called an application server because it handles some
application processing as well as storage.
64. A teleconference is any kind of multiway communication carried out in a real time
using telecommunications or computer networks and equipment.
65. POTS stands for plain old telephone service.
66. A local area network (LAN) is a data communication system consisting of several
devices such as computers and printers. This type of network contains computers that
are relatively near each other and are physically connected using cables, infrared 7A
links, or wireless media. A LAN is not a system that connects to the public
environment (such as the internet) using phone or data lines. A LAN can have few PCs
or hundreds of them in a single building or several buildings.
67. A Wide Area Network (WAN) is two or more LANs connected together, generally
across a wide geographical area, eg. a company may have its corporate headquarters
and manufacturing plant in one city and its marketing office in another.
68. Intranet : The company’s internal version of the Internet is called an intranet. An
intranet uses the same Web server software that gives the public access to Web sites
over the Internet. The major difference is that an intranet usually limits access to
employees and selected contractors having ongoing business with the company. An
intranet resides completely within the company’s internal network and is accessible
only to people that are members of the same company or organisation.
69. Extranet : An extranet is a partially accessible internal company Web site for
authorised users physically located outside the organisation. An extranet provides
levels of accessibility to outsiders. An extranet can only be accessed with a valid
username and password and one’s identity determines which parts of the extranet
can be viewed.
70. Node : A node is a processing location that can be a PC or some other device such as a
networked printer. A file server network is a fairly simple example of this kind of
nodes-and-server network.
71. Client/Server network is a popular type of server-based network, where individual
computers share the processing and storage workload with a central server.
72. Peer-to-peer networks (P2PN) : In a peer-to-peer network, all nodes on the network
have equal relationships to all others, and all have similar types of software that
support the sharing of resources. Many client operating systems, such as Windows 9x,
Windows 2000 Professional, Windows Me, Windows XP, and the Macintosh OS,
feature built-in support for peer-to-peer networking.
73. On the job behaviors (using company’s assets such as computers, internet services etc
for personal use, for example collecting pornographic pictures, real estate dealings
etc. through e-mails) are called “Cyberslacking”. In other words, using company
computers for personal or recreational purposes instead of work.
74. Peripheral sharing is one of the benefits of using a network.
75. If a server stores data files for users to access, it is commonly called a file server.

IT Theory/PC-3/RRM Page 5
76. A LAN generally does not connect to the public environment using phone or data lines
77. A network which is present within the user’s home and can be used to connect a
person’s digital devices is called a HAN (home area network). HAN is example of hybrid network.
78. Surveillance software - this type of software enables managers to review an
employee’s Internet activities in real time.
79. Packets - Packets are pieces of a message broken down into small units by the
sending PC and reassembled by the receiving PC. In the internet environment, packets
are called datagrams. Most packets have two parts : the header and the payload.
Header is the first part of the packet, which contains information needed by the 7A
network. The header identifies the node that sent the packet (the source), and
provides the address of the node that will receive the packet (the destination). The
payload is the actual data that is being transmitted between the two nodes.
80. Packet Sniffers – packet sniffers examine all packets being transmitted over a
network.
81. Proxy servers – this type of software (or hardware/software combination) can be
configured to trap network traffic that is coming from or going to an unauthorized
source.
82. Network Topologies & Protocols – An important feature of any LAN is its topology –
the logical layout of the cables and devices that connect the nodes of the network.
Network topologies can be logical or physical. In the logical topology, there is actual
transfer of the data in the network as per its design plan. Whereas, in the case of a
physical topology, the physical design of a network which consists of location, devices
and the cable installation is referred.
83. The star topology is the most common topology. In a star network, all nodes are
connected to a device called a hub and communicate through it. Some hubs – known
as intelligent hubs – can monitor traffic and help prevent collisions. In a star topology,
a broken connection between a node and the hub does not affect the rest of the
network.
84. The mesh topology is the least used network topology and the most expensive to
implement. The big advantage to this arrangement is that data can never fail to be
delivered.
85. A tree topology is a combination of the characteristics of a star topology and a bus
topology. Point-to-point wiring for every single segment is the main advantages of a
tree topology and it is also supported by most of the hardware and software vendors.
86. Hybrid topology is a combination of any two or more network topologies. The basic
examples of a hybrid network are star-bus network and star-ring network.
87. Each computer on the network needs a hardware component to control the flow of
data. The device that performs this function is the network interface card (NIC) also
known as the Network adapter Card or Network Card.
88. A Bridge is a device that connects two LANs or two segments of the same LAN. A
Bridge looks at the information in each packet header and forwards data that is
travelling from one LAN to another.
89. Switches. A switch is a device that learns which machine is connected to its port by
using the PC, printer, or other devices IP address. It reduces broadcast traffic. Modern

IT Theory/PC-3/RRM Page 6
switches can even function as routers, allowing multiple LANs to be interconnected by
linking each LANs switches together. This is called an uplink.
90. Routers. A router is a device that stores the routing information for networks. It looks
at each packet’s header to determine where the packet should go and then
determines the best root for the packet to take toward its destination. A router is
connected to atleast two networks. Routers are located at gateways, the places
where two or more networks connect.
91. Asynchronous Transfer Mode (or ATM). The work of an ATM is to transfer all the
data (voice, video and computer data) in the form of small packets which are of a
fixed size. Various types of media are supported by ATM which includes CD-quality
audio, imaging and video. ATM makes use of Star topology and this topology has the
advantage of working with both twisted pair cables and fiber optic cables.
92. The performance of Network media is measured by the amount of data they can
transmit each second. This value is called bandwidth. The higher a network’s
bandwidth, the more data it can carry.
93. In a Bus topology network a special device called a terminator is placed on each end
of the cable. 7A
94. A fibre optic cable is a thin strand of glass that transmits pulsating beams of light at
speeds that approach 100 Gbps.
95. High-end peer-to-peer networks allow for distributed computing. This lets users
access the power of multiple computers to process programs such as 3-D illustration
software.
96. Companies store data on a network server because it is easier to track changes made
to important data.
97. In a Star Network, all devices are connected to a device called a hub and
communicate through it.
98. In data conferencing, participants can share a whiteboard where they can draw,
write or import images.
99. A central computer with a large storage device and other resources which can be
shared by all users is called a Network Server.
POTS (plain old telephone system) gateways allow phone calls to jump the gap
100.
present between the POTS and the internet.
The alternative to using dedicated media is to use the telephone system call the POTS
101.
– for data communications.
102.
A computer’s “voice” is digital; i.e., it consists of on/off pulses representing 1s and 0s.
A device called a modem (short for modulator-demodulator) is needed to translate
7B
these digital signals into analog signals that can travel over standard telephone lines.
A modem’s transmission speed is measured in bits per second (bps).
103. If you use your computer to copy a file from a remote computer, you are said to be
downloading.
104. The most common file transfer protocols for modems are called Kermit, Xmodem,
Ymodem, Zmodem and MNP.

IT Theory/PC-3/RRM Page 7
105. The term Broadband is used to describe any data connection that can transmit data
faster than is possible through a standard dial-up connection using a modem. Some of
the better known are called integrated services digital network (ISDN), T1, T3, DSL,
cable modems, and ATM. A basic rate ISDN or BRI connection combines two 64 Kbps
data channels and one 19 Kbps error checking channel. T1 line offers 24 channels 64
Kbps. T3 line offers 672 channels of 64 Kbps.
106. A digital telephone service, called the DSL (digital subscriber line) is very popular, with
home users (less expensive than T1 services in terms of hardware setup and monthly
costs).
107. A device that is added into an expansion slot that allows users to connect the PC to
the telephone line is called an internal modem.
108. ATM service is a good choice for businesses that need to transmit very large files,
such as live audio or video feeds.
109. Wi-fi is another name to describe 802.11 technology.
110. In a cable network, the head end is where the cable TV networks connect to the
Internet.
111. A Web browser (or browser) is a software application designed to find hypertext
documents on the Web. A hyperlink is simply a part of the Web page that is linked to
a URL (uniform resource locator).
112. Electronic mail or e-mail is a system for exchanging messages through computer
network. Many mail servers use the post office protocol (POP) and are called POP
servers. When you send and e-mail message, the message is stored on a server until
the recipient can retrieve it.
113. FTP (file transfer protocol) is the internet tool used to copy files from one computer
to another.
IRC stands for Internet Relay Chart.
114.
Peer-to-peer services are distributed networks that do not require a central server,
115.
such as a web server, to manage files.
In many homes and small businesses, individual users connect to the Internet by using
116.
a telephone line and a 56 Kbps modems. The ISP’s servers route traffic between 9A
customer’s computers and the Internet.
For sharing Internet connections, dedicated high-speed data circuits are available
117.
from telephone companies, cable TV services, and other suppliers such as large
networking companies and satellite service providers. These high-speed services are
sometimes called broadband connections, because they can use media that can
handle multiple signals at once, such as fiber optics, microwave & other technologies.
118. An ISDN data connection can transfer data at upto 1,28,000 bits per second (128
Kbps). The benefits of ISDN include being able to connect a PC, telephone, and fax
machine to a single ISDN line and use them simultaneously.
119. Cable television systems send data over coaxial cable.
120. The two most common versions of DSL services are Asynchronous DSL (ADSL) &

IT Theory/PC-3/RRM Page 8
Synchronous DSL (SDSL)
121. In dial-up connection, your computer uses its modem to dial a telephone number
given by the ISP.
122. Sockets is the name of an API (application programming interface) for UNIX
computers, while windows sockets, or Winsock, is an adaptation of sockets for
Microsoft Windows operating systems.
123. Morse Code (a sort of radio (wireless) technology) was used by ships at sea even
9A
before the Titanic sank in 1912.
124. A Wireless Wide Area Network (WWAN) is a digital network that extends over a large
geographical area, and is normally measured in miles (or Kilometers). A WWAN is fully
bidirectional wireless network capable of data transfer at speed in excess of 100
Mbps for a cost comparable with most DSL connections. It requires an antenna tuned
to receive the proper radio frequency.
125. Wi-Fi stands for wireless fidelity.
126. The distance covered by a wireless local area network (WLAN) is usually measured in
feet (or meters).
127. The generic name for an earth-based communications station (an ISP for a satellite
server) is very small aperture terminal (VSAT).
128. Wireless LANs require additional security measures to prevent unauthorised users
from tapping into the network and gaining access to servers or other users systems.
Security schemes such as WEP (Wire Equivalent Privacy) and WPA (Wi-Fi Protected
Access) are designed to prevent unauthorized access to wireless networks.
War driving is a term used for a practice where people travel around the city with a
129.
specialized device, searching for unprotected WLAN.
Which high-speed service is now dropping out of favor, because higher-performance
130.
services are becoming increasingly available? ISDN
Application Software is designed to help users be productive, which is why one class
131.
of it is called productivity software.
132. A stand-alone program is an application that performs only one type of task, such as
a word processing program, a graphics program or an e-mail program.
10A
133. Software programs that are very commonly used-such as word processing software,
spreadsheets, Web-authoring tools, and e-mail programs - are often packaged
together and sold as software suites.
134. Shareware program is a commercial program that gets its name from the fact that its
developers encourage users to share it with one another, and to try out the software
before purchasing it.
135. A close cousin to shareware is freeware. Freeware is any software that is made
available to the public for free. It is, however, not a public domain software.
136. In order to retain the work done on the computer, we need to transfer the contents
of the RAM to the hard disk. This process of transferring the contents to the hard disk
are known as Saving (Ctrl +S).

IT Theory/PC-3/RRM Page 9
137. The process of formatting a document includes controlling the appearance of text, 10A
the layout of text on the page, and the use of pictures and other graphic elements.
Most formatting features fall into one of the three – character formatting, paragraph
formatting or document formatting.
138. A font’s size is measured in points. One point equals 1/72 of an inch, so 72 points equal
1 inch.
139. Mail Merge. Using this special feature available in MS-Word, you have an option to
send the same letter to as many people as you want, thereby avoiding typing the
same letter many times.
140. Macro. A macro is saved sequence of commands, actions or keystrokes that is stored
and can be recalled with a single command or keystroke.
141. Spreadsheet Programs. A spreadsheet program is a software tool for entering,
calculating, manipulating and analysing sets of numbers. Microsoft Excel (MS-Excel) is
one of the most commonly used spreadsheet applications. In a spreadsheet program,
you work in a document called a Worksheet and you can collect related worksheets in
a Workbook (also called notebook in some programs). An empty worksheet looks like
a grid of rows and columns. A row is a horizontal group of cells in a spreadsheet. Each
row is labeled with a number at the left. A column is vertical group of cells in a
spreadsheet, labeled with a letter at the top. The intersection of column and row is
called a Cell.
142. Worksheets can contain text – called labels – as well as numbers and other types of
data.
143. A worksheet’s (spreadsheet) cells can hold several types of data, but the four basic or
most commonly used kinds of data are – Labels, Values, Dates and Formulas. Cells
also can hold graphics, audio files, and video or animation files.
144. A Cells address is made up of the column letter and row number.
145. In a worksheet each column is identified by a letter, and each row is identified by a
number. Every Excel worksheet is limited to 256 columns and number of rows in a
worksheet is 65,536. Older versions of excel contained only 16,384 rows. Excel 2003
and earlier has 16,777,216 cells per worksheet (65,536 rows * 256 columns). Each cell
can hold 32,767 characters. Excel 2007 has 17,179,869,184 cells per worksheet
(1,048,576 rows * 16,384 columns). Remember, this is in just one worksheet. A single
workbook can hold more than one worksheet.
146. In a worksheet, the cell pointer indicates which cell is active.
147. Piracy. Software piracy is the act of copying software without the developer’s
consent, then selling or giving away the copies.
Presentation programs allow the user to design slides – single-screen images that
148.
contain a combination of text, numbers, and graphics (such as charts, clip art or
pictures).
PIM stands for Personal Information Manager. PIMs are special programs designed to
149.
manage contact information, schedules, and other personal or business information.
Contact lists are often called address books in e-mail programs and PIMs.

IT Theory/PC-3/RRM Page 10
150. The term snail mail refers to the U.S. Postal Service.
151. A word processing program or an e-mail program is an example of a stand alone
program.
152. To navigate a worksheet, you should understand its system of cell addresses.
153. Spreadsheet programs are used to create numeric based documents, such as budgets.
154. Any software which is available to the public for free is known as freeware.
155. In MS-Word, a paragraph mark can be created on pressing the Enter key.
156. In computers, all grapic files fall into one of two basic categories, known as Bitmapped
and Vector files.
157. The term raster is used to describe bitmap images.
158. A file format is a standardized method of encoding data for storage. File formats may
be proprietary or universal. For example, Adobe Photoshop, by default, saves images 10B
in its proprietary PSD format, but it also can save files in several universal formats,
such as TIF, GIF, JPEG, PICT and TGA. Word Processing programs can read and save
files in specific formats such as Doc or RTF, or TXT.
159. PICT – this is the native format defined by Aple for use on Macintosh computers.
160.
TIFF – (Tagged Image File Format) – is a bitmap format defined in 1986 by Microsoft
and Aldus (now part of Adobe) and widely used on both Macs and PCs.
161. JPEG (Joint Photographic Experts Group) – often abbreviated as JPG, a bitmap format
is common on the world wide web and is often use for photos (24 bit or millions of
colors)
GIF (Graphic Interchange Format) - Unlike JPEG images, GIF images can contain only
162.
256 or fewer unique colors.
EMF (Windows Enhanced Metafile) – It uses the windows built-in graphics device
163.
interface, or GDI, to create images that can be scaled to display at the highest-
possible resolution on any device selected-screen or printer.
DXF (Data Exchange Format) and IGES (Initial Graphics Exchange Specification) exist
164.
for vector graphics.
A scanned image is usually a bitmap files. A digital camera stores digitized images for
165.
transfer into a computer. The resulting file is generally a bitmap.
166. Paint programs, Photo editing programs are classified as bitmap based where as Draw
programs, computer aided design (CAD) programs, 3-D modeling and animation
programs are classified as vector based.
The individual pieces that make up a bitmapped image are called pixels.
167.
A CAD program’s drawings are often used as the basis for construction documents.
168.
169. Each filmed image is called a frame. High quality animation (film) is usually played at a
speed of 30 frames per second.
170. CGI stands for Computer Generated Imaging. PDF stands for Portable Document
format.

IT Theory/PC-3/RRM Page 11
171. CAD is the computerized version of the hand-drafting process.
172. A database is a collection of related data or facts. A database management system
(DBMS) is a software tool that allows people to store, access, and process data or
11A
facts into useful information.
173. Three most important terms to know about databases are;
Fields: each piece of data in the address book is stored in its own location, called a
field. The column is sometimes used instead of field.
Records: one full set of fields – that is all the related data about one person or object
– is called a record.
Tables: A complete collection of records makes a table.
174. Forms are documents that are filled in to create records.
175. Reports are documents that display a select portion of a database’s information in an
easily read format.
176. A database file that consists of a single data table is called a flat-file database. Flat-file
databases are most useful for Single-user or small group situations.
177. RAID (redundant array of independent disks) is a storage system that links any
number of disk drives so that they act as a single disk. RAID’s capabilities are based on
three basic techniques: (1) mirroring, (2) striping, and (3) striping-with-parity.
178. Two technologies are used to control data warehouses: symmetrical multiprocessing
(SMP) and massively parallel processing (MPP).
179. A relational database includes more than one table. RDBMS stands for Relational
Database Management System. E.F. Codd invented the relational database in 1970
at IBM.
180. In an RDBMS, there are two types of keys, i.e., primary key and foreign key. A field
used to identify a specific record present in a table uniquely is called a primary key. A
foreign key is present as a field in one table but it is already the primary key of
another table. Foreign keys are used for the establishment of a relationship in
between the main table and the subsidiary tables.
181. Flat-file databases are two-dimensional tables of fields and records. A flat-file
contains a single table.
182. Text fields (also called string fields, character fields, or alphanumeric fields) accept
any string of letters or numbers that are not used in calculations. Such an entry might
be a person’s name, a company’s name, an address, a phone number or any other
textual data. Numeric fields store purely numeric data. A date field or time field
stores date or time entries. Logical fields (also called Boolean fields) store one of only
two possible values (eg. either Yes or No).
183. SQL stands for Structured Query Language.
184. The fields which typically include automatic error checking features are date & time.
185. Enterprise Software is typically a suite of applications used by hundreds, or even
thousands, of people at the same time, which handles millions of records, or both.
11B
IT Theory/PC-3/RRM Page 12
One popular type of enterprise software is called an electronic document
management (EDM) system.
186. Tier is a term used to describe distributed applications.
187. One of the easiest ways to create a form in MS-Access is by using the Auto-Form
Wizards.
188. In Access Make-table query is used for creating a new table using a part of the data or
the entire data from an already existing table for tables.
189. The data analysis technique that can give you answers to questions you didn’t even
ask is called data mining.
190. DB2 is a common corporate DBMS developed by IBM.
191. Automated programs that roam the Internet, gathering information such as the
addresses of active Web sites, are called Crawlers/Spiders.
192. Applications that can handle high-volume traffic are called enterprise.
193. Today’s three most popular enterprise DBMSs are DB2, Oracle and SQL server.
194. Threat is not harmful unless it exploits an existing vulnerability.
13A
195. A countermeasure is any step you take to ward off a threat. Regularly backing up your
data is a countermeasure against the threat of data loss. A firewall is a counter-
measure against hackers.
196. Identity theft occurs when someone impersonates you by using your name, social
security number, or other personal information to obtain documents or credit in your
name.
197. Shoulder surfing – watching someone enter personal identification information for
private transaction, such as ATM machine.
198. Snagging listening in on a telephone extension, through a wiretap.
199. Dumpster diving - Thieves can go through garbage cans, dumpsters, or trash bins to
obtain cancelled checks, credit card statements or bank account information that
someone has carelessly thrown out.
Social Engineering. The ID thief tricks victims into providing critical information under
200.
the pretext of something legitimate, and also called ‘running a confidence game’.
A Cookie is a small text file that a Web server asks your browser to place on your
201.
computer.
A Web Bug is a small GIF-format image file that can be embedded in a Web page or
202.
an HTML-format e-mail message.
Spyware. It can track a computer user’s activities and report them to someone else.
203.
Another common term for spyware is adware, because Internet advertising is a
common source of spyware. Spyware can land on your PC from many sources eg.
Web pages, e-mail messages and pop-ups.
204. Spam is Internet “junk mail”. The correct term for spam is unsolicited commercial
e-mail (UCE).
205. Malware describes viruses, worms, Trojan horse attack applets, and attack scripts.

IT Theory/PC-3/RRM Page 13
206. The use of a computer to carry out any conventional criminal act, such as fraud, is
called Cybercrime.
207. Hacking. It is form of cybercrime. A hacker is someone who uses a computer and
network or Internet connection to intrude into another computer system to perform
an illegal act.
208. Sniffing. The term sniffing refers to finding a user’s password.
209. Spoofing. Hackers may alter an e-mail header to make it appear that a request for
information originated from another address. They can gain electronic entry by
pretending to be at a legitimate computer, which is called IP spoofing.
210. Phishing is a technique used by strangers to "fish" for information about you,
information that you would not normally disclose to a stranger, such as your bank
account number, PIN, and other personal identifiers such as your National
Insurance number.
211. Session cookies are temporary cookies that are automatically deleted when the
browser is closed. Session cookies are also known as transient cookies.
212. Persistent cookies are stored on your computer’s hard disk until they expire or are
deleted.
213. First party cookies come from the Web site you are currently viewing and the third
party cookies come from different Website, different than the one which is used.
214. Full featured firewall - ZoneAlarm, BlackICE PC Protection, or Norton Personal Firewall
215. E-mail is not a secure way to transmit data. An E-mail program’s filters also may be
called rules.
216. Pop-up blocker are small utilities in your PC which prevent secondary browser
windows from appearing when you are on the Web.
217. Some popular antivirus programs include: McAfee virusScan; Norton AntiVirus; Virex;
PC-cillin; Avast; Avira.
218. EBCDIC stands for Extended Binary Coded Decimal Interchange Code.
CD-ROM stands for Compact Disk Read Only Memory. The standard 12 cm
219.
diameter CD-ROM store about 660 megabytes.
IBM 1401 is a Second Generation Computer and is the first computer to enter
220.
Nepal in 2028 BS for census. After this computer, another ICL 2950/10, a British
computer, was purchased by the fund of UNDP and UNFPA for the census of 2038
BS is second computer in Nepal.
MICR (Magnetic Ink Character Reader) is kind of scanner that can scan and
221.
identify the writing of magnetic ink. This device is used in banks to verify
signatures in Checks.
The output quality of a printer is measured by Dot per sq. inch
222.
Who designed the first electronics computer – ENIAC?
223.
J. Presper Eckert and John W Mauchly
When did arch rivals IBM and Apple Computers Inc. decide to join hands? 1991
224.

IT Theory/PC-3/RRM Page 14
Human beings are referred to as Homosapinens, which device is called Sillico
225.
Sapiens? Computer
The arranging of data in a logical sequence is called Sorting.
226.
IMB launched its first personal computer called IBM-PC in 1981. It had chips from
227.
Intel, disk drives from Tandon, operating system from Microsoft, the printer from
Epson and the application software from everywhere. Can you name the country
which contributed the video display? Taiwan
Personal computers use a number of chips mounted on a main circuit board. What
228.
is the common name for such boards? Motherboard
IBM-1401, CDC-1604 is second generation computer. ICL-2900 is a fourth
229.
generation computer. EDSAC is important in the development of computer since it
was the first computer to use John von. Neumann’s Stored Program Concept. It
used 3000 vacuum tubes and computers with vacuum tubes are of first generation
computers.
Transistors were used for second generation computers and integrated circuits in
230.
third generation. First generation computers used vacuum tubes and valves as their
main electronic component. Vacuum Tubes were invented by Lee DeForest in
1908.
Second generation computers (1956-1965) used transistors as their main electronic
231.
component. Transistor was invented by Bell Lab Scientists John Burdeen, Walter
Brattain and William Shockley in 1947 and won the Nobel Prize in 1956 but it was
not used in computers till 1956. The second generation continued until the
implementation of IC chips invented by Jack Kilby in Texas Instruments in 1958.
Which was the world’s first minicomputer and when was it introduced?
232.
PDP-I, 1958
Where was India’s first computer installed and when?
233.
Indian Statistical Institute, Calcutta, 1955
In which year was UK’s premier computing event called “The which computer”
234.
started? 1980
Different components on the motherboard of a PC processor unit are linked
235.
together by sets or parallel electrical conducting lines. What are these lines called?
Buses
When was Apple Macintosh II microcomputer introduced in the market? 1983
236.
What is the name of the new color laptop computer which is powered by a 386
237.
processor at 33 MHz and is built by Epson? AX3/33
The word processing task associated with changing the appearance of a document
238.
is Formatting
The two kinds of main memory are: ROM and RAM
239.
A kind of serial dot-matrix printer that forms characters with magnetically-charged
240.
ink sprayed dots is called Ink-jet printer
A storage area used to store data to a compensate for the difference in speed at
241.
which the different units can handle data is Buffer
Programs designed to perform specific tasks is known as application software
242.
A computer which CPU speed around 100 million instruction per second and with
243.
the word length of around 64 bits is known as Super computer

IT Theory/PC-3/RRM Page 15
The term gigabyte refers to 1024 megabytes.
244.
The central processing unit (CPU) consists of Control unit, arithmetic-logic unit
245.
and primary storage
A byte consists of Eight bits.
246.
The silicon chips used for data processing are called PROM chips
247.
An application program that helps the user to change any number and immediately
248.
see the result of that change is Spreadsheet
In which year was chip used inside the computer for the first time? 1975
249.
What was the name of the first commercially available microprocessor chip?
250.
Intel 4004
When were the first minicomputer built? 1965
251.
The first digital computer built with IC chips was known as IBM System / 360
252.
Which was the most popular first generation computer? IBM 1650
253.
A technique used by codes to convert an analog signal into a digital bit stream is
254.
known as Pulse code modulation
The brain of any computer system is CPU.
255.
Computer professionals working in a computer center are Humanware.
256.
The default page setup orientation for notes pages, outlines and handout is Portrait.
257.
The default page setup orientation for slides in PowerPoint is Landscape.
258.
The toolbars that are displayed by default in the PowerPoint window includes
259.
Menu bar, standard toolbar, formatting toolbar, drawing toolbar, status bar.

260. Line spacing refers to the space between the lines of text.
261. The maximum zoom percentage in Microsoft PowerPoint is 400%.
262. Ellipse Motion is a predefined Animation scheme.
263. Pinging is the first step in the invasion process by a Hacker.
264. IT Act : Enacted on 9th June 2000 - India is 12th nation in the world to adopt cyber
laws. IT Act is based on Model law on e-commerce adopted by UNCITRAL
IT Act
265. Section 3 – Digital Certificate; Authentication of electronic records.
2000
Section 5 – Legal recognition of digital signatures.
266.
267.
Section 6 - Use of electronic records and digital signatures in Government and
its agencies.
Section 7 – Retention of Electronic Records.
268.
269. Section 8 - Publication of rule, regulation, etc., in Electronic Gazette.
270. Section 10 - Power to make rules by Central Government in respect of digital
signature.
271. Section 16 - Security procedure
272. Section 17 - Appointment of Controller and other officers.

IT Theory/PC-3/RRM Page 16
273.
Section 21 - Licence to issue Digital Signature Certificates.
Section 22 – Application for Licence.
274.
275. Section 25 - Suspension of licence
276. Section 32 - Display of licence.
277. Section 33 - Surrender of licence.
278. Section 35 - Certifying Authority to issue Digital Signature Certificate.
279. Section 37 - Suspension of Digital Signature Certificate.
280. Section 38 - Revocation of Digital Signature Certificate.
281. Section 41 - Acceptance of Digital Signature Certificate.
282.
Section 43 - Penalty for damage to computer, computer system, etc. Any person
who is charged under this act shall be liable to pay damages by way of
compensation not exceeding one crore rupees to the person so affected.
283. Section 46 - Power to adjudicate.
284. Section 48 - Establishment of Cyber Appellate Tribunal. IT Act

285.
Section 49 - Composition of Cyber Appellate Tribunal. A Cyber Appellate 2000
Tribunal shall consist of one person only (hereinafter referred to as the
Presiding Officer of the Cyber Appellate Tribunal) to be appointed, by
notification, by the Central Government.
286. Section 50 - Qualifications for appointment as Presiding Officer of the Cyber
Appellate Tribunal.
287. Section 51 - Term of office. The Presiding Officer of a Cyber Appellate
Tribunal shall hold office for a term of five years from the date on which he
enters upon his office or until he attains the age of sixty-five years, whichever is
earlier.
288. Section 58 - Procedure and powers of the Cyber Appellate Tribunal.

289. Section 61 - Civil court not to have jurisdiction.


290. Section 62 - Appeal to High Court
291. Section 65 - Tampering with computer source documents. Whoever
knowingly or intentionally conceals, destroys or alters or intentionally or
knowingly causes another to conceal, destroy or alter any computer source code
used for a computer, computer programme, computer system or computer
network, when the computer source code is required to be kept or maintained
by law for the time being in force, shall be punishable with imprisonment up to
three years, or with fine which may extend up to two lakh rupees, or with both.
292. Section 71 - Penalty for misrepresentation. Whoever makes any misrepre-
sentation to, or suppresses any material fact from, the Controller or the
Certifying Authority for obtaining any licence or Digital Signature Certificate,
as the case may be, shall be punished with imprisonment for a term which may
extend to two years, or with fine which may extend to one lakh rupees, or with
both

IT Theory/PC-3/RRM Page 17
293.
Section 75 - Act to apply for offence or contravention committed outside India.

294. Section 80 - Power of police officer and other officers to enter, search, etc.
Notwithstanding anything contained in the Code of Criminal Procedure, 1973,
any police officer, not below the rank of a Deputy Superintendent of Police, or
any other officer of the Central Government or a State Government authorised
by the Central Government in this behalf may enter any public place and search
and arrest without warrant any person found therein who is reasonably
suspected or having committed or of committing or of being about to commit
any offence under this Act
295. Section 82 - Controller, Deputy Controller and Assistant Controllers to be IT Act
public servants. 2000
296. Section 85 - Offences by companies.
297. Section 87 - Power of Central Government to make rules.
298. Section 90 - Power of State Government to make rules.
299. Section 91 - Amendment of Act 45 of 1860. The Indian Penal Code shall be
amended in the manner specified in the First Schedule to this Act.
300. Section 94 - Amendment of Act 2 of 1934. The Reserve Bank of India Act,
1934 shall be amended in the manner specified in the Fourth Schedule to this
Act.

IT Theory/PC-3/RRM Page 18

You might also like