Arihant CCC Course On Computer Concepts Study Guide
Arihant CCC Course On Computer Concepts Study Guide
What is Computer?
Generally, computer is the combination of
hardware and software, which converts data Keyboard Mouse
into information. Computer
Generations/Evolution of Computer 2
A generation refers to the state of improvement in the development of system. Computers are made up of electromechanical,
before generation. Each generation of computer is characterised by a major technological development that fundamentally
changed the way.
Generation Year Switching Storage Speed Operating Language Characteristics Applications
Device Device Measured System
First 1940-56 Vacuum tubes Magnetic Milli Batch operating Machine language ● Fastest computing Used for
drums seconds system (Binary number 0 s device. scientific
and 1s) ● Generate large amount purpose
of heat. e.g. ENIAC,
● Non-portable, unreliable. UNIVAC,
EDVAC, etc.
Second 1956-63 Transistors Magnetic core Micro Timesharing Assembly language, ● More reliable and less Used for
technology seconds system, high level language prone to hardware commercial
Multitasking OS failure. production
● Portable and generate e.g. NCR 304,
less amount of heat. IBM-1401, IBM
● Smaller in size. 1000, etc.
Third 1964-71 Integrated Circuits Magnetic core Nano Real-time High level ● Consumed less power. Database
(ICs) as main seconds system languages ● Highly sophisticated management
storage (FORTRAN, technology required. system
COBOL) ● Fast and more reliable. e.g. PDP-8,
PDP-11, IBM
360, etc.
Fourth 1971- Very Large Scale Semi Pico Time sharing PASCAL, ADA, ● More reliable and Distributed
Present Integrated (VLSI) conductor seconds network, GUI COBOL-74 and portable. system,
circuit or Memory, interface FORTRAN IV ● This generation leads to e.g. IBM 4341,
Microprocessor Winchester better communication DEC 10, APPLE
disk and resource sharing. II, etc.
● Cheapest among all
generations.
Fifth Present Super Large Scale Optical disc — Knowledge Natural language ● Able to recognise image Artificial
and Integrated (SLSI) information and graphs. intelligence
Beyond chips or Bio chips processing ● Able to solve highly e.g. Robotics,
system complex problems like etc.
logical reasoning.
● Able to use more than
one CPU for faster
processing speed.
Course on Computer Concepts (CCC)
Introduction to Computer 3
MICR can read upto 2400 documents/min. answer of objective type tests, voting
The MICR coding system contains applications and other evaluations studies.
14 characters (4 special symbols and 10 VII. Barcode Reader
decimal digits). So, it can recognise these
It is an input device used for reading printed
14 characters only. The type font E-13 B, a bar codes (Universal Product Code) available
standard typographical style, is used to print on product to be sold. A barcode reader emits
the characters or identification marks. a beam of light, which reflects off the barcode
V. OCR (Optical Character Recognition) image. A light sensitive
It is used to translate detector in the barcode
scanned images of reader identifies the
handwritten, type-written, barcode image by
printed text or special type recognising special bars at
font printed on conventional both the ends of the image.
Barcode Reader
paper with conventional ink Once code is identified, it is
into machine-encoded text.
OCR converted into a numeric code. A perfect
OCR is widely used to convert books and example of a barcode reader is its use in a
documents into electronic files, to super market where barcode scanner reads
computerise a record-keeping system in an the price of a product.
office or to publish the text on a website. A barcode is a machine readable
An optical reader uses photoelectric devices representation of information in the form of
to scan the characters being read and convert stripes of dark and light ink.
the reflected light patterns of the data into
VIII. Microphone (Mic)
binary data suitable for computer input. The
We can send sound to the computer through
normal speed of an OCR is 1500 to 3000
a special manual input device called
characters per second.
microphone or mic. A mic converts the
The technology is being developed for greater received sound into computer’s format, which
accurate recognition and is also known as is called Digitised Sound or Digital Audio. To
Intelligent Character Recognition (ICR). convert a voice into digital form, an
VI. OMR (Optical Mark Reader) additional hardware is always needed which
is known as Sound Card.
OMR is the process of detecting the presence
of intended marked responses. OMR is Sound is used most often in multimedia,
mainly used to detect marks on a paper. It where user can make his/her presentation
uses a beam of light that is reflected on the more attractive using recorded narration,
paper with marks, to capture presence and music or sound effects.
absence of data (Marks). Microphone
Microphone
A microphone can be attached to a computer
OMR to record sound. Now-a-days, microphones are
also being used with speech recognition
The OMR reader interprets the patterns of software. This means that you do not have to
marks into a data record and sends this to type the document, rather just have to speak
the computer for storing, analysing and and the spoken words appear in your
reporting. OMR is widely used to read the document.
8 Course on Computer Concepts (CCC)
There are various types of impact printers as (ii)Non-impact Printers These printers are
follows : much quieter than impact printers as their
(a) Line Printer It is a printing heads do not strike on the paper.
high speed printer These printers are comparatively faster
capable of printing an and produce high quality output. They can
entire line of text at once be used for printing text and graphics both
instead of one or more in black & white and colored.
characters at a time. The various types of non-impact printers
Print quality of line Line Printer are as follows :
printer is not high. (a) Electromagnetic Printer
(b) Drum Printer It is an old line printer Electrographic or electro-photographic
technology that is used to form printers are very fast printers and they
character images around a cylindrical fall under the category of page printers.
drum as its printing mechanism. They can produce documents at a speed
When the desired of over 20000 lines per minute i.e. more
character for the than 250 pages per minute.
selected position (b) Thermal Printer Thermal printer
rotated around the paper tends to darken over time due to
hammer line, the Drum Printer
exposure of sunlight or heat. The
hammer hits the standard of print produced is poor.
paper from behind and pushed it into Thermal printers are widely used in
the ribbon and onto the character. battery powered equipment such as
(c) Daisy Wheel Printer It can print one portable calculators.
character at a time. In daisy wheel (c) Electrostatic Printer These printers
printer, round disk extends a portion of
are generally used for large format
the wheel making contact with ink
printing.
ribbon that makes contact with paper
for creating the character. This They are favoured by large printing
procedure is repeated for each key when shops because of their ability to print
it is pressed. These printers are fitted fast and making low cost.
with unchangeable print heads called (d) Laser Printer In this
daisy wheels. To print each character, printer, the method of
the wheel is rotated and the appropriate printing is based on
stoke struck against an inked ribbon. principle of
Daisy wheel printers cannot produce electrophotography and
high quality print graphics. The speed use a beam of laser light Laser Printer
of this printer is about 100 CPS. as a photocopy machine.
(d) Dot Matrix Printer The term dot Resolution of laser printer is specified
matrix refers to the process of placing in term of DPI (Dots Per Inch).
dots to form an image. It uses print
The powdered ink (i.e. toner) is
heads to shoot ink or strike an ink
ribbon to place hundreds to thousands transferred to paper to form a text/an
of little dots to form text or images. It image pattern and then fixed by heat or
prints one character at a time. The pressure. When it is used to print bulk
speed of dot matrix printer lies between of papers, the laser printer produces the
200 to 600 CPS. cheapest cost per printout.
Introduction to Computer 11
DRAM
II. Secondary Memory/Storage Device
(ii)ROM In ROM (Read Secondary memory, also known as Secondary
Only Memory), Storage or Auxiliary Memory, is the slower
information once stored and cheaper form of memory. It is a
remain fixed, i.e. it can permanent storage device. CPU does not
not be changed. So, ROM ROM access the secondary memory directly. The
can only be read and content in it must first be copied into the
used. The contents of ROM remain stored RAM to be processed. Secondary memory is
even if power is turned OFF. This memory non-volatile in nature, i.e. the information
is often associated with non-volatile types does not get erased even when the power is
of memory. ROM cannot be altered once switched OFF and data will not be destructed
the chip has been made. until and unless the user erases it.
ROM is further sub-divided into three types :
Secondary Memory Devices include
(a) PROM (Programmable Read Only
Memory) It is a computer memory chip Magnetic Disks Optical Discs Solid State
capable of being programmed after it Floppy Disk CD Pen/Flash Drive
has been created. But once the PROM Hard Disk Drive DVD
has been programmed, the information
Magnetic Tape Blu-ray Disc
written is permanent and cannot be
erased or deleted.
(i) Floppy Disk (Diskette) A Floppy Disk
(b) EPROM (Erasable Programmable Drive (FDD) is a computer disk drive
Read Only Memory) It is a computer that enables a user to save data on
memory chip on which the written removable diskettes. This portable
information can be changed by storage device is a rewritable media and
exposing to ultra voilet light. It is just can be reused a number of times. It is
like a small glass circle that expose the made of plastic with magnetic coating
chip that can be re-programmed. on it. It is round in shape and is
(c) EEPROM (Electrically Erasable covered by square plastic jacket. Floppy
Programmable Read Only Memory) It is disks are commonly used to move files
a PROM that can be erased and between different computers. Although
reprogrammed using an electrical charge. 8” disk drives made available in 1971
14 Course on Computer Concepts (CCC)
were the first real disk drives, the first applications that are based on sequential
widely used floppy disk drives were the data processing i.e. it is a sequential
1" data access medium.
4", 5 , which were later replaced with
4 Due to this (sequential data access)
1" nature, these tapes are not suitable for
3 floppy disk drive. However, today
2 data files that need to be revised or
these drives are replaced with CD-R updated often. They are generally used
and other writable disk drives and to store backup data or that type of data,
flash drives. which is not frequently used or to
(ii) Hard Disk Drive A Hard Disk Drive transfer data from one system to
(HDD) is a non-volatile and random another.
access digital data storage device. It is (iv) Compact Disc (CD) It is an optical
a data storage device used for storing media that is used to store digital data.
and retrieving digital information It is relatively cheap, small, portable and
using rotating disks (platters) coated round in shape storage medium which is
with magnetic material. All programs of made up of molded polymer. It consists
a computer are installed in hard disk of a circular disc, which is coated with a
within a particular drive. thin metal that is highly reflective.
Read/Write
Spindle
Laser beam technology is used for
head Sectors
recording/reading of data on the disc. It
Head arm Tracks is also known as laser disc or optical
laser disc, due to the use of laser beam
Platters technology. CD provides random access
medium for high capacity secondary
storage. The diameter of the CD ranges
Hard Disk Drive Tracks and Sectors
from 10cms to 30cms. One CD can store
It consists of a spindle that hold non- 600 MB to 750 MB.
magnetic flat circular disks, called Compact discs are categorised into three
platters, which hold the recorded data. parts as follows :
Each platter requires two read/write (a) Compact Disc-Read Only Memory
heads, that is used to write and read (CD-ROM)
the information from a platter. All the
(b) Compact Disc-Recordable (CD-R)
read/write heads are attached to a
single access arm so that they cannot (c) Compact Disc-Rewritable (CD-RW)
move independently. (v) Digital Video Disc (DVD) It is also
The information is recorded in bands, known as Super Density (SD) disc. A
each band of information is called a DVD is an optical disc storage media
track. Each platter has the same manufactured for the first time by
number of tracks and a track location Philips, Sony, Toshiba and Panasonic
that cuts across all platters is called a in 1995. DVDs offer higher storage
cylinder. The tracks are divided into capacity than compact discs while having
pie-shaped sections known as sectors. the same dimensions. Depending upon
(iii) Magnetic Tape It is a medium of data the disk type, DVD can store several
storage, made up of a magnetic Gigabytes of data (4.7 GB-17.08 GB).
material. It is a storage medium on a DVDs are primarily used to store music
large open reel or in a smaller or movies and can be played back on
cartridge or cassette (like a music your television or on the computer too.
cassette). It is used for those They are not rewritable media.
Introduction to Computer 15
Peripherals are the external input-output devices acts like an interface between the device and
and storage media. the user.
Every device, whether it is a printer, monitor,
Software mouse or keyboard has a driver program
It is a collection of computer programs, associated with it for its proper functioning.
procedures and related data that provide the Device drivers are not independent programs,
instructions for telling a computer what to do they assist and are assisted by operating
and how to do it. system for the proper functioning.
It is responsible for controlling, integrating
and managing the hardware components of a
computer system and for accomplishing
Linker
specific tasks.
Software can be divided into following major It is a system program that links together
categories : several object modules and libraries to
form a single and coherent program
1. System Software (executable). The main purpose of linker is
2. Application Software to resolve references among files. Before
3. System Utilities execution of the program, modules and
required libraries are linked together using
1. System Software the linker software.
It consists of several programs, which are
directly responsible for controlling, Loader
integrating and managing the individual It is a kind of system software which is
hardware components of a computer system. responsible for loading and relocation of
System software also provides the interface the executable program in the main
between the user and components of the memory. It is a part of operating system
computer. Some common examples of system that brings an executable file residing on
software are as follows : disk into memory and starts its execution
process.
I. Operating System
It consists of programs, which control,
coordinate and supervise the activities of the III. Language Translator
various components of a computer system. Its It helps in converting programming
function is to provide link between the languages to machine language. The
computer hardware and the user. translated program is called object code.
Operating System (OS) performs all internal There are three different kinds of language
management functions (disk access, memory translators as follows :
management, task scheduling and user (i) Assembler It is used to convert the
interfacing) and ensures systematic assembly language into machine
functioning of a computer system. language (i.e. in the form of 0 or 1).
It provides an environment to run the This language consists of mnemonic
programs. e.g. MS-DOS, Windows codes, which are difficult to learn and is
XP/2000/98, Unix, Linux, etc. machine dependent.
(ii) Compiler It is used to convert the
II. Device Drivers source code (written in high level
A software, which is written with the language) into machine language.
objective of making a device functional when Compiler reads whole source code in a
it is connected to the computer is called single run and traps the errors and
device driver. It is a system software that inform to the programmer. For each
Introduction to Computer 17
● Billing System
18 Course on Computer Concepts (CCC)
Proprietary Software
It is a software that is owned by an individual
or a company. There are almost always major
restrictions on it to use and its source code is
always kept secret. Proprietary software is
copyrighted and bears limits against use,
distribution and modification that are Tablet
imposed by its publisher, vendor or developer.
Introduction to Computer 19
Smart Watch
6. Google Glass
It is a wearable computing device which
Smart Band comes with a head mounted display, in the
form of eyeglasses. The google glasses
4. Bluetooth Speakers function as a hands free smart phone, letting
Bluetooth speakers are a type of wireless users access the mobile internet browser,
speakers that are aimed at improving camera, maps, calendar and other apps by
20 Course on Computer Concepts (CCC)
through scan and pay. You can also that provide you a readymade interface to
generate your QR code. connect with the government on regular
basis.
2. IRCTC Connect App ● It also gives you the opportunity to connect
out the required documents they need to Roll by EPIC Number or barcode of EPIC card.
carry while visiting passport office for ● Voter can register to vote for new voter
application submission.
registration.
Model Questions
Multiple Choice Questions
Select the appropriate answer the choices given below.
1. The basic functions of a computer system 9. A ........ is a large and expensive computer
are to accept the input, process the input, capable of performing scientific and
output and to business applications.
(a) digital form (b) memory (a) Super computer
(c) store data (d) compute (b) Mainframe computer
(c) Mini computer
2. ......... is a command given to a computer
(d) Handheld computer
in the computer language by the user.
(a) Instruction 10. Analog computer works on the supply of
(b) Information (a) continuous electrical pulses
(c) Program (b) electrical pulses but not continue
(d) Data (c) magnetic strength
3. Which generation of computer is covered (d) physical strength
by the period 1964-71? 11. Seismograph is an example of
(a) First (b) Second (a) Analog computer (b) Digital computer
(c) Third (d) Fourth (c) Hybrid computer (d) All of these
4. In third generation, ............... were used. 12. The presence of computers can be seen in
(a) Vacuum tubes (a) education (b) banking
(b) Integrated circuits (c) multimedia (d) All of these
(c) Transistors
(d) Large scale integrated circuits 13. Pointing device includes the following
except
5. Speed of third generation computers was (a) mouse (b) touch screen
measured in (c) trackball (d) keyboard
(a) millisecond (b) microsecond
(c) nanosecond (d) picosecond 14. A joystick is primarily used to
(a) control sound on the screen
6. PCs are considered fourth generation and (b) computer gaming
contain (c) enter text
(a) information (b) data (d) draw pictures
(c) vacuum tubes (d) microprocessors
15. A device, which is used for making
7. Artificial intelligence is an example of drawings, graphics and for menu selection.
(a) first generation computer (a) Keyboard (b) Mouse
(b) second generation computer (c) Touch Screen (d) Light Pen
(c) fourth generation computer
(d) fifth generation computer 16. A device that makes copies and
reproduces text and images is called
8. Laptops are (a) CPU (b) memory
(a) computers used in clinical laboratories (c) printer (d) scanner
(b) portable, light weight and can be fit into
17. In abbreviation MICR, C stands for
briefcase
(a) Code (b) Color
(c) hearing voice recognition system
(c) Computer (d) Character
(d) desktop
24 Course on Computer Concepts (CCC)
18. A barcode reader is an example of 30. Which of the following storage media
(a) processing device (b) storage device provides sequential access only?
(c) input device (d) output device (a) Floppy disk
19. What type of device is a digital camera? (b) Magnetic disk
(c) Magnetic tape
(a) Input (b) Output
(c) Software (d) Storage (d) Optical disc
20. What is the function of an output device? 31. Which one is a secondary storage device?
(a) To send data to the computer (a) CD-ROM
(b) To store data (b) RAM
(c) To give output to the user (c) Both (a) and (b)
(d) To do mathematical calculations (d) None of the above
21. The output devices make it possible to 32. ...... is the smallest memory measurement
(a) view or print data (b) store data unit.
(c) scan data (d) None of these (a) Bit (b) Nibble
(c) Byte (d) Mega
22. Which type of printer cannot produce
high quality print graphics? 33. 1 Mega byte is equal to
(a) Daisy wheel printer (a) 1000 KB (b) 1026 KB
(b) Laser printer (c) 1024 KB (d) 1000 KB
(c) Line printer 34. What is the name given to Input-Output
(d) Chain printer devices and external storage media
23. Which of the following produces high together?
quality output? (a) Hardware (b) Peripherals
(a) Impact printer (b) Non-impact printer (c) Software (d) Control unit
(c) Both (a) and (b) (d) Plotter 35. The part of software are
24. Resolution of laser printer is specified in (a) word processing and spreadsheet
terms of (b) transaction and application
(a) DPI (b) LPM (c) windows and Mac OS
(c) CPM (d) PPM (d) system and application
25. Which of the following is an output device? 36. Which of the following is not a system
(a) Keyboard (b) Biometric Sensor software?
(c) Trackball (d) Plotter (a) Operating system (b) Compiler
(c) Interpreter (d) MS-Office
26. Which of the following is a part of CPU?
(a) ALU (b) Control unit 37. Operating system is a
(c) Both (a) and (b) (d) Disk drive (a) application software
(b) system software
27. Arithmetic operations in ALU performs (c) hardware
(a) addition (b) subtraction
(d) language
(c) multiplication (d) All of these
38. Translator program used in assembly
28. Arithmetic logic unit and control unit language is called
sections have special purpose location
(a) compiler (b) interpreter
called
(c) assembler (d) translator
(a) registers (b) RAM
(c) BIOS (d) I/O 39. Which type of software is designed to
29. Which of the following is the magnetic perform specific, personal, business or
storage device? scientific processing tasks?
(a) Hard disk (b) Compact disc (a) System (b) Application
(c) Audio tapes (d) All of these (c) GUI (d) Compiler
Introduction to Computer 25
True/False
Identify True/False from the following statements.
55. Instruction is a command given to a 66. When a computer prints a report, this
computer in the computer language by output is called hard copy.
the user.
67. A plotter is used to generate the map of
56. Information is a set of instructions given building and shopping malls.
to a computer.
68. Antivirus software is used to allocate the
57. The first generation computers could not memory to the data.
do multitasking.
69. Open source software must be available
58. NCR 304, IBM-1401 are the examples free or at a low cost.
of second generation computer.
70. Licenses and maintenance of proprietary
59. The main characteristics of fourth software are very cheap.
generation was vacuum tubes.
71. Smart bands have a pedometer and
60. A scanner, trackball and joystick are
sometimes also an optical heart rate
examples of output devices.
sensor.
61. OCR is a device that scans written or
typed text and transforms it into 72. Google glass is powered by Android
computer readable form. mobile operating system.
62. A mic converts the received sound into 73. Drone camera is an example of mobile
computer’s format. app.
63. Output devices store instructions or data 74. The aim to launch the BHIM app to
that the CPU process. make cashless payments.
64. The number of pixels displayed on a 75. MyGov app is used to store all official
screen is known as resolution. documents.
65. In a CRT, an electron gun is used, which 76. Helpline app provides a single point of
fires electrons at groups of phosphor dots service and information delivery to voters
coating the inside of the screen. across the country.
Answers
1. (c) 2. (a) 3. (c) 4. (b) 5. (c) 6. (d) 7. (d) 8. (b) 9. (a) 10. (a)
11. (a) 12. (d) 13. (d) 14. (b) 15. (d) 16. (d) 17. (d) 18. (c) 19. (a) 20. (c)
21. (a) 22. (d) 23. (b) 24. (a) 25. (d) 26. (c) 27. (d) 28. (a) 29. (a) 30. (c)
31. (a) 32. (a) 33. (c) 34. (b) 35. (d) 36. (d) 37. (b) 38. (c) 39. (b) 40. (a)
41. (d) 42. (c) 43. (d) 44. (a) 45. (b) 46. (c) 47. (c) 48. (a) 49. (d) 50. (b)
51. (a) 52. (b) 53. (b) 54. (a) 55. True 56. False 57. True 58. True 59. False 60. False
61. True 62. True 63. False 64. True 65. True 66. True 67. True 68. False 69. True 70. False
71. True 72. True 73. False 74. True 75. False 76. True
Introduction to
Operating System
Functions of Operating System
Objective of the Chapter The main functions of an operating system
This chapter includes Basics of Operating System, are as follows :
User Interface for Desktop and Laptop, Operating 1. Process Management A process is an
System Simple Setting, Files and Folder
application or a program in running
Management, Types of File Extensions.
state. Process management is the
important part of an operating system
Introduction which enables the activities of
Operating system is the system software that planning, monitoring and performance
performs all the basic tasks of a computer of a CPU.
system. It works like an interface between 2. Memory Management As a memory
the user and the computer hardware resources. manager, the operating system handles
It actually controls the execution of all the the allocation and deallocation of
tasks that are performed in a computer. memory space as required by various
Some examples of operating systems are programs. Managing the primary
Unix, MS-DOS, Windows 98/2000/XP. memory, sharing and minimising
It enables a user to utilise hardware resources memory access time are the basic goals
very efficiently. So, operating system makes of the memory management.
it easy for a user to use computer system. 3. File Management The operating
“An operating system is a collection of system is responsible for creation and
programs that controls and coordinates all the deletion of files and directories. It also
tasks and functions in a computer system. takes care of other file related activities
It mediates between application programs and such as organising, storing, retrieving,
hardware components.”
naming and protecting the files.
Basics of Operating System 4. Input/Output Management The
input/output management module of an
Operating system is the main part of the operating system coordinates and
system software of any computer. It mainly
assigns different input and output
provides an environment to run the software
devices. It controls all input/output
and serves services to the computer
hardware. Basically, operating system has devices, keeps track of input/output
two objectives : managing the computer’s requests, issues commands to these
hardware and providing the interface. devices.
28 Course on Computer Concepts (CCC)
5. Security Management The operating system protects system resources and information
against destruction and unauthorised use, it keeps different programs and data in such a
manner that they do not interface with each other.
Types of Operating System
Types Features
Time Sharing Operating ● In this OS, a small amount of time is allocated for the processing simultaneously.
System ● It provides scheduling to each process to be run on.
e.g. Mac OS
Real-Time Operating ● It was designed to respond to an event within a predetermined time.
System ● It aims to execute real time applications such as auto pilot mechanism used in aircrafts.
● It has very little user-interface capability and no end-user utilities.
e.g. Windows CE, QNX, RTLINUX, Vx Works, Free RTOS, etc.
Single-User Operating ● It is designed for one user to effectively use a computer at a time.
System e.g. Windows 95/NT/2000, DOS, etc.
Multi-User Operating ● It allows many users to take advantage of the computer’s resources simultaneously.
System ● It ensures that problem with one user doesn’t affect the entire community of users.
e.g. Unix, VMS, Linux, Windows 2000, etc.
Single-Tasking ● It allows only a single program to run at a time.
Operating System e.g. Palm OS, etc.
Multi-Programming ● It allows to run several programs at a time using time sharing.
Operating System ● This operating system keeps several jobs in memory at a time.
e.g. Linux, Unix, etc.
Multi-Tasking Operating ● This operating system is the logical extension of multi-programming operating system.
System ● In this OS, more than one processes can be executed concurrently.
● It reduces CPU idle time.
e.g. Microsoft’s Windows and Apple’s Mac OS.
Distributed Operating ● It uses multiple central processors to serve multiple real time applications.
System ● It manages a group of independent computers and makes them appear to a single computer.
● Data processing jobs are distributed among the processors according to their efficiency.
e.g. LOCUS etc.
Batch-Processing ● Similar types of jobs are grouped under batch and these batches are executed without
Operating System user’s interruption.
● Jobs are processed in the order of submission, i.e. on First Come First Serve (FCFS) basis.
e.g. DOS, IBM OS/2, etc.
Multi-Processing ● Use of two or more CPUs within a single computer system.
Operating System ● Simultaneous processing of two or more programs by multiple processors.
e.g. Linux, Unix, Windows 2000, etc.
Features of Ubuntu
User Interface There are following features of Ubuntu :
The user interface is one of the most ● It supports the office suite called LibreOffice.
important parts of any operating system ● It is easy to find content on Ubuntu with
because it allows users to easily access the the smart searching facility.
applications and the hardware. It is set of ● There are also applications to manage videos
commands or menus. The user can interact
and it also allows the users to share videos.
with the computer by using mainly two
● There are a host of free applications for
kinds of interfaces:
users to view and edit photos.
1. Character User Interface (CUI) This is a
● Ubuntu has an in-built e-mail software
mechanism of interacting with a
computer system or software by typing called Thunderbird, which gives the user
commands to perform specific tasks. access to e-mail.
Programs with Character User Interface Ubuntu Desktop
are generally easier to automate via
scripting. CUI only uses text types one When you turn ON the computer then the visible
after another, just as commands used in screen, which will display on the computer is
MS-DOS. It is also known as Command known as desktop. A small arrow or blinking
Line Interface (CLI). symbol, moving on the desktop is called as cursor.
Icons or
2. Graphical User Interface (GUI) It is used as Launcher Notification Area
an interface between program and user.
This is a computer program that
enables a user to communicate with a
computer through the use of symbols,
visual metaphors and pointing devices.
The first graphical user interface was
designed by Xerox Corporation in 1970s.
GUIs can be found in hand-held devices
such as MP3 players, portable media
players, gaming devices, etc.
● Files This icon contains Desktop, ● Clock Indicator It provides the options
Documents, Downloads, Music, Pictures, related to current date or time, calendar
Public, Templates, Videos and Examples setting etc.
options. Network connection also displays ● Session Indicator ( ) It provides the options
in this icon. as system settings, log-out, shut-down, etc.
● Firefox With this icon, internet services
are provided in the system. Taskbar
● LibreOffice Writer This icon helps to Initially, the long horizontal bar at the bottom
create and manipulate text document. of our desktop is known as taskbar. By
There are various tools present in the default, there is no taskbar in Ubuntu but
LibreOffice Writer which are used to create you can add it from dash.
template, printing the document etc. Structure of a Window
● LibreOffice Calc This icon helps to create Window is a rectangular area which provides
spreadsheet document. Calc is a powerful an environment to run many programs. It
program that used for analysing, sharing allows a user to work with multiple programs
and managing information for accounting or view multiple programs at once. A window
purpose, performing mathematical includes title bar, menu bar, etc.
calculations. Control Buttons Title Bar
● LibreOffice Impress This icon helps to
create presentation. Impress is a
presentation software that used for
123
creation of the slides and to display the Left Right
Pane Pane
information in the form of presentation of
slides.
● Ubuntu Software This is used for adding
and removing softwares.
● System Settings This icon represents the
settings related to system, hardware and
personal. You can change the date and
time, display, printer of your system. Title Bar
● Trash It is like a recycle bin icon of It is the horizontal bar at the top of a window
Windows. Trash contains deleted files or that displays the name of the window or the
folders. program, which is currently being used.
Simple Setting
of Operating System
In Ubuntu, most of the changes are done 3. In General section, Primary button is used
in System Settings. Settings for the mouse, for changing the function of left and right
display, sound, network and keyboard button of mouse. You can also change the
represent just a few examples of what may speed of double-click as Slow or Fast.
be modified in System Settings. To go on 4. In Mouse section of Mouse & Touchpad
System Settings, click on System Settings window, you can change the pointer speed
icon. of mouse by Pointer speed option.
34 Course on Computer Concepts (CCC)
Changing System Date and Time 6. If you want to display only watch and
month’s calendar, click on Show a clock in
To change your computer’s date and time,
menu bar and Monthly calendar. If you
follow the given steps :
want to display weekday and date, click
1. Click on time on your Notification Area on Weekday, Date and month and Year.
of window’s right upper corner. A drop
7. You can select 12-hour time or 24-hour
down menu will appear. Select Time &
time for time format.
Date settings option from it. A Time &
Date window will appear on your
screen, and its icon will display on
Changing Display Properties
launcher or click on System Settings The display properties include the settings of
icon. A window will appear. In System wallpaper, screen-saver, color, font, etc. To change
section, select Time & Date option. the display settings, follow the given steps :
1. Click the System Settings and now
select Appearance icon under the
Personal section. Appearance window
will be appear on the screen.
4. Choose the appropriate settings and 3. Now, select the program which you
click on Apply button. want to add in your system. e.g. Click
5. If you want to change the text size, on Calendar icon.
select System Settings and then choose Calendar window will appear on screen.
Universal Access icon under the System
section. Universal Access window will
be appear on screen.
3. Click on Add button, from which New 6. Click on Forward button. A New Printer
Printer dialog box will appear. dialog box will appear.
7. Click on Apply button.
Removing a Printer
To remove a printer, follow the given steps :
1. Click on System Settings from launcher.
A window will appear.
2. Select Printers icon under the Hardware
section. Printers dialog box will be appear.
3. Right click on that printer which you
want to remove and choose Delete button
from drop down menu that appear.
4. A confirmation dialog box will appear.
3. Open the location where you want to 3. Choose Move to Trash option from the
store the copied file/folder. drop down menu. File or folder will be
4. Right click on a blank area with the deleted.
location and then choose Paste. If you want to delete file or folder permanently,
The copy of the original file is now stored in follow below steps :
the new location. 1. Select a file or folder which you want to
delete.
Steps to Move a File or Folder
1. Open the location that contains the 2. Press Shift + Delete shortcut from the
file/folder, which you want to move. keyboard.
2. Right click the file/folder and then A confirmation message dialog box will
choose Cut option from the drop down appear.
menu.
3. Open the location where you want to
store the cutted file/folder.
4. Right click on a blank area with the
location and then choose Paste.
Now, the original file is stored in the new
location. 3. Click on Delete button.
Delete Files and Folders To Restore Files and Folders
When you organise the contents of a folder, Sometimes, you delete a file or folder by mistake.
disk, or the desktop, you might find files and So, to restore a file/folder, follow these steps :
folders that you no longer need. You can delete 1. Double click the Trash icon from the
these items or remove them from the disk. We launcher.
follow some steps to delete files and folders : 2. Select the item which you want to restore.
1. Locate your file or folder. 3. Click Restore from drop down menu
2. Right click on the file or folder icon. that appear.
Model Questions
Multiple Choice Questions
Select the appropriate answer the choices given below.
1. Ubuntu is a/an 10. Which software is a series of graphical
(a) operating system (b) office suite user interface operating systems
(c) desktop application (d) browser developed by Microsoft?
(a) Mac OS (b) MS-Windows
2. The primary purpose of the operating
(c) Linux (d) Solaris
system is
(a) to make the most efficient use of the 11. Which operating system is developed by
computer hardware Apple Incorporation?
(b) to allow people to use the computer (a) iOS (b) BlackBerry
(c) to keep systems programmer’s employed (c) Android (d) Symbian
(d) to make computers easier to use 12. BlackBerry also supports
3. ........ is responsible for creation and (a) WAP 1.0 (b) WAP 1.2
deletion of files and directories. (c) WAP 1.5 (d) None of these
(a) Operating system (b) Application software 13. GUI stands for
(c) Programs (d) Peripherals (a) Graphical User Interface
4. It provides scheduling to each process to (b) Graphical Used Interface
be run on. (c) Great User Interface
(a) Time sharing OS (b) Distributed OS (d) None of the above
(c) Real-time OS (d) Single-user OS
14. GUI is used as an interface between
5. An operating system is said to be (a) hardware and software
multi-user, if (b) man and machine
(a) more than one programs can run (c) program and user
simultaneously (d) None of the above
(b) more than one users can work
simultaneously 15. It uses pictures (called icons) and menus
(c) Either (a) or (b) displayed on the screen to send
commands to the computer system.
(d) All of the above
(a) Command-based user interface
6. ............ provides process and memory (b) GUI
management services that allow two or (c) System Utility
more tasks, jobs or programs to run (d) API
simultaneously.
(a) Multi-tasking (b) Multi-threading 16. The ‘desktop’ of a computer refers to
(c) Multi-processing (d) Multi-computing (a) the visible screen
(b) the area around the monitor
7. The simultaneous processing of two or
more programs by multiple processors is (c) the top of the mouse pad
(a) multi-programming (b) multi-tasking (d) the inside of a folder
(c) time sharing (d) multi-processing 17. The image, displayed on the desktop of
8. ………… is an operating system which Ubuntu
was first developed in 1969. (a) main image (b) wallpaper
(a) Windows (b)Mac Os (c) Linux (d) Unix (c) desktop image (d) windows image
9. Linux is which type of operating system? 18. A blinking indicator that shows you
(a) Open-Source (b) Microsoft where your next action will happen, is
(c) Windows (d) Mac (a) CPU (b) cursor (c) toolbar (d) boot
40 Course on Computer Concepts (CCC)
19. A small figure shown on the desktop 30. Which tab is used to represent the clock
screen with a program name is called in menubar of desktop background?
(a) menu (b) photo (c) modem (d) icon (a) Time & Date (b) Clock
(c) Both (a) and (b) (d) Menu
20. When you want to move an icon on your
desktop, this is called 31. To open Time & Date dialog box, follow
(a) double clicking (b) highlighting which steps?
(a) System Settings ® System ® Time & Date
(c) dragging (d) pointing
option
21. All the deleted files go to (b) System Settings ® Hardware ® Time &
(a) trash (b) task bar Date option
(c) status bar (d) computer (c) System Settings ® Personal ® Time &
Date option
22. Date and time are available on the (d) None of the above
desktop at
(a) Keyboard (b) Recycle Bin 32. With the help of which option, you can
(c) My Computer (d) Notification Area change display properties?
(a) Display (b) Appearance
23. ………… represents the details of current (c) Wallpaper (d) Background
keyboard layout and related setting.
(a) Text entry indicator (b) Clock indicator
33. In which section, Displays icon is present?
(a) Hardware (b) Personal
(c) Session indicator (d) Network indicator
(c) System (d) Wallpaper
24. The long horizontal bar at the bottom of 34. By ………… icon from launcher, you can
desktop is known as add or remove softwares or programs.
(a) Status bar (b) Task bar (a) Search Your Computer
(c) Menu bar (d) Title bar (b) System Settings
(c) Trash
25. Left pane of the Ubuntu window includes
(d) Ubuntu Software
option(s) as
(a) Desktop (b) Documents 35. Which tab(s) is/are available in the
(c) Music (d) All of these Ubuntu Software window?
(a) All (b) Installed
26. To shrink a window to an icon, (c) Updates (d) All of these
(a) open a group window
(b) minimize a window 36. By which icon from launcher, printer can
(c) maximize a window be add?
(a) Search Your Computer
(d) restore a window
(b) Trash
27. Applications can be run using (c) System Settings (d) Ubuntu Software
(a) launcher 37. Which option from drop down menu is
(b) Search Your Computer used to share printer?
(c) Both (a) and (b) (a) Properties (b) Sharing
(d) None of the above (c) Shared (d) Networking
28. With the help of which icon in launcher, 38. A ............ is a collection of information
you can change mouse properties, display saved as a unit.
properties etc? (a) Folder (b) File
(a) Ubuntu Software (c) Path (d) File extension
(b) System Settings 39. What is a file?
(c) Search Your Computer (a) A file is a section of main storage used to
(d) Trash store data
(b) A file is a collection of information that has
29. Mouse & Touchpad option is available been given a name and have an extension
under which section of System Settings? (c) A file is the part of a program that is used
(a) Personal (b) Hardware to describe what the program should do
(c) System (d) Properties (d) A file can be saved only in CDs
Introduction to Operating System 41
40. Files are organised after storing in 43. A named area on a disk that is used to
(a) archives store related sub folders and files is
(b) folders called as a ............
(c) indices (a) desktop (b) folder
(d) lists (c) menu (d) window
41. File extensions are used in order to 44. ...... may be included in other folder while
(a) name the file making hierarchical folder structure.
(b) ensure the file name is not lost (a) Mini folder (b) Tiered folder
(c) identify the file (c) Sub folder (d) Object
(d) identify the file type 45. Which shortcut key is used to delete file
42. What is the file extension of Writer? permanently?
(a) .eml (b) .wrt (a) Shift + Delete (b) Ctrl + Delete
(c) .odf (d) .txt (c) Alt + Delete (d) Shift + Ctrl + Delete
True/False
Identify True/False from the following statements.
46. An operating system is an application 57. In Ubuntu, deleted files are stored in
software. CD-ROM.
47. Process management is a function of 58. Task bar consists of three parts start
operating system. button, middle section and notification
48. The operating system manages the area.
primary memory of the computer. 59. The name of the control button which is
49. Linux is a case sensitive operating system. clicked to enlarge a window to the size of
50. Ubuntu is an open source operating system. whole screen is minimize button.
51. Ubuntu does not support office suite 60. A title bar contains programs that can be
called LibreOffice. selected.
52. Search Your Computer is also known as 61. You can change the settings of wallpaper
Trash. screen saver etc, from Mouse properties.
53. Ubuntu Software icon is used for adding 62. You can remove the printer, if you have
and removing softwares. items in the print queue.
54. A user interface is a set of commands or 63. .exe is the extension of Executable file.
menus.
64. Folder is a container which you can use
55. CUI is also known as Command Line to store files.
Interface (CLI).
65. Ubuntu offers several ways of working
56. In GUI, you need to type commands to with files and folders.
perform specific tasks.
Answers
1. (a) 2. (d) 3. (a) 4. (a) 5. (b) 6. (a) 7. (d) 8. (d) 9. (a) 10. (b)
11. (a) 12. (b) 13. (a) 14. (c) 15. (b) 16. (a) 17. (b) 18. (b) 19. (d) 20. (c)
21. (a) 22. (d) 23. (a) 24. (b) 25. (d) 26. (b) 27. (c) 28. (b) 29. (b) 30. (b)
31. (a) 32. (b) 33. (a) 34. (d) 35. (d) 36. (c) 37. (a) 38. (b) 39. (b) 40. (b)
41. (d) 42. (c) 43. (b) 44. (c) 45. (a) 46. False 47. True 48. True 49. True 50. True
51. False 52. False 53. True 54. True 55. True 56. False 57. False 58. False 59. False 60. False
61. False 62. False 63. True 64. True 65. True
03
Word Processing
(LibreOffice Writer)
It opens LibreOffice Writer with a blank document. By default, the name of the blank
document is Untitled 1 and file extension of LibreOffice Writer is .odt.
Control Buttons
Title Bar
Menu Bar
Standard
Toolbar
Formatting
Toolbar
Horizontal Ruler Vertical
Cursor Scroll Bar Side Toolbar
Work Area
Vertical Ruler
Horizontal Scroll Bar
Zoom Slider
Status Bar
Toolbars
LibreOffice Writer displays toolbars in different ways : docked (fixed in place) or floating. Docked
toolbars can be moved to different locations or made to float and floating toolbars can be docked.
Standard Toolbar
It is located just below the menu bar. Standard toolbar consists various options which are
showing in below figure :
Cut Find & Toggle
New Save Print Paste Undo Replace Formatting Insert Image
Insert
Text Box
Open Export Toggle Copy Clone Redo Check Insert Insert
as PDF Print Formatting Spelling Table Chart
Preview
Formatting Toolbar
It is located just below the standard toolbar. When we work with text, formatting toolbar is
displayed. Formatting toolbar consists of various options which are showing in below figure:
Strikethrough Font Toggle Bulleted
New Subscript Color List
Set Paragraph Font
Style Style Size Italic
Header
Choose a Location
4. Click on Save button.
Type File Name
Text Selection
Apart from this, use Shift key with the
combination of following keys to do the
further described tasks in the table
5. Enter the document name in File name Key Description
and click on Save button.
® Select one-one character from the right hand side.
¬
Text Creation and
Select one-one character from the left hand side.
Select one-one line to the top in the paragraph.
Manipulation ¯ Select one-one line to the bottom in the
After opening Writer document, user starts paragraph.
typing. Cursor inserts a character at its End Select the text till the end of the line.
current position, forcing all characters past it Home Select the text till the start of the line.
one position further.
Enter key is used to go to the next line. To Cut, Copy and Paste
correct or remove the mistakes of the text at
the time of typing, use Backspace or Delete Cut and Paste Operations
key. Cut option is used to move some content from
one place to another. While paste option is
Editing the Text used to paste some pre selected content at a
After typing the text in the document, the new or desired place. To move some text from
user can edit that text as per his/her one place to another, both the options are
requirement. used. Following procedure is used to move
To add some text in the document, click the some content in Writer document :
pointer on the correct position and then start 1. Select a portion of the text using any
typing, the all typed text will add to the right one of the text selection methods.
hand side of the cursor. Backspace or Delete 2. Next, with the help of various options
key is used to remove any character, text, available to cut the selected text and
paragraph, word, etc. put it in clipboard. Just use any one of
them :
Text Selection ● Use mouse right click and select Cut
drag the pointer over the text that you want ● Using Ctrl+X shortkey from keyboard.
to select.
Word Processing (LibreOffice Writer) 51
3. Click at the place where you want to toolbar. The font style/name drop down
move the selected text and use any one menu will appear.
of them :
● Use mouse right click and select
Paste option.
● Using Paste option from standard
toolbar.
● Using Ctrl+V shortkey from keyboard.
Paste option.
● Using Paste option from standard
toolbar.
● Using Ctrl + V shortkey from
keyboard.
AutoCorrect
By default, LibreOffice automatically corrects
many common typing errors and applies
formating while you type.
● To quickly undo an autocorrect correction
3. Choose the font size that you want to use. remove the check mark from the menu
Tools ® AutoCorrect ® While Typing.
Alignment of Text To remove a word from the AutoCorrect list,
In LibreOffice Writer, the default alignment steps are as follows :
for paragraph is left aligned. Steps to change 1. Click Tools® AutoCorrect® AutoCorrect
the text alignment in as document are as Options. AutoCorrect dialog box will
follows: appear.
1. Select the text which you want to
modify.
Left Right
Center Justified
Paragraph Indenting
2. Enter the text to search in the Find text box. Indents are the white space added to the
3. Enter the text to replace the found text in margins and decreasing the text area for
the Replace text box. paragraph.
4. Either click Replace or Replace All. So, when you have a ‘‘right margin’’ and
you want to add a right indent of 1.0, your
Formatting the Text text will be printed 2.0" from the right
edge of the paper.
The paragraph formatting involves controlling
the appearance of text in a paragraph as a whole. The first line of each paragraph can be
The paragraph formatting options are: paragraph indented differently from other lines in the
indentation, line spacing, spacing before and after paragraph. The first line can be shorter
the paragraph, border and shading, etc. than the others.
56 Course on Computer Concepts (CCC)
5. In this dialog box, select Line 3. Drag your mouse over the squares
Arrangement, Shadow Style, Line and diagram to select the desired number of
Padding settings. columns and rows in the table.
6. Click OK button. 4. Click your mouse and then a table will
7. Click OK button in Page Style: Default appear in the document.
Style dialog box. 5. Now, you can enter text into the table.
Word Processing (LibreOffice Writer) 59
2. In this dialog box, select Line Here is given many steps. We will discuss all
Arrangement, Line, Width and Color for steps one by one as follows :
border. For shading, do the modification 1. Select Starting Document
in Shadow Style. (i) Click one of the following options :
3. Click OK button. ● Use the current document Uses, the
letter to a large number of people. But, each new Writer document to use for the
version of letter is not exactly same so, you mail merge.
may need to sit for hours to draft each letter ● Start from existing document Select
and address of the recipients. LibreOffice template that you want to create your
Writer Mail Merge feature can be proved to mail merge document with.
be a very useful tool in such a situation. ● Start from a recently saved starting
Mail Merge feature enables you to generate a document Use an existing mail
set of forms, letters etc., containing similar merge document as the base for a new
information that can be sent to a group of mail merge document.
people. To use a Mail Merge system, you (ii) Click Next button.
have to first store a set of information like a 2. Select Document Type
list of names and addresses in one file. In
(i) In this step, you need to select
another file, you have to write a letter,
document type that you want to create.
substituting special symbols in place of
names and addresses (or whatever other
information will come form the first file).
Steps to start the mail merge wizard to
create letters or send e-mail messages to
many recipients are as follows
Click on Tools tab ® Mail Merge Wizard
option. Mail Merge Wizard dialog box will
appear.
male recipient.
● Field name Select the field name of the
5. Portrait and Landscape are 15. In print preview format, you can do
(a) page orientation (b) paper size (a) modify the margins
(c) page layout (d) page margin (b) change page orientation
(c) change paper size
6. Which tab provides options for changing (d) All of the above
alignment?
16. For printing a document, you have to put
(a) View (b) Format on
(c) Preview (d) Page Layout (a) printer (b) monitor
7. The first tab of LibreOffice Writer is (c) scanner (d) All of these
(a) File (b) View (c) Insert (d) Review 17. By which way, you can open PDF
8. Which toolbar is used to cut, copy, paste, Options dialog box?
undo, redo etc? (a) Export As ® Export as PDF
(a) Standard toolbar (b) Formatting toolbar (b) Import As ® Import as PDF
(c) Sidebar (d) None of these (c) Save As ® Save as PDF
(d) F2 Function key
9. Sidebar contains ……… decks.
(a) Two (b) Three 18. Which of the following should be used to
(c) Four (d) Five move a paragraph from one place to
another in a writer document?
10. Which deck of sidebar contains Header (a) Copy and paste
and Footer? (b) Cut and paste
(a) Styles (b) Page (c) Delete and retype
(c) Navigator (d) Gallery (d) Find and replace
66 Course on Computer Concepts (CCC)
19. To move the text from its original 29. ..... are the white space added to the
position to another position without margins and decreasing the text area for
deleting it is called paragraph.
(a) scrolling (b) searching (a) Indents (b) Borders
(c) moving (d) copying (c) Shading (d) Margins
20. To copy the selected text and put it into 30. .............. is a list of items preceded with
clipboard, use pictures.
(a) Copy command from Edit tab (a) Number list (b) Bullet list
(b) Ctrl + C (c) Picture list (d) None of these
(c) mouse right click and select Copy option
31. Which of the list is a listing order that is
(d) All of the above
done with numbers?
21. To quickly undo an AutoCorrect correction (a) Bullet list (b) Number list
or completion, press …… shortkey. (c) Order list (d) Both (b) and (c)
(a) Ctrl+Y (b) Ctrl+X
32. In LibreOffice Writer, document has text
(c) Ctrl+Z (d) Ctrl+W
case which help to change the text case.
22. In LibreOffice Writer, the default They are
alignment for paragraph is (a) Sentence case (b) lowercase
(a) left aligned (b) centered (c) UPPERCASE (d) All of these
(d) right aligned (d) justified
33. It is a section of the document that
23. Which of the following is not a font style? appears at the top margin of the page.
(a) Bold (b) Italic (a) Footer (b) Header
(c) Regular (d) Super script (c) Head (d) Tail
24. When a possible spelling error is 34. It is a section of the document that
encountered in a document, which dialog appears at the bottom margin of the
box will open? page.
(a) Spellcheck (a) Footer (b) Header
(b) Spellcheck and Grammar (c) Head (d) Tail
(c) Spelling
35. It is a grid of cells arranged in rows and
(d) None of the above columns.
25. User can also check the spelling and ....... (a) Row (b) Style Sheet
in a document. (c) Table (d) Sheet
(a) Graphic (b) Text
36. Insert table option is in .............. tab.
(c) Table (d) Grammar
(a) Insert (b) Table (c) Format (d) File
26. ……… option helps you to search a 37. Borders option is in ............... tab.
particular letter, word, phrase or
(a) View (b) Format ® Title
sentence in your document.
(c) Insert (d) Format ® Page
(a) Help (b) Find and Replace
(c) Indentation (d) Line Spacing 38. Which feature of Writer is used to create
a set of documents, such as forms or
27. The ……… formatting involves letters etc?
controlling the appearance of text in a
(a) Mail Merge (b) Merging document
paragraph as a whole.
(c) Main document (d) Data source
(a) Text (b) Paragraph
(c) Page (d) Document 39. When a field name has a space in its title,
such as Last Name, how is the merge field
28. The paragraph formatting options are displayed in the mail merge document?
(a) line spacing (b) superscript
(a) LastName (b) Last-Name
(c) bullets (d) text
(c) Last_ Name (d) Last/Name
Word Processing (LibreOffice Writer) 67
40. To correct or remove any character, text, 43. To cut the selected text, which shortcut
paragraph etc, use ................ . key is used?
(a) Enter key (b) Backspace key (a) Ctrl + C (b) Ctrl + D
(c) Spacebar key (d) Shift key (c) Ctrl + V (d) Ctrl + X
41. For pasting the cutted text use……shortkey. 44. To print a document, press ...............
(a) Edit tab + Paste (b) Ctrl + V shortcut key then press Enter.
(c) Both (a) and (b) (d) Ctrl + C (a) Shift + P (b) Ctrl + P
(c) Alt + P (d) Esc + P
42. To open a new blank document in
LibreOffice Writer, which shortcut key is 45. Move to the cursor to the beginning of
used? the document, press the ............... key.
(a) Ctrl + S (b) Ctrl + O (a) Page up (b) Insert
(c) Ctrl + P (d) Ctrl + N (c) Ctrl + Home (d) Enter
True/False
Identify True/False from the following statements.
46. Word processing is a GUI based software 56. Indentation can be done with the help of
used in the windows environment. horizontal ruler also.
47. Title bar is at the top of the window that 57. You can create a nested list in your
bears the name of the window. document.
48. Scroll bar is available in LibreOffice Writer. 58. Sentence case command is used to
49. Help option allows users to search and capitalise each first character of every
find any topic about that program. word.
50. Formatting toolbar exists above the 59. You can insert only text as header.
standard toolbar. 60. A table cannot contain row and column
51. Page Style dialog box is used to create both.
table, charts etc. 61. Shading can also be applied to give a
52. Enter key is used to go to the next line. shading background to a paragraph.
53. After typing the text in the document, 62. Mail Merge is a software function
user can edit that text. describing the production of single
document from a single template form
54. There are five options for alignment of text. and a structure data source.
55. The red wavy line indicates a possible 63. The first file in mail merge is called the
syntax error. data source file.
Answers
1. (c) 2. (a) 3. (a) 4. (d) 5. (a) 6. (b) 7. (a) 8. (a) 9. (d) 10. (b)
11. (c) 12. (d) 13. (d) 14. (d) 15. (d) 16. (a) 17. (a) 18. (b) 19. (d) 20. (d)
21. (c) 22. (a) 23. (d) 24. (c) 25. (d) 26. (b) 27. (b) 28. (a) 29. (a) 30. (b)
31. (b) 32. (d) 33. (b) 34. (a) 35. (c) 36. (b) 37. (d) 38. (a) 39. (c) 40. (b)
41. (c) 42. (d) 43. (d) 44. (b) 45. (c) 46. True 47. True 48. True 49. True 50. False
51. False 52. True 53. True 54. False 55. False 56. True 57. True 58. False 59. False 60. False
61. True 62. False 63. False
68 Course on Computer Concepts (CCC)
04
Spreadsheet (LibreOffice Calc)
Side Toolbar
always entered into the active cell.
Sheet Tab
Active Cell Column Letter
Formula Bar
The tab at the bottom of a worksheet tells
Row Number
Status Bar
Status Bar
It appears at the bottom of the workbook
The components of a spreadsheet window are and provides such information like Sum,
as follows : Average etc.
Title Bar Menu Bar
The bar located at the top of the window is When you select an item on the menu bar,
called title bar. It contains the name of the a sub menu drop down will appear. Tabs on
currently open document. menu bar are as follows :
Formula Bar File Tab
It displays the contents of the active cell. This It is found at the top-left corner of the
could be a formula, data or just text. window. It contains options as New, Open,
Open Remote, Templates, Save, Save
Name Box Remote, Save As, Print Preview, Print etc.
It is located on left of the formula bar. It Edit Tab
displays the cell reference or the name of the
It contains options as Undo, Redo, Cut,
active cell.
Copy, Paste, Find & Replace etc.
Worksheet
View Tab
LibreOffice Calc consists worksheets. Each
It contains options as Normal, Page Break,
worksheet contains columns and rows. Calc
Formula Bar, Status Bar, Sidebar, Styles,
documents are stored as files called worksheet.
Gallery, Zoom etc.
Workbook Insert Tab
An Calc file is called a workbook. It contains
It contains options as Image, Media, Chart,
several worksheets. By default, there is one
Object, Function, Date, Time, Comment,
worksheet in a workbook.
Header & and Footer & etc.
Column Letter Format Tab
Columns run vertically in a worksheet and It contains options as Text, Spacing, Align,
each one is identified by a letter in the column Cells, Rows, Page, Conditional, Spreadsheet
header. Theme etc.
70 Course on Computer Concepts (CCC)
$A5*B$4 $A5*C$4
$A6*B$4 $A6*C$4
Page Setup
It is used to do page settings like setting
margin, page orientation etc. You can change
Addressing of Cells size, layout, orientation and margin of paper
through this option.
There are three types of addressing as follows :
Steps to do setup of the page are as follows :
1. Relative Cell Addressing Relative
1. Select Format tab, a drop down menu
means that the reference of an area will
will appear.
be adjusted automatically when you
copy the formulas. 2. Now, choose Page option from it. Page
Style: Default dialog box will appear.
We can say the cell addressing change
when the formula is autofilled into
different cell is known as relative cell
addressing.
For example, you have entered a
formula = A5* B4 in cell C3. Now, if you
copy this formula to cell D3, then it will
become = B5*C4.
Orientation (Portrait or Landscape) save the file for the first time or save
etc. the file by different name.
● Margins With the help of this ● Choose Save, if the file has already
Printing of Sheet
When you are ready to print your
worksheet, you can change the worksheet’s
properties to ensure that your worksheets
display all your information properly.
To print the worksheet, steps are as
follows :
1. Click File tab → Print option or press
Ctrl+P shortkey on keyboard.
2. Print dialog box will appear. 4. Type the file name in File name box and
choose ODF Spreadsheet from the Save
as type list box.
5. Click on Save button. The default
extension of LibreOffice Calc is .ods.
Closing Spreadsheet
Steps to close an active spreadsheet are as follows :
1. Click the File tab. 2. Click Close option.
● To select a single entire row, click the row 3. Format Cells dialog box provides many
number. tabs to format the cells. Tabs and their
● To select multiple rows, drag across groups on the Format Cells dialog box
multiple row numbers. are as follows :
● To select sequential cells, click the first
Tabs Groups
cell, hold down the Shift key and click the
last cell you want. Optionally, click and Numbers Category, Format, Language, Options,
Format code
drag the mouse over a group of cells to
select a sequential area. Font Font, Style, Size, Language
● To select non-sequential cells, click the first Font Effects Font color, Overlining, Strikethrough,
cell, hold down the Ctrl key, and click each Underlining
additional cell (or row or column) you want Alignment Text Alignment, Text Orientation,
to select. Properties
● To select the entire worksheet, click the Borders Line Arrangement, Line, Padding,
small box located to the left of column A Shadow Style
and above row 1. You can select all cells in Background None, Color
a worksheet by pressing Ctrl + A.
Cell Protection Protection, Print
Different types of shapes are available to
select the cells are as follows :
Cut, Copy and Paste
Pointer Shape Use
These options work same as they do in
To select cells, row number, column letter Writer, we have studied earlier. But, we will
To change column width look at these options in terms of cells.
To change row height Selecting a Range of Cells
To AutoFill in cells A range of cells may contain a single cell or a
group of cells. Basically, it is a group of
Formatting Cells contiguous cells forming a rectangular area of
When we format cells in Calc, we can change cells. When we select a cell, its name gets
the appearance of a number without displayed in the Name Box.
changing the number itself. Steps to format Similarly, the name of the selected range of
the cells are as follows : cells also gets displayed in the same Name
1. Enter the value into a cell. Box. e.g. a range starting from E3 till G15
2. Select the cell and right click, then click would be written as E3:G15. Here, colon (:)
Format Cells. Format Cells dialog box represents the range indicator. We can do
will appear. this in two ways, through keyboard or mouse.
I. Using Keyboard
For selecting a range of cells using keyboard,
do the following :
(i) Point to the first cell that you want to
be included in the range of cells.
(ii) Then, press and hold the Shift key and
move to the diagonally opposite cell
using arrow keys to the cells that you
want to be included in the range of
cells.
(iii) Lastly, release the Shift key.
Spreadsheet (LibreOffice Calc) 75
Deleting Cells (ii) Type the first entry of the text series in
For deleting one of more cells in your the selected cell. And, next entry in the
worksheet, do the following steps : adjacent cell.
1. Select as many number of cells as
you want to delete from your
worksheet.
2. Click on Sheet tab → Delete Cells. Fill Handle
Delete Cells dialog box will appear.
(v) Optional If you select the Series option, Sorting and Filtering
then Fill Series dialog box will appear.
Sorting and filtering provide you to
manipulate the worksheet data.
Basic Sorting
To use ascending or descending sort which
depends on one column follow the given
steps :
1. Select those cells, which you want to
sort.
2. Click on Sort Ascending (a to z) button
or Sort Descending (z to a) button from
standard toolbar.
Custom Sorting
To use ascending or descending sort which
depends on more than one columns follow the
(vi) Now, choose the option as per your need. given steps :
1. Select those cells, which you want to
Direction Determines whether the series Down, Left,
sort.
Right and Up.
2. Click on Sort option from standard
Series Determines whether the additional toolbar. Sort dialog box will appear.
Type information will differ from the previous
entry by a specific interval (Linear), by
multiplying the previous entry by a specific
value (Growth), by creating a series of
dates according to the selected date format
(Date) or by automatically detecting, what
type of fill you would like to apply (AutoFill).
Sales Expenses
700
600
500
400
300
200
100
0
Monday Tuesday Wednesday Thursday Friday Saturday Sunday
Bar Chart
Categories are listed vertically, so that bars appear on the horizontal, thus there is less
emphasis on time flow.
Sunday
Saturday
Friday Expenses
Thursday Sales
Wednesday
Tuesday
Monday
Line Chart
Line chart tends to emphasize the rate of change rather than volume of change over time.
Sales Expenses
700
600
500
400
300
200
100
0
ay
y
ay
ay
ay
ay
y
da
a
d
sd
id
sd
rd
nd
es
on
Fr
tu
ur
ne
Su
Tu
M
Sa
Th
ed
W
84 Course on Computer Concepts (CCC)
Pie Chart
Only one data series can be plotted, making up 100%. They are used to compare the size of the
parts with the whole.
Sales
Sunday
15% Monday
21%
Saturday
13% Tuesday
11%
Friday
9% Wednesday
Thursday 18%
13%
Area Chart
They are used to compare the changes in volume of a data series over time, emphasizing the
amount of change rather than the rate of change.
1200
1000
800
Expenses
600
Sales
400
200
0
ay
y
ay
ay
ay
y
da
da
a
d
sd
id
sd
nd
es
on
r
Fr
tu
ur
ne
Su
Tu
M
Sa
Th
ed
W
Scatter Chart
They are useful, if the data on the X-axis represent uneven intervals of time or increments of
measurement.
700
600
500
Sales
400
Expenses
300
200
100
0
0 2 4 6 8
Spreadsheet (LibreOffice Calc) 85
Components of a Chart
A sample chart and its components is given below :
Chart Title
Gridlines
Sales Record
Plot
Data
Label Legends
Sales
Data
Series
Y-Axis
Title
Y-axis
X-axis
Company
X-axis Title
Now, components of a chart in detail are as follow : 2. Choose Chart option. Chart Wizard
X-axis is a horizontal axis known as category axis. dialog box will appear.
Y-axis is a vertical axis known as value axis.
Data Series is the set of values you want to
plot in the chart.
Chart Area is the total area of the chart.
Legends is a unique color or pattern, which helps
you to identify an individual data series.
Chart Title is the descriptive text aimed at
helping user to identify the chart.
Axis Titles are the titles given to three axis
i.e. X, Y, Z.
3. Select Chart Type as Column, Bar,
Gridlines are horizontal and vertical lines etc., and choose the desired option in
which are inserted in the chart.
Normal. Click on Next button.
Data Label provides additional information
about a data marker. 4. Select a Data Range and click on
Next button.
Creating Chart 5. Change the order of data using Add
Steps to create a chart are as follows : or Remove button. Click on Next
1. Select the data you want to summarise button.
visually and then click on the Insert tab. 6. Choose Title, legend and grid
A context menu will appear. settings and click on Finish button.
86 Course on Computer Concepts (CCC)
AutoSum in LibreOffice Calc can perform Spacebar Toggles row selection, except when
the row is in edit mode.
automatic summation only continuous row or
column range. Herewith, it will search a Ctrl+Spacebar Selects the current column
range to the vertically upwards and to the Shift+Spacebar Selects the current row
horizontally left. Ctrl+O Opens a document
But since, in fact, it just insert the SUM Ctrl+S Saves the current document
function with the range as an argument and Ctrl+N Creates a new document
leaves it open for editing, this function is Ctrl+Shift+N Opens Templates and Documents
often convenient, especially if you prefer to dialog box
work with the mouse. Ctrl+P Prints document
There is icon with the image of the Greek Ctrl+F Activates the Find toolbar
letter sigma (Σ) on the formula bar. Clicking Ctrl+H Opens the Find & Replace dialog box
on this icon activates the AutoSum. Ctrl+Shift+F Searches for the last entered search
Shortcut Keys for LibreOffice Calc term
F1 Starts the LibreOffice Help In the
Shortcut Keys Effect LibreOffice Help: Jumps to main help
Ctrl+X Cuts out the selected elements page
F10 Activates the first menu (File menu)
Ctrl+C Copies the selected items
Shift+F10 Opens the context menu
Ctrl+V Paste from the clipboard
Ctrl+Q Exits application
Ctrl+Alt+Shift+V Paste unformatted text from the
clipboard. The text is pasted using the Ctrl+Home Moves the cursor to the first cell in the
fomat that exists at the insertion point sheet (A1)
Ctrl+Shift+V Opens the Paste Special dialog box Ctrl+End Moves the cursor to the last cell in the
sheet that contains data
Ctrl+A Selects all
Home Moves the cursor to the first cell of the
Ctrl+Z Undoes last action current row.
Ctrl+Y Redoes last action End Moves the cursor to the last cell of the
Ctrl+Shift+Y Repeats last command current row.
Ctrl+I The Italic attribute is applied to the Shift+Home Selects cells from the current cell to
selected area. If the cursor is the first cell of the current row.
positioned in a word, this word is also Shift+End Selects cells from the current cell to
marked in italic. the last cell of the current row.
Ctrl+B The Bold attribute is applied to the Shift+Page Up Selects cells from the current cell up to
selected area. If the cursor is one page in the current column or
positioned in a word, this word is also extends the existing selection one
put in bold. page up.
Ctrl+U The Underlined attribute is applied to Shift+Page Selects cells from the current cell
the selected area. If the cursor is Down down to one page in the current
positioned in a word, this word is also column or extends the existing
underlined. selection one page down.
Spreadsheet (LibreOffice Calc) 87
Model Questions
Multiple Choice Questions
Select the appropriate answer from the choices given below.
1. Calc is a 11. ..........tab is used to insert Media picture,
(a) graphic program (b) word processor etc.
(c) spreadsheet (d) None of the above (a) File (b) Edit (c) Insert (d) View
2. Which one of the following is a 12. A worksheet range refers to
spreadsheet software? (a) a command used for date modeling
(a) Visi Calc (b) Lotus 1-2-3 (b) a range of values such as from 23 to 234
(c) Multiplan (d) All of these (c) a group of cells
(d) a group of worksheets
3. The intersection of row and column forms a
(a) square (b) cell 13. A cell range always has the ......... symbol
(c) oval (d) worksheet between the cell references.
(a) ; (semicolon) (b) .(Full stop)
4. The default file extension of Calc Work
(c) , (comma) (d) : (colon)
book is
(a) .xlr (b) .exe 14. A cell range starting from first row, first
(c) .exl (d) .ods column to fourth row and fifth column
can be represented as
5. New, Open, Save etc are the commands
(a) [A1 : E4] (b) [A0 : E3]
of ............ in LibreOffice Calc .
(c) [E4 : A1] (d) [E3 : A0]
(a) File (b) Review
(c) Insert (d) View 15. Cell address A4 in a formula means it is a
(a) mixed cell reference
6. In Calc, the contents of the active cell are
(b) absolute cell reference
displayed in the
(a) footer bar (b) tool bar (c) relative cell reference
(c) task bar (d) formula bar (d) All of the above
7. Calc documents are stored as files 16. Cell address $A4 in a formula means it is a
called (a) mixed cell reference
(a) workforce (b) worksheets (b) absolute cell reference
(c) worktables (d) workgroups (c) relative cell reference
(d) All of the above
8. Workbook is a collection of
(a) page setup (b) buttons 17. Absolute cell referencing occurs when
(c) diagrams (d) worksheets (a) formula is dragged but the cell references
do not adjust
9. In order to move from one worksheet to (b) spreadsheet is saved with ‘‘absolute’’ as file
another in LibreOffice Calc workbook, name
one should click (c) formula is dragged and the cell reference
(a) Active Cell (b) Scroll bar adjusts automatically
(c) Sheet tab (d) Tab button (d) $ symbol is a automatically added with
10. ............ appears at the bottom of the Calc each cell value
window. 18. Under which tab, the Print Preview
(a) Status bar (b) Name box option is available for printing?
(c) Formula bar (d) Title bar (a) Formulae (b) Data (c) File (d) View
88 Course on Computer Concepts (CCC)
19. Which of the following will you use as an 29. If you type = 2 * (6 − 4) in cell A1, what
option for saving a file? value will be displayed?
(a) Save button on standard toolbar (a) 2 (b) 4 (c) 6 (d) 8
(b) Save option from File menu
30. =COUNT (4, 78, False, 18) will return ....
(c) Pressing Ctrl + S (a) 2 (b) 3 (c) 4 (d) 5
(d) All of the above
31. In Calc charts are created using which tab?
20. Which of the following is not a valid data (a) Insert (b) Format
type in Calc? (c) File (d) Sheet
(a) Number (b) Text
(c) Character (d) Date/ Time 32. A chart is created on the basis of values in
(a) Mail merge (b) database
21. LibreOffice Calc stores dates internally (c) spreadsheet (d) document
as ....... .
(a) Date (b) Text 33. Which of the following charts is used for
(c) Number (d) Date and time comparing the changes in data over a
period of time?
22. To select a single entire column, the (a) Bar chart (b) Area chart
easiest method is to (c) Scatter chart (d) Line chart
(a) double click any cell in the column
(b) drag from the top cell in the column to the
34. Which of the following chart selects only
last cell in the column
one range of the data series?
(a) Line chart (b) Pie chart
(c) click the column heading
(c) Scatter chart (d) Bar chart
(d) click the row heading
35. The another name for the XY chart is
23. The AutoFill feature
(a) Column chart (b) Net chart
(a) Extends a sequential series of data
(c) Bar chart (d) Scatter chart
(b) automatically adds range of cell values
(c) applies a border around selected cells 36. A chart placed in a worksheet is called
(d) None of the above (a) formatting chart (b) embedded chart
(c) aligning chart (d) hanging chart
24. Sorting and filtering provides you
to.........the worksheet data. 37. Which of the following software used to
(a) Formatting (b) Manipulate create Pie chart?
(c) Increase (d) Decrease (a) Browser software
(b) Database software
25. Which allows you display the specific (c) Desktop publishing software
data? (d) Spreadsheet software
(a) Sorting (b) Filtering
(c) Scenario (d) Custom sorting 38. You can place the chart legend in the chart at
(a) bottom (b) corner
26. To combine the range of cells for various (c) top, right and left (d) All of these
calculations ................ operators are used.
(a) Arithmetic (b) Reference 39. .......... is the set of values that you want
(c) Comparison (d) Text concatenation to plot in the chart.
(a) Data series (b) Data label
27. In Calc this is a predefine formula that (c) Chart area (d) Gridlines
performs calculations using specific value
in a particular order. 40. Which of the following shortcut key
(a) Value (b) Data series brings the cursor to the last cell on the
(c) Function (d) Field sheet that contains data?
(a) Ctrl+Home (b) Ctrl+End
28. If cell range A1 : A5 contain the numbers (c) Ctrl+Page down (d) Ctrl+down arrow
20, 16, 5, 36 and 7 then = AVERAGE
(A1 : A5, 50) will display. 41. You can select all cells in a worksheet by
(a) 22. 167 (b) 27. 167 pressing …… shortcut key.
(c) 10 (d) 40 (a) Ctrl+Z (b) Ctrl+A (c) Ctrl+D (d) Ctrl+F
Spreadsheet (LibreOffice Calc) 89
True/False
Identify True/False from the following statements.
42. To create a new worksheet, select 53. Logical functions are performed boolean
worksheet from the Home tab. operations on given data.
43. There is only one worksheet in a spreadsheet. 54. Chart titles are titles given to three axis
44. Row run horizontally in a worksheet. are X,Y,Z.
45. The cell with the black outline is called 55. Legends provide additional information
active cell. about a data marker.
46. Sheet tab is displayed when you split a sheet. 56. Ctrl + U keys using applies or remove
underline.
47. A51 is an example of a cell address.
57. Using the Undo command, you can
48. We cannot setup the page according to correct multiple actions.
user’s need.
58. Delete key remove the cell contents.
49. Text can be formatted in a cell.
59. Page down key move one screen down in
50. Calc worksheet is always in grid format. a worksheet.
51. The default column width is 15 character. 60. Tab moves one screen up in a worksheet.
52. There are six different types of formula 61. AutoSum in LibreOffice Calc represents
operators. by Greek letter sigma (∑).
Answers
1. (c) 2. (d) 3. (b) 4. (d) 5. (a) 6. (d) 7. (b) 8. (d) 9. (c) 10. (a)
11. (c) 12. (c) 13. (d) 14. (a) 15. (c) 16. (c) 17. (a) 18. (c) 19. (d) 20. (c)
21. (c) 22. (c) 23. (a) 24. (b) 25. (b) 26. (b) 27. (c) 28. (a) 29. (b) 30. (b)
31. (a) 32. (c) 33. (d) 34. (b) 35. (d) 36. (b) 37. (d) 38. (d) 39. (a) 40. (b)
41. (b) 42. False 43. False 44. True 45. True 46. False 47. True 48. False 49. True 50. True
51. False 52. False 53. True 54. False 55. False 56. True 57. True 58. True 59. True 60. False
61. True
05
Presentation (LibreOffice Impress)
collection of slides.
Introduction ● A presentation generally has a title
The application software that can create slide, a outline slide and summary
professional looking visual aids is called slide, etc.
presentation graphics software. ● The information can be in the form of
The presentation software is used for creation of text as bulleted points, images or
the slides and to display the information in the animation, i.e., .jpg, .gif, .wav,
form of presentation of slides. Each slide contains .mid, etc.
the information or data that can include text, ● The presenter can control the
Impress, MS-PowerPoint, LibreOffice Impress, etc. slides and handouts, speaker’s notes
Here, we will discuss LibreOffice Impress in this and outlines.
chapter.
Opening a Impress
Basics of Impress Presentation
LibreOffice Impress is most common example of To open Impress in Windows, click
presentation program which is developed by on the Start button ® All Programs
Document Foundation. ® LibreOffice 6.2 ® LibreOffice Impress.
Presentation (LibreOffice Impress) 91
By this, the main window of Impress will open on your screen like the following figure :
Tital Bar Control Buttons
Menu
Standard
Bar
Toolbar
D E M O C R A T I C Formatting
Toolbar
Slide
Pane E D M O R C A T C I
Gmeer Øekeâej
C O N T I N U O U S
Sidebar
O C N T N I U O S U
Status Bar
Editing Text
There are various functions to edit text in
Impress, which are as follows :
Copying and Pasting Text
If user wants to repeat an entire sentence,
user can use the Copy and Paste commands.
To copy the text, follow the given steps :
1. Select the text that you want to copy.
2. Click on Edit tab, click Copy icon or
press Ctrl+C shortkey together or right
click on the selected text and choose the
Copy option.
3. Select a template which you would like 3. Click that place where you want to
to have. paste this text.
4. Click on Open button. 4. Click on the Edit tab, click Paste icon or
press the Ctrl+V shortkey together or
Creating a Blank Presentation right click and choose the Paste option.
Normally, when you open Impress window, Cutting and Pasting Text
Select a Template dialog box will appear. But
To cut a text or an object, simply follow the
if you are working on blank presentation, you
given steps :
have to choose the following steps:
1. Select the text that you want to move.
1. Click on File tab.
2. Click on Edit tab, click Cut icon or
2. From the drop down menu, click on
press Ctrl+X shortkeys together or right
New ® Presentation. Select a Template
click and select the Cut option.
dialog box will appear.
3. Click the place where you want to
3. Click on Cancel button. A new blank
insert this text.
presentation will appear on the Impress
window. 4. Click on the Edit tab, click the Paste
icon or press the Ctrl+V shoutkey
Inserting and Editing together or right click and then choose
the Paste option.
Text on Slides
In Impress, working on text is similar to Undo and Redo Text
LibreOffice Writer. Here, you can place your Undo command is used to erase the last
text either in a text box or a place holder. change done in the document reverting it to
the older state. While redo is the opposite of
Entering Text undo.
On a blank slide of a presentation you can The redo command is used to reverse the
add text, pictures, images, etc. Simply click undo or advances the buffer to a more
in the appropriate text box and type your current state.
text. The text can be formatted like bold,
To undo a change, click Undo option from the
italic, etc.
standard toolbar or press Ctrl + Z shortkey
You can apply design themes on your slides. together.
If you want to add a title in a slide, click in
To redo an action, go to the standard toolbar
the place-holder that displaying ‘Click to add
and select Redo option or press Ctrl + Y
Title’. Similarly, you can also add bulleted
shortkey together.
text on your slide.
94 Course on Computer Concepts (CCC)
Saving a Presentation
To save a presentation, do the following steps :
1. Select Save or Save As command in the
3. Enter the number of rows and
File tab. By this, Save As dialog box will
columns in respective field.
appear.
4. Click OK button.
Presentation (LibreOffice Impress) 95
● Master Notes View To access this view, 2. This dialog box has the following
click on View tab ® Master Notes option. sections :
Master Notes View dialog box will appear. ● Range In this section, user choose all
Right Align
Presentation (LibreOffice Impress) 101
Working with Color and Line Style Adding Headers, Footers and Notes
In a slide, to format line style and change Headers and Footers are respectively printed
color, follow the below steps : on the top and bottom of the slide. They can
1. Select the line which you want to include both text and pictures. e.g. You can
change. add page number, date, company’s logo, title
of presentation, etc., in Header and Footer.
2. Click Format tab ® Object and Shape
option. A context menu will appear. For including Header and Footer in your
3. Select Line. A Line dialog box will presentation, follow the given steps :
appear. 1. Insert tab ® Header and Footer command.
2. By doing so, the Header and Footer
dialog box will appear.
Adding Movie and Sound 3. This dialog box has two tabs Slides,
To enhance the effectiveness of presentation, Notes and Handouts. The Slides tab has
a user can add movie and sound into slides. following options :
It is a very impressive feature of Impress. ● Date and time If user wants to put
To add movie or sound, follow the given steps : date and time in header, click on this
option. By doing so, two radio buttons
1. Click where you want to insert file. will activate. Click on Variable button
2. Choose Insert ® Audio or Video. to automatically update the date and
Insert Audio or Video dialog box will click on Fixed to fix the date.
appear. ● Footer To insert some text in the
19. To insert other objects, select Object 28. Which of the following way is used to
option, from .............. tab. start slide show?
(a) Home (b) View (a) View tab ® Presentation Views group ®
(c) Insert (d) None of these Slide Show
(b) Press F5 Key
20. To insert shapes in your slide, which
option is suitable. (c) Slide Show tab
(a) File tab ® Shape (d) Both (b) and (c)
(b) Insert tab ® Shape 29. To start a slide show, which option is used?
(c) Both (a) and (b) (a) Start from First Slide
(d) Format tab ® Effects (b) Start from Current Slide
21. To ………… an object, drag one of the (c) Custom Slide Show
object’s handles in the direction which (d) All of the above
you want. 30. Special effects used to introduce slides in
(a) Resize (b) Reshape a presentation are called
(c) Both (a) and (b) (d) None of these (a) effects
22. ……… is a slide that is used as the (b) custom animations
starting point for other slides. (c) transitions
(a) Slide Master (d) present animations
(b) Slide Sorter 31. Under which tab, Slide Transition option
(c) Slide Notes is available?
(d) Slide Handouts (a) View (b) Tools
23. Which Impress view displays miniature (c) Format (d) Insert
version of slides are arranged on the 32. In Advance Slide section, which option(s)
screen and is useful reorder them and are available?
see more slides at one time? (a) On mouse click (b) Automatically after
(a) Slide Sorter (b) Slide Show (c) Both (a) and (b) (d) None of these
(c) Slide Master (d) Notes Page
33. To change the font style or color of a text
24. Outlining tools are used in typed on a slide, is known as
(a) Slide master view (a) Enhancing (b) Text Formatting
(b) Slide Show view (c) Text Editing (d) None of these
(c) Notes Page view
(d) Slide Sorter view 34. For aligning the text, Impress provides
which options?
25. What is the shortcut key to start the (a) Left (b) Right
LibreOffice Impress presentation from (c) Both (a) and (b) (d) Top
the beginning?
(a) F8 (b) F5 35. Which tab includes the Object and Shape
(c) F11 (d) F10 option that opens Line dialog box?
(a) View (b) Format (c) Tools (d) Home
26. To open Slide Show Settings dialog box,
which tab is used? 36. To enhance the effectiveness of
(a) View (b) Animation presentation, a user can add …………
(c) Slide Show (d) Insert into slides.
(a) Movie (b) Sound
27. Slide Show Settings dialog box contains (c) Images (d) All of these
options as
(a) Range 37. ………… are respectively printed on the
(b) Presentation Mode top of the slide.
(c) Options (a) Footers (b) Headers
(d) All of the above (c) Logo (d) Top Heading
Presentation (LibreOffice Impress) 105
38. Header and Footer include 41. To open the Find & Replace dialog box,
(a) text (b) picture press ……… key.
(c) data and time (d) All of these (a) Ctrl + A (b) Ctrl + H
(c) Both (a) and (b) (d) Ctrl + L
39. In Print dialog box, which section is used
to enter number of copies of slides? 42. To close presentation, press ...... key.
(a) Printer (b) Print (a) Ctrl + M (b) Ctrl + W
(c) Range and Copies (c) Ctrl + H (d) All of these
(d) Print what
43. To select one hyperlink after another
40. Which of the following shortcut keys are during a slide presentation, what do you
used to print slides? press?
(a) Ctrl + P (b) Shift + P (a) Tab (b) Ctrl + K
(c) Ctrl + Shift + P (d) Alt + P (c) Ctrl + H (d) All of these
True/False
Identify True/False from the following statements.
44. All pages of a Impress presentation is 50. In Impress, each slide has placeholder for
also called a slide. the title of the slide.
45. Speaker notes cannot be used for future 51. Video clips and Audio cannot be added to
reference. the slide.
46. To print the slides of a presentation is 52. Left part of slide has one tab sheet
called Handout. Slides.
47. You can create your own animation and 53. Slide Show view is completely filled by a
add to the slide. single slide.
48. Impress cannot be started from Start 54. When we click the Print button, can
button. choose exactly, which items to print.
49. If you want to save the presentation file 55. Slide transitions are animation like effects.
with different name, you can use Save As
button. 56. User cannot set a time for each slide.
Answers
1. (a) 2. (d) 3. (d) 4. (c) 5. (c) 6. (d) 7. (b) 8. (b) 9. (d) 10. (d)
11. (b) 12. (c) 13. (a) 14. (a) 15. (c) 16. (a) 17. (d) 18. (a) 19. (c) 20. (b)
21. (c) 22. (a) 23. (a) 24. (a) 25. (b) 26. (c) 27. (d) 28. (d) 29. (d) 30. (c)
31. (a) 32. (c) 33. (b) 34. (c) 35. (b) 36. (d) 37. (b) 38. (d) 39. (c) 40. (a)
41. (b) 42. (b) 43. (b) 44. True 45. False 46. True 47. True 48. False 49. True 50. True
51. False 52. True 53. True 54. False 55. True 56. False
06
Introduction to
Internet and WWW
media. E-mailing, instant messaging and web
Objective of the Chapter pages all are dependent on communication
This chapter includes Basics of Computer Networks, that take place across an underlying
Network Topology, Internet, World Wide Web. ISP computer network.
and Role of ISP, Internet Protocol, Popular Web
Browsers, Popular Search Engines, Downloading Benefits of Computer Network
Web Pages, Printing Web Pages etc.
(Networking)
Computer network is very useful in modern
Introduction environment. Some of the benefits of network
The vast network of computers that connects are discussed here :
millions of people all over the world is called
Internet. Internet is a global computer 1. Data and File Sharing Networking of
network providing a variety of information computer helps the users to share data
and communication facilities, consisting of and files.
interconnected networks using standardized 2. Hardware Sharing Users can share
communication protocols. devices such as printers, scanners,
CD-ROM drives, hard drives, etc.
WWW (World Wide Web) is the most
important resource of Internet on which 3. Storage Capacity Users can access
information in bulk for each subject is files and multimedia, such as images
provided. It consists of all the public websites and music, which you store remotely on
connected to the Internet world wide, other machines or network attached
including the client devices (computers, cell storage devices.
phones, etc) that access web content. 4. Application Sharing Applications can
be shared over the network and this
Basics of Computer Network allows implementation of client/server
applications.
A computer network is a collection of two or
more computers which are connected together Components of Computer
to share information and resources. It is a
combination of hardware and software that Network
allows communication between computers Network components are those major parts
over a network. that are needed to install a network. Before
The computers may be connected via any that understand how data is transmitted on a
data communication link, like wires, cables, network, it is important to know various
satellite links and other communication components that compose a network.
Introduction to Internet and WWW 107
Tree Topology
HUB This is a network topology in which nodes
Node 5 Node 4 are arranged as a tree. The function of
the central node in this topology may be
distributed. Its basic structure is like an
inverted tree, where the root acts as a
Star Topology server.
It is least affected by additional/removal of a The tree topology simulates hierarchical
node. flow of data.
Introduction to Internet and WWW 109
It allows more devices to be attached to a kbits circuits. The goal of this project was to
single hub. connect computers at different universities
Server and US defence.
In mid 80s another federal agency,
the National Science Foundation, created a
new high capacity network called NSFnet,
which was more capable than ARPANET.
The only drawback of NSFnet was that it
allowed only academic research on its
network and not any kind of private
business on it.
Tree Topology
So, private organisations and people started
working to build their own networks, which
Internet were later interconnected with ARPANET
International and Network are those two and NSFnet to form the Internet.
terms that are combined to make a single
term Internet. It is a ‘network of networks’ World Wide Web (WWW)
that connects millions of computers together WWW was introduced on 13th March, 1989.
globally forming a network in which any The world wide web is a system of Internet
computer can communicate with any other servers that supports hypertext and
computer as long and they both are connected multimedia to access several Internet
to the Internet. protocols on single interface.
The world wide web is often abbreviated as
the web or WWW. The world wide web is a
way of exchanging information between
computers on the Internet, try to tie them
together into a vast collection of interactive
multimedia resources.
The world wide web (web) is only a portion of
what makes up the Internet, but it is the
Internet fastest growing part of the Internet. The web
Internet uses the TCP/IP (Transmission lets people, organisations and companies
Control Protocol/Internet Protocol) to serve publish information for other people to see.
billions of users world wide. So, TCP/IP can
be called as backbone of Internet. Web Page
The backbone of the world wide web is made
The Internet is a huge ocean of information
of files, called pages or web pages, containing
of resources and services such as interlinked
information and links to resources both text
hypertext documents of World Wide Web
and multimedia throughout the Internet. It is
(WWW), online chatting, online banking, file
created using HTML (HyperText Markup
transfer and sharing, online gathering, online
Language).
education and so on.
The web is a collection of large number of
History of Internet computer documents or web pages that are
In 1969, the University of California stored on computers around the world and
at Los Angeles, the University of Utah are connected to one another using
and some other universities were connected hyperlinks. These web pages can be seen by
as the beginning of the ARPANET (Advanced anyone through a web browser. To reload a
Research Projects Agency Network) using 50 webpage, press Refresh button.
110 Course on Computer Concepts (CCC)
Website e.g.
http://www.google.com/services/index.htm
A group of web pages that follow the same theme
and are connected together with hyperlinks is Here, http:// - protocol identifier
called a website. In other words, “A website is a www - World Wide Web
collection of digital documents, primarily HTML google.com - domain name
files, that are linked together and that exist on /services/ - directory
the Internet under the same domain”. index.htm - web page
Websites and web pages are written in a coding
language that makes it possible to add pictures,
Domain Name
sound and interactivity to plain old text, making Domain is a group of network resources
people’s reading experience more exciting. assigned to a group of users. A domain
The very first page of a website is called home name is a way to identify and locate
page of that website. computers connected to the Internet. A
domain name must be unique and always
e.g. http://www.carwale.com is a website while has two or more parts, separated by
http://www.carwale.com/new/ is a web page. periods dot(.)
e.g. google.com, yahoo.com, etc.
Web Server
It is a computer program that serves requested Domain Abbreviation
HTML pages or files. A web client is the Domains are organised by the type of
requesting program associated with the user. The organisations and by country. A
web browser is a client that request HTML files three-letter abbreviation indicating the
from web servers. The server computer delivers organisation and usually two-letter
those web pages to the client computers that are abbreviation indicating the country name.
requested. Every web server that is connected to Most common domain abbreviations for
the Internet is given a unique address i.e. IP organisations are :
address made up of a series of four numbers .info - Informational organisation
between 0 to 255 separated by periods(.).
.com - Commercial
e.g. 68.178.157.132 or 68.122.35.127.
.gov - Government
Web Address/URL .edu - Education
A web address identifies the location of a specific .mil - Military
web page on the Internet, such as .net - Network resources
http://www.learnyoga.com. On the web, web .org - Usually non-profitable
addresses are called URLs. URL stands for organisation
Uniform Resource Locator. It is the web address Some domain abbreviations for country are :
for a website or a web page. The basic purpose of .in - India
URL is to locate IP address. .au - Australia
The URL specifies the Internet address of a file .fr - France
stored on a host computer connected to the .nz - New Zealand
Internet. The URL contains the name of the .uk - United Kingdom
protocol to be used to access the file resource, a
domain name that identifies a specific computer Domain Name System (DNS)
on the Internet and a pathname, with It stores and associates many types
hierarchical description that specifies the location of information with domain names.
of a file in that computer. It translates domain names (computers
➥
host names) to IP addresses. It also lists
Note Tim Berners Lee created the first URL in 1994
to allow the publishing of hyperlinks on the world mail exchange servers accepting E-mail
wide web. for each domain.
Introduction to Internet and WWW 111
(iv) Broadband over Power Line (BPL) It would operate similar to Wi-Fi but at
is the delivery of broadband over the higher speed, over greater distances and
existing low and medium voltage for a greater number of users. WiMAX has
electric power distribution network. the ability to provide service even in areas
BPL speeds are comparable to DSL and that are difficult for wired infrastructure
cable modem speeds. BPLs can be to reach and the ability to overcome the
provided to homes using existing physical limitations of traditional wired
electrical connections and outlets. BPL infrastructure.
is good for areas, where there are no
other broadband connections, but power Other Mode of Connecting Internet
infrastructure exists, e.g. rural areas. LAN Cable
Wireless Connection It refers to the cables for carrying data in
computer networking. There are two main
Wireless broadband can connect a home or
types of LAN cable. One is the standard
business to the Internet using a radio link
straight through cable usually known as
between the customer’s location and the
Ethernet patch cable, which is used for
service provider’s facility. Wireless broadband
connecting computers to routers or switches.
can be mobile or fixed. Unlike DSL and cable,
wireless broadband requires neither a modem The other type is a crossover cable, which is
nor cables and as a result it can be easily used for connecting two computers directly
established in areas, where it is not feasible without routers, switches or hubs. As for
to deploy DSL or cable. straight through vs crossover cable, they use
different wiring standards in the connectors
Some ways to connect the Internet wirelessly
of the two ends. The two connectors of
are as follows :
straight through type use the same wiring
(i) Wireless Fidelity (Wi-Fi) It is a standards. either T568A or T568B. While
universal wireless networking technology connectors of crossover adopt different
that utilises radio frequencies to transfer standards, one connector uses T568A and the
data. Wi-Fi allows high speed Internet other one uses T568B.
connections without the use of cables or
wires. Wi-Fi networks can be designed for USB Tethering
private access within a home or business Tethering is the process of sharing your
or be used for public Internet access at phone’s mobile data to access the Internet on
hotspots such as restaurants, coffee other devices, like a laptop. USB tethering is
shops, hotels, airports, convention centers a simple application that shares Internet
and city parks. connection from your smartphone to your
computer through USB connection. It is the
Hotspot fastest and most effective way to share your
phone’s mobile data with other devices.
It is physical location where people can access
the Internet, typically using Wi-Fi, via a Wireless How to Setup USB Tethering?
Local Area Nework (WLAN) with a router Steps to setup USB tethering on Android
connected to an Internet service provider. device are as follows :
1. Open settings® Network & Internet ®
(ii) Worldwide Interoperability for
Hotspot & Tethering.
Microwave Access (WiMAX) It is one of
the popular broadband wireless techno- 2. Tap the USB Tethering option. The
logies around today. WiMAX systems are Hotspot & Tethering warning will
expected to deliver broadband access appear, informing you that continuing
services to residential and enterprise will interrupt any existing data transfer
customers in an economical way. WiMAX between your phone and PC.
is based on wireless MAX technology. It 3. Click OK to proceed.
114 Course on Computer Concepts (CCC)
Model Questions
Multiple Choice Questions
Select the appropriate answer the choices given below.
1. The vast network of computers that 10. What is the central device in star
connects millions of people all over the topology?
world is called (a) STP server (b) Hub/Switch
(a) LAN (b) Web (c) PDC (d) Router
(c) HyperText (d) Internet
11. Which of the following topology, is least
2. Two or more computers connected to each affected by addition/removal of a node?
other for sharing information form a (a) Ring (b) Star
(a) network (b) router (c) Bus (d) Net
(c) server (d) tunnel
12. The …… topology simulates hierarchical
3. Computer network is flow of data.
(a) collection of hardware components and (a) Star (b) Ring
computers (c) Tree (d) Mesh
(b) interconnected by communication channels
13. …… allows more devices to be attached
(c) sharing of resources and information
to a single hub.
(d) All of the above (a) Star topology (b) Ring topology
4. The hardwares that are available to a (c) Tree topology (d) Mesh topology
computer on a particular network are 14. It is a network of networks that connects
known as…………. millions of computers.
(a) resources (b) clients
(a) LAN (b) MAN
(b) servers (d) protocols
(c) Internet (d) Network
5. The advantage of a LAN is 15. ARPANET stands for
(a) sharing peripherals
(a) Advance Research Project Agent Networks
(b) backing up your data
(b) Advance Research Project Agency Nodes
(c) saving all your data
(c) Actual Research Project Agency Networks
(d) accessing the web
(d) Advanced Research Projects Agency
6. Cable TV network is an example of Network
(a) LAN (b) MAN (c) WAN (d) PAN
16. The first computer network of the world is
7. Which type of network would use phone (a) iNet (b) NSFnet
lines? (c) ARPANET (d) Vnet
(a) WAN (b) LAN (c) WWAN (d) Wireless
17. The WWW is made up of the set of
8. Geometric arrangement of devices on the interconnected …… that are linked
network is called together over the Internet.
(a) topology (b) protocols (a) Electronic documents
(c) media (d) LAN (b) Web pages
(c) Files
9. Network components are connected to the (d) All of the above
same cable in the …… topology.
(a) Star (b) Ring 18. Web page is created using language
(c) Bus (d) Mesh (b) XML (b) Java (c) C (d) HTML
120 Course on Computer Concepts (CCC)
22. ............ is the Web address for a website 31. DSL is an example of which connection?
(a) Network (b) Wireless
or a web page.
(c) Slow (d) Broadband
(a) Domain name
(b) E-mail account 32. Which of the following allows high speed
(c) Home page Internet connections without use of
(d) URL cables or wires?
(a) Wireless Fidelity (Wi-Fi)
23. The basic purpose of URL is to locate
(b) Fiber optic
(a) web server (b) IP address
(c) Cable modem
(c) web page (d) node
(d) Dial-up connection
24. An educational institution would
generally have the following in its 33. Standard straight through cable is used
domain name. for connecting computers with
(a) .org (b) .edu (a) router (b) switch
(c) .inst (d) .com (c) hub (d) All of these
25. Which is not the communication feature 34. ………… is the process of sharing your
of Internet? phone’s mobile data to access the
(a) E-mail (b) Newsgroup Internet on other devices like laptop.
(c) Chat (d) Designing (a) Protocol (b) Tethering
(c) Browser (d) Topology
26. Video conferencing is use for
(a) talking each other 35. A set of rules is called
(b) communicating purpose (a) resource (b) protocol
(c) live conversation (c) server (d) client
(d) All of the above 36. Which protocol allows different
27. .............. includes sharing business computers to communicate by creating a
information, maintaining business network of networks?
relationship and conducting business (a) TCP (b) FTP (c) IP (d) SMTP
transaction by means of tele
communication networks. 37. Which of the following protocol allows
(a) E-commerce delivery of voice communication over IP
(b) E-marketing
network?
(c) E-procurement (a) VoIP (b) FTP (c) TCP/IP (d) PPP
(d) E-business 38. ………… address is a logical numeric
28. Which of the following website is not address that is assigned to every single
used for job search? computer or device.
(a) Monster. com (b) Recruitment. com (a) MAC (b) IP
(c) Naukri.com (d) MySpace (c) IMEI (d) None of these
Introduction to Internet and WWW 121
39. Versions of IP (Internet Protocol) is /are 48. Which of the following is developed by
(a) IPv4 (b) IPv6 Apple incorporation?
(c) Both (a) and (b) (d) None of these (a) Lynx (b) Opera
(c) Safari (d) Mozilla
40. Which of the following is a 6-byte address
that allows NIC to be uniquely identified 49. Which of the following is a text based
on the network? web browser?
(a) MAC (b) IP (a) Opera (b) Lynx
(c) IMEI (d) TCP (c) Safari (d) Mozilla firefox
41. Which command is used to find MAC 50. A website that provides the required data
address of computer? on specific topics
(a) ipconfig/MAC/all (b) ipconfig /all (a) domain (d) e-mail client
(c) ipconfig/mac (d) ipconfig (c) modem (d) search engine
42. Full form of IMEI 51. Which of the following is a search engine?
(a) International Mobile Equipment Identity (a) Macromedia Flash
(b) International Mobile Equipment Identifier. (b) Google
(c) International Mobile Equipment (c) Netscape
Identification (d) Librarian’s index to the index
(d) International Message Equipment Identifier
52. There are numerous websites, which
43. How to find IMEI number on any phone? provide search facility for searching the
(a) *#04# (b) *#06# contents on
(c) *#06#* (d) #06# (a) Internet (b) website
(c) web page (d) LAN
44. A web browser is a software application
for accessing information on the 53. .............. is the process of saving some
(a) WWW (b) website data from Internet to your own computer.
(c) web page (d) URL (a) Conferencing (b) Downloading
(c) Uploading (d) None of these
45. A browser is
(a) the program to connect to Internet 54. By default, web pages are saved in the
(b) the program to create websites ………… folder.
(c) the program used to view sites on web (a) Download (b) Document
(d) All of the above (c) Picture (d) Music
46. Which of the following terms is used as a 55. Which of the following command is used
browser? to print a web page?
(a) Netscape (b) WWW (a) File (b) Edit
(c) Launcher (d) E-mail (c) Both (a) and (b) (d) Insert
47. Which of the following is based on first 56. To print the web pages, which of the
web browser software Mosaic? following shortcut key can be used?
(a) Opera (b) Netscape Navigator (a) Ctrl + P (b) Ctrl + V
(c) Internet Explorer (d) Google Chrome (c) Ctrl + C (d) Ctrl + S
122 Course on Computer Concepts (CCC)
True/False
Identify True /False from the following statements.
57. Networking of computer helps the users 65. Chatting is widely interactive text based
to share data. communication process that takes place
over the Internet.
58. LAN stands for Large Area Network.
66. A browser display a web page, but does
59. Internet uses the communication protocol not interprets its HTML code.
TCP/IP.
67. The process of using browser to view
60. WWW was introduced on 13th March, information on the Internet is known as
1869. surfing.
61. To reload a web page, press Refresh 68. Internet Explorer was developed by
button. Kansas University of USA.
62. The first page of a website is called home 69. The most popular social networking site
page. is Mozilla Firefox.
70. Dogpile is a search engine that fetches
63. Web server is a computer program that
results from Hotbot.
serves requested XML page.
71. Lycos is a famous web browser.
64. Address bar displays the URL of current
web page. 72. Web crawler is also called web spider or
spider.
Answers
1. (d) 2. (a) 3. (d) 4. (a) 5. (a) 6. (b) 7. (a) 8. (a) 9. (c) 10. (b)
11. (b) 12. (c) 13. (c) 14. (c) 15. (d) 16. (c) 17. (b) 18. (d) 19. (b) 20. (b)
21. (a) 22. (d) 23. (b) 24. (b) 25. (d) 26. (d) 27. (a) 28. (d) 29. (c) 30. (c)
31. (d) 32. (a) 33. (d) 34. (b) 35. (b) 36. (c) 37. (a) 38. (b) 39. (c) 40. (a)
41. (b) 42. (a) 43. (b) 44. (a) 45. (d) 46. (a) 47. (c) 48. (c) 49. (b) 50. (d)
51. (b) 52. (a) 53. (b) 54. (b) 55. (a) 56. (a) 57. True 58. False 59. True 60. False
61. True 62. True 63. False 64. True 65. True 66. False 67. True 68. False 69. False 70. False
71. False 72. True
07
E-Mail, Social Networking
and E-Governance Services
E-mails are routed to different E-mail
Objective of the Chapter accounts through E-mail server. E-mail
This chapter includes Structure of E-mail, Using servers accept, forward, deliver and store
E-mails, Social Networking, Introduction to Blogs, messages.
E-Commerce, Netiquettes, E-Governance,
E-mail may be defined as a system of world
Accessing E-Governance Services on Mobile using
UMANG App, Digital Locker. wide electronic communication in which a
computer user can compose a message at one
terminal that can be regenerated at the
Introduction recipient’s terminal when the recipient Login.
E-mail is a method of sending messages, Users can also read their E-mails offline.
data, video, voice and graphics over digital E-mails allow users to communicate with
communication link such as the Internet. each other in less time and at nominal cost
An E-mail message consists of three as compared to traditional phone or mail
components : Message envelope, Message services. There are many software platforms
header and Message body. Social networking available for sending and receiving E-mails.
is the use of internet-based social media
programs to make connections with friends, Advantages of E-Mail
family, classmates, customers and clients. 1. The delivery of messages is very fast.
Social networking can be done for both social 2. The cost of E-mailing is almost free as
and business purposes. E-Governance refers it involves negligible amount of
to the use of information technologies (such as telephone and Internet Service Provider
Internet and mobile computing) by government (ISP) charges.
agencies. 3. Multiple copies of the same message can
These technologies have the ability to be sent to a group of people at the same
transform relations with citizens, business time and can be sent as easily to a
and other arms of government. single person.
4. Pictures, documents and other files can
What is an E-Mail? also be attached to messages.
Sending some messages like letters to other
people through a network is called E-mail. Disadvantages of E-Mail
Electronic mail can be defined as a system 1. Viruses attached with an E-mail could
for sending and receiving messages seriously affect recipient’s computer.
electronically over a computer network. 2. E-mails cannot really be used for official
Today’s E-mail systems are based on a business documents. They may be lost
store-and-forward model. and you cannot find them.
124 Course on Computer Concepts (CCC)
3. E-mails may be intercepted by hackers The content of the E-mail can be varied
as E-mail, before it is delivered to the according to the different E-mail systems
recipient, ‘bounces’ between servers used by each user.
located in different parts of the world.
4. If an E-mail is too long or not drafted E-mail Addressing
properly by the sender, the reader may An E-mail address is composed of two
lose interest to read the mail till the end. separate parts :
1. Your personal identity or account name
Structure of an E-mail (user name) on that mail server.
There is a standard structure of an E-mail 2. The domain name of the mail server
whose parts are described below : computer on which you have an E-mail
1. Header account.
An E-mail address is generally of the form
The E-mail header gives us information about username@domain name. Some examples of
the message such as unique identity of the E-mail address are – [email protected],
message. The E-mail header consists of the [email protected], etc.
following parts :
In E-mail address, symbol ‘@’ is used as an
I. Subject It is a description of the topic
separator. It separates your account name
of the message and displays in most and mail server name.
E-mail systems that list E-mail message
individually. Applications or Using of an
II. Sender (From) This field specifies the
sender’s E-mail address. Usually, it will
E-mail
be the ‘reply to’ address. There are many applications to use of an
E-mail as follows :
III. Date and Time Received (on) This is
the date and time message received. Opening an E-mail Account
IV. Reply to This field describes the E-mail There are various web-portals (websites),
address that will become the recipients which allow you to create free E-mail
of the reply to the particular E-mail. account. e.g. www.gmail.com,
When you reply, it will go to this E-mail www.yahoo.com, www.hotmail.com,
address despite the sender E-mail www.rediffmail.com, www.msn.com, etc.
address. Some steps for opening an E-mail account are
V. Recipient (To) This is the first/last as follows :
name of E-mail recipient as configured 1. Enter the URL address as www.gmail.
by the sender. com. Gmail Homepage will appear.
VI. Recipient E-mail Address The E-mail
address of the recipient is specified here.
VII. Attachments Some E-mails could be
attached with files such as text, image,
audio, video etc. These files are
specified here.
2. Body
The actual content is stored in this part.
This will be in the format of text. This field
could also include signatures or text
generated automatically by the sender’s
E-mail system.
E-Mail, Social Networking and E-Governance Services 125
Delete Items When an E-mail is deleted, it ● Bcc (Blind carbon copy) This is Cc, except
is automatically sent to the trash. Items in that the recipient does not see the list of
your Trash will remain there for people in the Bcc field.
approximately 30 days before it is ● Signature This is one of the basic elements
automatically emptied and permanently of an E-mail message. By this, you are often
deleted. able to set a signature, meaning a few lines
of text which will be added to the end of the
Creating and Sending a New document.
E-mail
After login, if a user wants to create an
Replying to an E-mail Message
E-mail click on COMPOSE button and New For replying to an E-mail message, follow
Message window will display on the screen. these steps :
1. Open the E-mail which you have to answer.
2. Click on Reply option.
3. Click on Reply to all option for answering
the all recipients of To and Cc boxes.
Forwarding an E-mail Message
To forward an E-mail message, follow these
steps :
1. Open the E-mail which a user wants to
forward.
2. Click on Forward option.
3. Enter the names of the recipients in To,
In this window, To text box carries the Cc and Bcc boxes.
E-mail address of the recipient, Subject 4. Click on Send button.
carries the heading for E-mail or subject of
the E-mail and the whole body of text Forward is used to send a copy of received
matter comes within the Body option. E-mail to someone else.
For sending an E-mail, click on Send Searching E-mails
button. E-mail delivers to the recipient’s end To search an E-mail, follow these steps :
instantly. 1. Firstly, enter the sender’s name, subject
Instead of this, if a user wants to send a file of the E-mail, etc on the top of the text
(.doc, .pdf, .jpg, etc.) then click on Attach box for that E-mail which a user wants to
files for the attachment of files. search.
There are various options which are 2. Click on Search button.
accessible within an E-mail like Text 3. After this, the list of the E-mails will
Formatting, Cc (Carbon Copy), Bcc (Blind display according to the searching action.
Carbon Copy) etc.
Sending Documents by E-mail/
Some of these are as follows :
● Cc (Carbon copy) This allows an E-mail
Attaching Files with E-mail
The files which are stored in computer can be
to be send to a large number of people by
sent through E-mail. With the help of Attach
writing their respective addresses
files option in New Message window, user can
separated by commas.
send .doc, .pdf and .jpg file.
E-Mail, Social Networking and E-Governance Services 127
Social Networking
E-mail Message Window Social network is a way of making internet
based connections. People use social
4. To attach any soft copy, click on Attach networking sites to connect with their family,
files button ( ) and the Open dialog box friends, colleagues etc. Using these sites, they
will display on the screen. can share their information and ideas with
5. Select the file which you want to attach. the persons they want to connect.
After selecting the file, click on Open Through the social networking, we come to
button. know what is happening in all around the
world and we also can give our reaction
about it.
Introduction to Blogs
A blog is a website or a web page, in which
an individual records opinion links to other
sites on regular basis. A blog content is
written frequently and added in a
chronological order. It is written online
and visible to everyone.
4. Above page shows different fields such as
A typical blog combines text, images and E-mail Address, Username, Password etc.
links to other blogs, web pages and other
● E-mail Address WordPress will sent an
media related to its topic. In education,
blogs can be used as instructional activation link to your E-mail id after
resources. These blogs are referred to as clicking on Create Blog button. So,
edublogs. The entries of blog are also provide a valid E-mail address.
● Username This name will manage your
known as posts.
blog.
A person who writes a blog or a weblog is
● Password You must use strong
known as blogger. Blogging is the act of
posting content on a blog. There are some password for securing purpose. You can
popular websites which offer blog service use uppercase and lowercase letter with
as follows : numbers and special symbols.
● Blog Address This address is used by
● Joomla ● WordPress.com
● Drupal ● Blogger
viewer to view your blog.
● Language Here, you can choose language
● Tumblr ● Weebly
in which you want to write a blog.
130 Course on Computer Concepts (CCC)
● Do not troll people in web forums or website information accumulation for citizens and
comments by repeatedly nagging or annoying businesses.
them. ● It empowers people to gather information
The ministry of railway has setup the IRCTC 6. Individual Registration page will appear,
for transferring all responsibility for tourism
and catering to this new corporation. This
has been done to ensure professionalism and
upgradation of service through private–public
collaborations.
To book the ticket on IRCTC, follow the given
steps :
1. Open the IRCTC site by www.irctc.co.in
address. The home page of IRCTC will
appear on the screen.
10. Travelling Passengers page will be date of birth, the date of issue, date of expiry,
appear as shown below. passport number, photo and signature.
Follow the below steps to apply for passport
online:
1. Go to the Passport Seva Website and
click on Register now.
● Internet banking
As of September 2016, 46 hospitals covering The application will enable users to access
478 departments are providing this service. e-Government services from the central
government, the state government, local
bodies and their agencies.
UMANG App Key Features
UMANG App key features are as follows :
● It brings together all government
departments and their services on a single
platform to provide better and easier
E-Hospital (ORS) services to citizens.
● It provides seamless integration with
How to Book an Appointment Using
other digital India services like Aadhaar,
E-Hospital Portal? Digilocker, PayGov, etc.
1. The portal helps in booking ● It is designed to enable citizens to
appointments through online mode in discover, download, access and use all
different hospitals across various government services easily.
departments. One can book an ● It supports Aadhaar based and other
appointment.
authentication mechanisms for service
2. By using e-Know Your Customer (eKYC) access.
data of Aadhaar number, if the patient’s ● The sensitive profile data is saved in
mobile number is registered with the encrypted format and no one can view this
Unique Indentification Authority of information.
India (UIDAI).
3. If the mobile number of the patient is not How to use UMANG App?
registered with UIDAI, the portal uses Follow the below steps to use UMANG App
patient’s name. on your mobile :
4. Any new patient who is enrolling for the 1. Download UMANG App from Google
first time in the portal will get a Unique Play Store or Apple App Store.
Health Identification (UHID) number. 2. Create your profile by providing
5. In case if the Aadhaar number is already personal details such as name, mobile
linked with UHID number, then a new number, age, etc. There is also an
appointment number will be generated option to upload a profile photo.
and the UHID number will remain the 3. You can also link your Aadhaar
same. number to the app and other social
media accounts.
Accessing E-Governance Services 4. After profile creation, you can log in
on Mobile Using UMANG App and go to the sort and filter section to
Unified Mobile Application for New-age browse through the services and
Governance (UMANG) has been developed by categories.
National e-Governance Division (NeGD) and 5. Go to the search option to look for
Ministry of Electronics and Information particular services.
Technology (Meity) with the aim of driving
mobile governance in India. UMANG app is a Digital Locker/DigiLocker
unified application that can be used to avail a Prime Minister Narendra Modi on 1st July,
number of pan India e-Government Services 2015 launched digital locker facility to help
such as filing income tax, making Aadhaar citizens to digitally store their important
and provident fund queries, booking a gas documents like PAN card, passport, mark
cylinder, passport seva, among others. sheets and degree certificates.
E-Mail, Social Networking and E-Governance Services 135
With the help of this portal, the sharing of the How to use DigiLocker?
e-documents will be done through registered To use DigiLocker, follow the below steps :
repositories thereby ensuring the authenticity of
the documents online. 1. Go to DigiLocker website or
download DigiLocker app on your
On the other hand, organisations like the CBSE, phone. Using Aadhaar number and
Registrar office or Income Tax department can mobile number. You can create a
also push electronic copies of documents and user ID using an OTP. (One Time
certificates directly into your E-lockers.
Password)
2. If some organisation has
uploadedany of your e-document, you
can see it in the account. You can
also upload your own documents and
e-sign.
3. You also get the facility of sharing
documents with others by sharing a
Digilocker link to the e-document.
Model Questions
Multiple Choice Questions
Select the appropriate answer from choices given below.
1. Sending some messages like letter to 6. In E-mail, …… gives us information
other people through a network is called about the message such as unique
(a) E-mail (b) FTP identity of the message.
(c) Browsing (d) None of these (a) Subject (b) Header
(c) Body (d) Attachment
2. E-mails are routed to different E-mail
accounts through 7. Which of following is not an example of
(a) web server (b) E-mail server E-mail account?
(c) browser (d) None of these (a) www. gmail.com (b) www. msn.com
(c) www. yahoo.com (d) www. altavista. com
3. ............. attached with an E-mail could
seriously affect your computer. 8. The contents of ............. will display first
(a) Message (b) Virus which means that the list of received
(c) Worm (d) Trojan horse mails will appear.
(a) Inbox folder
4. An E-mail address is made up of ………
(b) Outbox folder
parts joined by an ‘@’ sign.
(c) Sent items folder
(a) Two (b) Three
(d) Delete items folder
(c) Four (d) None of these
5. Which of the following domain is used for 9. Your half finished messages are stored in
non-profit organisation? (a) Inbox (b) Outbox
(c) Drafts (d) None of these
(a) .com (b) .edu (c) .mil (d) .org
136 Course on Computer Concepts (CCC)
10. Which of the following folders are used to 21. WhatsApp was founded in 2009 by
keep E-mail messages sent but not deleted? (a) Mark Zuckerberg
(a) Inbox (b) Outbox (b) Steve Jobs
(c) Sent Items (d) Deleted (c) Brian Acton and Jan Kaum
11. Which of the following is one of the basic (d) Mark Zuckerberg and Steve Jobs
elements of an E-mail message? 22. Which instant messenger is cloud based
(a) Header (b) Message and claims that is prioritises security and
(c) Footer (d) Signature speed?
12. If user wants to reply to all the recipients (a) Telegram (b) Facebook
then he will click on (c) WhatsApp (d) Twitter
(a) Reply (b) All Reply 23. A/An …… is a website in which an
(c) Reply to all (d) None of these individual records opinion links to other
13. Which button (followed by Send) is used sites on regular basis.
to send a copy of received E-mail to (a) Blog (b) Message
someone else? (c) Memo (d) Advice
(a) Forward (b) Reply (c) Back (d) Reply All 24. A person who writes a blog or a weblog is
14. An E-mail …… is a block of text known as …… .
appended to the end of an E-mail (a) Blogs (b) Blogger
message which often contains the (c) Messenger (d) Writer
sender’s name and contact information. 25. Which of the following is a website which
(a) Header (b) Signature offer blog service?
(c) Attachment (d) Body (a) Joomla (b) WordPress
15. Which of the following is a way of (c) Drupal (d) All of these
making Internet based connections? 26. It is a buying and selling of goods and
(a) E-Commerce (b) Blog services on the Internet.
(c) E-Governance (d) Social Network (a) E-Commerce (b) E-Business
16. Which of the following is not a social (c) E-Governance (d) E-Service
networking site? 27. Which of the following describes
(a) Facebook (b) LinkedIn activities of business serving and
(c) Instagram (d) Telegram consumers with products and services?
17. Twitter enables user to send and read (a) C2B (b) B2B
short messages called …… . (c) B2C (d) C2C
(a) Tweets (b) Blogs (c) Messages (d) Posts 28. Rules of behaviour to be followed on
18. Which social networking site provides Internet communication are called
business and employment oriented (a) Netiquette (b) Protocol
services? (c) Regulation (d) None of these
(a) Facebook (b) Twitter 29. Netiquette is short for
(c) LinkedIn (d) Instagram (a) Net etiquette (b) Internet etiquette
19. Which social networking site was (c) Etiquette (d) None of these
acquired by Facebook in 2012? 30. E-Governance simplifies the process of
(a) Instagram (b) LinkedIn information accumulation for citizens and
(c) Youtube (d) Telegram (a) business (b) government
20. Which type of messaging is a software utility (c) schools (d) private offices
that connects users through Internet? 31. Government to citizen relationship is the
(a) Fast messaging (b) Instant messaging most important aspect of
(c) Immediate messaging (a) E-Commerce (b) E-Business
(d) Instant accessing (c) E-Governance (d) E-Citizen
E-Mail, Social Networking and E-Governance Services 137
32. Which of the following is a travel 34. Which App has been developed by NeGD
document issued by a country’s and Meity with the aim of driving mobile
government to its citizens? governance in India?
(a) Passport (a) UMANG (b) BHIM
(b) Aadhaar card (c) DigiLocker (d) All of these
(c) PAN card
35. Who launched digital locker facility to
(d) None of these
help citizens?
33. E-Hospital is also known as (a) Home Minister (b) Chief Minister
(a) Electronic Hospital (c) Health Minister (d) Prime Minister
(b) Digital Hospital 36. Which App is used to digitally store their
(c) Online Registration System (ORS) important documents like PAN card,
(d) Outpatient Department Passport etc.?
(a) DigiLocker (b) BHIM
(c) UMANG (d) PhonePe
True/False
Identify True/False from the following statements.
37. E-mail is a method of sending messages, 47. To specify multiple recipients of Carbon
data, video, voice and graphic. copy of same mail message, Cc: field is
used.
38. We can read our e-mails offline.
48. Always use appropriate language on
39. E-mail messages are usually addressed social network.
and delivered to only one or two people.
49. Instagram does not allow users to edit
40. In an E-mail address, the characters and upload photos.
following ‘@’ sign represents the name of
domain. 50. The entries of blog are also known as
posts.
41. The two parts of E-mail address is
separated by @. 51. WordPress is a free personal publishing
platform.
42. We can open our free E-mail accounts on
some web portals. 52. Do not reply to strangers is one of the
rules for Internet etiquettes.
43. A mailbox is the storage location of
electronic mail messages. 53. G2C relationship also describes
facilities provided by the government
44. All incoming E-mail messages are to be to citizens.
stored in the Outbox folder.
54. E-Hospital program is launched by Chief
45. An E-mail is deleted, it is automatically Minister.
sent to the Recycle Bin.
55. One popular chat service is known as
46. Type the subject of the E-mail in the Internet relational.
subject line.
Answers
1. (a) 2. (b) 3. (b) 4. (a) 5. (d) 6. (b) 7. (d) 8. (a) 9. (c) 10. (c)
11. (d) 12. (c) 13. (a) 14. (b) 15. (d) 16. (d) 17. (a) 18. (c) 19. (a) 20. (b)
21. (c) 22. (a) 23. (a) 24. (b) 25. (d) 26. (a) 27. (c) 28. (a) 29. (b) 30. (a)
31. (c) 32. (a) 33. (c) 34. (a) 35. (d) 36. (a) 37. True 38. True 39. False 40. True
41. True 42. True 43. True 44. False 45. False 46. True 47. True 48. True 49. False 50. True
51. True 52. True 53. True 54. False 55. False
138 Course on Computer Concepts (CCC)
08
Digital Financial Tools
and Applications
OTPs minimize the risk of fraudulent
Objective of the Chapter login attempts and thus the risk of stolen
This chapter includes Digital Financial Tools, Card data.
(Credit/Debit), eWallet, PoS, Internet Banking, Online OTP works through randomness algorithms
Bill Payment etc.
that generate a new and random password
each time they are used.
QR code consists of black squares arranged in Such is not the case with UPI. Here, you can
a square grid on a white background. It can be simply transfer money anytime anywhere
read by an imaging device such as camera, without adding any beneficiary or bank details.
and processed using Reed-Solomon error
correction until the image can be appropriately How to Register for UPI?
interpreted. Steps to registration for UPI are as follows :
1. Download the BHIM (Bharat Interface for
Money) app/ bank’s app/ third party apps.
2. Create your profile by adding details such
as name, password, UPI Pin etc.
3. Link the bank account with the VPA
(Virtual Payment Address) to complete
the registration process.
Types of QR Code
There are two types of QR code as follows :
How to Generate UPI Pin?
● Static QR Code These codes are most
Steps to generate UPI Pin, are as follows :
common type of QR code which are used 1. Select the bank account in the app from
to disseminate information to the general which you want to carry out transactions.
public. They are often displayed in 2. Once you select the bank account, you
advertising materials in the environment, on will be asked to generate your UPI Pin.
television, in newspapers and magazines. 3. An OTP will be sent to your registered
● Dynamic QR Code These codes are
mobile number with the bank account.
sometimes referred to as unique QR codes that 4. Enter this OTP to generate your UPI Pin.
offer more functionality. The owner can edit
5. Create your 6 or 4 digits UPI Pin which
the code at anytime and can target a specific
will be required for making all
individual for personalized marketing.
transactions.
UPI (Unified Payment Interface) Benefits of UPI
UPI is a digital mode that helps you transfer Benefits of UPI for Customers
funds from one bank to another without using ● Transfer can be made instantly by it.
any account number, bank name, account type ● It is easy to use.
and IFSC code. It facilitates users to access ● It requires single click authentication.
multiple bank accounts with a single mobile
application. It combines merchant payments,
● It highly secured as no account detail is
numerous banking features and seamless fund shared.
routing to be accessed from a single place. Benefits of UPI for Banks
It eliminates the need to enter bank details ● It is safe and secure transaction system.
or other sensitive information each time a ● It requires single click with two factors
customer initiates a transaction. authentication.
UPI has been launched by the National ● Use of the existing infrastructure ensures
Payments Corporation of India also known as no additional cost is incurred by the bank.
NPCI. In conjunction with the Reserve Bank of
India and Indian Banks’ Association, NPCI Benefits of UPI for Merchants
has framed this network. It is similar in ● It provides instant receipt of fund.
mechanisms like the RuPay system through ● For this, there is no need for sharing bank
which debit and credit cards function. details.
If you want to transfer funds using Internet ● It is suitable for E-Commerce platforms.
banking then in most cases, the bank takes some ● CoD (Cash on Delivery) collection is made
time to update the new beneficiary details. easy with UPI payment.
140 Course on Computer Concepts (CCC)
3. Enter the account details/mobile number. ● It increases the reach to rural areas as
Model Questions
Multiple Choice Questions
Select the appropriate answer from the choices given below.
1. ...... is a term used to describe 9. How many digits are there to set UPI Pin?
organizations that deal with the (a) 3 (b) 7 (c) 5 (d) 6
management of money.
10. Which of the following is a type of
(a) Financial tool (b) Economic tool
payment system that is based on the
(c) Financial product (d) None of these
Unique Identification Number?
2. Which of the following is a string of (a) USSD (b) AEPS
characters or numbers automatically (c) PoS (d) QR code
generated for single login attempt?
11. AEPS is another initiative taken by the
(a) Password (b) OTP
……… to encourage cashless transactions
(c) QR code (d) USSD code
in India.
3. Many companies use ………… to provide (a) NPCI (b) RBI
temporary passcode. (c) ICICI (d) HDFC
(a) Email (b) SMS
12. Which services are offered by AEPS?
(c) Phone Calls (d) None of these (a) Cash deposit
4. Which of the following refers to the (b) Payment transaction
instant access to the information hidden (c) Balance enquiry
in the code? (d) All of the above
(a) OTP (b) USSD code
13. ...... is a communication protocol available
(c) QR code (d) UPI
an every GSM enabled mobile device.
5. Which type of QR code is displayed in (a) USSD (b) AEPS
advertisting materials, on television and (c) UPI (d) NEFT
in newspapers?
14. To use USSD mobile banking, users will
(a) Static QR code (b) Dynamic QR code
have to simply dial ...... .
(c) Both (a) and (b) (d) None of these
(a) *99*# (b) *99 #
6. Which QR code can be edit at any time (c) *# 99 # (d) *999*#
by owner?
15. Which information/details are required
(a) Static QR code
for USSD fund transfer?
(b) Dynamic QR code
(a) MMID
(c) Automatic QR code
(b) MPIN
(d) Perfect QR code
(c) Registered mobile number
7. UPI has been launched by (d) All of the above
(a) RBI (b) IFSC
16. For this card, cardholders borrow funds
(c) USSD (d) NPCI
with which to pay for goods and services.
8. Which of the following is a system that (a) Credit Card (b) Debit Card
facilitates users to access multiple bank (c) ATM Card (d) None of these
accounts with a single mobile
17. Which Credit Cards are meant for those
application?
who already have a lot of credit card dept?
(a) UPI (b) AEPS
(a) Balance transfer (b) Secured
(c) USSD (d) OTP
(c) Low interest (d) Reward
Digital Financial Tools and Applications 147
18. Which of the following is/are type of 27. Which type of PoS is a software/
Credit Card? hardware based system that carries
(a) Reward (b) Low interest add-on peripherals?
(c) Secured (d) All of these (a) Terminal (b) Cloud
(c) Mobile (d) None of these
19. Debit Cards are also known as
(a) Credit Cards 28. Internet banking is also known as
(b) RuPay Cards (a) online banking (b) web banking
(c) Check Cards (c) Both (a) and (b) (d) None of these
(d) Shopping Cards 29. What is the meaning of N in NEFT?
20. ......... cards need electronic authorization, (a) Net (b) New
every time a transaction is reflected in (c) National (d) Next
the user’s account. 30. The timing of NEFT is from
(a) Online debit (b) Offline debit
(a) 9 AM to 6 PM (b) 9 AM to 7 PM
(c) Prepaid debit (d) All of these
(c) 10 AM to 8 PM (d) 8 AM to 7 PM
21. eWallet is also known as ………… 31. What is the meaning of T in RTGS?
protected with a password. (a) Time (b) Text
(a) Pocket wallet (b) Mobile wallet
(c) Term (d) Transfer
(c) Prepaid wallet (d) None of these
32. The minimum amount to be remitted
22. Which of the following facilities available through RTGS is
under eWallet?
(a) ` 1 lakh (b) ` 1.5 lakhs
(a) Cash back (b) Rewards
(c) ` 2 lakhs (d) ` 2.5 lakhs
(c) Both (a) and (b) (d) None of these
33. Which internet banking service is
23. Which eWallet is the first company in
India to receive a license from RBI to available 24×7 throughout the year?
start a payment bank? (a) RTGS (b) IMPS
(a) Freecharge (b) Mobikwik (c) NEFT (d) None of these
(c) Airtel Money (d) Paytm 34. In IMPS, the transfer limit is also
24. Which bank offered the eWallet app considerable approximately………per day.
PayZapp? (a) ` 50,000 (b) ` 1, 00, 000
(a) ICICI (b) HDFC (c) ` 1, 50, 000 (d) ` 2, 00, 000
(c) SBI (d) PNB 35. ...... is an internet based method of
25. ………… provides an online payment processing economic transactions.
system based on Unified Payments (a) Online bill payment
Interface (UPI). (b) eWallet
(a) PayZapp (b) PhonePe (c) USSD
(c) SBI Buddy (d) Citrus (d) All of the above
26. Which of the following is the time and place 36. Online payment systems typically are
where a retail transaction is completed? run by third party corporations such as
(a) Credit Card (b) Debit Card (a) PayPal (b) Google
(c) PoS (d) eWallet (c) Click2Pay (d) All of these
148 Course on Computer Concepts (CCC)
True/False
Identify True/False from the following statements.
37. A new era of financial system in India 45. Offline debit cards usually have a daily
was started after independence. limit restriced to the value of
38. OTP cannot be sent to the user’s phone transactions.
via SMS. 46. Mobile wallets are essentially digital
39. OTP works through randomness versions of traditional wallet.
algorithms that generate a new and 47. Airtel Money Wallet launched in 13
random password. different languages in collaboration with
40. Static QR codes are used to disseminate Master Card.
information to the general public. 48. Mobile PoS is also known as mPoS.
41. Using UPI, single click with single factor 49. There is no maximum and no
authentication is done. minimum limit of fund transfer
42. USSD helps all individuals carry out through the NEFT.
financial transactions on a Micro-ATM. 50. Timing of IMPS is from 9 AM to
43. Only SBI bank in India that is currently 4:30 PM.
providing the *99 # service. 51. RTGS mechanism is regulated by
44. Credit cardholder will not have to pay Reserve Bank of India.
interest if the borrowed amount is repaid 52. Online bill pay helps you organize bills
within 30 days. and keep track of due dates.
Answers
1. (a) 2. (b) 3. (b) 4. (c) 5. (a) 6. (b) 7. (d) 8. (a) 9. (d) 10. (b)
11. (a) 12. (d) 13. (a) 14. (b) 15. (d) 16. (a) 17. (a) 18. (d) 19. (c) 20. (a)
21. (b) 22. (c) 23. (d) 24. (b) 25. (b) 26. (c) 27. (a) 28. (c) 29. (c) 30. (d)
31. (a) 32. (c) 33. (b) 34. (d) 35. (a) 36. (d) 37. True 38. False 39. True 40. True
41. False 42. False 43. False 44. True 45. True 46. True 47. False 48. True 49. True 50. False
51. False 52. True
09
Overview of FutureSkills
and Cyber Security
journey by choosing job role and skills that
Objective of the Chapter interest you.
This chapter includes Internet of Things, Big Data Learner can either take a course and get
Analytics, Cloud Computing, Virtual Reality, Artificial certified through the hundreds of course
Intelligence, Social & Mobile, Blockchain available or follow some learning pathway
Technology, 3D Printing, Robotics Process created by the subject matter experts. The
Automation, Cyber Security, etc.
learning goals can be edited anytime you
want to ensure that the skills you have
Introduction to FutureSkills chosen, always interest you.
FutureSkills is meant for IT professionals The platform has the optional ability to
which will help them to upgrade their skills. award skill coins, which can be used for
With the increase use of technologies, there is course available on FutureSkills market
a need to realign the approaches of the place. FutureSkills is a simple yet powerful
industry. platform which can go a long way in future
proofing your career.
This platform will ensure that all the needs
are fulfilled. As the work of engineers already
involves the use of technology to a large Introduction to Internet
extent, the tech industry in particular, will of Things (IoT)
need to strategically implement FutureSkills IoT is a network in which all physical objects
which will help to adapt these changes.
are connected to the Internet through
How FutureSkills Work? network devices and exchange data. IoT
allows objects to be controlled remotely across
Journey of a person in the field of
existing network infrastructure. The goal of
FutureSkills begins as a learner by exploring
IoT is to extend to Internet connectivity from
the platform where he can search for
technologies, job roles yourself. He can follow standard devices like computer, mobile, tablet
technology to get daily learning insights. to relatively dumb devices like a toaster.
The contents are arranged to show a Advancements in medicine, power, gene
description of that job role through a job role therapies, agriculture, smart cities and smart
card and the skills required for the job role. homes are few examples where IoT is
There is an option to personalise learning strongly established.
150 Course on Computer Concepts (CCC)
4. Servers and digital storage devices take virtual models to prepare them for
up space. Some companies rent physical working on a real body. Virtual reality
space to store servers and databases can also be used as a treatment for
because they do not have it available on mental health issues.
site. Cloud computing gives these 3. In Education Virtual reality has been
companies the option for storing data on adopted in education too. It improves
someone else’s hardware, removing the teaching and learning. With virtual
need for physical space on the front end. reality, a large group of students can
5. Corporations might save money on IT interact with one another within a
support. Streamlined hardware would, three-dimensional environment.
in theory, have fewer problems than a 4. In Engineering and Architecture
network of heterogeneous machines and Virtual reality plays a major role in
operating systems. simulating three-dimensional models of
infrastructures, designs which can
Virtual Reality provide a real-life experience of the
Virtual Reality is a computer interface which physical designs or infrastructures
tries to mimic real world beyond the flat before hand. This helps in reducing
monitor to give an immersive 3D visual considerable costs and expenses which
experiences. It is an artificial environment can be incurred in a prototype.
that is created with software and presented 5. In Entertainment Virtual reality is
to the user in such a way that the user being used in the entertainment
suspends belief and accepts it as a real industry to boost experiences with 360
environment. On a computer, virtural reality films and increase emotional connection
is primarily experienced through two of the with them and/or the characters.
five senses i.e., sight and sound. 6. In Business Virtual reality has also been
Virtual Reality (VR) technology is applied to adopted in business. It is now being used
advance fields of medicine, engineering, for virtual tours of a business
education, design, training and environment, training of new employees
entertainment. and this also gives new employees a 360
degree view of every product.
Applications of Virtual Reality
Virtual reality is one of the offshoots of Artificial Intelligence
mobile technology and it has impacted on Artificial Intelligence (AI) is an area of
human lives in many ways. There are several computer science that emphasizes the
applications of virtual reality technology in creation of intelligent machines that work
human lives some of them are discussed and react like humans.
below : The term may also be applied to any machine
1. In Gaming Virtual technology’s devices that exhibits traits associated with a human
are used for virtual gaming experiences. mind such as learning and problem-solving.
Along with this, devices such as Wi-Fi
Knowledge engineering is a core part of AI
Remote, PlayStation Move/Eye, Kinect
research. Machines can often act and react
are based on virtual reality which
like humans only if they have abundant
track and send input of the players
information relating to the world. Artificial
to the game.
intelligence must have access to objects,
2. In Healthcare Healthcare is one of the categories, properties and relations between
applications where virtual reality could all of them to implement knowledge
have the most significant impact. engineering.
Healthcare professionals can now use
154 Course on Computer Concepts (CCC)
How does 3D Printing Work? Robotic process automation does not involve
any form of physical robots. Software robots
Here are the steps taken in creating a 3D object :
mimic human activities by interacting with
1. Produce a 3D model using CAD or applications in the same way that a person
equivalent 3D design software. does. Robotic process automation enables
2. Convert the drawing to the STL business professionals to easily configure
(Standard Tessellation Language) file software robots to automate repetitive,
format, which is a format developed for routine work between multiple systems,
3D printers. filling in automation gaps to improve
3. Transfer the STL file to the computer business processes.
that controls the 3D printer. From
there, you can specify the size and Business Benefits of RPA
orientation for printing. Some business benefits of RPA are as follows :
4. Prepare for a new print job based on the 1. Increased Accuracy Robots are
requirements of the 3D printer you are extremely accurate and consistent, they
using. This may include refilling are much less prone to make mistakes
whichever additive you are using to or typo than a human worker.
make your object. 2. No Interruption of Work Operations
5. Begin the building process. Since, each can be performed 24/7 as software
layer is usually about 0.1 mm thick, robots can work tirelessly and
this can take anywhere from hours to autonomously without requiring staff to
days to complete depending on the manually trigger bots to initiate
object’s size. business processes.
6. Remove the object from the printer and 3. Low Technical Barriers Programming
avoid any contact with toxins or hot skills are not necessary to configure a
surfaces. software robot. As a primarily code-free
7. Perform any post-processing needed, technology, any non-technical staff can
which may involve brushing off residue use a drag and drop process designer to
or washing the object. set up a robot.
8. Use your new printed object. 4. Increased Productivity Process cycle
times are more efficient and can be
Examples of 3D Printing completed at a faster speed compared to
● Architectural scale model and maquettes manual processes.
● Eyewear 5. Meet Regulatory Compliance
● Dental products Standards Robots only follow the
● Design (lamps, furniture, etc) instructions they have been configured
● Reconstructing bones and body parts in to follow and provide an audit trail
forensic pathology. history for each step.
● Reconstructing heavily damaged evidence
retrieved from a crime scene.
Applications of RPA
Some applications of RPA are as follows :
Robotics Process Automation 1. Customer Service RPA can help
companies offer better customer service
(RPA) by automating contact center tasks,
RPA is the use of specialized computer including verifying E-signatures,
programs, known as software robots, to uploading scanned documents and
automate and standardize repeatable verifying information for automatic
business processes. approvals or rejections.
Overview of FutureSkills and Cyber Security 157
2. Keep Your Windows Operating 1. Put a Strong Passcode This is the first
System Upto Date Probably the most step to keep your phone secure. Every
important step to do is checking for the phone lets you set a passcode lock for
latest security updates and patches security and most of them now come
available for your windows operating with a fingerprint scan for added
system. After checking for available security. For passcode, make sure you
updates for your windows operating choose a pattern or combination which
system, keep the automatic update is not easy to guess or find out such as
turned ON in order to download and your birth year, car number, home
install the important updates that can number, etc.
help to protect your PC against new
2. Install Security Apps Your
viruses or next generation malware.
smartphone is a susceptible to data
3. Install Antivirus Software Antivirus theft as your computer.
is one other means to protect the
Therefore, just like you have security
computer. It is software that helps to
apps installed on your computer, you
protect the computer from any
must also get one for your smartphone.
unauthorized code or software that
There are security apps available from
creates a threat to the system.
all known companies such as Avast,
Unauthorized software includes viruses,
McAfee, Norton, Kaspersky, etc.
keyloggers, trojans, etc.
3. Internet Browsing Be careful when
This might slow down the processing
accessing a web browser on your
speed of your computer, delete important
smartphone as it can be easy to accept
files and access personal information.
messages that pop-up.
Antivirus software plays a major role in
real time protection, its added advantage If any security warning pop-up when
of detecting threats helps computer and looking at a website, take note of it and
the information in it to be safe. leave the website if needed. You always
look at the URL and make sure the
4. Check on Security Settings of the
Browser Browsers have various security
‘http’ has an s at the end. This ensures
and privacy settings that you should that the URL you are using, is secure.
review and set to the level you desire. 4. Turn Off Geotagging Many
Recent browsers give you ability to tell smartphone social networking apps
websites to not track your movements, automatically upload photos to the
increasing your privacy and security. Internet. The problem with this is that
5. Use Complex and Secure Passwords many phones embed location tags called
Complex passwords are difficult for the geotags, right into the photo files
hackers to find. Use a password that is themselves.
at least 8 characters in length and 5. Update Phone and Apps Regularly
include a combination of numbers, App developers regularly add features
letters that are both upper and lower and security updates to their apps on
case and a special character. Hackers the play store.
use certain tools to break easy They even give details on what the new
passwords in few minutes. update adds to the app for users before
installing the update.
Securing Smartphone
We recommend that you regularly check
It is really important that your smartphone is
secure for many reasons. You may keep data the play store for updates and make
on it and if your phone was lost or stolen, sure that you have the latest version of
this would be lost. the app installed on your device.
Model Questions
Multiple Choice Questions
Select the appropriate answer the choices given below.
1. Which is meant for IT professionals 9. Which of the following provides
which will help them to upgrade their computing and storage capacity services
skills? to heterogeneous community of end
(a) FutureSkills (b) Technology recipients?
(c) Internet of Things (d) Processing (a) Cloud computing (b) Big data
(c) FutureSkills (d) Robotics
2. FutureSkills is a simple yet powerful
platform which can go a long way in 10. What is/are characteristics of cloud
……… your career. computing?
(a) Present proofing (b) Past proofing (a) On demand self services
(c) Future proofing (d) All of these (b) Broad network access
(c) Resource pooling
3. Which of the following objects to be (d) All of the above
controlled remotely across existing
network infrastructure? 11. Which type of cloud deployments is used
(a) FutureSkills (b) IoT to serve multiple users, not a single
(c) Cloud computing (d) SaaS customer?
(a) Private cloud (b) Public cloud
4. ...... are key components that help you to (c) Hybrid cloud (d) None of these
collect live data from the surrounding
12. Which cloud computing services refers to
environment.
supply on demand environment for
(a) Sensors (b) Connectivities
developing software applications?
(c) User interfaces (d) None of these
(a) SaaS (b) AaaS (c) PaaS (d) IaaS
5. IoT system provides substantial personal 13. Virtual reality is primarily experienced
data in ...... detail.
through ...... of the five senses.
(a) Minimum (b) Maximum
(a) Two (b) Three (c) Four (d) One
(c) Medium (d) All of these
14. Which technology devices is used for
6. Which of the following is the process of virtual gaming experiences?
collecting, organizing and analyzing large (a) FutureSkills (b) Virtual
sets of data to discover patterns and
(c) Big data (d) Blockchain
other useful information?
(a) FutureSkills (b) IoT 15. Virtual reality technology is applied to
(c) Big Data Analytics (d) User Interface advance fields of
(a) medicine (b) engineering
7. ...... of big data refers to structured,
(c) education (d) All of these
unstructured and semi-structured data
that is gathered from multiple sources. 16. ...... is an area of computer science that
(a) Feature (b) Analysis emphasizes the creation of intelligent
(c) Privacy (d) Variety machines that work and react like humans.
(a) Artificial Intelligence
8. Big data is used in .....
(b) Introduction of Things
(a) Government (b) Healthcare
(c) FutureSkills
(c) Banking (d) All of these
(d) Robotics
160 Course on Computer Concepts (CCC)
17. Which type of artificial intelligence 25. RPA is the use of specialized computer
embodies a system designed to carry out programs known as ......
one particular job? (a) FutureSkills
(a) Weak AI (b) User Interface
(b) Strong AI (c) Software Robot
(c) Both (a) and (b) (d) Artificial Intelligence
(d) None of the above
26. What is/are business benefit(s) of RPA?
18. AI is important because it can help to (a) Increased accuracy
solve immensely difficult issues in (b) No interruption of work
(a) entertainment (b) education (c) Low technical barriers
(c) health (d) All of these (d) All of the above
19. Which of the following originated as 27. ...... can help companies offer better
a way to interact with friends and customer service by automating contact
family? center tasks.
(a) Social Media (a) RPA (b) Interface
(b) Blockchain (c) Additive (d) Blockchain
(c) Automation
(d) Artificial Intelligence 28. Which of the following involves
protecting information and systems from
20. ...... is a social media designed specifically major cyber threats?
for the business community. (a) Cyber crime (b) Cyber security
(a) Pinterest (b) Twitter (c) Robotics (d) Virtual reality
(c) LinkedIn (d) Facebook
29. It is the guarantee of reliable and
21. Which of the following is an encrypted constant access to your sensitive data by
and distributed database that records authorized people.
data? (a) Confidentiality (b) Integrity
(a) Automation (c) Availability (d) None of these
(b) Blockchain
(c) Artificial Intelligence
30. ...... creates a barrier between the
computer and any unauthorized program
(d) FutureSkills
trying to come in through the Internet.
22. Blockchain mechanism brings everyone (a) Firewall (b) Integrity
to the highest degree of ....... . (c) Blockchain (d) Automation
(a) Accountability (b) Availability
31. There are security apps available from
(c) Performance (d) Analytics
all known companies such as
23. Additive manufacturing uses…… software. (a) Avast (b) McAfee
(a) System (b) Application (c) Norton (d) All of these
(c) Utility (d) CAD
32. It is a software that helps to protect the
24. Example(s) of 3D printing is/are computer from any unauthorized code or
(a) Eyewear software that creates a threat to the
(b) Dental products system.
(c) Architectural scale model (a) Antivirus (b) Password
(d) All of the above (c) Passcode (d) Firewall
Overview of FutureSkills and Cyber Security 161
True/False
Identify True/False from the following statements.
33. FutureSkills platform will ensure that all 42. Artificial Intelligence is a computer
the needs are fulfilled. interface which tries to mimic real world
beyond the flat monitor.
34. The goal of IoT is to extend the Internet
connectivity from standard devices like 43. Virtual reality has also been adopted in
computer. business.
35. Some data is sent to a cloud 44. Knowledge engineering is a core part of
infrastructure. AI research.
36. IoT technology does not help a lot in 45. Pinterest is a free microblogging service.
improving technologies and making them
better. 46. Blockchain technology does not provide
durability, reliability and longevity with
37. IoT offers real time information leading decentralized network.
to effective decision-making.
47. Additive manufacturing adds material to
38. In big data, volume refers to the speed at create an object.
which data is being created in real time.
48. Programming skills are not necessary to
39. The banking sector relies on big data for configure a software robot.
fraud detection.
49. Confidentiality refers to protecting
40. Hybrid cloud is combination of private information from being accessed by
cloud and public cloud. unauthorized parties.
41. Cloud computing could bring hardware 50. Complex passwords are simple for the
costs down. hackers to find.
Answers
1. (a) 2. (c) 3. (b) 4. (a) 5. (b) 6. (c) 7. (d) 8. (d) 9. (a) 10. (d)
11. (b) 12. (c) 13. (a) 14. (b) 15. (d) 16. (a) 17. (a) 18. (d) 19. (a) 20. (c)
21. (b) 22. (a) 23. (d) 24. (d) 25. (c) 26. (d) 27. (a) 28. (b) 29. (c) 30. (a)
31. (d) 32. (a) 33. True 34. True 35. False 36. False 37. True 38. False 39. True 40. True
41. True 42. False 43. True 44. True 45. False 46. False 47. True 48. True 49. True 50. False
162 Course on Computer Concepts (CCC)
Computer Abbreviations
A CLI Command Line Interface
CPS Characters Per Second
AEPS Aadhaar Enabled Payment System
CPU Central Processing Unit
AI Artificial Intelligence
CRT Cathode Ray Tube
ALU Arithmetic Logic Unit
CU Control Unit
AMLCD Active Matrix Liquid Crystal Display
ANSI American National Standards
Institute D
API Application Programming Interface
DB Database
ARPA Advanced Research Projects
DBA Database Administrator
Agency
DBMS Database Management System
ASP Application Service Provider
DDR SDRAM Double Data Rate Synchronous
ATM Asynchronous Transfer Mode/
Dynamic Random Access Memory
Automated Teller Machine
DFD Data Flow Diagram
DHTML Dynamic HyperText Markup
B Language
DMA Direct Memory Access
BBS Bulletin Board System
DNS Domain Name System
Bcc Blind carbon copy
DOS Disk Operating System
BCR Barcode Reader
DPI Dots Per Inch
BD Blu-ray Disc
DRAM Dynamic Random Access Memory
BHIM Bharat Interface for Money
DSL Digital Subscriber Line/Domain
BIOS Basic Input/Output System
Specific Language
Bit Binary Digit
DSN Data Source Name
BPI Bits Per Inch
DVD Digital Video Disc/Digital Versatile
BPL Broadband over Power Line Disc
BPS Bits Per Second DVD-R DVD-Recordable
DVD-ROM DVD-Read Only Memory
C DVD-RW DVD-Rewritable
DVR Digital Video Recorder
CAD Computer Aided Design
CAE Computer Aided Engineering
CAM Computer Aided Manufacturing E
Cc Carbon Copy E-Commerce Electronic Commerce
CD Compact Disc EDORAM Extended Data Output Random
C-DAC Centre for Development of Access Memory
Advanced Computing EDP Electronic Data Processing
CDMA Code Division Multiple Access EPROM Erasable Programmable Read Only
CD-R Compact Disc-Recordable Memory
CD-ROM Compact Disc-Read Only Memory EEPROM Electrically Erasable Programmable
Read Only Memory
CD-RW Compact Disc-ReWritable
E-Mail Electronic Mail
CGI Common Gateway Interface
EXE Executable
Computer Abbreviations 163
G J
JPEG Joint Photographic Experts Group
GARV Grameen Vidyutikaran
Gb Gigabit
GB Gigabyte K
GPS Global Positioning System Kb Kilobit
GUI Graphical User Interface KB Kilobyte
Kbps Kilobits per second
H KHz KiloHertz
Computer Glossary
are capable of calculating the results of a wide
variety of basic arithmetical and logical
A computations.
Artificial Intelligence Fifth generation computing
Accumulator A local storage area called a register, devices, based on artificial intelligence, are still in
in which the result of an arithmetic and logic development, though there are some applications,
operation is formed. It contains a single data such as voice recognition, that are being used
register. today.
Active Cell It refers to the currently selected cell in Assembler A program that translates mnemonic
a spreadsheet. It can be identified by a bold outline statement into executable instruction.
that surrounds the cells.
Authentication Any process by which a system
Active Device The device that requires a source of varifies the identity of the user who wishes to
energy for its operation and has an output that is a access it.
function of present and past input signals.
Auxiliary Memory It is a non-volatile memory
Active Window It is the currently focused window which is not directly accessible by CPU. It is also
in the current window manager. known as secondary or external memory.
Alignment An arrangement or position of text in a
straight line or in parallel lines.
Algorithm In computing, an algorithm is a B
procedure for accomplishing some tasks which
given an initial state, will terminate in a defined Backspace Key This key is used on the keyboard
end-state. to delete the text. Backspace will delete the text to
Alphanumeric A character set that contains letters, the left of cursor.
digits and other special characters such as @, $, +, Backup A copy of a file or other item of data made,
*, %, etc. in case the original is lost and damaged.
Analog Computer A computer that operates on Bandwidth The maximum amount of data that can
data which is in the form of continuous variable travel in a communication path in a given time,
physical quantities. measured in bits per second (bps).
Android It is a LINUX based operating system Bar Code It is a machine-readable representation
designed primarily for touchscreen mobile devices of information in a visual format on a surface.
such as smartphones and tablet computers. Basic Input Output System (BIOS) It is also known
Antivirus Software It consists of computer as ROM BIOS. It provides an abstraction layer for
programs that attempt to identify threats and the hardware, i.e. a consistent way for application
eliminate computer viruses and other malicious programs and operating system to interact with
softwares (malware). input/output devices.
Bit It is the most basic information unit used in the instructions contained in the software. The
computing and information theory. CPU is generally called by its generic name
Blog It is a discussion or informational site 'Processor' and also known as the brain of
published on the World Wide Web. computer.
Channel A medium for transferring information
Bluetooth It permits a wireless exchange of
which is also called a line or circuit. A
information between computers, cell phones and
communication channel can be a physical link,
other electronic devices.
such as a cable that connects two stations in a
Booting It is a bootstrapping process which starts network or it can consist of some electromagnetic
the operating system when a computer is switched transmission.
ON.
Chart Graphical and pictorial representation of
Broadband A high capacity transmission technique worksheet data.
using a wide range of frequencies, which enables a Chat Typing text into a message box on a screen
large number of messages to be communicated to engage in dialog with one or more people via the
simultaneously. Internet or other network.
Browser A special software that enables users to Chip A tiny wafer of silicon containing small
read/view Web pages and jump from one Web page electric circuits that can store millions of bits of
to another. information.
Buffering The process of storing data in a memory Client Computer A computer that retrieves
device, allowing the devices to change the data information or uses resources provided by the
rates, perform error checking and error server or main computer.
retransmission.
Client-Server It is a network architecture which
Bug It is an error, flaw, failure, or fault in a separates the client from the server. Each instance
computer program or system that produces an of the client software can send requests to a server
incorrect or unexpected result. or application server.
Bus A circuit that provides a communication path Clipboard A temporary storage area where
between two or more devices of a digital computer material out or copied from a file is kept for
system. pasting into another file.
Byte It is commonly used as a unit of storage ClipArt Simple pictures and symbols made
measurement in computers, regardless the type of available for computer users to add to their
data being stored. documents.
Coding The process of assigning a code to
C something for classification or identification.
Command A very specific instruction to a
Cache Memory It is a very high speed memory computer to perform some kind of action.
that is placed between the CPU and main memory,
to operate at the speed of the CPU. Command Line Interface (CLI) It is a method of
interacting with a computer by giving it lines of
CD-R A blank compact disc which can be recorded textual commands (i.e., a sequence of characters)
at once only. from the keyboard.
CD-RW A blank compact disc that can be Communication The transmission of data from one
recorded, erased and written many times. computer to another or from one device to another
Cell A box in a spreadsheet, in which you can is called communication.
enter a single piece of data. Compact Disc (CD) These discs are made of plastic
Central Processing Unit (CPU) It performs the and are coated with reflective metals. Their storage
actual processing of data. It is the part of a density is very high, storage cost is very low and
computer system that interprets and carries out access time is relatively fast.
168 Course on Computer Concepts (CCC)
Disk Operating System (DOS) An operating system EDO RAM (Extended Data Output RAM) This form
which contains the disk oriented commands and of dynamic RAM speeds access to memory
uses disk devices for permanent storage. locations by working on a simple assumption—the
Display Unit A device with a screen that displays next time memory is accessed, it will be at a
characters or graphics representing data in a contiguous address in a contiguous chunk of
computer memory. hardware.
Domain Name A unique name that identifies a EEPROM (Electrically Erasable Programmable Read
particular website and represents the name of the Only Memory) A special type of Programmable
server where the Web pages reside. Read Only Memory (PROM) that can be erased by
exposing it to an electrical charge. It retains its
Dot Matrix Printer It refers to a type of computer contents even when the power is turned OFF.
printer with a print head that runs back and forth
E-mail (Electronic mail) It is a method of
on the page and prints by impact, striking an
composing, sending, storing and receiving
ink-soaked cloth ribbon against the paper, much
messages over electronic communication systems.
like a typewriter.
End User Any individual who uses the information
Dot Pitch A measurement that indicates the
generated by a computer based system.
diagonal distance between like-colored phosphor
dots on a display screen. EPROM (Erasable Programmable Read Only
Memory) It is a type of computer memory chip that
Dots Per lnch (DPI) It is defined as the measure of
retains its data when its power supply is switched
the resolution of a printer, scanner or monitor.
OFF.
It refers to the number of dots in one inch line.
Ethernet It is a modern technique which is used to
Download It refers to the act of transmitting data connect local computers in LAN.
from a remote computer on the Internet or other
network to one’s own computer. Exe (.exe) It is a common filename extension
denoting an executable file (a program) in the DOS,
Drag Selecting some part of data and shifting it MS-Windows.
from one place to another is called dragging.
Execution Time Total time taken by computer to
Drag-and-Drop In graphical user interface, drag and process some program or instruction.
drop is the action of clicking on a virtual object
Extranet A technology that permits the users of
and dragging it to a different location or onto
one organisation’s intranet to enter portions of
another virtual object.
another organisation’s intranet in order to conduct
DVD It is an optical disc storage media format that business transactions or collaborate on joint
can be used for data storage including movies with projects.
high quality video and sound.
Dynamic RAM (Dynamic Random Access Memory) It F
is a type of random access memory which stores
each bit of data in a separate capacitor. Fax It stands for ‘Facsimile’. It is used to transmit
a copy of a document electronically.
Fiber Optics It is a cable made up of glass or fiber
E through which data can be transferred from one
place to another.
E-Commerce (Electronic Commerce) It is a type of
industry where buying and selling of product or File A collection of information stored
services is conducted over electronic systems such electronically and treated as a unit by a computer.
as the Internet and other computer network. Every file must have its own distinctive name.
File Allocation Table (FAT) It is the name of a
Editing The process of changing information by
computer file system architecture. The FAT file
inserting, deleting, replacing, rearranging and
system is a legacy file system which is simple
reformation.
and robust.
170 Course on Computer Concepts (CCC)
File Utilities These softwares are used to control Gigabyte It is a unit of information or computer
general activities of files. storage equal to approximately one billion bytes.
Firewall A security system usually consisting of GigaHertz (GHz) A measurement used to identify
hardware and software that prevents unauthorised the speed of the central processing unit. One
persons from accessing certain parts of a program gigahertz is equal to 1 billion cycles per second.
database or network. Gopher A protocol used for locating and
Flash Memory It is a type of non-volatile computer transferring information on the Internet. It is an
storage chip that can be electrically erased and Internet search tool that allows users to access
reprogrammed. It was developed using EEPROM. textual information.
Floppy disk It is a data storage device that is Graphic Interchange Format (GIF) A simple file
composed of a circular piece of thin, flexible (i.e. format for pictures and photographs, that are
floppy) magnetic storage medium encased in a compressed so they can be sent quickly.
square or rectangular plastic walled. Graphic Tablet It is an input device which is used
Font It is a fixed typeface of a particular size to create images, etc.
and style. Graphical User Interface (GUI) It is a method of
Formula An expression which calculates the interacting with a computer through a metaphor of
value of a cell. direct manipulating of graphical images and
widgets in addition to text.
Footer On a document, it is the bottom most
portion. Normally, page numbers and/or dates, etc.,
are written in this area. H
Format To set margins, tabs, font or line spacing
in layout of a document. Hang To crash in such a way that the computer
does not respond to input from the keyboard or
Fragmentation The data stored in memory is kept mouse.
in small parts, this partition is called
fragmentation. Hard Copy Printed version of soft copy of
information or data. It is the permanent output
Freeware A form of software distribution where provided by computer.
the author retains copyright of the software but
makes the program available to others at no cost. Hard Disk It is a non-volatile data storage device
that stores data on a magnetic surface layered onto
FTP This protocol is used to transfer files from disk platters.
one place to another on Internet.
Hardware The mechanical, magnetic, electronic
Function Predefined formula that performs and electrical components that comprise a
calculations using specific values in a particular computer system such as CPU, monitor, keyboard,
order. mouse, etc.
Computer Glossary 171
Header In a document, it is the top most portion. Instruction A command or order given to a
Normally date, page numbers etc, are written in computer to perform a task.
this area. Integrated Circuits Multiple electronic components
Home Page It refers to the Web page that combined on a silicon chip.
identifies a website and contains the hyperlink to Interface A device or program that helps a user to
other Web page in the website. communicate with a computer.
Hyperlink An image or portion of text on a Web Interpreter A program that converts and executes
page that is linked to another Web page. the source code into machine code line by line.
Hybrid Computer These computers are made by Internet (also known simply as the net) It is the
taking the best features of the analog computer worldwide, publicly accessible system of
and digital computer. interconnected computer networks that transmit
HyperText Markup Language (HTML) This language data by packet switching using the standard
is used to write Web page and for designing. Internet protocol.
HyperText Transfer Protocol (HTTP) It is an Internet Surfing To search something on Internet
important protocol used on the world wide web for is called Internet surfing.
moving hypertext files across the Internet. It Internet Protocol (IP) Address These addresses are
requires an HTTP client program on one end and assigned to each and every computer on a TCP/IP
HTTP server program on other end. network. It ensures that data on a network goes
where it is supported to go e.g. 192.168.2.250.
I Internet Service Provider (ISP) It is a business
organisation that offers users to access the
Icon A symbol (such as picture or a folder) that Internet and related services.
represents a certain function on your computer. Internet Protocol Suite It is the set of
When the user clicks on the icon, the appropriate communication protocols that implement the
function is executed. protocol stack on which the Internet and most
Impact Printers These printers transfer the image commercial networks run.
onto paper through a printing mechanism that
strikes the paper called ribbon.
J
Information It is the summarization of data
according to a certain pre-defined purpose. Joint Photographic Experts Groups (JPEG) It is a
Ink-Jet Printer In this printer, characters are commonly used method of lossy compression for
formed as a result of electrically charged or heated digital images particularly produced by digital
ink being sprayed in fine jets onto the paper. photography.
Individual nozzles in the printing head produce Joystick It is a computer peripheral or general
high resolution characters. control device consisting of a handheld stick that
Input In order to give instructions to a computer, pivots about one end and transmits its angle in
the information has to be supplied to it. This two or three dimensions to a computer.
information is given to the computers through
an input device such as keyboard, mouse,
scanner, etc.
K
Input Device These devices are used to put data Kernel It is the fundamental part of a program,
and instructions in computer. such as an operating system, that resides in
Instant Messaging (IM) A chat program that memory at all times.
lets people communicate over the Internet in Keyboard This is the standard input device
real time. attached to all computers. The layout of keyboard
172 Course on Computer Concepts (CCC)
is just like the traditional typewriter of the type MAC Address Hardware identification number that
QWERTY. It also contains some extra command uniquely identifies each device on a network.
keys and function keys. Mainframe Computer Sometimes it’s called a server
Key-Stroke To press a button in keyboard. or CPU. Mainframe computer or mainframe is used
Kilobyte It is a unit of information or computer in the large organization. It is bigger and much
storage equal to 1024 bytes. It is commonly more powerful.
abbreviated KB. Main Memory A volatile and speedy memory.
It is divided into two parts RAM and ROM.
L Malware It is a software that disrupts normal
computer functions or sends a users personal data
Landscape A printer feature, generally controlled without the users authorisation.
by software, which rotates the output image by 90° Mass Storage It is referred to storage where large
to print across the length rather than the width of volumes of backup/data is stored.
the paper.
Megabyte (MB) 1 Megabyte is equal to 1048576
Laptop It is a small, lightweight and portable bytes, usually rounded off to one million bytes.
battery-powered computer that can fit onto your
lap. They each have a thin, flat and liquid crystal Memory Temporary storage for information,
display screen. including applications and documents. Computer
memory is measured in terms of the amount of
Laser Printer A computer-driven photocopier that information it can store, commonly in megabytes
creates an original image of the text or graphics or gigabytes.
from the output of the computer onto a paper.
Menu The option list in some program or in
Light Pen A light sensitive style for forming software is called menu.
graphics by touching coordinates on a display
screen, thereby seeming to draw directly on Menu Bar The horizontal strip across the
the screen. top of an application’s window. Each word on the
strip has a context sensitive drop down menu
Link A communication path between two nodes or containing features and actions that are available
channels. for the application in use.
LINUX It is an open source operating system, Merge Combining two or more files into a
meaning that the source code of the operating single file.
system is freely available to the public.
Microcomputer A microprocessor-based computer,
Local Area Network (LAN) In LAN, the connected consisting of an CPU, internal semiconductor
computers are geographically close together. memory, input and output sections and a system
They are either in the same building or within a bus, all on one, or several monolithic IC chips
smaller area. inserted into one or several PC boards.
Login To start computer or some program is called Microprocessor A complete Central Processing
login. Unit (CPU) contained on a single silicon chip.
Log out Quitting the program, after completing
MIDI (Music Instrument Digital Interface) It allows
your work is known as log out.
a computer to store and replay a musical
instrument’s output.
System Software A general term for software that Upload The processes of transferring information
supervises, sequences and coordinates programs. from a computer to a website (or other remote
System software may include programs, such as: location on a network).
176 Course on Computer Concepts (CCC)
UPS (Universal Power Supply or Uninterruptible Webcam A video camera/computer setup that takes
Power Supply) An electrical power supply that live images and sends them to a Web browser.
includes a battery to provide enough power to a Web Browser An application or program which is
computer during an outage to back-up data and used to view and interact with Web pages and to
properly shut down. navigate between them.
User Someone attached to a server or host. Website A collection of Web pages or hyperlinked
User-Friendly Refers to anything that makes it Web page, which owned by an individual, company
easier for novices to use a computer. e.g. GUIs are or organization.
considered as user-friendly. Window A portion of a computer display used in a
User-Friendly Program A software program that graphical interface that enables users to select
has been designed to easily direct the user commands by pointing to illustrations or symbols
through the operation or application of a program. with a mouse.
A menu-driven program is considered to be Word The set of binary bits handled by a computer
‘user-friendly’. as a primary unit of data. Typically, each location in
Utility A software program designed to perform a memory contains one word.
computer system’s routine housekeeping Word Processing A program that enables to
functions, like copying, deleting files and/or compose a document within computer system with
providing techniques to simplify the execution of edit, store, format and print the specific document
a program. or insert, delete, copy and include text/graphics
from other files.
V Word Processor A computer system or program for
setting, editing, revising, correcting, storing and
Video Disc A disc on which movies, television printing text.
programs, etc. are recorded in order to be watched World Wide Web (‘WWW’ or ‘The Web’) A network of
on a computer or television screen. servers on the Internet that use hypertext-linked
Video Display Terminal A device for displaying databases and files.
input signals as characters on a screen, typically a Workgroup Persons sharing files and data between
monitor. themselves.
Video Teleconferencing A remote ‘face-to-face Workstation The work area and/or equipment used
chat,’ when two or more people using a webcam for computer operations, including Computer Aided
and an Internet telephone connection chat online. Design (CAD). The equipment generally consists of a
The webcam enables both live voice and video. monitor, keyboard, printer and/or plotter and other
Virus A piece of computer code designed as a output devices.
prank or malicious act to spread from one
computer to another by attaching itself to other
programs. X
Volatile Memory A memory whose contents are X-Y Plotter A computer-driven printing mechanism
irretrievably lost when power is removed. that draws coordinate points in graph form.
W Z
WAN A network of a large number of computers Zoom The enlarging or reducing an image
that cover a large area like a city, state or even a displayed on a computer process of proportionately
whole country. monitor.
Practice Set 1 177
CCC
Course on Computer Concepts
Practice Set 1
A. Select correct answer from given options.
1. The development of computers can be 8. The background screen and main area of
divided into ............. generations. windows where you can open and
(a) 3 (b) 4 (c) 6 (d) 5 manage files and programs is known as
(a) background
2. The unit of speed used for super (b) desktop
computer is
(c) wallpaper
(a) KB (b) FLOPS
(d) None of the above
(c) GB (d) EB
9. You can check spelling and grammatical
3. Which of the following is a word
mistakes by the ............. option.
processing software?
(a) Auto SpellCheck
(a) Perfect Work (b) Easy Processing
(b) Grammar and Auto SpellCheck
(c) Writer (d) All of these
(c) Spelling and Grammar
4. The fastest memory in a computer (d) SpellCheck
system is ............. .
(a) ROM (b) RAM
10. The IC chip used in computers is made of
(c) Cache (d) None of these (a) chromium (b) iron oxide
(c) silica (d) silicon
5. When a computer prints a report, this
output is called ............. . 11. A browser is
(a) Hard copy (b) Soft copy (a) a special folder on the Windows desktop
(c) COM (d) None of these used to keep documents up to date when
shared between computers.
6. It responds to an event within a (b) a line that delineates the edge of a program
predetermined time. window.
(a) Batch processing (c) a software program used for viewing web
(b) Online processing pages on the Internet.
(c) Real time processing (d) a window that is currently open.
(d) None of the above
12. An area of memory or disk that is
7. The slowest memory in a computer assigned to store E-mail messages sent
system is ....... . by other users.
(a) Hard disk (b) CD-ROM (a) Post-email (b) Post box
(c) Cache memory (d) Static RAM (c) E-mail box (d) Mail box
178 Course on Computer Concepts (CCC)
23. Pressing ............. is a quick way to center 32. The ............. of a system includes the
a paragraph. programs or instructions.
(a) Ctrl + L (b) Ctrl + E (a) Hardware (b) Icon
(c) Ctrl + R (d) Ctrl + J (c) Information (d) Software
Practice Set 1 179
33. Which of the following displays programs 42. A person who writes a blog or a weblog is
that are currently running? known as
(a) Menu bar (b) Task bar (a) Blogger (b) Writer
(c) Title bar (d) Status bar (c) Author (d) Twitter
34. Which type of debit cards include the 43. ORS stands for
logos of major cards such as Visa or (a) Online Registered System
Master card? (b) Online Regional System
(a) Online (b) Offline (c) Online Registration System
(c) Prepaid (d) None of these (d) Online Registration Secure
35. Which of the following can be used as a 44. When you activate the Spelling and
primary memory? Grammar checker
(a) Cartridge tape (b) Hard disk (a) it displays the misspelled words in the
(c) Optical disc (d) None of these dialog box
(b) it highlights the misspelled words in the
36. Which of the following can be embedded
document
into a slide?
(c) it allows you to correct the misspelled
(a) A web page (b) An audio clip
words manually
(c) A video clip (d) All of these
(d) All of the above
37. E-mail could be attached with files
such as 45. Which of the following memories must be
(a) text (b) image refreshed many times per second?
(a) Static RAM
(c) audio (d) All of these
(b) Dynamic RAM
38. A word processor is ............. . (c) ROM
(a) a program which processes the word, e.g. (d) EPROM
giving frequency of words, sorting of words,
etc. 46. In Print dialog box, you can select
(b) a program which provides the facility for (a) all pages in range (b) odd pages
creating, viewing, editing and (c) even pages (d) Any of these
manipulating text before printing. 47. By default, Calc positions text in a cell
(c) CPU microcomputer ............. .
(d) None of the above (a) left-aligned (b) right-aligned
39. It is an American site which provides (c) centered (d) justified
business and employment oriented 48. What will allow you to select entire
services. document?
(a) Twitter (b) LinkedIn (a) Select (b) Locate
(c) Facebook (d) Pinterest (c) Select all (d) None of these
40. Magnetic tape storage is primarily 49. In computer terminology, information
used for means
(a) backups (a) raw
(b) installing new programs (b) data
(c) rarely used software (c) data in more useful or intelligible form
(d) None of the above (d) alpha-numeric data program
41. GUI stands for 50. You can download UMANG app from
(a) Great User Interface (a) Google Play Store
(b) Geographical User Interface (b) Apple App Store
(c) Graphical User Interface (c) Both (a) and (b)
(d) None of the above (d) None of the above
180 Course on Computer Concepts (CCC)
91. A computer consists of Input and 96. The operating system is the most common
Output devices. type of application software.
92. The two parts of an E-mail address is 97. Two bits equal to one byte.
separated by @ symbol. 98. The binary language consists of only 2 digit(s).
93. HTML files are text files only. 99. With a wireless network, it is easier to
94. Ctrl+Y command is used to undo an relocate devices.
action. 100. The PC (Personal Computer) and the Apple
95. A byte can hold one kilobyte Macintosh are examples of two different
of data. programs.
Answers
1. (d) 2. (b) 3. (c) 4. (c) 5. (a) 6. (c) 7. (b) 8. (b) 9. (c) 10. (d)
11. (c) 12. (d) 13. (a) 14. (c) 15. (d) 16. (c) 17. (a) 18. (c) 19. (d) 20. (a)
21. (a) 22. (b) 23. (b) 24. (d) 25. (b) 26. (d) 27. (a) 28. (b) 29. (d) 30. (c)
31. (d) 32. (d) 33. (c) 34. (b) 35. (d) 36. (d) 37. (d) 38. (b) 39. (b) 40. (a)
41. (c) 42. (a) 43. (c) 44. (a) 45. (b) 46. (d) 47. (a) 48. (c) 49. (c) 50. (c)
51. True 52. True 53. True 54. False 55. False 56. False 57. True 58. False 59. True 60. False
61. True 62. True 63. False 64. True 65. True 66. False 67. False 68. False 69. False 70. False
71. False 72. True 73. False 74. True 75. True 76. True 77. True 78. False 79. False 80. False
81. False 82. False 83. True 84. False 85. False 86. True 87. True 88. False 89. True 90. False
91. True 92. True 93. True 94. False 95. False 96. False 97. False 98. True 99. True 100. False
182 Course on Computer Concepts (CCC)
CCC
Course on Computer Concepts
Practice Set 2
A. Select correct answer from given options.
1. Which of the following Ubuntu icons is 7. WWAN stands for
used for adding and removing softwares? (a) Wireless Wap Area Network
(a) Trash (b) Wireless Wide Area Network
(b) Ubuntu Software (c) Wireless Wide Array Network
(c) Firefox (d) Wireless World Area Network
(d) Search your computers
8. Which of the following is not a website
2. 1 MB is equal to which offers blog services?
(a) 500 GB (b) 1024 Byte (a) Joomla (b) Blogger
(c) 1000 KB (d) 1024 KB (c) Drupal (d) Telegram
3. Topology in computer network is 9. It is the set of computer instructions or
(a) organisation of a computer network programs that enables the hardware to
(b) speed of computer network perform different tasks.
(c) capacity of computer network (a) Software (b) Hardware
(d) volume flow in a computer network (c) Utility (d) Both (a) and (b)
4. All of the following are examples of 10. To select the entire document, use
storage devices except (a) Alt+F5 (b) Shift+A
(a) hard disk drives (b) printers (c) Ctrl+K (d) Ctrl+A
(c) floppy disk drives (d) CD drives
11. The operating system is the most
5. BHIM app was launched by ...... on 30th common type of
December, 2016. (a) communication software
(a) Narendra Modi (b) application software
(b) Rahul Gandhi (c) system software
(c) Manmohan Singh (d) word-processing software
(d) Yogi Aditya Nath
12. The steps and tasks needed to process
6. Computer software includes data, such as responses to questions or
(a) application programs clicking an icon, are called
(a) instructions
(b) operating system
(b) the operating system
(c) packaged programs
(c) application software
(d) All of the above
(d) the system unit
Practice Set 2 183
13. The two broad categories of software are 22. It is approximately one billion bytes.
(a) word processing and spreadsheet (a) Kilobyte (b) Bit
(b) transaction and application (c) Gigabyte (d) Megabyte
(c) windows and Mac OS
23. It is approximately one million bytes.
(d) system and application
(a) Gigabyte (b) Kilobyte
14. It is the program that manages the (c) Megabyte (d) Terabyte
hardware of the computer system
including the CPU, memory storage 24. This is the main editing view.
devices and input/output devices. (a) Normal view (b) Notes Page view
(a) Software (b) Operating system (c) Slide Sorter view (d) Master view
(c) Hardware (d) System software 25. Which of the rule mentioned below for
15. Input, output and processing devices range names is incorrect?
grouped together represent a(n) (a) Names cannot be the same as a cell
(a) mobile device reference
(b) information processing cycle (b) In a range name, you are allowed to use
(c) circuit board spaces or commas
(d) computer system (c) Range names can be directly used in
formulas
16. Which is not a basic function of a (d) None of the above
computer?
(a) Copy text (b) Accept input 26. Border can be applied to
(c) Process data (d) Store data (a) cells (b) paragraph
(c) text (d) All of these
17. ............ requires brief descriptions but
the main focus of the site is visual. 27. To start a slide show from beginning,
(a) Twitter (b) LinkedIn this shortcut key can be used.
(c) Pinterest (d) Facebook (a) F1 (b) F4
(c) F2 (d) F5
18. Mouse speed is
(a) adjustable through right click
28. In a worksheet, you can select
(b) not adjustable (a) the entire worksheet
(c) adjustable through control panel (b) rows
(d) None of the above (c) columns
(d) All of the above
19. Computers use which language to process
data? 29. Which area in a Calc window allows
(a) Processing (b) Kilobyte entering values and formulas?
(c) Binary (d) Representational (a) Title bar (b) Menu bar
(c) Formula bar (d) Standard toolbar
20. The output quality of a printer is
measured by 30. Which of the following is the oldest
(a) dots per unit (b) dots per inch spreadsheet package?
(c) dot per time (d) None of these (a) VisiCalc (b) Lotus 1-2-3
(c) Excel (d) StarCalc
21. EEPROM stands for
(a) Electrically Erasable Programmable Read
31. There can be many ways to insert page
Only Memory number in a document. Which of the
(b) Electronic Erasable Programmable Read
following lets you insert page number?
(a) Page Number from Insert Menu
Only Memory
(b) Page Setup from File Menu
(c) Easily Erasable Programmable Read Only
Memory (c) Footnote from Insert Menu
(d) None of the above (d) Both (a) and (c)
184 Course on Computer Concepts (CCC)
32. Where can you find the Draw Table 41. Magnetic disks are the most popular
option? medium for
(a) Pages tab (b) Table tab (a) Direct access (b) Sequential access
(c) Text tab (d) Symbols tab (c) Both (a) and (b) (d) None of these
33. Which of the following methods cannot be 42. In word document, alignment refers to
used to enter data in a cell? the position of text relative to the
(a) Pressing an Arrow key (a) margins (b) paragraphs
(b) Pressing the Tab key (c) header (d) footer
(c) Pressing the Esc key
43. After a table has been created, which of the
(d) Clicking the Enter button to the formula
following operations cannot be performed?
bar
(a) Insert rows in a table
34. Which statement is valid about magnetic (b) Delete and insert columns
tape? (c) Split the table into two tables
(a) It is a plastic ribbon. (d) None of the above
(b) It is coated on both sides with iron oxide.
44. Word processing, spreadsheet and photo
(c) It can be erased and reused.
(d) All of the above editing are examples of
(a) application software
35. Operating system (b) system software
(a) is an interface between the user and the (c) operating system software
computer (d) platform software
(b) manages all resources
(c) does all process management 45. It is also called the brain of the computer, is
(d) All of the above responsible for processing data.
(a) Motherboard
36. Embedded software is used in (b) Memory
(a) online railway information system (c) RAM
(b) mobile phones (d) Central Processing Unit (CPU)
(c) E-learning software
(d) multimedia movies
46. Cursor is a
(a) pointing device (b) thin blinking line
37. What do folders let you do? (c) pixel (d) None of these
(a) Organise the files on a disk
(b) Ensure that the computer starts properly
47. Undo is similar to
(a) Ctrl + X (b) Ctrl + C
(c) Names your files
(c) Ctrl + Z (d) None of these
(d) Creates a file allocation table
38. In a Spreadsheet, a statement that 48. The ............. effects are special types of
performs a calculation is called a/an effects that allow you to specify how you
(a) formula (b) reference to navigate from one slide to the other?
(c) argument (d) parameter (a) special (b) animation
(c) transition (d) All of these
39. It refers to protecting information from
being accessed by unauthorised parties. 49. How can you go back to previous slide
(a) Confidentiality during presentation?
(b) Integrity (a) Space bar (b) Left Arrow key
(c) Availability (c) Right Arrow key (d) Shift key
(d) Reliability 50. ....... option will first ask you that, Are
40. The device, utilised for connection of you sure you want to move this folder to
Internet is the Recycle Bin?
(a) modem (b) web browser (a) Paste (b) Cut
(c) Delete (d) Copy
(c) website (d) LAN
Practice Set 2 185
53. Memory management is a main function 73. Character size in LibreOffice Impress is
of the operating system. measured in font size.
54. Term ‘security’ implies ‘cyber security’. 74. A web browser is a hardware that is
connected to your computer that allows it
55. A cell entry can be edited either in the to communicate with other devices on a
cell or in the formula bar. network.
56. Hard disk can store more information as 75. A computer is not the most efficient
compared to floppy disk. method for solving all types of problems.
57. Biometric scanners are used to detect 76. Download means to copy or save a file
illnesses. from your computer to another.
58. Microphones are used to capture video 77. Mouse is a pointing device.
into electronic form.
78. HTTP stands for HyperText Transfer
59. Keyboard is not a game controller. Protocol.
60. Microphones are connected directly to 79. Octal is a number system.
webcam using firewire and flash memory
cards. 80. Text can be wrapped around an image.
61. A computer is a mechanical machine 81. UMANG provides seamless integration
which is used only for record keeping. with other digital India services like
DigiLocker.
62. Barcode Reader is an input device to play
sound. 82. B2C means Business-to-Consumer.
63. Simple Mail Transfer Protocol is a 83. Using E-Commerce you can save time,
protocol which is used to send and money and efforts.
receive E-mails. 84. Chatting is one of the most important
64. There are 12 function keys on keyboard. facility of the Internet.
65. Wireless Local Area Network uses phone 85. Network is a group of computers setup to
lines or fiber optic cables. communicate with one another.
66. A program that manages all other 86. E-mail is a short form of Electronic mail.
programs in a computer is called 87. Make changes in an existing document is
operating system. called editing the document.
67. Cookie is a message given to a web 88. Tele-communication devices permit users
browser by a web server. to send and receive information to/from
68. In E-mail address [email protected], another person or location.
domain name is “me”. 89. Software is the set of instructions that
69. A system can have more than one web your hardware executes to carry out a
browser installed at the same time. specific task.
92. eWallet do all have the same 96. Security system of LINUX is very strong.
transactions process. 97. Android belongs to the family of UNIX.
93. Table is a collection of rows and columns. 98. The computer and other devices that
94. Computers are fast machines but communicate with each other on a
inaccurate. network are called Hub.
95. The most common type of memory that 99. DVD is not a form of optical storage.
the computer uses to process data is 100. There is no minimum limit of fund
ROM. transfer through NEFT.
Answers
1. (b) 2. (d) 3. (a) 4. (b) 5. (a) 6. (d) 7. (b) 8. (d) 9. (a) 10. (d)
11. (c) 12. (a) 13. (d) 14. (b) 15. (d) 16. (a) 17. (c) 18. (c) 19. (c) 20. (b)
21. (a) 22. (c) 23. (c) 24. (a) 25. (b) 26. (d) 27. (d) 28. (d) 29. (c) 30. (a)
31. (a) 32. (b) 33. (c) 34. (a) 35. (d) 36. (b) 37. (a) 38. (a) 39. (a) 40. (a)
41. (c) 42. (a) 43. (c) 44. (a) 45. (d) 46. (b) 47. (c) 48. (c) 49. (b) 50. (c)
51. False 52. True 53. True 54. True 55. True 56. True 57. False 58. False 59. True 60. False
61. False 62. False 63. True 64. True 65. False 66. True 67. True 68. False 69. True 70. False
71. False 72. False 73. True 74. False 75. True 76. True 77. True 78. True 79. True 80. True
81. True 82. True 83. True 84. True 85. True 86. True 87. True 88. True 89. True 90. False
91. False 92. False 93. True 94. False 95. False 96. True 97. False 98. False 99. False 100. True
Practice Set 3 187
CCC
Course on Computer Concepts
Practice Set 3
A. Select correct answer from given options.
1. A communication port is used to 6. Which area in a Calc window allows you
(a) communicate with hard disks to enter values and formulas?
(b) download files (a) Title Bar (b) Menu Bar
(c) communicate with other computer (c) Formula Bar (d) Standard Toolbar
peripherals
(d) None of the above
7. To make the number pad act as directional
arrows, you can press the ....... key.
2. Connections to the Internet using a (a) Num Lock (b) Caps Lock
phone line and a modem are called .......... (c) Arrow Lock (d) Shift
connections.
(a) digital
8. What is Windows?
(a) Program for designing window
(b) dial-up
(b) An operating system
(c) broadband
(c) An application program
(d) Both (b) and (c)
(d) A game
3. To insert a new slide in a presentation,
9. Which one of the following is a valid
.......... key is used.
E-mail?
(a) Ctrl+N (b) Ctrl+S
(a) [email protected]
(c) Ctrl+M (d) None of these
(b) [email protected]
4. In which of the following fund transfer (c) @[email protected]
mechanisms, can funds be moved from (d) sales.enquiries.guilds.co.uk
one bank to another and where the
transaction is settled instantly without
10. The fastest printer among the given
options is
being bunched with any other
(a) jet printer (b) laser printer
transaction?
(c) inkjet printer (d) daisy-wheel printer
(a) RTGS (b) NEFT
(c) TT (d) EFT 11. DMA stands for
5. Which of the following bars is not (a) Direct Memory Access
available in LibreOffice Writer? (b) Direct Module Access
(a) Toolbar (b) Formula bar (c) Distinct Memory Access
(c) Menu bar (d) All of these (d) Distinct Memory Allocation
188 Course on Computer Concepts (CCC)
31. The ........ tells the computer how to use 40. Which type of software manages the
its components. computer processes functioning as an
(a) Utility interface, connecting as an interface,
(b) Network connect user, application software and
(c) Operating system the hardware?
(d) Application program (a) Application software (b) Utility program
(c) Translator program (d) Operating system
32. Virtual memory is
(a) memory on the hard disk that the CPU 41. The most common input devices are the
uses as an extended RAM ........... and the ........ .
(b) in RAM (a) Microphone, Printer
(c) only necessary if you do not have any RAM (b) Scanner, Monitor
in your computer (c) Digital Camera, Speakers
(d) a backup device for floppy disks (d) Keyboard, Mouse
33. Which of the following is not transition 42. The ........... performs simple mathematics
effect? for the CPU.
(a) Cover down (b) Box in (a) ALU (b) DIMM (c) Bus (d) Register
(c) Slide sorter (d) Venetian blind 43. Hard disk drives are considered .............
34. When a computer displays a report on storage.
monitor, this output is called (a) Flash (b) Non-volatile
(a) hard copy (b) soft copy (c) Temporary (d) Non-permanent
(c) COM (d) None of these 44. …… is the introducer of Internet explorer.
35. A tree structured file directory system (a) Microsoft (b) IBM
(a) allows easy storage and retrieval of file (c) Intel (d) Pentium
names 45. The small pictures on desktop are called
(b) is a much debated unnecessary feature (a) bar (b) icons (c) view (d) cursor
(c) is not essential when we have millions
of files 46. ...... allows you to improve customer’s
(d) None of the above experience by detecting problems and
improving the process.
36. The basic unit of a worksheet into which (a) IoT (b) FutureSkills
you enter data in Calc is called as (c) VR (d) AI
(a) tab (b) box
(c) cell (d) range 47. A computer consists of
(a) a CPU (b) a memory
37. The name a user assigns to a document (c) I/O unit (d) All of these
is called a
(a) file name (b) program 48. The file extension of LibreOffice Writer
(c) record (d) data document is ......... .
(a) .docx (b) .odt
38. Something which has easily understood (c) Both (a) and (b) (d) .txt
instructions is said to be
(a) user friendly (b) information 49. A saved document is referred to as a
(c) word processing (d) icon (a) file (b) word (c) folder (d) project
39. Which of the following are commonly 50. A ........... is a collection of computers and
found on web pages? device connected together.
(a) Internet (b) Hyperlinks (a) Protocol (b) Memory card
(c) Intranet (d) All of these (c) Network (d) CPU
190 Course on Computer Concepts (CCC)
54. Output devices store instructions or data 74. In Impress, when you use Save As web
that the CPU processes. page, the presentation is turned into an
animated gif image.
55. Data can be a number, a word, a picture
or a sound. 75. Processed data is defined as that type of
data which is processed and represented
56. The design of the network is called the in a useful manner to the user.
network transmission.
76. The background of any web page is
57. Computers process data into information always white in color.
by working exclusively with numbers.
77. Web browser refers to a software
58. To maximise or restore a selected window application that allows you to interact
press Ctrl+F10. with the information on the WWW.
59. Cloud computing has considerable 78. ROM, which stands for Read Only
overlap with SaaS. Memory and is also known as firmware,
60. Dial-up is not a type of Broadband cannot be written on or erased by the
Internet Connection. computer user.
61. The name of the lowest strip of desktop 79. The data projector is portable and allows
is title bar. the presenter to place the slides onto any
surface.
62. Modern computers use the binary
number system. 80. The CPU and memory are located on a
special circuit board in the system unit
63. LINUX is a system software. called the motherboard.
64. The primary function of I/O peripherals 81. The default file extension for all Writer
is to facilitate computer-to-computer data document is .odt.
transmission.
82. PDA stands for Personal Digital
65. Ctrl + B is used to make the text bold in Assistant.
LibreOffice Writer.
83. Non-printing characters like spacebar,
66. Railway Ticket Reservation System is not enter key, tab key, etc., are not printed
an example of online processing system. on paper when you print a document.
67. Strictly defined, a computer is a data 84. Corporations might save money on IT
processing device. support.
68. You cannot open two different workbooks 85. The act of exploring web is known as
in Calc at the same time. surfing.
69. Data stored on magnetic disk can be 86. PlN has to be validated during each and
accessed directly. every transaction.
70. Print preview does not allow editing of 87. E-mail can be used to broadcast
the document. messages, but only within your own
71. Even and odd pages have different company.
footers in Writer. 88. 1 KB is equal to 1024 bytes.
Practice Set 3 191
Answers
1. (c) 2. (d) 3. (c) 4. (a) 5. (b) 6. (c) 7. (a) 8. (b) 9. (b) 10. (b)
11. (a) 12. (b) 13. (d) 14. (a) 15. (b) 16. (d) 17. (b) 18. (a) 19. (b) 20. (b)
21. (d) 22. (b) 23. (d) 24. (d) 25. (a) 26. (b) 27. (b) 28. (c) 29. (a) 30. (d)
31. (c) 32. (a) 33. (c) 34. (b) 35. (a) 36. (c) 37. (a) 38. (a) 39. (b) 40. (d)
41. (d) 42. (a) 43. (a) 44. (a) 45. (b) 46. (a) 47. (d) 48. (d) 49. (a) 50. (c)
51. True 52. False 53. True 54. False 55. True 56. False 57. False 58. False 59. True 60. False
61. False 62. True 63. Ture 64. False 65. True 66. False 67. True 68. False 69. False 70. True
71. True 72. True 73. True 74. False 75. True 76. False 77. True 78. True 79. True 80. True
81. True 82. True 83. True 84. True 85. True 86. True 87. False 88. True 89. True 90. False
91. True 92. True 93. False 94. False 95. True 96. True 97. True 98. True 99. True 100. True
192 Course on Computer Concepts (CCC)
CCC
Course on Computer Concepts
Practice Set 4
A. Select correct answer from given options.
1. ........ are devices used to transmit data 8. Personal computers can be connected
over tele-communication lines. together to form a
(a) Drives (b) Drives bays (a) server (b) super computer
(c) Modems (d) Platforms (c) enterprise (d) network
2. An error is also known as 9. A word in a web page that when clicked,
(a) debug (b) bug opens another document is called
(c) cursor (d) None of these (a) anchor (b) hyperlink
(c) reference (d) URL
3. What difference does the fifth generation
computers have from other generation 10. The Delete key deletes the text
computers? (a) to the right of insertion point
(a) Use of artificial language (b) to the left of insertion point
(b) Use of OOP concepts (c) to the both sides of insertion point
(c) Both (a) and (b) (d) None of the above
(d) None of the above
11. Flash drive is a type of
4. In LibreOffice Writer, to cut something (a) ROM (b) software
which of the following shortcut keys is (c) hardware (d) memory
used?
(a) Ctrl + C (b) Ctrl + X 12. A dot or symbol placed at the front of
(c) Ctrl + V (d) None of these some text to highlight, is known as
(a) drop cap (b) bullets
5. Which is not a common feature of (c) symbol (d) None of these
software application?
(a) Menu (b) Windows (c) Help (d) Search 13. PROM in computer system stands for
(a) Programmable Read Only Memory
6. Dot-matrix, Inkjet and Laser are all (b) Pulse Read Only Memory
types of which computer peripherals? (c) Packet Read Only Memory
(a) Keyboards (b) Softwares
(d) Parallel Read Only Memory
(c) Monitors (d) Printers
14. Data gathering in computer means, they
7. NEFT stands for allow to use ............ data.
(a) National Electronic Funds Transfer (a) Present
(b) Negotiated Efficient Fund Transfer (b) Input
(c) National Efficient Fund Transfer (c) Output
(d) Non-Effective Fund Transfer (d) Store
Practice Set 4 193
15. Typical acronym of reusable optical 24. A ............ is a pre-designed format of text
storage will be and color scheme.
(a) CD (b) CD-RW (a) Template
(c) DVD (d) RPM (b) Slide
(c) Presentation
16. Storage which stores or retains data after
(d) None of the above
power off is called
(a) volatile storage (b) non-volatile storage 25. A computer program that converts entire
(c) sequential storage (d) direct storage program into machine language in a
single run is called a/an
17. You would use ............ software to create
(a) interpreter (b) simulator
spreadsheets, type documents and edit
(c) compiler (d) commander
photos.
(a) Application (b) Utility 26. In order to play and hear sound on a
(c) System (d) Operating computer one needs
(a) sound card and speaker
18. The term ‘operating system’ means
(b) a microphone
(a) a set of programs which controls computer
(c) Both (a) and (b)
working
(d) None of the above
(b) it is an interface between software and
hardware 27. The software that allows users to surf
(c) Both (a) and (b) the Internet is called a/an ............ .
(d) it is a programming language (a) Search engine
(b) Internet Service Provider (ISP)
19. Most websites have a main page, the
(c) Internet Surfing Provider
............ which acts as a doorway to the
(d) Web browser
rest of the website pages.
(a) Search engine (b) Home page 28. Which of the following is not a feature of
(c) Browser (d) URL Impress?
(a) Adding animations to the slides
20. ............ is a collection of many separate
networks. (b) Printing the speaker’s notes along with the
slide images
(a) A WAN (b) An Internet
(c) A LAN (d) None of these (c) Linking a slide transition with a laser
printer
21. Which of the following is the time and (d) Printing more than one slide on a single
place where a retail transaction is sheet
completed?
(a) PoS (b) IoT (c) AI (d) VR 29. Storage capacity of magnetic disk
depands on
22. Which of the following is not one of the (a) tracks per inch of surface
four major data processing functions of a (b) bits per inch of tracks
computer? (c) disk pack in disk surface
(a) Gathering data (d) All of the above
(b) Processing data into information
(c) Analyzing the data or information 30. This was the first network.
(d) Storing the data or information (a) CSNET (b) NSFNET
(c) ANSNET (d) ARPANET
23. Which of the following is not a
transmission medium? 31. A ............ is the term used when a search
(a) Modem engine returns a web page that matches
(b) Coaxial cables the search criteria.
(c) Telephone lines (a) Blog (b) Hit
(d) Microwave transmission (c) Link (d) None of these
194 Course on Computer Concepts (CCC)
32. The classic model for information 41. What is the full form of CD-R?
security defines objectives of security: (a) Collect Data-Readable
maintaining (b) Compact Disc-Recordable
(a) confidentiality (b) integrity (c) Cover Drink
(c) availability (d) All of these (d) Carbon Data
33. Which of the following looses its contents 42. A mouse, trackball and joystick are the
when the computer is turned OFF ? examples of
(a) RAM (b) ROM (a) pointing devices (b) pen input devices
(c) PROM (d) All of these (c) output devices (d) None of these
34. To close a presentation, you have to press 43. The utility which is used to increase the
(a) Ctrl+U (b) Ctrl+Shift speed of programs is called
(c) Ctrl+H (d) Ctrl+W (a) disk defragmenter (b) disk cleanup
35. HTML stands for (c) disk formatter (d) None of these
(a) HyperText Making Links 44. The mouse .... usually appears as an arrow.
(b) HyperText Markup Language (a) cursor (b) pointer
(c) Higher Textual Marking of Links (c) insertion line (d) None of these
(d) HyperText Mixer of Links
45. CU is a part of
36. What is a shell? (a) CPU (b) RAM
(a) It is a hardware component (c) ROM (d) None of these
(b) It is a command interpreter
(c) It is a part of computer 46. CPU reads the information from
(d) It is a tool in CPU scheduling secondary memory
(a) through cache
37. A computer program that translates one (b) first, information is transferred to main
program instructions at a time into a memory and from there, the CPU reads
machine language is called a/an (c) through DMA
(a) interpreter (b) CPU
(d) None of the above
(c) compiler (d) None of these
47. You can use the Tab key to
38. The instructions for starting the
(a) move a cursor across the screen
computer are stored in
(b) indent a paragraph
(a) Random Access Memory
(c) Both (a) and (b)
(b) CD-ROM
(d) move the cursor down the screen
(c) Read Only Memory Chip
(d) All of the above 48. ............ is done when the computer is
turned on and the operating system is
39. Which is not the search engine?
loading.
(a) altavista.com
(a) Booting (b) Flashing
(b) google.com
(c) Tracking (d) Taping
(c) facebook.com
(d) yahoo.com 49. This mobile App reduces the use of
physical documents and fake documents.
40. The term ‘user interface’ refers to (a) GARV App (b) Mygor App
(a) what the user sees on the screen and how (c) Digilocker App (d) Online RTI App
they can interact with it
(b) how the operating system responds to the 50. What is the full form of OMR?
user commands (a) Optical Mark Reader
(c) the means by which the user interacts with (b) Optical Marked Reading
the peripheral devices on the computer (c) Optical Moon Right
(d) None of the above (d) Optical Me Right
Practice Set 4 195
65. AEPS does not increase the reach to 84. For sound recording, speaker is
rural areas as banking executives. necessary.
66. Scanner is an input device used to 85. The well known non-impact printers are
captures videos. inkjet laser printers.
67. A series of specially designed documents, 86. Headers and footers are displayed only
all linked together to be viewed on the on first page in a document.
Internet is known as World Wide Web. 87. Memory management is a main function
68. Pixel is the number of dots per inch. of CPU.
69. Most computer-related errors are the 88. Airtel Money is a wallet.
result of improperly entered data. 89. USB stands for Uniform Serial Bus.
70. CAPS LOCK key helps you in typing 90. Application software acts as an interface
letters in uppercase. between operating system and hardware.
196 Course on Computer Concepts (CCC)
91. Pen drive is a type of secondary 96. Cathode Ray Tube (CRT) and Liquid Crystal
memory data storage device. Display (LCD) are types of mouse available in
the market.
92. The data once stored in the CD-R
discs, cannot be erased. 97. An icon on the desktop that represents a
temporary holding place for files that are
93. The set of programs necessary to deleted is called as recycle bin.
carry out operations for a specified
job is called hardware. 98. DVD-ROM is an optical disc that is capable of
storing data from 4.7 GB to 17 GB.
94. Star topology requires a multi-point
connections. 99. When you turn on background printing, you can
continue working in Impress while you print.
95. Unit price is a valid name for a cell
or range. 100. Primary memory is also known as main
memory of the computer.
Answers
1. (c) 2. (b) 3. (a) 4. (b) 5. (b) 6. (d) 7. (a) 8. (d) 9. (b) 10. (a)
11. (d) 12. (b) 13. (a) 14. (d) 15. (b) 16. (b) 17. (a) 18. (c) 19. (b) 20. (b)
21. (a) 22. (c) 23. (a) 24. (a) 25. (c) 26. (a) 27. (d) 28. (c) 29. (d) 30. (d)
31. (b) 32. (d) 33. (a) 34. (d) 35. (b) 36. (b) 37. (a) 38. (c) 39. (c) 40. (a)
41. (b) 42. (a) 43. (a) 44. (b) 45. (a) 46. (b) 47. (b) 48. (a) 49. (c) 50. (a)
51. False 52. False 53. False 54. True 55. False 56. False 57. True 58. False 59. True 60. False
61. True 62. False 63. True 64. False 65. False 66. False 67. False 68. False 69. True 70. True
71. True 72. True 73. True 74. True 75. True 76. True 77. True 78. False 79. True 80. True
81. True 82. True 83. True 84. False 85. True 86. False 87. False 88. True 89. False 90. False
91. True 92. True 93. False 94. True 95. True 96. False 97. True 98. False 99. False 100. True
CCC
Course on Computer Concepts
Practice Set 5
A. Select correct answer from given options.
1. The ..... effects are used to apply movement 8. Which operation is not performed by
to the images and objects in slides. computer?
(a) Transition (b) Animation (a) Inputting (b) Processing
(c) Both (a) and (b) (d) None of these (c) Controlling (d) Understanding
2. The list of coded instructions is called 9. When you copy a formula
(a) computer program (b) algorithm (a) Calc edits cell references in the newly
(c) utility program (d) None of these copied formula
(b) Calc adjusts absolute cell references
3. The time computer takes to locate data
and instructions and make them (c) Calc erases the original copy of the formula
available to the CPU is known as (d) Calc doesn’t adjust relative cell references
(a) clock speed (b) a processing cycle 10. The maximum amount to be remitted
(c) CPU speed (d) access time through NEFT is
4. Which output device is used for (a) No limit (b) 10 Lacs (c) 5 Lacs (d) 2 Lacs
translating information from a computer 11. CD-ROM stands for
into pictorial form on paper? (a) Compactable Read Only Memory
(a) Mouse (b) Plotter (b) Compact Data Read Only Memory
(c) Punched cards (d) None of these (c) Compactable Disc Read Only Memory
5. A general purpose single user (d) Compact Disc Read Only Memory
micro-computer designed to be operated 12. Operating system is the most common
by one person at a time is type of .............. software.
(a) special purpose computer (a) Management (b) Application
(b) KIPS (c) System (d) Communication
(c) KB (d) PC
13. What is the meaning of G in RTGS?
6. With the help of Attach Files option in New (a) General (b) Gross (c) Great (d) Generate
Message window, user can send ...... file.
(a) .doc (b) .pdf 14. .............. is a form of permanent memory
(c) .jpg (d) All of these that holds all the instructions.
(a) Network Interface Card (NIC)
7. IT stands for (b) CPU
(a) Integrated Technology (c) RAM (d) ROM
(b) Interesting Technology
(c) Information Technology
15. Netiquette is a short form for
(a) Net Etiquette (b) Internet Etiquette
(d) Intelligent Technology
(c) Etiquette (d) None of these
198 Course on Computer Concepts (CCC)
16. A website address is a unique name that 27. Chief component of first generation
identifies a specific .............. on the Web. computer was
(a) Web browser (b) PDA (a) translators (b) vaccum tubes
(c) Website (d) Link (c) integrated circuits (d) None of these
17. Line spacing refers to 28. Which of the following is required to
(a) the space between the lines of text communicate between two computers?
(b) the height of lines (a) Communication software
(c) the length of lines (b) Protocol
(d) Both (a) and (c) (c) Communication hardware
(d) All of the above
18. A Calc workbook is a collection of
(a) workbooks (b) charts 29. In the URL, http://www.prenhall.com, the
(c) worksheets (d) Both (b) and (c) portion labelled http is the
(a) host (b) domain name
19. This platform will ensure that all the (c) protocol (d) top-level domain
needs are fulfilled.
(a) FutureSkills (b) IoT 30. A dedicated computer
(c) Blockchain (d) Robotics (a) is used by one person only
(b) is assigned one and only one task
20. Binary means (c) uses only one kind of software
(a) there are two possibilities: on and off (d) is meant for application software
(b) the same as a byte: 8 bits
(c) there are three options: 0, 1 and 2. 31. The number of pixels displayed on a
(d) that computers really need to have three or
screen is
(a) resolution (b) color depth
more options
(c) refresh rate (d) viewing size
21. To log on to the network, a user must
enter their 32. MAC address is a ……… byte address.
(a) money (a) 6 (b) 4 (c) 8 (d) 2
(b) username and password 33. Accidently, you made a mistake when
(c) full name working with your document. How can
(d) job profile you undo that action?
(a) Ctrl+X (b) Ctrl+Y (c) Ctrl+Z (d) Ctrl+U
22. LibreOffice Calc is a powerful
(a) word processing software 34. The ...... shows all the websites and pages
(b) spreadsheet package that you have visited over a period of time.
(c) DBMS package (a) Status bar (b) Task bar
(d) communication package (c) History list (d) Tool bar
23. BHIM app is used to make simple, easy 35. Which of the following is/are domain
and quick payment transactions using name suffixe(s)?
(a) Password (b) UPI (a) .com (b) .net
(c) Phone number (d) Aadhaar number (c) Both (a) and (b) (d) None of these
24. The hardware device commonly referred 36. A permanent memory, which holds data
to as the brain of the computer is the and instructions for start-up the computer
(a) RAM chip (b) data input and does not erase data after power off.
(c) CPU (d) secondary storage (a) NIC (b) CPU
(c) RAM (d) ROM
25. In which section , Display icon is present?
(a) Hardware (b) Personal 37. Each Calc file is called a workbook because
(c) System (d) Wallpaper (a) it can contain text and data.
(b) it can be modified.
26. Websites contain many pages that can be (c) it can contain many worksheets and
navigated using chartsheets.
(a) bars (b) threads (c) links (d) strings (d) None of the above
Practice Set 5 199
38. Which command is used to find MAC (b) collect signals from low speed terminals
address of computer? and transmit them over a single.
(a) ipconfig /MAC/ all (b) ipconfig /all (c) line modulate electrical digital signal into
(c) ipconfig / mac (d) ipconfig an analog signal.
(d) demodulate an analog signal into digital
39. An output device that uses words or signal.
message recorded on a magnetic medium
to produce audio response is 46. A(n) .............. is a private corporate
(a) magnetic tape (b) voice response unit network, used exclusively by company
(c) voice recognition unit employees.
(d) voice band (a) Internet (b) local area network
(c) peer-to-peer (d) intranet
40. A gigabyte is equal to
(a) 1024 GB (b) 1024 MB 47. The keystrokes Ctrl+I is used to
(c) 1024* 1024 MB (d) 1024 KB (a) increase font size
(b) insert a line break
41. Data is in form of (c) indicate the text show be bold
(a) numbers and characters
(d) applies italic format to the selected text
(b) images
(c) sound (d) All of the above 48. Which of the following is not a vaild data
type in Calc?
42. The term bit is short for (a) Number (b) Character
(a) megabyte (b) binary language (c) Label (d) Date/time
(c) binary digit (d) binary number
49. ............ allows LAN users to share
43. The Impress view that displays only text computer programs and data.
(title and bullet) is (a) Communication server
(a) slide show (b) slide sorter view (b) Print server
(c) notes page view (d) outline view (c) File server
44. RTGS stands for (d) None of the above
(a) Real Time Genocide Settlement 50. The E-Commerce domain that involves
(b) Regional Time Genocide Settlement business activity initiated by the consumer
(c) Real Time Gross Settlement and targeted to businesses is known as
(d) Real Time General Settlement (a) Consumer-to-Consumer (C2C)
45. The modem does not (b) Business-to-Business (B2B)
(a) produce sound similar to those you hear on (c) Consumer-to-Business (C2B)
the touch tone telephone. (d) Business-to-Consumer (B2C)
65. OMR is used for correction of MCQ 83. Debugging is the process of finding errors
paper. in software code.
66. KB stands for kit byte. 84. Computer is an electronic device.
67. There is only one way to start Writer, 85. File structure in Linux is hierarchical.
which is by Insert shortcut bar. 86. Ubuntu does not support office suite
68. ‘Add/remove tools’ is found in Accessories. called LibreOffice.
69. Super computer is a symbol of fifth 87. ‘Softcopy’ is a term applied to multiple
generation computer. pages of computer-printed reports.
70. Windows is the operating system of 88. By default, the hyperlink color is blue.
computer. 89. A cache memory is faster than main
71. In star topology, any node can memory.
communicate with any other node 90. 1 TB = 1024 MB
directly.
91. DBMS stands for Database Management
72. One of the advantages of a PC network is System.
that the access to the Internet is quicker.
92. Point to point connection, more than two
73. You can apply sound effects to your devices can share a single link.
slides in your presentation.
93. Full form of ‘E-Commerce’ is Electronic
74. The small pictures you see on the Commerce.
desktop are called Task bar.
94. Multimedia software helps you carry out
75. Motherboard is also known as system tasks, such as typing a document or
board. creating a spreadsheet.
76. RTOS stands for Real Time Operating 95. You can cut or copy and paste a table to
System. an other location in a document, just as
77. Computer cannot understand the binary you would text.
language. 96. Payroll is a type of application software.
78. RAM is a temporary memory. 97. The type of operating system software,
79. Audio output devices can output only music. you use depends on your computer’s
80. PPP is a dial account which puts your application.
computer directly on the Internet. 98. RAM is a volatile memory.
81. LibreOffice Impress is a spreadsheet 99. Word processing software is used to
software. create presentation.
82. Computer is a manual machine. 100. Drone camera is an example of mobile app.
Answers
1. (c) 2. (a) 3. (d) 4. (b) 5. (d) 6. (d) 7. (c) 8. (d) 9. (a) 10. (a)
11. (d) 12. (c) 13. (b) 14. (d) 15. (b) 16. (c) 17. (a) 18. (d) 19. (a) 20. (a)
21. (b) 22. (b) 23. (b) 24. (c) 25. (a) 26. (c) 27. (b) 28. (d) 29. (c) 30. (b)
31. (a) 32. (a) 33. (c) 34. (c) 35. (c) 36. (d) 37. (c) 38. (b) 39. (b) 40. (b)
41. (d) 42. (c) 43. (d) 44. (c) 45. (a) 46. (b) 47. (d) 48. (b) 49. (c) 50. (c)
51. False 52. True 53. False 54. False 55. True 56. True 57. True 58. True 59. False 60. False
61. False 62. False 63. True 64. True 65. True 66. False 67. False 68. False 69. False 70. True
71. False 72. False 73. True 74. False 75. True 76. True 77. False 78. True 79. False 80. True
81. False 82. False 83. True 84. True 85. True 86. False 87. False 88. True 89. True 90. False
91. True 92. True 93. True 94. False 95. True 96. True 97. False 98. True 99. False 100. False